WorldWideScience

Sample records for networked combat capability

  1. Abductive networks applied to electronic combat

    Science.gov (United States)

    Montgomery, Gerard J.; Hess, Paul; Hwang, Jong S.

    1990-08-01

    A practical approach to dealing with combinatorial decision problems and uncertainties associated with electronic combat through the use of networks of high-level functional elements called abductive networks is presented. It describes the application of the Abductory Induction Mechanism (AIMTM) a supervised inductive learning tool for synthesizing polynomial abductive networks to the electronic combat problem domain. From databases of historical expert-generated or simulated combat engagements AIM can often induce compact and robust network models for making effective real-time electronic combat decisions despite significant uncertainties or a combinatorial explosion of possible situations. The feasibility of applying abductive networks to realize advanced combat decision aiding capabilities was demonstrated by applying AIM to a set of electronic combat simulations. The networks synthesized by AIM generated accurate assessments of the intent lethality and overall risk associated with a variety of simulated threats and produced reasonable estimates of the expected effectiveness of a group of electronic countermeasures for a large number of simulated combat scenarios. This paper presents the application of abductive networks to electronic combat summarizes the results of experiments performed using AIM discusses the benefits and limitations of applying abductive networks to electronic combat and indicates why abductive networks can often result in capabilities not attainable using alternative approaches. 1. ELECTRONIC COMBAT. UNCERTAINTY. AND MACHINE LEARNING Electronic combat has become an essential part of the ability to make war and has become increasingly complex since

  2. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  3. Medical capability team: the clinical microsystem for combat healthcare delivery in counterinsurgency operations.

    Science.gov (United States)

    Clark, Susz; Van Steenvort, Jon K

    2008-01-01

    Today's operational environment in the support of counterinsurgency operations requires greater tactical and operational flexibility and diverse medical capabilities. The skills and organizations required for full spectrum medical operations are different from those of the past. Combat healthcare demands agility and the capacity for rapid change in clinical systems and processes to better support the counterinsurgency environment. This article proposes the Army Medical Department (AMEDD) develop and implement the medical capability team (MCT) for combat healthcare delivery. It discusses using the concept of the brigade combat team to develop medical capability teams as the unit of effectiveness to transform frontline care; provides a theoretical overview of the MCT as a "clinical microsystem"; discusses MCT leadership, training, and organizational support, and the deployment and employment of the MCT in a counterinsurgency environment. Additionally, this article proposes that the AMEDD initiate the development of an AMEDD Combat Training Center of Excellence to train and validate the MCTs. The complexity of combat healthcare demands an agile and campaign quality AMEDD with joint expeditionary capability in order to promote the best patient outcomes in a counterinsurgency environment.

  4. Meta-path based heterogeneous combat network link prediction

    Science.gov (United States)

    Li, Jichao; Ge, Bingfeng; Yang, Kewei; Chen, Yingwu; Tan, Yuejin

    2017-09-01

    The combat system-of-systems in high-tech informative warfare, composed of many interconnected combat systems of different types, can be regarded as a type of complex heterogeneous network. Link prediction for heterogeneous combat networks (HCNs) is of significant military value, as it facilitates reconfiguring combat networks to represent the complex real-world network topology as appropriate with observed information. This paper proposes a novel integrated methodology framework called HCNMP (HCN link prediction based on meta-path) to predict multiple types of links simultaneously for an HCN. More specifically, the concept of HCN meta-paths is introduced, through which the HCNMP can accumulate information by extracting different features of HCN links for all the six defined types. Next, an HCN link prediction model, based on meta-path features, is built to predict all types of links of the HCN simultaneously. Then, the solution algorithm for the HCN link prediction model is proposed, in which the prediction results are obtained by iteratively updating with the newly predicted results until the results in the HCN converge or reach a certain maximum iteration number. Finally, numerical experiments on the dataset of a real HCN are conducted to demonstrate the feasibility and effectiveness of the proposed HCNMP, in comparison with 30 baseline methods. The results show that the performance of the HCNMP is superior to those of the baseline methods.

  5. Combating Forest Corruption: the Forest Integrity Network

    NARCIS (Netherlands)

    Gupta, A.; Siebert, U.

    2004-01-01

    This article describes the strategies and activities of the Forest Integrity Network. One of the most important underlying causes of forest degradation is corruption and related illegal logging. The Forest Integrity Network is a timely new initiative to combat forest corruption. Its approach is to

  6. Architecture for an integrated real-time air combat and sensor network simulation

    Science.gov (United States)

    Criswell, Evans A.; Rushing, John; Lin, Hong; Graves, Sara

    2007-04-01

    An architecture for an integrated air combat and sensor network simulation is presented. The architecture integrates two components: a parallel real-time sensor fusion and target tracking simulation, and an air combat simulation. By integrating these two simulations, it becomes possible to experiment with scenarios in which one or both sides in a battle have very large numbers of primitive passive sensors, and to assess the likely effects of those sensors on the outcome of the battle. Modern Air Power is a real-time theater-level air combat simulation that is currently being used as a part of the USAF Air and Space Basic Course (ASBC). The simulation includes a variety of scenarios from the Vietnam war to the present day, and also includes several hypothetical future scenarios. Modern Air Power includes a scenario editor, an order of battle editor, and full AI customization features that make it possible to quickly construct scenarios for any conflict of interest. The scenario editor makes it possible to place a wide variety of sensors including both high fidelity sensors such as radars, and primitive passive sensors that provide only very limited information. The parallel real-time sensor network simulation is capable of handling very large numbers of sensors on a computing cluster of modest size. It can fuse information provided by disparate sensors to detect and track targets, and produce target tracks.

  7. Defense Acquisitions: 2009 Review of Future Combat System Is Critical to Program's Direction

    National Research Council Canada - National Science Library

    Francis, Paul L

    2008-01-01

    The Future Combat System (FCS) program which comprises 14 integrated weapon systems and an advanced information network is the centerpiece of the Army's effort to transition to a lighter, more agile, and more capable combat force...

  8. Empirical research on complex networks modeling of combat SoS based on data from real war-game, Part I: Statistical characteristics

    Science.gov (United States)

    Chen, Lei; Kou, Yingxin; Li, Zhanwu; Xu, An; Wu, Cheng

    2018-01-01

    We build a complex networks model of combat System-of-Systems (SoS) based on empirical data from a real war-game, this model is a combination of command & control (C2) subnetwork, sensors subnetwork, influencers subnetwork and logistical support subnetwork, each subnetwork has idiographic components and statistical characteristics. The C2 subnetwork is the core of whole combat SoS, it has a hierarchical structure with no modularity, of which robustness is strong enough to maintain normal operation after any two nodes is destroyed; the sensors subnetwork and influencers subnetwork are like sense organ and limbs of whole combat SoS, they are both flat modular networks of which degree distribution obey GEV distribution and power-law distribution respectively. The communication network is the combination of all subnetworks, it is an assortative Small-World network with core-periphery structure, the Intelligence & Communication Stations/Command Center integrated with C2 nodes in the first three level act as the hub nodes in communication network, and all the fourth-level C2 nodes, sensors, influencers and logistical support nodes have communication capability, they act as the periphery nodes in communication network, its degree distribution obeys exponential distribution in the beginning, Gaussian distribution in the middle, and power-law distribution in the end, and its path length obeys GEV distribution. The betweenness centrality distribution, closeness centrality distribution and eigenvector centrality are also been analyzed to measure the vulnerability of nodes.

  9. Predictive Methods for Dense Polymer Networks: Combating Bias with Bio-Based Structures

    Science.gov (United States)

    2016-03-16

    Combating bias with bio - based structures 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Andrew J. Guenthner...unlimited. PA Clearance 16152 Integrity  Service  Excellence Predictive methods for dense polymer networks: Combating bias with bio -based...Architectural Bias • Comparison of Petroleum-Based and Bio -Based Chemical Architectures • Continuing Research on Structure-Property Relationships using

  10. Networking capability and new product development

    NARCIS (Netherlands)

    Mu, J.; Di Benedetto, A.C.

    2012-01-01

    Current research on network theory remains largely focused on structures and outcomes without exploring the capability that firms need to build efficient and effective networks to their advantage. In this paper, we take a networking capability view in studying inter-firm relationships. We assume

  11. Assured communications and combat resiliency: the relationship between effective national communications and combat efficiency

    Science.gov (United States)

    Allgood, Glenn O.; Kuruganti, Phani Teja; Nutaro, James; Saffold, Jay

    2009-05-01

    Combat resiliency is the ability of a commander to prosecute, control, and consolidate his/her's sphere of influence in adverse and changing conditions. To support this, an infrastructure must exist that allows the commander to view the world in varying degrees of granularity with sufficient levels of detail to permit confidence estimates to be levied against decisions and course of actions. An infrastructure such as this will include the ability to effectively communicate context and relevance within and across the battle space. To achieve this will require careful thought, planning, and understanding of a network and its capacity limitations in post-event command and control. Relevance and impact on any existing infrastructure must be fully understood prior to deployment to exploit the system's full capacity and capabilities. In this view, the combat communication network is considered an integral part of or National communication network and infrastructure. This paper will describe an analytical tool set developed at ORNL and RNI incorporating complexity theory, advanced communications modeling, simulation, and visualization technologies that could be used as a pre-planning tool or post event reasoning application to support response and containment.

  12. China’s Near Seas Combat Capabilities (China Maritime Study, Number 11)

    Science.gov (United States)

    2014-02-01

    include FY- 2G and -2H in 2014, FY-3D/PM1 and FY-4 M in 2015, FY-3E/AM1 in 2017, FY-3F/PM2 in 2019, china’s near seas combat capabilities 97 FY- 3G ...on ASCMs. This is indicated by the display of land-based, mobile YJ-62 transporter-erector-launchers (TELs) during the 1 October 2009 National Day...air defenses and a supporting targeting system that can detect fleeting mobile targets and rapidly relay the data underwater, submarines would

  13. Dynamic capabilities and network benefits

    Directory of Open Access Journals (Sweden)

    Helge Svare

    2017-01-01

    Full Text Available The number of publicly funded initiatives to establish or strengthen networks and clusters, in order to enhance innovation, has been increasing. Returns on such investments vary, and the aim of this study is to explore to what extent the variation in benefits for firms participating in networks or clusters can be explained by their dynamic capabilities (DC. Based on survey data from five Norwegian networks, the results suggest that firms with higher DC are more successful in harvesting the potential benefits of being member of a network.

  14. Staging Options for the Air Force’s Electronic Combat Test Capability: a Cost Analysis

    Science.gov (United States)

    1990-09-01

    strategic in nature and completely different than daily operating decisions (20:6). Horngren , in his book Cost Accounting : A Managerial Emphasis...AFIT/GCA/LSY/90S-3 DTTC S E-191 J) C, STAGING OPTIONS FOR THE AIR FORCE’S ELECTRONIC COMBAT TEST CAPABILITY: A COST ANALYSIS THESIS Joseph J. Landino...Alternative Costs ......... 56 v AFIT/GCA/LSY/90S-3 Abstract This study’s purpose was to identify the lowest cost aircraft staging base( s ) for the Air

  15. Optimizing the recovery efficiency of Finnish oil combating vessels in the Gulf of Finland using Bayesian Networks.

    Science.gov (United States)

    Lehikoinen, Annukka; Luoma, Emilia; Mäntyniemi, Samu; Kuikka, Sakari

    2013-02-19

    Oil transport has greatly increased in the Gulf of Finland over the years, and risks of an oil accident occurring have risen. Thus, an effective oil combating strategy is needed. We developed a Bayesian Network (BN) to examine the recovery efficiency and optimal disposition of the Finnish oil combating vessels in the Gulf of Finland (GoF), Eastern Baltic Sea. Four alternative home harbors, five accident points, and ten oil combating vessels were included in the model to find the optimal disposition policy that would maximize the recovery efficiency. With this composition, the placement of the oil combating vessels seems not to have a significant effect on the recovery efficiency. The process seems to be strongly controlled by certain random factors independent of human action, e.g. wave height and stranding time of the oil. Therefore, the success of oil combating is rather uncertain, so it is also important to develop activities that aim for preventing accidents. We found that the model developed is suitable for this type of multidecision optimization. The methodology, results, and practices are further discussed.

  16. Impact of self-healing capability on network robustness

    Science.gov (United States)

    Shang, Yilun

    2015-04-01

    A wide spectrum of real-life systems ranging from neurons to botnets display spontaneous recovery ability. Using the generating function formalism applied to static uncorrelated random networks with arbitrary degree distributions, the microscopic mechanism underlying the depreciation-recovery process is characterized and the effect of varying self-healing capability on network robustness is revealed. It is found that the self-healing capability of nodes has a profound impact on the phase transition in the emergence of percolating clusters, and that salient difference exists in upholding network integrity under random failures and intentional attacks. The results provide a theoretical framework for quantitatively understanding the self-healing phenomenon in varied complex systems.

  17. The Measurement of Combat Stress in the Field: A Product Development Study

    National Research Council Canada - National Science Library

    Cotton, A

    1998-01-01

    .... In the early nineties, however, a need was perceived to improve the individual combat capability of the infantry soldier in order to improve the combat capability of the Army as a whole. This led to the creation of Project WUNDURRA (an aboriginal word meaning "warrior"), which subsequently became known as Project LAND125 (Soldier Combat System Enhancement Study).

  18. Do social networks and technological capabilities help knowledge management?

    Directory of Open Access Journals (Sweden)

    Encarnación García-Sánchez

    2017-12-01

    Full Text Available Dynamic capabilities are currently becoming an important extension of the theory of resources and capabilities that enables companies to adapt better in the current competitive environment. This paper examines how knowledge management, a dynamic function related to management or administration of a set of knowledge flows, develops thanks to the greater dynamism of social networks. It then shows how this relationship is especially strengthened by different technological capabilities. To achieve these goals, the paper examines the main tools that permit companies to develop an ability to achieve competitive advantage relative to the technological capabilities of managers and workers, social networks and knowledge management.

  19. The United States Army Concept Capability Plan for Combating Weapons of Mass Destruction for the Futer Modular Force 2015-2024

    Science.gov (United States)

    2009-03-25

    development and pest control, also have deleterious dual use potential. By replicating themselves after introduction into a target population, a small...N national NATO North Atlantic Treaty Organization NEBC network-enabled battle command NMSCWMD National Military Strategy for Combating...within the continental U.S., Alaska, Hawaii, the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, American Samoa

  20. Network Communication as a Service-Oriented Capability

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, William; Johnston, William; Metzger, Joe; Collins, Michael; Burrescia, Joseph; Dart, Eli; Gagliardi, Jim; Guok, Chin; Oberman, Kevin; O' Conner, Mike

    2008-01-08

    In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as"services" -- they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service -- it is provided, in general, as a"best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely distributed components) to be successful in performing the sustained, complex tasks of large-scale science -- e.g., the multi-disciplinary simulation of next generation climate modeling and management and analysis of the petabytes of data that will come from the next generation of scientific instrument (which is very soon for the LHC at CERN) -- networks must provide communication capability that is service-oriented: That is it must be configurable, schedulable, predictable, and reliable. In order to accomplish this, the research and education network community is undertaking a strategy that involves changes in network architecture to support multiple classes of service; development and deployment of service-oriented communication services, and; monitoring and reporting in a form that is directly useful to the application-oriented system so that it may adapt to communications failures. In this paper we describe ESnet's approach to each of these -- an approach that is part of an international community effort to have intra-distributed system communication be based on a service-oriented capability.

  1. Combating trafficking: the Swiss approach

    OpenAIRE

    Sebastian Rauber

    2006-01-01

    Switzerland is committed to combating and preventingtrafficking in human beings. Effective policy implementationin a federal structure depends on networking,effective information exchange and development ofrobust cooperation mechanisms.

  2. Combating trafficking: the Swiss approach

    Directory of Open Access Journals (Sweden)

    Sebastian Rauber

    2006-05-01

    Full Text Available Switzerland is committed to combating and preventingtrafficking in human beings. Effective policy implementationin a federal structure depends on networking,effective information exchange and development ofrobust cooperation mechanisms.

  3. Meeting the Challenge - Developing Leaders for Army National Guard Combat Units

    National Research Council Canada - National Science Library

    Keolanui, Stan

    2000-01-01

    ...). Capable and qualified leaders are a necessity in complex organizations like the eSB. These leaders will insure that Guard combat units meet all readiness and deployment standards necessary for future combat...

  4. Development of data analysis tool for combat system integration

    Directory of Open Access Journals (Sweden)

    Seung-Chun Shin

    2013-03-01

    Full Text Available System integration is an important element for the construction of naval combat ships. In particular, because impeccable combat system integration together with the sensors and weapons can ensure the combat capability and survivability of the ship, the integrated performance of the combat system should be verified and validated whether or not it fulfills the requirements of the end user. In order to conduct systematic verification and validation, a data analysis tool is requisite. This paper suggests the Data Extraction, Recording and Analysis Tool (DERAT for the data analysis of the integrated performance of the combat system, including the functional definition, architecture and effectiveness of the DERAT by presenting the test results.

  5. The Role 1 capability review: mitigation and innovation for Op HERRICK 18 and into contingency.

    Science.gov (United States)

    Wheatley, Robert J

    2014-09-01

    The Role 1 orientated JRAMC of September 2012 was a welcome addition to the body of Role 1 literature. In particular, the Role 1 capability review by Hodgetts and Findlay detailed both current issues and future aspirations for Role 1 provision. This personal view considers issues still prevalent during Op HERRICK 18 namely the provision of primary healthcare by combat medical technicians on operations and the organisational issues that contribute to historical structural and attitudinal obstructions to the employment of combat medical technicians in firm base primary healthcare. It also considers a dynamically updating dashboard capable of displaying risk across the Role 1 network with the implied move to a model of continuous healthcare assurance. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Data Farming Process and Initial Network Analysis Capabilities

    Directory of Open Access Journals (Sweden)

    Gary Horne

    2016-01-01

    Full Text Available Data Farming, network applications and approaches to integrate network analysis and processes to the data farming paradigm are presented as approaches to address complex system questions. Data Farming is a quantified approach that examines questions in large possibility spaces using modeling and simulation. It evaluates whole landscapes of outcomes to draw insights from outcome distributions and outliers. Social network analysis and graph theory are widely used techniques for the evaluation of social systems. Incorporation of these techniques into the data farming process provides analysts examining complex systems with a powerful new suite of tools for more fully exploring and understanding the effect of interactions in complex systems. The integration of network analysis with data farming techniques provides modelers with the capability to gain insight into the effect of network attributes, whether the network is explicitly defined or emergent, on the breadth of the model outcome space and the effect of model inputs on the resultant network statistics.

  7. Antecedents of network capability and their effects on innovation performance: an empirical test of hi-tech firms in China

    NARCIS (Netherlands)

    Fang, Gang; Ma, Xiang Yuan; Brouwers-Ren, Liqin; Zhou, Qing

    2014-01-01

    A firm’s competitive advantage can come not only from internal resources but also from inter-firm innovation networks. This paper shows that network capabilities (i.e., network visioning capability, network constructing capability, network operating capability and network centring capability) are

  8. Neural network fusion capabilities for efficient implementation of tracking algorithms

    Science.gov (United States)

    Sundareshan, Malur K.; Amoozegar, Farid

    1997-03-01

    The ability to efficiently fuse information of different forms to facilitate intelligent decision making is one of the major capabilities of trained multilayer neural networks that is now being recognized. While development of innovative adaptive control algorithms for nonlinear dynamical plants that attempt to exploit these capabilities seems to be more popular, a corresponding development of nonlinear estimation algorithms using these approaches, particularly for application in target surveillance and guidance operations, has not received similar attention. We describe the capabilities and functionality of neural network algorithms for data fusion and implementation of tracking filters. To discuss details and to serve as a vehicle for quantitative performance evaluations, the illustrative case of estimating the position and velocity of surveillance targets is considered. Efficient target- tracking algorithms that can utilize data from a host of sensing modalities and are capable of reliably tracking even uncooperative targets executing fast and complex maneuvers are of interest in a number of applications. The primary motivation for employing neural networks in these applications comes from the efficiency with which more features extracted from different sensor measurements can be utilized as inputs for estimating target maneuvers. A system architecture that efficiently integrates the fusion capabilities of a trained multilayer neural net with the tracking performance of a Kalman filter is described. The innovation lies in the way the fusion of multisensor data is accomplished to facilitate improved estimation without increasing the computational complexity of the dynamical state estimator itself.

  9. Logistical Analysis of the Littoral Combat Ship

    National Research Council Canada - National Science Library

    Rudko, David

    2003-01-01

    The purpose of the Littoral Combat Ship (LCS) is to provide the Navy with an affordable, small, multi-mission ship capable of independent, interdependent, and integrated operations inside the littorals...

  10. Communications for unattended sensor networks

    Science.gov (United States)

    Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano

    2004-07-01

    The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.

  11. Interference suppression capabilities of smart cognitive-femto networks (SCFN)

    KAUST Repository

    Shakir, Muhammad; Atat, Rachad; Alouini, Mohamed-Slim

    2013-01-01

    Cognitive Radios are considered a standard part of future heterogeneous mobile network architectures. In this chapter, a two tier heterogeneous network with multiple Radio Access Technologies (RATs) is considered, namely (1) the secondary network, which comprises of Cognitive-Femto BS (CFBS), and (2) the macrocell network, which is considered a primary network. By exploiting the cooperation among the CFBS, the multiple CFBS can be considered a single base station with multiple geographically dispersed antennas, which can reduce the interference levels by directing the main beam toward the desired femtocell mobile user. The resultant network is referred to as Smart Cognitive-Femto Network (SCFN). In order to determine the effectiveness of the proposed smart network, the interference rejection capabilities of the SCFN is studied. It has been shown that the smart network offers significant performance improvements in interference suppression and Signal to Interference Ratio (SIR) and may be considered a promising solution to the interference management problems in future heterogeneous networks. © 2013, IGI Global.

  12. FELIN: tailored optronics and systems solutions for dismounted combat

    Science.gov (United States)

    Milcent, A. M.

    2009-05-01

    The FELIN French modernization program for dismounted combat provides the Armies with info-centric systems which dramatically enhance the performances of the soldier and the platoon. Sagem now has available a portfolio of various equipments, providing C4I, data and voice digital communication, and enhanced vision for day and night operations, through compact high performance electro-optics. The FELIN system provides the infantryman with a high-tech integrated and modular system which increases significantly their detection, recognition, identification capabilities, their situation awareness and information sharing, and this in any dismounted close combat situation. Among the key technologies used in this system, infrared and intensified vision provide a significant improvement in capability, observation performance and protection of the ground soldiers. This paper presents in detail the developed equipments, with an emphasis on lessons learned from the technical and operational feedback from dismounted close combat field tests.

  13. 2006 Combat Vehicles Conference

    Science.gov (United States)

    2006-10-25

    stressed or worn out beyond economic repair due to combat operations by repairing, rebuilding, or procuring replacement equipment. These...lives Vehicle Hardening Logistics Solutions for the Warfighter • Unique and economical surge capability • Support in coordination with op tempo...Speed, • Diagnostics Indicators – DECU Health Check Indicator, Utility Bus Comm Failure, 1553 Bus Comm Failure; MPU Critical Failure, Cautions and

  14. Neural network modeling of a dolphin's sonar discrimination capabilities

    OpenAIRE

    Andersen, Lars Nonboe; René Rasmussen, A; Au, WWL; Nachtigall, PE; Roitblat, H.

    1994-01-01

    The capability of an echo-locating dolphin to discriminate differences in the wall thickness of cylinders was previously modeled by a counterpropagation neural network using only spectral information of the echoes [W. W. L. Au, J. Acoust. Soc. Am. 95, 2728–2735 (1994)]. In this study, both time and frequency information were used to model the dolphin discrimination capabilities. Echoes from the same cylinders were digitized using a broadband simulated dolphin sonar signal with the transducer ...

  15. Littoral Combat Ship: Need to Address Fundamental Weaknesses in LCS and Frigate Acquisition Strategies

    Science.gov (United States)

    2016-06-01

    LITTORAL COMBAT SHIP Need to Address Fundamental Weaknesses in LCS and Frigate Acquisition Strategies Report to...Office Highlights of GAO-16-356, a report to congressional committees June 2016 LITTORAL COMBAT SHIP Need to Address Fundamental Weaknesses in...capabilities of the LCS—a small surface combatant (SSC) consisting of a ship and reconfigurable mission packages built by two shipyards as different

  16. Moving image compression and generalization capability of constructive neural networks

    Science.gov (United States)

    Ma, Liying; Khorasani, Khashayar

    2001-03-01

    To date numerous techniques have been proposed to compress digital images to ease their storage and transmission over communication channels. Recently, a number of image compression algorithms using Neural Networks NNs have been developed. Particularly, several constructive feed-forward neural networks FNNs have been proposed by researchers for image compression, and promising results have been reported. At the previous SPIE AeroSense conference 2000, we proposed to use a constructive One-Hidden-Layer Feedforward Neural Network OHL-FNN for compressing digital images. In this paper, we first investigate the generalization capability of the proposed OHL-FNN in the presence of additive noise for network training and/ or generalization. Extensive experimental results for different scenarios are presented. It is revealed that the constructive OHL-FNN is not as robust to additive noise in input image as expected. Next, the constructive OHL-FNN is applied to moving images, video sequences. The first, or other specified frame in a moving image sequence is used to train the network. The remaining moving images that follow are then generalized/compressed by this trained network. Three types of correlation-like criteria measuring the similarity of any two images are introduced. The relationship between the generalization capability of the constructed net and the similarity of images is investigated in some detail. It is shown that the constructive OHL-FNN is promising even for changing images such as those extracted from a football game.

  17. Dynamic Resource Allocation and QoS Control Capabilities of the Japanese Academic Backbone Network

    Directory of Open Access Journals (Sweden)

    Michihiro Aoki

    2010-08-01

    Full Text Available Dynamic resource control capabilities have become increasingly important for academic networks that must support big scientific research projects at the same time as less data intensive research and educational activities. This paper describes the dynamic resource allocation and QoS control capabilities of the Japanese academic backbone network, called SINET3, which supports a variety of academic applications with a wide range of network services. The article describes the network architecture, networking technologies, resource allocation, QoS control, and layer-1 bandwidth on-demand services. It also details typical services developed for scientific research, including the user interface, resource control, and management functions, and includes performance evaluations.

  18. A survey on the measure of combat readiness

    Science.gov (United States)

    Wen, Kwong Fook; Nor, Norazman Mohamad; Soon, Lee Lai

    2014-09-01

    Measuring the combat readiness in military forces involves the measures of tangible and intangible elements of combat power. Though these measures are applicable, the mathematical models and formulae used focus mainly on either the tangible or the intangible elements. In this paper, a review is done to highlight the research gap in the formulation of a mathematical model that incorporates tangible elements with intangible elements to measure the combat readiness of a military force. It highlights the missing link between the tangible and intangible elements of combat power. To bridge the gap and missing link, a mathematical model could be formulated that measures both the tangible and intangible aspects of combat readiness by establishing the relationship between the causal (tangible and intangible) elements and its effects on the measure of combat readiness. The model uses multiple regression analysis as well as mathematical modeling and simulation which digest the capability component reflecting its assets and resources, the morale component reflecting human needs, and the quality of life component reflecting soldiers' state of satisfaction in life. The results of the review provide a mean to bridge the research gap through the formulation of a mathematical model that shows the total measure of a military force's combat readiness. The results also significantly identify parameters for each of the variables and factors in the model.

  19. Candid Voices - Agile Combat Support From the OC-ALC Engine Shop Viewpoint. Volume XXII, Number 4

    National Research Council Canada - National Science Library

    Larvick, Jon

    1998-01-01

    .... This article will take the Agile Combat Support initiative -the focus of combat support shifts from maintaining massive inventories to establishing a response capability-as the goal and will focus...

  20. MILITARY MISSION COMBAT EFFICIENCY ESTIMATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Ighoyota B. AJENAGHUGHRURE

    2017-04-01

    Full Text Available Military infantry recruits, although trained, lacks experience in real-time combat operations, despite the combat simulations training. Therefore, the choice of including them in military operations is a thorough and careful process. This has left top military commanders with the tough task of deciding, the best blend of inexperienced and experienced infantry soldiers, for any military operation, based on available information on enemy strength and capability. This research project delves into the design of a mission combat efficiency estimator (MCEE. It is a decision support system that aids top military commanders in estimating the best combination of soldiers suitable for different military operations, based on available information on enemy’s combat experience. Hence, its advantages consist of reducing casualties and other risks that compromises the entire operation overall success, and also boosting the morals of soldiers in an operation, with such information as an estimation of combat efficiency of their enemies. The system was developed using Microsoft Asp.Net and Sql server backend. A case study test conducted with the MECEE system, reveals clearly that the MECEE system is an efficient tool for military mission planning in terms of team selection. Hence, when the MECEE system is fully deployed it will aid military commanders in the task of decision making on team members’ combination for any given operation based on enemy personnel information that is well known beforehand. Further work on the MECEE will be undertaken to explore fire power types and impact in mission combat efficiency estimation.

  1. Consumer preferences relative to the price and network capability of small urban vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Burns, L.D.

    1979-09-01

    Preferences of consumers for small urban vehicle concepts differing only with respect to their hypothetical purchase prices and network capabilities (i.e., whether they are capable of operating on expressways, major arterials, or local streets) are analyzed using statistical techniques based on psychological scaling theories. Results from these analyses indicate that a vast majority of consumers are not readily willing to give up the accessibility provided by conventional automobiles. More specifically, over the range of hypothetical prices considered here, network capability dominates as a determinant of preferences for vehicle concepts. Also, the ability to operate vehicles on expressways is of utmost importance to consumers.

  2. Neural network modeling of a dolphin's sonar discrimination capabilities

    DEFF Research Database (Denmark)

    Andersen, Lars Nonboe; René Rasmussen, A; Au, WWL

    1994-01-01

    The capability of an echo-locating dolphin to discriminate differences in the wall thickness of cylinders was previously modeled by a counterpropagation neural network using only spectral information of the echoes [W. W. L. Au, J. Acoust. Soc. Am. 95, 2728–2735 (1994)]. In this study, both time a...

  3. Comprehensive evaluation index system of total supply capability in distribution network

    Science.gov (United States)

    Zhang, Linyao; Wu, Guilian; Yang, Jingyuan; Jia, Shuangrui; Zhang, Wei; Sun, Weiqing

    2018-01-01

    Aiming at the lack of a comprehensive evaluation of the distribution network, based on the existing distribution network evaluation index system, combined with the basic principles of constructing the evaluation index, put forward a new evaluation index system of distribution network capacity. This paper is mainly based on the total supply capability of the distribution network, combining single index and various factors, into a multi-evaluation index of the distribution network, thus forming a reasonable index system, and various indicators of rational quantification make the evaluation results more intuitive. In order to have a comprehensive judgment of distribution network, this paper uses weights to analyse the importance of each index, verify the rationality of the index system through the example, it is proved that the rationality of the index system, so as to guide the direction of distribution network planning.

  4. Managerial capabilities of the home base in an intra-organisational global network

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona

    of the HB change in the process of its global intra-organisational network evolution. In particular, the four papers constituting this thesis investigate how global intra-organisational networks evolve, how the types of network management capabilities of the HB change along with such network evolution....... This investigation was conducted through a retrospective longitudinal case study of one Danish original equipment manufacturer and its three subsidiaries in China, Slovakia, and the US. The findings, first of all, support, extend, and modify the revised Uppsala globalisation model with regard to the types...

  5. Logistics Operations in Combat Operations Against an Insurgent Force

    National Research Council Canada - National Science Library

    Hatcher, Clay

    2007-01-01

    .... The road networks are generally not secure and put soldiers at risk. How do we distribute supplies and reduce the risk or avoid the enemy's threat to our combat logistics patrols in an insurgent environment...

  6. Traffic routing for multicomputer networks with virtual cut-through capability

    Science.gov (United States)

    Kandlur, Dilip D.; Shin, Kang G.

    1992-01-01

    Consideration is given to the problem of selecting routes for interprocess communication in a network with virtual cut-through capability, while balancing the network load and minimizing the number of times that a message gets buffered. An approach is proposed that formulates the route selection problem as a minimization problem with a link cost function that depends upon the traffic through the link. The form of this cost function is derived using the probability of establishing a virtual cut-through route. The route selection problem is shown to be NP-hard, and an algorithm is developed to incrementally reduce the cost by rerouting the traffic. The performance of this algorithm is exemplified by two network topologies: the hypercube and the C-wrapped hexagonal mesh.

  7. Establishing capabilities for combating illicit trafficking: the Syrian experience

    International Nuclear Information System (INIS)

    Othman, I.; Suman, H.

    2008-01-01

    Since the late 80's, Syria has been taking steps towards combating illicit trafficking or inadvertent movement involving radioactive or nuclear material within the country or across its border. By applying the proper combination of technical and procedural measures, an acceptable level of performance has been achieved. The measures undertaken by AECS include anticipative measures, which aim at identifying potential loss of control over radioactive sources and potential illicit trafficking within the country, as well as defensive measures which aim at detection of and response to events of illicit trafficking. In addition, a tight follow up of radiation source along their entire lifetime in the Syrian territory, supported by proper data analysis is one of the most efficient tools for identifying potential loss of control over sources. AECS has established Border Monitoring Centers (BMC) in almost all border crossings. They work in close cooperation with the customs and other relevant authorities at the Syrian borders. AECS has been also providing the necessary training for the frontline officers. (author)

  8. Establishing capabilities for combating illicit trafficking: the Syrian experience

    International Nuclear Information System (INIS)

    Othman, I.; Suman, H.

    2008-01-01

    Since the late 80 's, Syria has been taking steps towards combating illicit trafficking or inadvertent movement involving radioactive or nuclear material within the country or across its border. By applying the proper combination of technical and procedural measures, an acceptable level of performance has been achieved. The measures undertaken by AECS include anticipative measures, which aim at identifying potential loss of control over radioactive sources and potential illicit trafficking within the country, as well as defensive measures which aim at detection of and response to events of illicit trafficking. In addition, a tight follow up of radiation source along their entire lifetime in the Syrian territory, supported by proper data analysis is one of the most efficient tools for identifying potential loss of control over sources. AECS has established Border Monitoring Centers (BMC) in almost all border crossings. They work in close cooperation with the customs and other relevant authorities at the Syrian borders. AECS has been also providing the necessary training for the front-line officers. (author)

  9. The facilitation of groups and networks: capabilities to shape creative cooperation

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard

    2003-01-01

    The facilitator, defined as a process guide of creative cooperation, is becoming more and more in focus to assist groups,teams and networks to meet these challenges. The author defines and exemplifies different levels of creative coorperation. Core capabilities of facilitation are defined...

  10. Research on the tourism resource development from the perspective of network capability-Taking Wuxi Huishan Ancient Town as an example

    Science.gov (United States)

    Bao, Yanli; Hua, Hefeng

    2017-03-01

    Network capability is the enterprise's capability to set up, manage, maintain and use a variety of relations between enterprises, and to obtain resources for improving competitiveness. Tourism in China is in a transformation period from sightseeing to leisure and vacation. Scenic spots as well as tourist enterprises can learn from some other enterprises in the process of resource development, and build up its own network relations in order to get resources for their survival and development. Through the effective management of network relations, the performance of resource development will be improved. By analyzing literature on network capability and the case analysis of Wuxi Huishan Ancient Town, the role of network capacity in the tourism resource development is explored and resource development path is built from the perspective of network capability. Finally, the tourism resource development process model based on network capacity is proposed. This model mainly includes setting up network vision, resource identification, resource acquisition, resource utilization and tourism project development. In these steps, network construction, network management and improving network center status are key points.

  11. Regulatory Requirements to Combat Illicit Trafficking of Hazardous Materials

    International Nuclear Information System (INIS)

    Hussein, A.Z.; Zakaria, Kh.M.

    2011-01-01

    Since more than a decade illicit Trafficking of hazardous ( CBRNE), materials ( chemical, biological, radiological, nuclear and explosive ) has been identified as a key threat in national, regional, inter regional and international strategies. An Effective response to hazardous materials (CBRNE) risk and threat were realized to require a very high level of cooperation and coordination between various governments and their responsible organizations and authorities of regional and international partner. While improper policy of actions may easily be exploited by non- state members to (CBRNE) trafficking which may lead to develop weapon of mass destruction (WMD). Such strategy are of paramount important between all levels of the states and among regional agreements through comprehensive tailored assistance packages (e.g. export control, illicit trafficking of hazardous materials, redirection of scientist, emergency planning, crisis response safety and security culture. Capacity building, action plans and instruments for stability are necessary actions for efficient combating against illicit trafficking of hazardous materials. Regarding the needs of assessment phase, assistance must be based on data collection, analysis and prioritization of implanting the regulatory controls. Several activities have to be conducted to reduce CBRNE threat. The one- by- one approach, covering either nuclear and radioactive or chemical or biological materials has to be implanted on the country basis performance to mitigate CBRNE hazardous risk. On several consequent phases of intervention dealing with CBRNE risk mitigation the country has to establish a network of local, regional and international capabilities. Such network is setting up the mechanism for the country needs identifications, the guidelines for data collection, for data platform maintenance and update, the data assessment and the competent and operative organizations. This network will be to strengthen the long - term

  12. Artificial Neural Network Application for Power Transfer Capability and Voltage Calculations in Multi-Area Power System

    Directory of Open Access Journals (Sweden)

    Palukuru NAGENDRA

    2010-12-01

    Full Text Available In this study, the use of artificial neural network (ANN based model, multi-layer perceptron (MLP network, to compute the transfer capabilities in a multi-area power system was explored. The input for the ANN is load status and the outputs are the transfer capability among the system areas, voltage magnitudes and voltage angles at concerned buses of the areas under consideration. The repeated power flow (RPF method is used in this paper for calculating the power transfer capability, voltage magnitudes and voltage angles necessary for the generation of input-output patterns for training the proposed MLP neural network. Preliminary investigations on a three area 30-bus system reveal that the proposed model is computationally faster than the conventional method.

  13. Multihop Capability Analysis in Wireless Information and Power Transfer Multirelay Cooperative Networks

    Directory of Open Access Journals (Sweden)

    Qilin Wu

    2018-01-01

    Full Text Available We study simultaneous wireless information and power transfer (SWIPT in multihop wireless cooperative networks, where the multihop capability that denotes the largest number of transmission hops is investigated. By utilizing the broadcast nature of multihop wireless networks, we first propose a cooperative forwarding power (CFP scheme. In CFP scheme, the multiple relays and receiver have distinctly different tasks. Specifically, multiple relays close to the transmitter harvest power from the transmitter first and then cooperatively forward the power (not the information towards the receiver. The receiver receives the information (not the power from the transmitter first, and then it harvests the power from the relays and is taken as the transmitter of the next hop. Furthermore, for performance comparison, we suggest two schemes: cooperative forwarding information and power (CFIP and direct receiving information and power (DFIP. Also, we construct an analysis model to investigate the multihop capabilities of CFP, CFIP, and DFIP schemes under the given targeted throughput requirement. Finally, simulation results validate the analysis model and show that the multihop capability of CFP is better than CFIP and DFIP, and for improving the multihop capabilities, it is best effective to increase the average number of relay nodes in cooperative set.

  14. Structures and Infrastructures of International R&D Networks: A Capability Maturity Perspective

    DEFF Research Database (Denmark)

    Niang, Mohamed; Wæhrens, Brian Vejrum

    Purpose: This paper explores the process towards globally distributing R&D activities with an emphasis on organizational maturity. It discusses emerging configurations by asking how the structure and infrastructure of international R&D networks evolve along with the move from a strong R&D center...... to dispersed development. Design/Methodology/Approach: This is a qualitative study of the process of distributing R&D. By comparing selected firms, the researchers identify a pattern of dispersion of R&D activities in three Danish firms. Findings and Discussion: Drawing from the case studies, the researchers...... present a capability maturity model. Furthermore, understanding the interaction between new structures and infrastructures of the dispersed networks is viewed as a key requirement for developing organizational capabilities and formulating adequate strategies that leverage dispersed R&D. Organizational...

  15. U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    OpenAIRE

    Oveyik, Kaan.; Kurkcu, Coskun

    2008-01-01

    Approved for public release; distribution is unlimited Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluat...

  16. Childhood maltreatment and combat posttraumatic stress differentially predict fear-related fronto-subcortical connectivity.

    Science.gov (United States)

    Birn, Rasmus M; Patriat, Rémi; Phillips, Mary L; Germain, Anne; Herringa, Ryan J

    2014-10-01

    Adult posttraumatic stress disorder (PTSD) has been characterized by altered fear-network connectivity. Childhood trauma is a major risk factor for adult PTSD, yet its contribution to fear-network connectivity in PTSD remains unexplored. We examined, within a single model, the contribution of childhood maltreatment, combat exposure, and combat-related posttraumatic stress symptoms (PTSS) to resting-state connectivity (rs-FC) of the amygdala and hippocampus in military veterans. Medication-free male veterans (n = 27, average 26.6 years) with a range of PTSS completed resting-state fMRI. Measures including the Clinician-Administered PTSD Scale (CAPS), Childhood Trauma Questionnaire (CTQ), and Combat Exposure Scale (CES) were used to predict rs-FC using multilinear regression. Fear-network seeds included the amygdala and hippocampus. Amygdala: CTQ predicted lower connectivity to ventromedial prefrontal cortex (vmPFC), but greater anticorrelation with dorsal/lateral PFC. CAPS positively predicted connectivity to insula, and loss of anticorrelation with dorsomedial/dorsolateral (dm/dl)PFC. Hippocampus: CTQ predicted lower connectivity to vmPFC, but greater anticorrelation with dm/dlPFC. CES predicted greater anticorrelation, whereas CAPS predicted less anticorrelation with dmPFC. Childhood trauma, combat exposure, and PTSS differentially predict fear-network rs-FC. Childhood maltreatment may weaken ventral prefrontal-subcortical circuitry important in automatic fear regulation, but, in a compensatory manner, may also strengthen dorsal prefrontal-subcortical pathways involved in more effortful emotion regulation. PTSD symptoms, in turn, appear to emerge with the loss of connectivity in the latter pathway. These findings suggest potential mechanisms by which developmental trauma exposure leads to adult PTSD, and which brain mechanisms are associated with the emergence of PTSD symptoms. © 2014 Wiley Periodicals, Inc.

  17. Assessing the weather monitoring capabilities of cellular microwave link networks

    Science.gov (United States)

    Fencl, Martin; Vrzba, Miroslav; Rieckermann, Jörg; Bareš, Vojtěch

    2016-04-01

    Using of microwave links for rainfall monitoring was suggested already by (Atlas and Ulbrich, 1977). However, this technique attracted broader attention of scientific community only in the recent decade, with the extensive growth of cellular microwave link (CML) networks, which form the backbone of today's cellular telecommunication infrastructure. Several studies have already shown that CMLs can be conveniently used as weather sensors and have potential to provide near-ground path-integrated observations of rainfall but also humidity or fog. However, although research is still focusing on algorithms to improve the weather sensing capabilities (Fencl et al., 2015), it is not clear how to convince cellular operators to provide the power levels of their network. One step in this direction is to show in which regions or municipalities the networks are sufficiently dense to provide/develop good services. In this contribution we suggest a standardized approach to evaluate CML networks in terms of rainfall observation and to identify suitable regions for CML rainfall monitoring. We estimate precision of single CML based on its sensitivity to rainfall, i.e. as a function of frequency, polarization and path length. Capability of a network to capture rainfall spatial patterns is estimated from the CML coverage and path lengths considering that single CML provides path-integrated rain rates. We also search for suitable predictors for regions where no network topologies are available. We test our approach on several European networks and discuss the results. Our results show that CMLs are very dense in urban areas (> 1 CML/km2), but less in rural areas (online tool. In summary, our results demonstrate that CML represent promising environmental observation network, suitable especially for urban rainfall monitoring. The developed approach integrated into an open source online tool can be conveniently used e.g. by local operators or authorities to evaluate the suitability of

  18. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    OpenAIRE

    Blanco, Bego; Taboada, Ianire; Fajardo, Jose Oscar; Liberal, Fidel

    2017-01-01

    In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-awa...

  19. Including 10-Gigabit-capable Passive Optical Network under End-to-End Generalized Multi-Protocol Label Switching Provisioned Quality of Service

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Gavler, Anders; Wessing, Henrik

    2012-01-01

    of the network where quality of service signaling is bridged. This article proposes strategies for generalized multi-protocol label switching control over next emerging passive optical network standard, i.e., the 10-gigabit-capable passive optical network. Node management and resource allocation approaches...... are discussed, and possible issues are raised. The analysis shows that consideration of a 10-gigabit-capable passive optical network as a generalized multi-protocol label switching controlled domain is valid and may advance end-to-end quality of service provisioning for passive optical network based customers.......End-to-end quality of service provisioning is still a challenging task despite many years of research and development in this area. Considering a generalized multi-protocol label switching based core/metro network and resource reservation protocol capable home gateways, it is the access part...

  20. Combating Rhino Horn Trafficking: The Need to Disrupt Criminal Networks.

    Directory of Open Access Journals (Sweden)

    Timothy C Haas

    Full Text Available The onslaught on the World's wildlife continues despite numerous initiatives aimed at curbing it. We build a model that integrates rhino horn trade with rhino population dynamics in order to evaluate the impact of various management policies on rhino sustainability. In our model, an agent-based sub-model of horn trade from the poaching event up through a purchase of rhino horn in Asia impacts rhino abundance. A data-validated, individual-based sub-model of the rhino population of South Africa provides these abundance values. We evaluate policies that consist of different combinations of legal trade initiatives, demand reduction marketing campaigns, increased anti-poaching measures within protected areas, and transnational policing initiatives aimed at disrupting those criminal syndicates engaged in horn trafficking. Simulation runs of our model over the next 35 years produces a sustainable rhino population under only one management policy. This policy includes both a transnational policing effort aimed at dismantling those criminal networks engaged in rhino horn trafficking-coupled with increases in legal economic opportunities for people living next to protected areas where rhinos live. This multi-faceted approach should be the focus of the international debate on strategies to combat the current slaughter of rhino rather than the binary debate about whether rhino horn trade should be legalized. This approach to the evaluation of wildlife management policies may be useful to apply to other species threatened by wildlife trafficking.

  1. Advanced protection technology for ground combat vehicles.

    Science.gov (United States)

    Bosse, Timothy G

    2012-01-01

    Just as highway drivers use radar detectors to attempt to stay ahead of police armed with the latest radar technology, the Armed Forces are locked in a spiral to protect combat vehicles and their crews against the latest threats in both the contemporary operating environment and the anticipated operating environment (ie, beyond 2020). In response to bigger, heavier, or better-protected vehicles, adversaries build and deploy larger explosive devices or bombs. However, making improvements to combat vehicles is much more expensive than deploying larger explosives. In addition, demand is increasing for lighter-weight vehicles capable of rapid deployment. Together, these two facts give the threat a clear advantage in the future. To protect vehicles and crews, technologies focusing on detection and hit avoidance, denial of penetration, and crew survivability must be combined synergistically to provide the best chance of survival on the modern battlefield.

  2. Implementing ARFORGEN: Installation Capability and Feasibility Study of Meeting ARFORGEN Guidelines

    National Research Council Canada - National Science Library

    Anderson, Dorian; Blackmon, Pamela; Coviello, Paul; Curvey, Brendan; Hogan, Hal; Rogers, Doug; Wilcox, Steven

    2007-01-01

    ...., nature of threat, climate, terrain, etc.), and capable of rapid assembly. The ARFORGEN model allows the Army to build predictability in a cyclic way of producing forces for the Combat Commander...

  3. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network which comprises of cognitive enabled femto base stations which are referred to as cognitive-femto BS (CFBS) such that each of the BS are equipped with a single antenna and (ii) the macrocell network which is considered as a primary network. The effectiveness of the cognitive transmission is based on the efficient spectrum sensing algorithms which determine the availability of the spectrum holes. However, it is equally important for the cognitive network to minimize the cross-tier interference particularly during (i) the spectrum sensing and (ii) the cognitive transmission if spectrum is available. By exploiting the cooperation among the CFBS, the multiple CFBS can be considered as a single base station with multiple geographically dispersed antennas. In this context, we proposed a smart network where CFBS collaborates to reduce the cross-tier interference level by directing the main beam toward the desired femtocell mobile user and creating toward the cross-tier interference. The resultant network is referred to as Smart cognitive-femto network (SCFN) which requires the CFBS to be self-aware such that the CFBS are aware of their surroundings and adapt accordingly to maintain a reliable and efficient communication link. In order to determine the effectiveness of the proposed smart network, we study the interference rejection (or suppression) capabilities of the SCFN. It has been shown that the proposed smart network offers significant performance improvements in interference suppression and signal to interference ratio (SIR) and may be considered as a promising solution to the interference management problems in Heterogeneous network. © 2012 IEEE.

  4. Location capability of a sparse regional network (RSTN) using a multi-phase earthquake location algorithm (REGLOC)

    Energy Technology Data Exchange (ETDEWEB)

    Hutchings, L.

    1994-01-01

    The Regional Seismic Test Network (RSTN) was deployed by the US Department of Energy (DOE) to determine whether data recorded by a regional network could be used to detect and accurately locate seismic events that might be clandestine nuclear tests. The purpose of this paper is to evaluate the location capability of the RSTN. A major part of this project was the development of the location algorithm REGLOC and application of Basian a prior statistics for determining the accuracy of the location estimates. REGLOC utilizes all identifiable phases, including backazimuth, in the location. Ninty-four events, distributed throughout the network area, detected by both the RSTN and located by local networks were used in the study. The location capability of the RSTN was evaluated by estimating the location accuracy, error ellipse accuracy, and the percentage of events that could be located, as a function of magnitude. The location accuracy was verified by comparing the RSTN results for the 94 events with published locations based on data from the local networks. The error ellipse accuracy was evaluated by determining whether the error ellipse includes the actual location. The percentage of events located was assessed by combining detection capability with location capability to determine the percentage of events that could be located within the study area. Events were located with both an average crustal model for the entire region, and with regional velocity models along with station corrections obtained from master events. Most events with a magnitude <3.0 can only be located with arrivals from one station. Their average location errors are 453 and 414 km for the average- and regional-velocity model locations, respectively. Single station locations are very unreliable because they depend on accurate backazimuth estimates, and backazimuth proved to be a very unreliable computation.

  5. Detection and localization capability of an urban seismic sinkhole monitoring network

    Science.gov (United States)

    Becker, Dirk; Dahm, Torsten; Schneider, Fabian

    2017-04-01

    Microseismic events linked to underground processes in sinkhole areas might serve as precursors to larger mass dislocation or rupture events which can cause felt ground shaking or even structural damage. To identify these weak and shallow events, a sensitive local seismic monitoring network is needed. In case of an urban environment the performance of local monitoring networks is severely compromised by the high anthropogenic noise level. We study the detection and localization capability of such a network, which is already partly installed in the urban area of the city of Hamburg, Germany, within the joint project SIMULTAN (http://www.gfz-potsdam.de/en/section/near-surface-geophysics/projects/simultan/). SIMULTAN aims to monitor a known sinkhole structure and gain a better understanding of the underlying processes. The current network consists of six surface stations installed in the basement of private houses and underground structures of a research facility (DESY - Deutsches Elektronen Synchrotron). During the started monitoring campaign since 2015, no microseismic events could be unambiguously attributed to the sinkholes. To estimate the detection and location capability of the network, we calculate synthetic waveforms based on the location and mechanism of former events in the area. These waveforms are combined with the recorded urban seismic noise at the station sites. As detection algorithms a simple STA/LTA trigger and a more sophisticated phase detector are used. While the STA/LTA detector delivers stable results and is able to detect events with a moment magnitude as low as 0.35 at a distance of 1.3km from the source even under the present high noise conditions the phase detector is more sensitive but also less stable. It should be stressed that due to the local near surface conditions of the wave propagation the detections are generally performed on S- or surface waves and not on P-waves, which have a significantly lower amplitude. Due to the often

  6. Prioritization Assessment for Capability Gaps in Weapon System of Systems Based on the Conditional Evidential Network

    Directory of Open Access Journals (Sweden)

    Dong Pei

    2018-02-01

    Full Text Available The prioritization of capability gaps for weapon system of systems is the basis for design and capability planning in the system of systems development process. In order to address input information uncertainties, the prioritization of capability gaps is computed in two steps using the conditional evidential network method. First, we evaluated the belief distribution of degree of required satisfaction for capabilities, and then calculated the reverse conditional belief function between capability hierarchies. We also provided verification for the feasibility and effectiveness of the proposed method through a prioritization of capability gaps calculation using an example of a spatial-navigation-and-positioning system of systems.

  7. Impact of distance on the network management capability of the home base firm

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Slepniov, Dmitrij

    For many globally dispersed organizations the home base (HB) is historically the locus of integrative, coordinating and innovating efforts, important for the overall performance. The growing concerns about the offshoring strategies posing threats to the capabilities of the HB draw attention to how...... a HB can continuously sustain its centrality. The well-known challenges of distance in the distributed working arrangements may be regarded as a major threat to the network management capabilities (NMCs) of the HB. Therefore, this paper investigates what role does distance between the HB and its...

  8. Evaluation of Combat Service Support Logistics Concepts for Supplying a USMC Regimental Task Force

    National Research Council Canada - National Science Library

    Lenhardt, Thomas

    2001-01-01

    .... This thesis evaluates existing and proposed concepts on how to best use the CSSE resources of a Force Service Support Group to transport supplies to Regimental Combat Teams over constrained networks...

  9. Applications of RFID technology in dismounted soldier solution systems – study of mCOP system capabilities

    Directory of Open Access Journals (Sweden)

    Chmielewski Mariusz

    2016-01-01

    Full Text Available This paper discusses application of RFID technology in Dismounted Soldier Solutions gathered from the development and demonstration of mCOP platform. The software has been developed to elaborate Network Enabled Capabilities in tactical environments. Presented research was a part of demonstration prepared for the European Defence Agency. The main aim of the tool is the delivery of command support capabilities utilizing data fusion and integration mechanisms implemented in heterogeneous military mobile networks. Application of military integration standards such as JC3IEDM, NFFI and TSO supports interoperability with BMS class systems. Utilisation of RFID technology in mCOP software has several purposes, mainly used for process automation of authorisation and personal identification. Indirectly such functionalities can be used for implementation of UAV supported - Blue Force Tracking and IFF services. This research elaborates a set of implemented ideas for such solutions. Developed system serves as a multi-level and multi-platform command and control system supporting military and crisis operations. A crucial part of the system - mCOP, the handheld application for tactical level commanders, serves as personal toolkit for location monitoring and combat situation distribution and management. The tool delivers a set of tailored functionalities supporting commander’s situation awareness and decision making process. The mCOP hosting device equipped with RFID delivers also means of tactical , emergency, micro network communication.

  10. The Impact of Combat Status on Veterans' Attitudes Toward Help Seeking: The Hierarchy of Combat Elitism.

    Science.gov (United States)

    Ashley, Wendy; Brown, Jodi Constantine

    2015-01-01

    Many veterans do not seek assistance for mental health concerns despite the staggering prevalence of trauma-related symptomatology. Barriers to service provision include personal and professional stigma and inter-veteran attitudes that dictate who is more or less deserving of services. Veteran attitudes are shaped by military culture, which promotes a hyper-masculine paradigm upholding combat experience as the defining feature of the "ideal soldier." The stratification of soldiers into combat or non-combat status creates a hierarchy of combat elitism that extends far beyond active duty. This pilot study surveyed veterans (n = 24) to explore how combat experience may affect attitudes toward help seeking. Findings indicate combat and non-combat veterans are less accepting of non-combat veterans' help-seeking behavior, supporting the notion that veterans' attitudes toward help seeking are influenced by combat status. Despite limitations, the results of this study reflect a need for increased attention to the attitudes veterans have about each other and themselves.

  11. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  12. Mitigating Inter-Network Interference in LoRa Networks

    OpenAIRE

    Voigt, Thiemo; Bor, Martin; Roedig, Utz; Alonso, Juan

    2017-01-01

    Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional a...

  13. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  14. Redes de política no combate à fome e à pobreza: a estratégia Comunidade Solidária no Brasil Policy networks combating hunger and poverty: the Solidarity Community strategy in Brazil

    Directory of Open Access Journals (Sweden)

    Luciene Burlandy

    2007-12-01

    Full Text Available Este estudo analisou a estratégia de combate à pobreza da Comunidade Solidária (Governo Federal Brasileiro -1995-2003, examinando os mecanismos institucionais utilizados para aprimorar a focalização do Programa de Distribuição de Alimentos (PRODEA e do Programa de Combate à Desnutrição Materno Infantil (PCDMI. Foram realizadas 97 entrevistas com atores governamentais e societários integrantes da CS nos níveis federal (9, estadual (6 e municipal (82 entrevistas em oito municípios do Estado do Rio de Janeiro, no ano de 2000. Concluiu-se que a CS avançou em identificar e convergir os programas para os municípios mais pobres e torná-los mais visíveis aos gestores. A inserção dos diferentes atores na rede da CS variou de acordo com o poder político e a capacidade institucional de cada setor. As estratégias utilizadas foram: a negociação com cada ministério para alocação prioritária de recursos a partir de um critério técnico (indigência; maior apoio técnico e acesso à informação para os municípios mais pobres, fortalecendo sua habilidade em captar recursos. O papel da CS no nível local foi limitado devido a deficiências na articulação intersetorial e a dificuldades no monitoramento da implementação dos programas e na seleção de beneficiários, limitando seu direcionamento para os grupos mais vulneráveis.This paper analyzes a strategy deployed by the Brazilian Government for combating hunger and poverty: the Solidarity Community (1995-2003, particularly institutional mechanisms used to fine-tune targeting processes and allocate resources to the Food Stocks Distribution Program (PRODEA and the Undernourished Child and High-Risk Pregnancy Program (PCDMI. Primary data were obtained through interviews with policy network players, including segments of government and society: nine Federal; six State and 82 from eight Municipalities in Rio de Janeiro state. Moving towards its goal of converging programs for the

  15. A Methodology for Measuring the Physiological Strain of Enhanced Soldiers: The 1998 Soldier Combat System Enhancement Study

    National Research Council Canada - National Science Library

    Amos, Denys

    1998-01-01

    ... or enhanced capabilities conducting routine operations in the tropics. Core temperature, mean skin temperature and heart rate are appropriate measures for evaluating the physiological burden of soldier combat system enhancements...

  16. Basic Combat Unit of the Slovenian Armed Forces

    Science.gov (United States)

    2017-06-09

    public sector .6 There are three main reasons why: 1. After Slovenia joined NATO, political support for the armed forces began to decline. Image...can put three $20 bills together, but if we have an $18 or $20 fight, we have a unit that’s capable of a better integration (with other forces) and... three different $20 bills . It has to be noted, that the U.S. Army did significantly reduce the number of types of combat brigades from seventeen to

  17. Littoral Combat Ship: Knowledge of Survivability and Lethality Capabilities Needed Prior to Making Major Funding Decisions

    Science.gov (United States)

    2015-12-01

    USS Port Royal hit a coral reef in order to provide an independent review of the damage the ship sustained. Our classified report discussed...Improved Weight Management Needed Prior to Further Investments, GAO-14-349SU (Washington, D.C.: Apr. 8, 2014); Littoral Combat Ship: Knowledge of...Early in the program, the Navy decided to forgo a number of traditional ship requirements in order to help reduce the costs and the weight and size

  18. The Next EFV: Aligning Marine Corps Capabilities With National Security

    Science.gov (United States)

    2011-05-09

    However, the technological bugaboo is that propelling a 34 ton rectangular, high drag armored vehicle at 25kt through water is simply not feasible...never reach the point of replacing the warfighter on the scene. Adding a true littoral combatant capability to the U.S. military 11 portfolio

  19. New development thoughts on the bio-inspired intelligence based control for unmanned combat aerial vehicle

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Bio-inspired intelligence is in the spotlight in the field of international artificial intelligence,and unmanned combat aerial vehicle(UCAV),owing to its potential to perform dangerous,repetitive tasks in remote and hazardous,is very promising for the technological leadership of the nation and essential for improving the security of society.On the basis of introduction of bioinspired intelligence and UCAV,a series of new development thoughts on UCAV control are proposed,including artificial brain based high-level autonomous control for UCAV,swarm intelligence based cooperative control for multiple UCAVs,hy-brid swarm intelligence and Bayesian network based situation assessment under complicated combating environments, bio-inspired hardware based high-level autonomous control for UCAV,and meta-heuristic intelligence based heterogeneous cooperative control for multiple UCAVs and unmanned combat ground vehicles(UCGVs).The exact realization of the proposed new development thoughts can enhance the effectiveness of combat,while provide a series of novel breakthroughs for the intelligence,integration and advancement of future UCAV systems.

  20. A study on the multiple dynamic wavelength distribution for gigabit capable passive optical networks

    Directory of Open Access Journals (Sweden)

    Gustavo Adolfo Puerto Leguizamón

    2014-04-01

    Full Text Available This paper presents a data traffic based study aiming at evaluating the impact of dynamic wavelength allocation on a Gigabit capable Passive Optical Network (GPON. In Passive Optical Networks (PON, an Optical Line Terminal (OLT feeds different PONs in such a way that a given wavelength channel is evenly distributed between the Optical Network Units (ONU at each PON. However, PONs do not specify any kind of dynamic behavior on the way the wavelengths are allocated in the network, a completely static distribution is implemented instead. In thispaper we evaluate the network performance in terms of packet losses and throughput for a number of ONUs being out-of-profile while featuring a given percentage of traffic in excess for a fixed wavelength distribution and for multiple dynamic wavelength allocation. Results show that for a multichannel operation with four wavelengths, the network throughput increases up to a rough value of 19% while the packet losses drop from 22 % to 1.8 % as compared with a static wavelength distribution.

  1. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  2. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  3. Sleep quality affects cognitive functioning in returning combat veterans beyond combat exposure, PTSD, and mild TBI history.

    Science.gov (United States)

    Martindale, Sarah L; Morissette, Sandra B; Rowland, Jared A; Dolan, Sara L

    2017-01-01

    The purpose of this study was to determine how sleep quality affects cognitive functioning in returning combat veterans after accounting for effects of combat exposure, posttraumatic stress disorder (PTSD), and mild traumatic brain injury (mTBI) history. This was a cross-sectional assessment study evaluating combat exposure, PTSD, mTBI history, sleep quality, and neuropsychological functioning. One hundred and nine eligible male Iraq/Afghanistan combat veterans completed an assessment consisting of a structured clinical interview, neuropsychological battery, and self-report measures. Using partial least squares structural equation modeling, combat experiences and mTBI history were not directly associated with sleep quality. PTSD was directly associated with sleep quality, which contributed to deficits in neuropsychological functioning independently of and in addition to combat experiences, PTSD, and mTBI history. Combat experiences and PTSD were differentially associated with motor speed. Sleep affected cognitive function independently of combat experiences, PTSD, and mTBI history. Sleep quality also contributed to cognitive deficits beyond effects of PTSD. An evaluation of sleep quality may be a useful point of clinical intervention in combat veterans with cognitive complaints. Improving sleep quality could alleviate cognitive complaints, improving veterans' ability to engage in treatment. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  4. Littoral Combat Ship and Frigate: Congress Faced with Critical Acquisition Decisions

    Science.gov (United States)

    2016-12-01

    Authorizing the block buy strategy for the frigate appears premature . The decisions Congress makes could have implications for what aspiring...LCS and small surface combatant programs. This statement is largely based on GAO’s prior reports and larger work on shipbuilding and acquisition...ships capable of performing surface, anti-submarine, and anti-air warfare. Letter Page 2 GAO-17-262T This testimony largely

  5. Evaluation and Management of Combat-Related Spinal injuries: A Review Based on Recent Experiences

    Science.gov (United States)

    2012-01-01

    and also possess the capability of performing emergent surgical and orthopedic procedures [11]. On occa- sion, a neurosurgeon may be assigned to a...typically there is at least one fellowship-trained orthopedic spine surgeon and one neurosurgeon in each combat theater at any one time. That being said

  6. Network-Capable Application Process and Wireless Intelligent Sensors for ISHM

    Science.gov (United States)

    Figueroa, Fernando; Morris, Jon; Turowski, Mark; Wang, Ray

    2011-01-01

    Intelligent sensor technology and systems are increasingly becoming attractive means to serve as frameworks for intelligent rocket test facilities with embedded intelligent sensor elements, distributed data acquisition elements, and onboard data acquisition elements. Networked intelligent processors enable users and systems integrators to automatically configure their measurement automation systems for analog sensors. NASA and leading sensor vendors are working together to apply the IEEE 1451 standard for adding plug-and-play capabilities for wireless analog transducers through the use of a Transducer Electronic Data Sheet (TEDS) in order to simplify sensor setup, use, and maintenance, to automatically obtain calibration data, and to eliminate manual data entry and error. A TEDS contains the critical information needed by an instrument or measurement system to identify, characterize, interface, and properly use the signal from an analog sensor. A TEDS is deployed for a sensor in one of two ways. First, the TEDS can reside in embedded, nonvolatile memory (typically flash memory) within the intelligent processor. Second, a virtual TEDS can exist as a separate file, downloadable from the Internet. This concept of virtual TEDS extends the benefits of the standardized TEDS to legacy sensors and applications where the embedded memory is not available. An HTML-based user interface provides a visual tool to interface with those distributed sensors that a TEDS is associated with, to automate the sensor management process. Implementing and deploying the IEEE 1451.1-based Network-Capable Application Process (NCAP) can achieve support for intelligent process in Integrated Systems Health Management (ISHM) for the purpose of monitoring, detection of anomalies, diagnosis of causes of anomalies, prediction of future anomalies, mitigation to maintain operability, and integrated awareness of system health by the operator. It can also support local data collection and storage. This

  7. The future of resuscitative endovascular balloon occlusion in combat operations.

    Science.gov (United States)

    Smith, Shane A; Hilsden, R; Beckett, A; McAlister, V C

    2017-08-09

    Damage control resuscitation and early thoracotomy have been used to increase survival after severe injury in combat. There has been a renewed interest in resuscitative endovascular balloon occlusion of the aorta (REBOA) in both civilian and military medical practices. REBOA may result in visceral and limb ischaemia that could be harmful if use of REBOA is premature or prolonged. The purpose of this paper is to align our experience of combat injuries with the known capability of REBOA to suggest an implementation strategy for the use of REBOA in combat care. It may replace the resuscitative effect of thoracotomy; can provide haemostasis of non-compressible torso injuries such as the junctional and pelvic haemorrhage caused by improvised explosive devices. However, prehospital use of REBOA must be in the context of an overall surgical plan and should be restricted to deployment in the distal aorta. Although REBOA is technically easier than a thoracotomy, it requires operator training and skill to add to the beneficial effect of damage control resuscitation and surgery. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  8. A High-Fidelity Batch Simulation Environment for Integrated Batch and Piloted Air Combat Simulation Analysis

    Science.gov (United States)

    Goodrich, Kenneth H.; McManus, John W.; Chappell, Alan R.

    1992-01-01

    A batch air combat simulation environment known as the Tactical Maneuvering Simulator (TMS) is presented. The TMS serves as a tool for developing and evaluating tactical maneuvering logics. The environment can also be used to evaluate the tactical implications of perturbations to aircraft performance or supporting systems. The TMS is capable of simulating air combat between any number of engagement participants, with practical limits imposed by computer memory and processing power. Aircraft are modeled using equations of motion, control laws, aerodynamics and propulsive characteristics equivalent to those used in high-fidelity piloted simulation. Databases representative of a modern high-performance aircraft with and without thrust-vectoring capability are included. To simplify the task of developing and implementing maneuvering logics in the TMS, an outer-loop control system known as the Tactical Autopilot (TA) is implemented in the aircraft simulation model. The TA converts guidance commands issued by computerized maneuvering logics in the form of desired angle-of-attack and wind axis-bank angle into inputs to the inner-loop control augmentation system of the aircraft. This report describes the capabilities and operation of the TMS.

  9. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    Directory of Open Access Journals (Sweden)

    Bego Blanco

    2017-01-01

    Full Text Available In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-aware placement solution using a robust optimization approach based on service demand uncertainty in order to minimize the power consumption in the system constrained by network service latency requirements and infrastructure terms. Then, we discuss the results of the proposed placement mechanism in 5G scenarios that combine several service flavours and robust protection values. Once the impact of the service flavour and robust protection on the global power consumption of the system is analyzed, numerical results indicate that our proposal succeeds in efficiently placing the virtual network functions that compose the network services in the available hardware infrastructure while fulfilling service constraints.

  10. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  11. An improved artificial bee colony algorithm based on balance-evolution strategy for unmanned combat aerial vehicle path planning.

    Science.gov (United States)

    Li, Bai; Gong, Li-gang; Yang, Wen-lun

    2014-01-01

    Unmanned combat aerial vehicles (UCAVs) have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC) algorithm improved by a balance-evolution strategy (BES) is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.

  12. Exploiting the In-Network Capabilities of Multicast to Discover Proximate IPTV Channels

    Directory of Open Access Journals (Sweden)

    William Donnelly

    2010-09-01

    Full Text Available IPTV has become the next generation of television due, in part, to its ability to support features that have been lacking in conventional broadcasting—for example, end-user interactivity, personalisation and localisation. Providers are also searching for the most efficient delivery methods to provide the greatest amount of contents at the lowest cost. At present IPTV uses IP multicast to deliver live TV channels in an over-provisioned walled-garden network due to issues of deploying multicast and QoS challenges in the public Internet. However, IPTV is likely to shift into some parts of the public Internet in the future as a managed service. Multicast routing is performed on a per-session destination-address basis so each router maintains a table of all of the multicast addresses to which the content is being forwarded. We exploit this information to discover and join the in-progress channels of geographically proximate users and to create a new incentivised premium service in future IPTV networks called ProxyTV. This approach is expected to minimise network bandwidth requirements as it enables ISPs to optimise bandwidth on their edge networks. This becomes increasingly significant as TV content consumes more and more bandwidth, especially with the onset of HD and 3D capabilities. In this paper, we have presented in detail the concept with the results of a survey and an analysis of network traffic to justify the proposed approach.

  13. Combat Power Analysis is Combat Power Density

    Science.gov (United States)

    2012-05-17

    Lanchester equations, Weapon Effectiveness Index (WEI), Weighted Unit Value (WUV), Armored Division Equivalents (ADE), and Unit Frontages. The research...6 Lanchester Equations... Lanchester Equations ............................................................................................... 53 Appendix C: Relative Combat Power

  14. Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1)

    Science.gov (United States)

    2016-03-01

    Global Combat Support System – Marine Corps (GCSS-MC) is a portfolio of systems that supports logistics elements of command and control, joint...future Marine Corps logistics systems modernization . GCSS-MC/LCM Increment 1 Capability Release 1 (hereinafter Release 1.1) is the baseline

  15. Determination of the capabilities of a detachment for neutralizing chemical attack effects in the brigade defense zone

    Directory of Open Access Journals (Sweden)

    Dejan R. Inđić

    2012-04-01

    Full Text Available This paper presents one possible way of deploying detachments for neutralizing the effects of chemical attacks in a brigade defense zone. The detachment composition is provisional and depends on the assessment of whether the enemy in the incoming combat will use weapons of mass destruction. A detachment consists of several organizational units: medical care forces, chemical reconnaissance forces, forces for the establishment of combat efficiency and chemical decontamination forces. The capabilities of the mentioned forces depend on their size, equipment, training level, extent of effects and combat conditions. The paper indicates a potential to overcome the gap in the provisions after disbanding the Army Corps.

  16. Bilateral Cooperation Between Indonesia and Malaysia in Combating Transnational Crime

    OpenAIRE

    Mustofa, Prof. Muhammad

    2008-01-01

    This paper us discuss that bilateral cooperation between Indonesia and Malaysia in combating transnational crime or trans-border crime. First of all, it should be based on understanding the root of the problem in trans-border crime problems. Furthermore, the effective bilateral cooperation can occur when notice the same aspects in the definition of the crime, the existence of law, the recognition of the evidence, extradition agreement, and the network information between the states.

  17. Specifying Orchestrating Capability in Network Organization and Interfirm Innovation Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    -tech industry. Besides interfirm networks, some organizational researchers are interested in the internal network organizational design. Prospector firms putting innovation on top of the agenda usually has a network organization which is more flexible. This paper analyzes how an SME from a traditional industry...

  18. Violence associated with combat-related posttraumatic stress disorder: The importance of anger.

    Science.gov (United States)

    Novaco, Raymond W; Chemtob, Claude M

    2015-09-01

    The importance of anger with regard to violence among veterans with combat-related PTSD has received little attention. We previously proposed that in PTSD the activation of threat-related cognitive networks strongly potentiates anger in a positive feedback loop and that inhibitory controls on aggression can be overridden when PTSD and anger activation are conjoined. We predicted that violence would be intensified when combat-related PTSD was conjoined with anger. We used the National Vietnam Veterans Readjustment Study (NVVRS) public use data set, selecting the male combat theater veterans, which entailed 1,200 from the main survey (Study 1) and 259 from the clinical interview component (Study 2). Anger indices were constructed from NVVRS variables. PTSD was assessed by continuous symptom scores and by clinical diagnostic measures. Conjoined anger and PTSD was associated with greatly increased violence. PTSD was not associated with violence in the absence of anger. This result was obtained using alternative measures of PTSD and of anger in both the main survey and the clinical interview component. These findings call for reconceptualizing the association of PTSD and violence. Concerted attention should be given to anger as a risk factor for violence in the assessment and treatment of combat-related PTSD, and as an important portal of entry for treatment. (c) 2015 APA, all rights reserved).

  19. An Improved Artificial Bee Colony Algorithm Based on Balance-Evolution Strategy for Unmanned Combat Aerial Vehicle Path Planning

    Directory of Open Access Journals (Sweden)

    Bai Li

    2014-01-01

    Full Text Available Unmanned combat aerial vehicles (UCAVs have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC algorithm improved by a balance-evolution strategy (BES is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.

  20. Introduction of Counter-Proliferation Capabilities in Development States

    International Nuclear Information System (INIS)

    Caulfield, P.; Edwards, T.; Witkin, A.; Elgebaly, A.

    2010-01-01

    In recent history we have seen a number of States develop their indigenous industrial skills to a point suitable for the manufacture of nuclear components. Private individuals unbeknown to the State have then utilized this capability to supply directly into proliferation networks - potentially reducing international confidence in such a State. To combat this possibility, a developing State must recognize the challenges that are raised by its emerging skills and take action to introduce measures that not only help the State identify proliferation activities but also ensure the national security of the State. One of those measures might be to develop a capability within the State to recognize and counter the activities of would-be-proliferators. In many States this capability is managed and applied through a dedicated counter-proliferation unit that has strong links with border controls and customs organizations. A counter-proliferation unit, once established could show dramatic returns for a modest investment. The activities of such a Unit could save the State political embarrassment by hindering and narrowing the chances of unintentional proliferation activities. The Unit should not be introduced as part of a Safeguards agreement or as part of a non proliferation treaty. It should rather be established as an act by the State to protect and control its emerging technologies from being involved, willingly or unwittingly, in proliferation activities. This is a sovereign act of the State - solely for its benefit and should not be imposed by any external power. Today's would-be-proliferators around the world cooperate and act together; similarly emerging counter-proliferation units should act and work together in order to be a step ahead of the proliferators. Improved world-wide cooperation should increase the detection rate of proliferation incidents which will in turn curtail the spread of nuclear weapons - for the benefit of all. (author)

  1. Simulating barrier penetration during combat. Technical report

    International Nuclear Information System (INIS)

    De Laquil, P. III.

    1980-04-01

    A computer program, BARS, simulates combat between an adversary group attempting to hijack special nuclear material and escort personnel attempting to protect it. BARS is designed to investigate how various combat strategies and levels of performance affect the time required to penetrate barriers (armor, deterrent systems, etc.) against forcible entry. A Monte Carlo code, BARS uses a game theoretic approach to allocate the attacking and defending forces. Combat suppression is simulated using a stochastic state-transition model for the behavior of individuals under combat stress. The BARS program was developed as part of the overall combat modelling effort of the transportation safeguards program

  2. Human performance modeling for system of systems analytics: combat performance-shaping factors.

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R.; Miller, Dwight Peter

    2006-01-01

    The US military has identified Human Performance Modeling (HPM) as a significant requirement and challenge of future systems modeling and analysis initiatives. To support this goal, Sandia National Laboratories (SNL) has undertaken a program of HPM as an integral augmentation to its system-of-system (SoS) analytics capabilities. The previous effort, reported in SAND2005-6569, evaluated the effects of soldier cognitive fatigue on SoS performance. The current effort began with a very broad survey of any performance-shaping factors (PSFs) that also might affect soldiers performance in combat situations. The work included consideration of three different approaches to cognition modeling and how appropriate they would be for application to SoS analytics. This bulk of this report categorizes 47 PSFs into three groups (internal, external, and task-related) and provides brief descriptions of how each affects combat performance, according to the literature. The PSFs were then assembled into a matrix with 22 representative military tasks and assigned one of four levels of estimated negative impact on task performance, based on the literature. Blank versions of the matrix were then sent to two ex-military subject-matter experts to be filled out based on their personal experiences. Data analysis was performed to identify the consensus most influential PSFs. Results indicate that combat-related injury, cognitive fatigue, inadequate training, physical fatigue, thirst, stress, poor perceptual processing, and presence of chemical agents are among the PSFs with the most negative impact on combat performance.

  3. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  4. Nuclear or conventional power for surface combatant ships: Department of the Navy. Report to the Congress

    International Nuclear Information System (INIS)

    1977-01-01

    GAO reviewed the controversy over whether the Navy's major surface combatant ships should be all nuclear powered, all conventionally powered, or a mix of both. Nuclear ships are more capable but cost more and their relative cost-effectiveness cannot be measured because Navy analysts cannot quantify many benefits of nuclear power. The Congress, in reviewing Navy shipbuilding plans for surface combatant ships, should be cognizant that buying only conventional ships will maximize naval firepower; buying only nuclear ships will provide mobility and greater freedom from logistics support; and buying a mix is a third option providing, to varying degrees, the advantages and disadvantages of the all-nuclear and all-conventional options

  5. Detection capability of the IMS seismic network based on ambient seismic noise measurements

    Science.gov (United States)

    Gaebler, Peter J.; Ceranna, Lars

    2016-04-01

    All nuclear explosions - on the Earth's surface, underground, underwater or in the atmosphere - are banned by the Comprehensive Nuclear-Test-Ban Treaty (CTBT). As part of this treaty, a verification regime was put into place to detect, locate and characterize nuclear explosion testings at any time, by anyone and everywhere on the Earth. The International Monitoring System (IMS) plays a key role in the verification regime of the CTBT. Out of the different monitoring techniques used in the IMS, the seismic waveform approach is the most effective technology for monitoring nuclear underground testing and to identify and characterize potential nuclear events. This study introduces a method of seismic threshold monitoring to assess an upper magnitude limit of a potential seismic event in a certain given geographical region. The method is based on ambient seismic background noise measurements at the individual IMS seismic stations as well as on global distance correction terms for body wave magnitudes, which are calculated using the seismic reflectivity method. From our investigations we conclude that a global detection threshold of around mb 4.0 can be achieved using only stations from the primary seismic network, a clear latitudinal dependence for the detection threshold can be observed between northern and southern hemisphere. Including the seismic stations being part of the auxiliary seismic IMS network results in a slight improvement of global detection capability. However, including wave arrivals from distances greater than 120 degrees, mainly PKP-wave arrivals, leads to a significant improvement in average global detection capability. In special this leads to an improvement of the detection threshold on the southern hemisphere. We further investigate the dependence of the detection capability on spatial (latitude and longitude) and temporal (time) parameters, as well as on parameters such as source type and percentage of operational IMS stations.

  6. On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures

    OpenAIRE

    Tutschku, Kurt; Ahmadi Mehri, Vida; Carlsson, Anders; Chivukula, Krishna Varaynya; Johan, Christenson

    2016-01-01

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to e...

  7. S.A.C.I.: Incident Combat Support System; S.A.C.I.: Sistema de Apoio ao Combate de Incidentes

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, Antonio R.L. [ARMTEC Tecnologia em Robotica, Fotrtaleza, CE (Brazil); Macedo, Antonio R.M. [Universidade de Fortaleza, CE (Brazil)

    2004-07-01

    The incidents that occur in the petrochemical industry are extremely dangerous, because of the range of temperature that it reaches and the radius of the explosion. For this reason the S.A.C.I. that is an Incident's Combat Support System was developed. The purpose of this paper is to present the complete operational capability of this machine, and also some of the construction design calculations. It is a controlled-by-distance robot that carries one water cannon that generates fog, stream or foam with a limit pressure of 125 psi. It works within 90 m from the operator, has 3 degrees of freedom and a minimum autonomy of 3 hours. Before this prototype was made, only the United Kingdom by Qinetiq and the Japan by the Tokyo Fire Department had this technology. This prototype is around 70% of the investment of the ones in the market. The tests shown in the paper were made in the training bunker of Ceara's Military Fire Corp. Headquarters and in an arena in the Gloria Marine in Rio de Janeiro. The results of this project is a national product that improves the incident's combat response time, saving the most important resource, that is the human been. (author)

  8. S.A.C.I.: Incident Combat Support System; S.A.C.I.: Sistema de Apoio ao Combate de Incidentes

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, Antonio R.L. [ARMTEC Tecnologia em Robotica, Fotrtaleza, CE (Brazil); Macedo, Antonio R.M. [Universidade de Fortaleza, CE (Brazil)

    2004-07-01

    The incidents that occur in the petrochemical industry are extremely dangerous, because of the range of temperature that it reaches and the radius of the explosion. For this reason the S.A.C.I. that is an Incident's Combat Support System was developed. The purpose of this paper is to present the complete operational capability of this machine, and also some of the construction design calculations. It is a controlled-by-distance robot that carries one water cannon that generates fog, stream or foam with a limit pressure of 125 psi. It works within 90 m from the operator, has 3 degrees of freedom and a minimum autonomy of 3 hours. Before this prototype was made, only the United Kingdom by Qinetiq and the Japan by the Tokyo Fire Department had this technology. This prototype is around 70% of the investment of the ones in the market. The tests shown in the paper were made in the training bunker of Ceara's Military Fire Corp. Headquarters and in an arena in the Gloria Marine in Rio de Janeiro. The results of this project is a national product that improves the incident's combat response time, saving the most important resource, that is the human been. (author)

  9. Space Communications Capability Roadmap Interim Review

    Science.gov (United States)

    Spearing, Robert; Regan, Michael

    2005-01-01

    Contents include the following: Identify the need for a robust communications and navigation architecture for the success of exploration and science missions. Describe an approach for specifying architecture alternatives and analyzing them. Establish a top level architecture based on a network of networks. Identify key enabling technologies. Synthesize capability, architecture and technology into an initial capability roadmap.

  10. International network competition

    OpenAIRE

    Tangerås, Thomas P.; Tåg, Joacim

    2014-01-01

    We analyse network competition in a market with international calls. National regulatory agencies (NRAs) have incentives to set regulated termination rates above marginal cost to extract rent from international call termination. International network ownership and deregulation are alternatives to combat the incentives of NRAs to distort termination rates. We provide conditions under which each of these policies increase efficiency and aggregate welfare. Our findings provide theoretical suppor...

  11. Adaptive Planning: Understanding Organizational Workload to Capability/ Capacity through Modeling and Simulation

    Science.gov (United States)

    Hase, Chris

    2010-01-01

    In August 2003, the Secretary of Defense (SECDEF) established the Adaptive Planning (AP) initiative [1] with an objective of reducing the time necessary to develop and revise Combatant Commander (COCOM) contingency plans and increase SECDEF plan visibility. In addition to reducing the traditional plan development timeline from twenty-four months to less than twelve months (with a goal of six months)[2], AP increased plan visibility to Department of Defense (DoD) leadership through In-Progress Reviews (IPRs). The IPR process, as well as the increased number of campaign and contingency plans COCOMs had to develop, increased the workload while the number of planners remained fixed. Several efforts from collaborative planning tools to streamlined processes were initiated to compensate for the increased workload enabling COCOMS to better meet shorter planning timelines. This paper examines the Joint Strategic Capabilities Plan (JSCP) directed contingency planning and staffing requirements assigned to a combatant commander staff through the lens of modeling and simulation. The dynamics of developing a COCOM plan are captured with an ExtendSim [3] simulation. The resulting analysis provides a quantifiable means by which to measure a combatant commander staffs workload associated with development and staffing JSCP [4] directed contingency plans with COCOM capability/capacity. Modeling and simulation bring significant opportunities in measuring the sensitivity of key variables in the assessment of workload to capability/capacity analysis. Gaining an understanding of the relationship between plan complexity, number of plans, planning processes, and number of planners with time required for plan development provides valuable information to DoD leadership. Through modeling and simulation AP leadership can gain greater insight in making key decisions on knowing where to best allocate scarce resources in an effort to meet DoD planning objectives.

  12. Target distribution in cooperative combat based on Bayesian optimization algorithm

    Institute of Scientific and Technical Information of China (English)

    Shi Zhifu; Zhang An; Wang Anli

    2006-01-01

    Target distribution in cooperative combat is a difficult and emphases. We build up the optimization model according to the rule of fire distribution. We have researched on the optimization model with BOA. The BOA can estimate the joint probability distribution of the variables with Bayesian network, and the new candidate solutions also can be generated by the joint distribution. The simulation example verified that the method could be used to solve the complex question, the operation was quickly and the solution was best.

  13. Intelligently interactive combat simulation

    Science.gov (United States)

    Fogel, Lawrence J.; Porto, Vincent W.; Alexander, Steven M.

    2001-09-01

    To be fully effective, combat simulation must include an intelligently interactive enemy... one that can be calibrated. But human operated combat simulations are uncalibratable, for we learn during the engagement, there's no average enemy, and we cannot replicate their culture/personality. Rule-based combat simulations (expert systems) are not interactive. They do not take advantage of unexpected mistakes, learn, innovate, and reflect the changing mission/situation. And it is presumed that the enemy does not have a copy of the rules, that the available experts are good enough, that they know why they did what they did, that their combat experience provides a sufficient sample and that we know how to combine the rules offered by differing experts. Indeed, expert systems become increasingly complex, costly to develop, and brittle. They have face validity but may be misleading. In contrast, intelligently interactive combat simulation is purpose- driven. Each player is given a well-defined mission, reference to the available weapons/platforms, their dynamics, and the sensed environment. Optimal tactics are discovered online and in real-time by simulating phenotypic evolution in fast time. The initial behaviors are generated randomly or include hints. The process then learns without instruction. The Valuated State Space Approach provides a convenient way to represent any purpose/mission. Evolutionary programming searches the domain of possible tactics in a highly efficient manner. Coupled together, these provide a basis for cruise missile mission planning, and for driving tank warfare simulation. This approach is now being explored to benefit Air Force simulations by a shell that can enhance the original simulation.

  14. Combat Rescue Helicopter (CRH)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-479 Combat Rescue Helicopter (CRH) As of FY 2017 President’s Budget Defense Acquisition...Name Combat Rescue Helicopter (CRH) DoD Component Air Force Responsible Office References SAR Baseline (Development Estimate) Defense Acquisition... Helicopter (CRH) system will provide Personnel Recovery (PR) forces with a vertical takeoff and landing aircraft that is quickly deployable and

  15. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  16. Superior Generalization Capability of Hardware-Learing Algorithm Developed for Self-Learning Neuron-MOS Neural Networks

    Science.gov (United States)

    Kondo, Shuhei; Shibata, Tadashi; Ohmi, Tadahiro

    1995-02-01

    We have investigated the learning performance of the hardware backpropagation (HBP) algorithm, a hardware-oriented learning algorithm developed for the self-learning architecture of neural networks constructed using neuron MOS (metal-oxide-semiconductor) transistors. The solution to finding a mirror symmetry axis in a 4×4 binary pixel array was tested by computer simulation based on the HBP algorithm. Despite the inherent restrictions imposed on the hardware-learning algorithm, HBP exhibits equivalent learning performance to that of the original backpropagation (BP) algorithm when all the pertinent parameters are optimized. Very importantly, we have found that HBP has a superior generalization capability over BP; namely, HBP exhibits higher performance in solving problems that the network has not yet learnt.

  17. Towards a Determination of the Physiological Characteristics Distinguishing Successful Mixed Martial Arts Athletes: A Systematic Review of Combat Sport Literature.

    Science.gov (United States)

    James, Lachlan P; Haff, G Gregory; Kelly, Vincent G; Beckman, Emma M

    2016-10-01

    Mixed martial arts (MMA) is a combat sport underpinned by techniques from other combat disciplines, in addition to strategies unique to the sport itself. These sports can be divided into two distinct categories (grappling or striking) based on differing technical demands. Uniquely, MMA combines both methods of combat and therefore appears to be physiologically complex requiring a spectrum of mechanical and metabolic qualities to drive performance. However, little is known about the physiological characteristics that distinguish higher- from lower-level MMA athletes. Such information provides guidance for training interventions, performance testing and talent identification. Furthermore, while MMA incorporates techniques from both grappling and striking sports, it is unknown precisely how these disciplines differ physiologically. Understanding the relationship between higher-level competitors in grappling and striking combat sports can provide further insight into the development of the optimal performance profile of a higher-level MMA athlete. This article aims to analyse the scientific literature on MMA and the primary combat sports underpinning it to determine the physiological adaptations that distinguish superior competitors, with a view to defining the optimal physiological profile for higher-level MMA performance. Furthermore, this article will explore the differences in these capabilities between grappling- and striking-based combat sports in the context of MMA. A literature search was undertaken via PubMed, Web of Science, SportDiscus and Google Scholar. The following sports were included for systematic review based on their relevance to MMA: mixed martial arts, boxing, Brazilian jiu-jitsu, judo, karate, kickboxing, Muay Thai and wrestling. The inclusion criteria allowed studies that compared athletes of differing competition levels in the same sport using a physiological performance measure. Only male, adult (aged 17-40 years), able-bodied competitors

  18. The balance and harmony of control power for a combat aircraft in tactical maneuvering

    Science.gov (United States)

    Bocvarov, Spiro; Cliff, Eugene M.; Lutze, Frederick H.

    1992-01-01

    An analysis is presented for a family of regular extremal attitude-maneuvers for the High Angle-of-Attack Research Vehicle that has thrust-vectoring capability. Different levels of dynamic coupling are identified in the combat aircraft attitude model, and the characteristic extremal-family motion is explained. It is shown why the extremal-family trajectories develop small sideslip-angles, a highly desirable feature from a practical viewpoint.

  19. CONCEPTUALISATION ONTOLOGIQUE DE LA REPRÉSENTATION DU COMBAT CONCEPTUALISATION ONTOLOGIQUE DE LA REPRÉSENTATION DU COMBAT

    Directory of Open Access Journals (Sweden)

    Sylvain Rheault

    2012-10-01

    Full Text Available En adoptant une perspective existentielle, on peut tenter d'expliquer la représentation du combat au moyen de concepts comme les positions de SOI et de L'AUTRE ainsi que les statuts de l'ÊTRE et de la CHOSE, qui, une fois combinés, définissent des domaines ontologiques. Le combat devient alors, conceptuellement, l'action de forcer une conscience à passer d'un domaine à un autre. On observe qu'en modifiant l'intensité des positions (polarisation, des statuts (hiérarchisation et des actions (dosage, on peut expliquer les variations possibles des représentations du combat. Il restera à valider la pertinence de ces concepts en multipliant les analyses.En adoptant une perspective existentielle, on peut tenter d'expliquer la représentation du combat au moyen de concepts comme les positions de SOI et de L'AUTRE ainsi que les statuts de l'ÊTRE et de la CHOSE, qui, une fois combinés, définissent des domaines ontologiques. Le combat devient alors, conceptuellement, l'action de forcer une conscience à passer d'un domaine à un autre. On observe qu'en modifiant l'intensité des positions (polarisation, des statuts (hiérarchisation et des actions (dosage, on peut expliquer les variations possibles des représentations du combat. Il restera à valider la pertinence de ces concepts en multipliant les analyses.

  20. Battlemind Training: Transitioning Home from Combat

    National Research Council Canada - National Science Library

    Castro, Carl A; Hoge, Charles W; Milliken, Charles W; McGurk, Dennis; Adler, Amy B; Cox, Anthony; Bliese, Paul D

    2006-01-01

    .... Destruction, injury, and death were ever present in the combat zone. Transitioning from combat to home can be difficult, and many Soldiers encounter readjustment problems ranging from elevated post-traumatic stress disorder (PTSD...

  1. Evaluation of artillery equipment maintenance support capability based on grey clustering

    Science.gov (United States)

    Zhai, Mei-jie; Gao, Peng

    2017-12-01

    This paper, the theory and method of evaluating the capability of equipment maintenance support in China and abroad are studied, from the point of view of the combat task of artillery troops and the strategic attachment in the future military struggle. This paper establishes the framework of the evaluation Index system of the equipment maintenance support capability of the artillery units, and applies the grey clustering method to the evaluation of the equipment maintenance support capability of the artillery units, and finally evaluates the equipment maintenance and support capability of the artillery brigade as an example, and analyzes the evaluation results. This paper finds out the outstanding problems existing in the maintenance and support of military equipment, and puts forward some constructive suggestions, in order to improve the status of military equipment maintenance and support and improve the level of future equipment maintenance.

  2. Why Does Military Combat Experience Adversely Affect Marital Relations?

    Science.gov (United States)

    Gimbel, Cynthia; Booth, Alan

    1994-01-01

    Describes investigation of ways in which combat decreases marital quality and stability. Results support three models: (1) factors propelling men into combat also make them poor marriage material; (2) combat causes problems that increase marital adversity; and (3) combat intensifies premilitary stress and antisocial behavior which then negatively…

  3. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  4. Born to fight? Genetics and combat sports

    Directory of Open Access Journals (Sweden)

    Emerson Franchini

    2014-02-01

    Full Text Available Recently, the influence of genetics on sports performance has received increased attention from many researchers. In combat sports, some investigations have also been conducted. This article’s main objective was to review the representation of specific gene polymorphisms in combat sports athletes compared to controls. The following databases were searched: PubMed, Web of Science and SportDiscus. The terms used in this search involved combat sports (boxing, karate, judo, mixed martial arts, taekwondo and wrestling, genes, genetics and candidate genes. Articles published until November 2013 were included if combat sports athletes were considered as a single group (i.e., not mixed with athletes of other sports. Seven studies were found, with two presenting no difference between combat sports athletes and controls, two presenting higher frequencies of candidate genes related to a more endurance-related profile compared to controls, and three where a more power-related gene overrepresentation was found in comparison to controls. Taken together, the initial studies about the genetic characteristics of combat sports athletes are controversial, which is probably due to the mixed (aerobic and anaerobic characteristic and to the multifactorial performance determinants of these sports.

  5. Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft

    Science.gov (United States)

    2009-06-12

    or Foe IFR Instrument Flight Rules ISR Intelligence Surveillance and Reconnaissance JP Joint Publication JTAC Joint Terminal Attack...capable, combat range, loiter time, weapons payloads, ejection seats, NVG compatible cockpits, IFR avionics, etc.8 One of the primary enablers for cost...to-air threats. In cases where radar guided air defense systems are present, the lack of an RWR puts the aircraft at a definite disadvantage and is

  6. Combat Leadership Styles: Empowerment versus Authoritarianism

    Science.gov (United States)

    1990-12-01

    Combat Leadership Styles : Empowerment versus Authoritarianism FARIS R. KIRKLAND Recent research in Israel and the United States suggests that...Combat Leadership Styles : Empowerment versus Authoritarianism 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  7. Challenging the conclusion that lower preinduction cognitive ability increases risk for combat-related post-traumatic stress disorder in 2,375 combat-exposed, Vietnam War veterans.

    Science.gov (United States)

    Thompson, William W; Gottesman, Irving I

    2008-06-01

    Among U.S. Vietnam War veterans, we assessed whether preinduction cognitive abilities were associated with the risk of developing combat-related post-traumatic stress disorder (PTSD). The sample included 2,375 single-term, enlisted, male, Army, Vietnam War veterans who reported exposure to combat during the war. There were two measures of cognitive abilities obtained before military induction, the Armed Forces Qualification Test and the General Technical Examination. Associations of ability with current and lifetime diagnoses of Diagnostic and Statistical Manual of Mental Disorders, Third Edition Revised, combat-related PTSD were assessed. An index was used to grade the severity of combat exposure. Among low-combat exposure veterans, higher preinduction cognitive abilities decreased the risk for lifetime, Diagnostic and Statistical Manual of Mental Disorders, Third Edition Revised, combat-related PTSD. For veterans with higher levels of combat exposure, higher scores for preinduction cognitive abilities had no effect on reducing the risk for lifetime diagnosis of combat-related PTSD. For a current diagnosis of combat-related PTSD, approximately 20 years after the stressful life events, preinduction cognitive abilities had no effect on the rates of combat-related PTSD. We found significant interactions between preinduction cognitive abilities and severity of combat exposure for the lifetime diagnosis of combat-related PTSD among Army Vietnam War veterans. High levels of combat exposure are likely to exhaust intellectual resources available for coping with stressful life events. Lower scores for cognitive abilities are not uniformly disadvantageous, and this should be considered by military manpower policymakers.

  8. Communication network structure parameters and new knowledge generation capabilities in companies engaged in industry control system engineering projects

    Directory of Open Access Journals (Sweden)

    Titov Sergei

    2016-01-01

    Full Text Available Engineering companies engaged in business of industry control systems need to manage the processes of generation of innovations within and across their projects. Generation and diffusion of innovations materialize through the communication networks of project teams. Therefore, it is possible to hypothesize that the characteristics of communication networks play role in generation of new knowledge. With the data from 14 industry control system projects of a Russian engineering company the communication network structure characteristics were calculated and the analysis of correlation between these characteristics and knowledge generation capabilities was performed. As a result correlation between centralization of communication and the number of new technical solutions developed in projects was discovered.

  9. Rating of Perceived Exertion for Quantification of Training and Combat Loads During Combat Sport-Specific Activities: A Short Review.

    Science.gov (United States)

    Slimani, Maamer; Davis, Philip; Franchini, Emerson; Moalla, Wassim

    2017-10-01

    The aim of this short review was to summarize data pertaining to the rating of perceived exertion (RPE) methods (RPE value and session-RPE) during combat sport-specific activities (i.e., competition and training) based on many factors, including contest type (i.e., official vs. simulated vs. training), combat rounds, age of participants and muscle groups, and their correlation with physiological variables (i.e., blood lactate concentration [La] and heart rate [HR]). The current review shows higher RPE in a match of mixed martial arts (MMAs) than Brazilian jiu-jitsu and kickboxing matches and during the competitive period compared with the precompetitive period. This could be explained by the longer duration of bouts, the higher percentage contribution of aerobic metabolism in MMA than other combat sports and contest type differences (simulated vs. official matches). Thus, this review found significant correlations between RPE or session-RPE, [La] and HR. Particularly, there was a stronger correlation between RPE and [La] during official striking (r = 0.81) than grappling combat sports matches (r = 0.53). In addition, a variation of correlation (moderate to large) between session-RPE and HR-based methods has been reported (i.e., Edwards' training load [r ranged between 0.58 and 0.95] and Banister training impulse [r ranged between 0.52 and 0.86]). Specifically, stronger correlation was apparent in combat sport competition that required a much higher percentage contribution of aerobic metabolism (e.g., karate) and in adult athletes than anaerobic-based combat sports (e.g., taekwondo) and young athletes, respectively. Indeed, the current review highlights that the correlations between session-RPE and HR-based methods were higher during official competition than training sessions. Session-RPE was affected by participants' competitive level, the intensity of session (high vs. low), the training modalities (tactical-technical vs. technical-development vs. simulated

  10. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  11. Combat ocular trauma and systemic injury.

    Science.gov (United States)

    Weichel, Eric D; Colyer, Marcus H

    2008-11-01

    To review the recent literature regarding combat ocular trauma during hostilities in Operations Iraqi Freedom and Enduring Freedom, describe the classification of combat ocular trauma, and offer strategies that may assist in the management of eye injuries. Several recent publications have highlighted features of combat ocular trauma from Operation Iraqi Freedom. The most common cause of today's combat ocular injuries is unconventional fragmentary munitions causing significant blast injuries. These explosive munitions cause high rates of concomitant nonocular injuries such as traumatic brain injury, amputation, and other organ injuries. The most frequent ocular injuries include open-globe and adnexal lacerations. The extreme severity of combat-related open-globe injuries leads to high rates of primary enucleation and retained intraocular foreign bodies. Visual outcomes of intraocular foreign body injuries are similar to other series despite delayed removal, and no cases of endophthalmitis have occurred. Despite these advances, however, significant vision loss persists in cases of perforating globe injuries as well as open and closed-globe trauma involving the posterior segment. This review summarizes the recent literature describing ocular and systemic injuries sustained during Operations Iraqi and Enduring Freedom. An emphasis on classification of ocular injuries as well as a discussion of main outcome measures and complications is discussed.

  12. Combat Stress Decreases Memory of Warfighters in Action.

    Science.gov (United States)

    Delgado-Moreno, Rosa; Robles-Pérez, José Juan; Clemente-Suárez, Vicente Javier

    2017-08-01

    The present research aimed to analyze the effect of combat stress in the psychophysiological response and attention and memory of warfighters in a simulated combat situation. Variables of blood oxygen saturation, heart rate, blood glucose, blood lactate, body temperature, lower body muscular strength manifestation, cortical arousal, autonomic modulation, state anxiety and memory and attention through a postmission questionnaire were analyzed before and after a combat simulation in 20 male professional Spanish Army warfighters. The combat simulation produces a significant increase (p body temperature post, HF post/correct sound, body temperature post/glucose post, CFFTpre/lactate post, CFFT post/wrong sound, glucose post/AC pre, AC post/wrong fusil, AS post/SC post and SC post/wrong olfactory; and negative correlations: LF post/correct sound, body temperature post/lactate post and glucose post/lactate post. This data suggest that combat stress actives fight-flight system of soldiers. As conclusion, Combat stress produces an increased psychophysiological response that cause a selective decrease of memory, depending on the nature, dangerous or harmless of the objects.

  13. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  14. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  15. Effect of signal noise on the learning capability of an artificial neural network

    International Nuclear Information System (INIS)

    Vega, J.J.; Reynoso, R.; Calvet, H. Carrillo

    2009-01-01

    Digital Pulse Shape Analysis (DPSA) by artificial neural networks (ANN) is becoming an important tool to extract relevant information from digitized signals in different areas. In this paper, we present a systematic evidence of how the concomitant noise that distorts the signals or patterns to be identified by an ANN set limits to its learning capability. Also, we present evidence that explains overtraining as a competition between the relevant pattern features, on the one side, against the signal noise, on the other side, as the main cause defining the shape of the error surface in weight space and, consequently, determining the steepest descent path that controls the ANN adaptation process.

  16. Tactical Reconnaissance and Security for the Armor Battalion Commander: Is the Scout Platoon Combat Capable or Combat Ineffective?

    Science.gov (United States)

    1990-12-27

    reconnaissance force back to a heavy ele ,._.it capable of security missions and limited 10 reconnaissance. Vletnam continued the platoon’s emphasis on...College, Fort Leavenworth, KS, 30 November 1988 (CARL Ref. AOR215860). JouroaI ~ el Bacevich, LTC A. J. "Training Scouts." Armor, September 1987, pp. 37...Swanson, Major Steven G. " Bronco Nine Speaks His Mind." MIlitaryInteigence, April-June 1990, pp. 8- 10, 12. "The Bustle Rack." Armo,; March-April 1990

  17. Marine Corps Amphibious Combat Vehicle (ACV) and Marine Personnel Carrier (MPC): Background and Issues for Congress

    Science.gov (United States)

    2016-09-09

    providing critical capabilities to execute the nation’s military strategy . On January 6, 2011, after spending approximately $3 billion in...the Landing Craft , Air Cushioned (LCAC). The LAV-25 has been in service since 1983. According to the Marine Program Executive Office (PEO) Land...the Marines’ new MPC/ACV acquisition strategy and its associated challenges and risks. Marine Corps Amphibious Combat Vehicle (ACV) and Marine

  18. High Reliability Organization and Applicability to the Battlefield to Reduce Errors Associated with Combat Casualty Care

    Science.gov (United States)

    2016-06-10

    use different terminology depending on which sister service they are from. Every service has various medical capabilities for each role of medical ... Medical Errors, Combat Casualty Care, Culture of Safety 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...Army) AE Adverse event AHRQ Agency for Healthcare Research and Quality AHS Army Health System AMEDD Army Medical Department CPQ Clinical Practice

  19. Combat Wound Initiative program.

    Science.gov (United States)

    Stojadinovic, Alexander; Elster, Eric; Potter, Benjamin K; Davis, Thomas A; Tadaki, Doug K; Brown, Trevor S; Ahlers, Stephen; Attinger, Christopher E; Andersen, Romney C; Burris, David; Centeno, Jose; Champion, Hunter; Crumbley, David R; Denobile, John; Duga, Michael; Dunne, James R; Eberhardt, John; Ennis, William J; Forsberg, Jonathan A; Hawksworth, Jason; Helling, Thomas S; Lazarus, Gerald S; Milner, Stephen M; Mullick, Florabel G; Owner, Christopher R; Pasquina, Paul F; Patel, Chirag R; Peoples, George E; Nissan, Aviram; Ring, Michael; Sandberg, Glenn D; Schaden, Wolfgang; Schultz, Gregory S; Scofield, Tom; Shawen, Scott B; Sheppard, Forest R; Stannard, James P; Weina, Peter J; Zenilman, Jonathan M

    2010-07-01

    The Combat Wound Initiative (CWI) program is a collaborative, multidisciplinary, and interservice public-private partnership that provides personalized, state-of-the-art, and complex wound care via targeted clinical and translational research. The CWI uses a bench-to-bedside approach to translational research, including the rapid development of a human extracorporeal shock wave therapy (ESWT) study in complex wounds after establishing the potential efficacy, biologic mechanisms, and safety of this treatment modality in a murine model. Additional clinical trials include the prospective use of clinical data, serum and wound biomarkers, and wound gene expression profiles to predict wound healing/failure and additional clinical patient outcomes following combat-related trauma. These clinical research data are analyzed using machine-based learning algorithms to develop predictive treatment models to guide clinical decision-making. Future CWI directions include additional clinical trials and study centers and the refinement and deployment of our genetically driven, personalized medicine initiative to provide patient-specific care across multiple medical disciplines, with an emphasis on combat casualty care.

  20. Status and tendencies in combating computer crime at European level

    Directory of Open Access Journals (Sweden)

    Pisarić Milana

    2011-01-01

    Full Text Available Without certain adjustments to specifics of computer crime, as to a phenomenon of global proportions, detection, investigation and prosecution of this type of crime is almost impossible. Therefore, the need for setting up a legal framework for combating cyber crime has been identified, in order to define which activities related to information systems are considered computer crime; to determine the specific procedural rules, which would enable the access to data, computer and networks during investigating and prosecuting computer crime and to provide continuous training of members of the institutions responsible for countering this form of crime. This legal framework should consist of substantive and procedural rules adapted to this type of crime due its aim is the improvement of international cooperation in the framework of global and regional approach to combating cyber crime. In this this paper the current situation of strategic and legal framework of countering cyber crime is presented (at the level of the Council of Europe and of the European Union as well as trends in the development of systematic approach towards countering the mentioned abuses within these regional organizations. At the European level, the legal framework to combat cyber crime is set in the Council of Europe Convention on cyber crime and the Council of EU Framework Decision on attacks against information systems. In a series of documents organs of EU confirmed the strategic support of COE Convention and the encouragement of Member States to ratify the Convention. In addition, the Convention represent the base of the said Framework Decision. These two legal instruments have the same goal - removing the differences between national legislation, the introduction of new powers in the discovery and evidence of computer crime and improvement of the international cooperation in combating cyber crime. Although their legal nature and scope vary, its objectives will be achieved

  1. Building capability through networking with investors and researchers

    DEFF Research Database (Denmark)

    Wang, Daojuan; Schøtt, Thomas

    A startup requires financing, typically, and the startup is based on innovation, often. Capabilities for innovation and financing may be built simultaneously and created jointly at inception. Co-creation of capabilities for financing and innovation is accounted for in this study. Co...

  2. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  3. Medical rescue of naval combat: challenges and future.

    Science.gov (United States)

    Jin, Hai; Hou, Li-Jun; Fu, Xiao-Bing

    2015-01-01

    There has been no large-scale naval combat in the last 30 years. With the rapid development of battleships, weapons manufacturing and electronic technology, naval combat will present some new characteristics. Additionally, naval combat is facing unprecedented challenges. In this paper, we discuss the topic of medical rescue at sea: what challenges we face and what we could do. The contents discussed in this paper contain battlefield self-aid buddy care, clinical skills, organized health services, medical training and future medical research programs. We also discuss the characteristics of modern naval combat, medical rescue challenges, medical treatment highlights and future developments of medical rescue at sea.

  4. [Gastrointestinal diseases and abdominal pain in combat veterans].

    Science.gov (United States)

    Pal'tsev, A I; Torgashov, M N; Popova, O S

    2013-01-01

    To analyze the role of consequences of combat stress in the development of gastrointestinal tract (GIT) diseases. One hundred and sixty-one combat veterans aged 24 to 69 years were examined. All underwent a clinical and neurological examination using the McGill pain questionnaire (MPQ), Beck depression inventory, Kotenev trauma stress questionnaire, and visual analogue scale to determine pain intensity. Anxiety, impairments in memory and sleep, and depression were identified. The SF-36 questionnaire was used to estimate quality of life in the patients. Gastric secretory function was investigated; esophagogastroduodenoscopy, X-ray and ultrasound studies, clinical and biochemical blood tests, coprological examinations, fecal tests for dysbiosis, if indicated, occult blood were made. Combat stress and its consequences as posttraumatic stress disorder have been shown to play an important role in the pathogenesis of GIT diseases and in the development of chronic abdominal pain. GIT diseases in combat veterans are in larger measure a sequel of impaired processes of adjustment to combat stress. Chronic abdominal pains were heterogeneous. On the one hand, chronic GIT disease serves as a source of pain syndrome; on the other hand, the central nervous system is of importance in the development of chronic abdominal pain. In addition to therapy for GIT and hepatobiliary diseases, the treatment of GIT diseases in this category of patients involves psychotherapy and neuroprotection, aimed at reducing the consequences of combat stress in combat veterans.

  5. Comparison of High Performance Network Options: EDR InfiniBand vs.100Gb RDMA Capable Ethernet

    Energy Technology Data Exchange (ETDEWEB)

    Kachelmeier, Luke Anthony [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Univ. of New Mexico, Albuquerque, NM (United States); Van Wig, Faith Virginia [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Missouri Univ. of Science and Technology, Rolla, MO (United States); Erickson, Kari Natania [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); New Mexico Inst. of Mining and Technology, Socorro, NM (United States)

    2016-08-08

    These are the slides for a presentation at the HPC Mini Showcase. This is a comparison of two different high performance network options: EDR InfiniBand and 100Gb RDMA capable ethernet. The conclusion of this comparison is the following: there is good potential, as shown with the direct results; 100Gb technology is too new and not standardized, thus deployment effort is complex for both options; different companies are not necessarily compatible; if you want 100Gb/s, you must get it all from one place.

  6. Psycho-physiological response of soldiers in urban combat

    Directory of Open Access Journals (Sweden)

    Vicente J. Clemente-Suárez

    2013-05-01

    Full Text Available Current armed conflicts are asymmetrical and are developed m urban areas. These new requirements have not been studied for current literature. The aim of this study was to analyse changes in cortical arousal, blood lactate, muscle strength, autonomic modulation and rate of perceived exertion in a simulated urban combat. We analyzed 20 soldiers before and after an urban combat simulation. The results showed how urban combat produced high sympathetic nervous system activation, increasing the muscle strength, heart rate and blood lactate concentration of the soldiers. Despite this effort, rate of perceived exertion were not consistent with the physiological response that soldiers presented, the rate of perceived exertion was lower than the physiological response evaluated. Furthermore, the information processing and cortical arousal decreased after the urban combat simulation. These results have showed the psycho-physiological response of soldiers in combat, helping to better understanding and enabling an improvement of current training methods of soldiers.

  7. A naturalistic decision making model for simulated human combatants

    International Nuclear Information System (INIS)

    HUNTER, KEITH O.; HART, WILLIAM E.; FORSYTHE, JAMES C.

    2000-01-01

    The authors describe a naturalistic behavioral model for the simulation of small unit combat. This model, Klein's recognition-primed decision making (RPD) model, is driven by situational awareness rather than a rational process of selecting from a set of action options. They argue that simulated combatants modeled with RPD will have more flexible and realistic responses to a broad range of small-scale combat scenarios. Furthermore, they note that the predictability of a simulation using an RPD framework can be easily controlled to provide multiple evaluations of a given combat scenario. Finally, they discuss computational issues for building an RPD-based behavior engine for fully automated combatants in small conflict scenarios, which are being investigated within Sandia's Next Generation Site Security project

  8. Transforming organizational capabilities in strategizing

    DEFF Research Database (Denmark)

    Jørgensen, Claus; Friis, Ole Uhrskov; Koch, Christian

    2014-01-01

    Offshored and networked enterprises are becoming an important if not leading organizational form and this development seriously challenges their organizational capabilities. More specifically, over the last years, SMEs have commenced entering these kinds of arrangements. As the organizational...... capabilities of SMEs are limited at the outset, even more emphasis is needed regarding the issues of developing relevant organizational capabilities. This paper aims at investigating how capabilities evolve during an offshoring process of more than 5 years in two Danish SMEs, i.e. not only short- but long......-term evolvements within the companies. We develop our framework of understanding organizational capabilities drawing on dynamic capability, relational capability and strategy as practice concepts, appreciating the performative aspects of developing new routines. Our two cases are taken from one author’s Ph...

  9. Evidence of combat in triceratops.

    Directory of Open Access Journals (Sweden)

    Andrew A Farke

    Full Text Available The horns and frill of Triceratops and other ceratopsids (horned dinosaurs are interpreted variously as display structures or as weapons against conspecifics and predators. Lesions (in the form of periosteal reactive bone, healing fractures, and alleged punctures on Triceratops skulls have been used as anecdotal support of intraspecific combat similar to that in modern horned and antlered animals. If ceratopsids with different cranial morphologies used their horns in such combat, this should be reflected in the rates of lesion occurrence across the skull.We used a G-test of independence to compare incidence rates of lesions in Triceratops (which possesses two large brow horns and a smaller nasal horn and the related ceratopsid Centrosaurus (with a large nasal horn and small brow horns, for the nasal, jugal, squamosal, and parietal bones of the skull. The two taxa differ significantly in the occurrence of lesions on the squamosal bone of the frill (P = 0.002, but not in other cranial bones (P > 0.20.This pattern is consistent with Triceratops using its horns in combat and the frill being adapted as a protective structure for this taxon. Lower pathology rates in Centrosaurus may indicate visual rather than physical use of cranial ornamentation in this genus, or a form of combat focused on the body rather than the head.

  10. Technical-tactical and physiological demands of wrestling combats

    Directory of Open Access Journals (Sweden)

    Bianka Miarka

    2016-06-01

    Full Text Available Technical-tactical and physiological demand analyses of wrestling combats are important because they reveal essential information for the development of contextual training and specific physical preparation of wrestlers. Therefore, the aim of this review is to describe the characteristics of wrestling combats in freestyle, female and Greco-roman styles. The time-motion analysis presented in this article is the main component to carry out inferences on intensity and effort: pause ratio of combat actions. After rules modification in 2013, wrestling combats showed quicker and more diversified actions, especially in the lighter categories. For Greco-roman wrestling, most studies showed takedowns as the most effective techniques in World competitions for the period 2009-2011. For the same period, foot/leg techniques were the most effective in female and freestyle wrestling, followed by takedown attacks. Recent analyses, developed after 2013 rules modification, showed that the decisive offensive actions were applied on foot and in par terre situations – especially gutwrenches techniques and derivatives of suplex movements. The knowledge on the determinant and predominant actions of wrestling combats can be applied in future research, as well as can be used practically for training, physical preparation and assessments of similar combat actions. It also allows interventions to prevent injuries resulting from technical and tactical wrestling actions.

  11. Barriers to Implementing a Single Joint Combat Camouflage Uniform

    Science.gov (United States)

    2017-12-01

    opportunities, threats (SWOT), and political, economic, social, and technological (PEST) analyses; examines the requirements and role of each of the...SUBJECT TERMS ground combat uniform, combat camouflage uniform history , combat camouflage uniform pattern, camouflage pattern testing 15. NUMBER...methodology applies strengths, weaknesses, opportunities, threats (SWOT), and political, economic, social, and technological (PEST) analyses

  12. Evaluation of speech recognizers for use in advanced combat helicopter crew station research and development

    Science.gov (United States)

    Simpson, Carol A.

    1990-01-01

    The U.S. Army Crew Station Research and Development Facility uses vintage 1984 speech recognizers. An evaluation was performed of newer off-the-shelf speech recognition devices to determine whether newer technology performance and capabilities are substantially better than that of the Army's current speech recognizers. The Phonetic Discrimination (PD-100) Test was used to compare recognizer performance in two ambient noise conditions: quiet office and helicopter noise. Test tokens were spoken by males and females and in isolated-word and connected-work mode. Better overall recognition accuracy was obtained from the newer recognizers. Recognizer capabilities needed to support the development of human factors design requirements for speech command systems in advanced combat helicopters are listed.

  13. Enhancing the Radio Astronomy Capabilities at NASA's Deep Space Network

    Science.gov (United States)

    Lazio, Joseph; Teitelbaum, Lawrence; Franco, Manuel M.; Garcia-Miro, Cristina; Horiuchi, Shinji; Jacobs, Christopher; Kuiper, Thomas; Majid, Walid

    2015-08-01

    NASA's Deep Space Network (DSN) is well known for its role in commanding and communicating with spacecraft across the solar system that produce a steady stream of new discoveries in Astrophysics, Heliophysics, and Planetary Science. Equipped with a number of large antennas distributed across the world, the DSN also has a history of contributing to a number of leading radio astronomical projects. This paper summarizes a number of enhancements that are being implemented currently and that are aimed at increasing its capabilities to engage in a wide range of science observations. These enhancements include* A dual-beam system operating between 18 and 27 GHz (~ 1 cm) capable of conducting a variety of molecular line observations, searches for pulsars in the Galactic center, and continuum flux density (photometry) of objects such as nearby protoplanetary disks* Enhanced spectroscopy and pulsar processing backends for use at 1.4--1.9 GHz (20 cm), 18--27 GHz (1 cm), and 38--50 GHz (0.7 cm)* The DSN Transient Observatory (DTN), an automated, non-invasive backend for transient searching* Larger bandwidths (>= 0.5 GHz) for pulsar searching and timing; and* Improved data rates (2048 Mbps) and better instrumental response for very long baseline interferometric (VLBI) observations with the new DSN VLBI processor (DVP), which is providing unprecedented sensitivity for maintenance of the International Celestial Reference Frame (ICRF) and development of future versions.One of the results of these improvements is that the 70~m Deep Space Station 43 (DSS-43, Tidbinbilla antenna) is now the most sensitive radio antenna in the southern hemisphere. Proposals to use these systems are accepted from the international community.Part of this research was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics & Space Administration.

  14. Medical rescue of naval combat: challenges and future

    OpenAIRE

    Jin, Hai; Hou, Li-Jun; Fu, Xiao-Bing

    2015-01-01

    There has been no large-scale naval combat in the last 30?years. With the rapid development of battleships, weapons manufacturing and electronic technology, naval combat will present some new characteristics. Additionally, naval combat is facing unprecedented challenges. In this paper, we discuss the topic of medical rescue at sea: what challenges we face and what we could do. The contents discussed in this paper contain battlefield self-aid buddy care, clinical skills, organized health servi...

  15. Combat sports for persons with disabilities

    Directory of Open Access Journals (Sweden)

    Kasum Goran

    2011-01-01

    Full Text Available In literature, the term adapted sport indicates sports activities, modified and adapted to persons with disabilities. In spite of their highly prominent values, combat sports are underrepresented among persons with disabilities in Serbia. The benefits of combat sports practicing are numerous, and at some international hospitals, martial sports and arts already have an important role in the treatment of traumatized and disabled persons. Currently, the programme of Paralympic Games includes only two sports, these are fencing and judo, in male and female competition. Almost certainly, karate will also be included in the programme of Paralympic Games, and there are similar ambitions in the case of taekwondo as well. In addition to these sports, some martial arts, especially aikido, thai-chi-chuan and qigong, have obtained significant representation and interest among persons with disabilities. The reasons for weaker interest in other martial sports and arts, should be sought in the fact that they are underrepresented among this population, and that these persons are not offered the possibility of organized practice of such sports. Orientation towards a combat sport brings great refreshment and powerful emotional experience to each practitioner, and this fact has special significance to persons with disabilities. In Serbia, combat sports are not widely represented among persons with disabilities, and only the wrestlers with impaired hearing have achieved significant success on the international stage. On the other hand, the popularity of combat sports among persons with disabilities in the world is significantly growing. It is necessary to take concrete steps to make it so in Serbia as well.

  16. Research on the Emergence Modeling of Equipment System

    Directory of Open Access Journals (Sweden)

    He Xin-Hua

    2017-01-01

    Full Text Available Under the conditions of information, the network-centric system and the confrontation in the system has developed into a major combat style. But the traditional line of sexual assessment method is difficult to accurately assess the information equipment system combat capability. Therefore, this paper studies the effective evaluation method of the operational capability of the information equipment system from the perspective of emerge. Based on the simulation modeling and evaluation method, building the capability model of the weapon equipment system to evaluate the operational capability of the information weapon weaponry equipment. Through the example analysis, the validity of the simulation model and the practicability of the evaluation system is analyzed by analyzing the examples.

  17. COMPETITIVENESS, MARKETING ACCESS, AND NETWORK CAPABILITY AND ITS IMPACTS ON MARKETING PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Teguh Iman Sayekti

    2016-12-01

    Full Text Available This study is to determine what factors influencingthe performance of SMEs. The population in this study is SMEs in the Central Java. Sample collection was conducted with a purposive sampling method. Criteriaused to take into accountis the SMEs that are already running at leastfortwo years. The sample in this study is intended as the representative of total population,67 (sixty seven. The data were processed and analyzed by computer program of SPSS 20 for Windows. Based on the results of regression analysis, it can be concluded that competitiveness has positive and significant impact on marketing performance marketing access has positive and significant impact on marketing performance. It means that the higher competitiveness and marketing access, the higher its performance. Competitiveness and marketing access have influence on SMEs’ performance through network capability.   

  18. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide......-Configurable Intelligent Distributed Antenna System (SCIDAS)’ that overlays intelligence over the conventional DAS architecture and latter is in the form of a swarm of intelligent hovering base stations working in a team to cooperatively resolve the PTC congestion at the Area of Event (AoE). A suitable network...

  19. Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancee pour l’entrainement au combat urbain)

    Science.gov (United States)

    2018-01-01

    NORTH ATLANTIC TREATY ORGANIZATION SCIENCE AND TECHNOLOGY ORGANIZATION AC/323(MSG-098)TP/740 www.sto.nato.int STO TECHNICAL...REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat urbain...NORTH ATLANTIC TREATY ORGANIZATION SCIENCE AND TECHNOLOGY ORGANIZATION AC/323(MSG-098)TP/740 www.sto.nato.int STO TECHNICAL

  20. Building Software Tools for Combat Modeling and Analysis

    National Research Council Canada - National Science Library

    Yuanxin, Chen

    2004-01-01

    ... (Meta-Language for Combat Simulations) and its associated parser and C++ code generator were designed to reduce the amount of time and developmental efforts needed to build sophisticated real world combat simulations. A C++...

  1. Recommendations for strengthening the national systems and the international regime for combating of illicit trafficking. Keynote address/session 10

    International Nuclear Information System (INIS)

    Ek, P.; Wredberg, L.

    2001-01-01

    internal control, quality assurance, security culture and individual responsibilities; Shortage of suitable and modern equipment for monitoring and detection of radioactive material; Shortage of staff and training capabilities and insufficient financial resources concerning supervision and law enforcement authorities; Insufficient access to relevant information and data bases. A first step to improve national systems would be to assist states, by educating key-persons and authority staff, how to establish good, state-of-the-art national systems for combating of illicit trafficking, which would meet the requirements of international legal instruments, recommendations and guidelines. State Governments need to be made more aware of the seriousness of the proliferation threat and be convinced that supervision and law enforcement resources must be reinforced for bringing their national systems up to international standard. On the international level, combating of illicit trafficking would be ameliorated by improving the communication links between national authorities bi-laterally and with the international organisations. Also increased information exchange between national and international databases would improve prevention and detection capabilities. For the effective and consequent combating of illicit trafficking of nuclear material and equipment, it is, however, necessary that the international non-proliferation regime be strengthened through new initiatives and approaches. These should focus on, inter alia, a set of minimum requirements to be implemented, and to pursue, impose, follow-up and audit the implementation of those requirements into the national systems for combating of illicit trafficking. The IAEA is the recognised international organisation, both for nuclear energy promoting activities, and for the implementation of the international non-proliferation regime. The IAEA has, within its area of competence, relevant know-how and capability, including qualified

  2. How Relational Capabilities Matter? Organizational Context and Performance of Internationally Oriented SMEs

    Directory of Open Access Journals (Sweden)

    Mariola Ciszewska-Mlinarič

    2012-12-01

    Full Text Available The article sheds light on the organizational context enhancing development of relational capabilities and examines the significance of relational capabilities for SMEs’ financial and non-financial performance. The firm relational capability is measured separately in customers’ and suppliers’ networks. The research results reveal that fostering internal social capital coupled with the usage of economic motivators augment a firm relational capability in a supplier network, which in turn is associated with better performance results, both financial and non-financial. The results on relational capability in a customer network with respect to performance are less conclusive, indicating that vertical ties that internationally oriented SMEs develop (with suppliers and customers are not of equal importance.

  3. Performance differences between male and female marines on standardized physical fitness tests and combat proxy tasks: identifying the gap.

    Science.gov (United States)

    Jameson, Jason; Pappa, Leon; McGuire, Brian; Kelly, Karen R

    2015-01-01

    For decades women have been restricted from direct assignment to certain military occupational specialties such as infantry. These restrictions can limit the advancement of women through the ranks of military leadership. Thus, the purpose of this effort was to identify those physical requirements most likely to serve as barriers for women wanting to enter closed combat arms positions, and to evaluate the quality of existing physical fitness tests as potential measures of assessment of combat readiness. Data were collected from 3 different sites within the US Marine Corps Training and Education Command. All participants (409 male, 379 femaile) were active-duty Marines who recently completed the Physical Fitness Test (PFT) and Combat Fitness Test (CFT). Participants completed 6 physical tasks: 120-mm tank loading drill, 155-mm artillery round carry, negotiating an obstacle course wall while wearing a fighting load (≈30 lb), pull-ups, deadlift, and clean and press. Overall, there was a high rate of successful completion on the combat proxy tasks (men, ≈80% to 100%; women, ≈70% to 100%), with the notable exception being the clean and press (men, 80%; women, 9%) and pull-ups (men, 16±4; women, 4±2). The PFT and CFT components tasks were also related, strongly in some cases, with performance on combat-related proxy tasks (Spearman's ρ typically ranged from 0.60 to 0.80). Estimates of fat-free mass and VO2max were also strongly related to an overall measure of combat readiness (Spearman's ρ=0.77 and ρ=0.56, respectively). The primary physical obstacle for women is upper body strength. However, some women could successfully complete all of the proxy tasks and thus are physically capable of meeting the demands of closed combat occupations. The fact that some female Marines could complete the most challenging upper body strength tasks suggests that these barriers are not inherent but may be due to a lack of training specificity.

  4. Combats escènics

    Directory of Open Access Journals (Sweden)

    Pawel Rouba Billowicz

    2016-04-01

    Full Text Available “Combats Escènics” és un treball que tracta sobre la interpretació artística de la violència d’artistes de l’espectacle per tal de divertir el públic i emetre un missatge humanista mitjançant una coreografia ritual. En aquest estudi es presenta una classificació del combat escènic des del doble vessant agonista/antagonista, es realitza un passeig històric de la representació artística del combat a través de les diferents etapes i de les diverses cultures, s’aborda la preparació escènica de l’actor i del coreògraf, i s’entreveuen les perspectives de futur d’aquesta modalitat artística. Estudi realitzat per Pawel Rouba Billewicz (Inowroclaw, Polònia, 1939 - Barcelona, 2007, director, coreògraf, actor, mestre d’armes, mestre del gest i de la pantomima i professor de l’INEF de Catalunya. Aquest article, editorialment inèdit, es publica postmortem per Apunts. Educació Física i Esports com a homenatge i reconeixement de l’autor per la seva extraordinària i polivalent aportació al camp de l’art i l’Activitat Física i l’Esport.

  5. Combating Desertification and Mitigating the Effects of Drought

    International Nuclear Information System (INIS)

    Awuondo, C.O

    2001-01-01

    The paper discusses the effects of desertification and drought on the well-being of humankind and therefore it important for them to be combated and mitigated. Desertification is the process that turns fertile lands into desert; drought is defined as lack of sufficient precipitation to sustain plant and human life. In an effort to discuss how to combat desertification, the author has subdivided the paper into five sections namely; introduction, ecological crisis, strategies for combating desertification and mitigating the effects of drought and finally the conclusion

  6. Analysis of Error Propagation Within Hierarchical Air Combat Models

    Science.gov (United States)

    2016-06-01

    values alone are propagated through layers of combat models, the final results will likely be biased, and risk underestimated. An air-to-air...values alone are propagated through layers of combat models, the final results will likely be biased, and risk underestimated. An air-to-air engagement... PROPAGATION WITHIN HIERARCHICAL AIR COMBAT MODELS by Salih Ilaslan June 2016 Thesis Advisor: Thomas W. Lucas Second Reader: Jeffrey

  7. Unit Reconstitutions: Combat Stress as an Indicator of Unit Effectiveness

    Science.gov (United States)

    2014-06-13

    doctrinally “Combat and Operational Stress Reactions:” A. Shell shock B. War neurosis C. Battle fatigue D. Combat exhaustion E. Combat stress F...... neurosis . The approach that evolved–proximity, immediacy, and expectancy–was a formula that incorporated some of the best practices to increase the

  8. Selected Foreign Counterparts of U.S. Army Ground Combat Systems and Implications for Combat Operations and Modernization

    Science.gov (United States)

    2017-01-18

    responsibility is to defeat other nations’ combat formations on the battlefield. In order to accomplish this, nations indigenously develop, maintain, and improve...defeat other nations’ combat formations on the battlefield. In order to accomplish this, nations indigenously develop, maintain, and improve a variety...catastrophic kill. A number of foreign tracked IFVs mount either hard kill 13 or soft kill 14 APS and the Army is presently examining both non

  9. Joint preprocesser-based detector for cooperative networks with limited hardware processing capability

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2015-02-01

    In this letter, a joint detector for cooperative communication networks is proposed when the destination has limited hardware processing capability. The transmitter sends its symbols with the help of L relays. As the destination has limited hardware, only U out of L signals are processed and the energy of the remaining relays is lost. To solve this problem, a joint preprocessing based detector is proposed. This joint preprocessor based detector operate on the principles of minimizing the symbol error rate (SER). For a realistic assessment, pilot symbol aided channel estimation is incorporated for this proposed detector. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Our proposed scheme has low computational complexity.

  10. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-01

    of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be established

  11. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-01

    . By means of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be

  12. Designing Networks that are Capable of Self-Healing and Adapting

    Science.gov (United States)

    2017-04-01

    battlefield, and utility infrastructure in cities . Networks that are easy to repair after many breaks. The origi- nal networks (left), the networks after...8725 John J. Kingman Road, MS 6201 Fort Belvoir, VA 22060-6201 T E C H N IC A L R E P O R T DTRA-TR-15-78 Designing Networks that are...from statistical mechanics, combinatorics, boolean networks , and numerical simulations, and inspired by design principles from biological networks , we

  13. The mental health of UK ex-servicemen with a combat-related or a non-combat-related visual impairment: does the cause of visual impairment matter?

    Science.gov (United States)

    Stevelink, Sharon A M; Malcolm, Estelle M; Gill, Pashyca C; Fear, Nicola T

    2015-08-01

    Since the start of the conflicts in Iraq and Afghanistan, the numbers of young service personnel who have sustained a combat-related visual impairment have increased. This cross-sectional study examined the mental well-being of ex-servicemen (aged 22-55 years) with a visual impairment and determined if the mental health of those with a combat-related visual impairment differed from those whose visual impairment is not combat-related. Male ex-service personnel with a visual impairment completed a telephone interview assessing the presence of depressive symptomatology, probable anxiety disorder, post-traumatic stress disorder (PTSD) symptomatology and alcohol misuse. Data were analysed using descriptive statistics. 77 participants were included in the study, reflecting a response rate of 76.2%. Of those with complete data (n=74), 20 ex-servicemen had a combat-related visual impairment. Among ex-service personnel with a combat-related visual impairment, 10.0% (95% CI 0 to 23.2) screened positive for a probable depression, 25.0% (95% CI 6.0 to 44.0) for probable anxiety and 10.0% (95% CI 0 to 23.2) for probable PTSD. The prevalence of probable depression and probable PTSD differed among those with a non-combat-related visual impairment, namely 18.5% (95% CI 8.1 to 28.9) and 16.7% (95% CI 6.8 to 26.7), respectively. Probable anxiety was 18.5% (95% CI 8.1 to 28.9) among non-combat-related visually impaired ex-service personnel. 45.0% (95% CI 23.2 to 66.8) of combat-related visually impaired personnel reported hazardous drinking, compared with 20.4% (95% CI 9.7 to 31.2) of those with a non-combat-related visual impairment. Mental health problems were prevalent among visually impaired younger ex-servicemen. No statistically significant differences were found in the prevalence of mental health problems among ex-servicemen with a combat-related visual impairment compared with those with a non-combat-related visual impairment. Published by the BMJ Publishing Group Limited

  14. Reinforcement Sensitivity and Social Anxiety in Combat Veterans

    Science.gov (United States)

    Kimbrel, Nathan A.; Meyer, Eric C.; DeBeer, Bryann B.; Mitchell, John T.; Kimbrel, Azure D.; Nelson-Gray, Rosemery O.; Morissette, Sandra B.

    2017-01-01

    Objective The present study tested the hypothesis that low behavioral approach system (BAS) sensitivity is associated with social anxiety in combat veterans. Method Self-report measures of reinforcement sensitivity, combat exposure, social interaction anxiety, and social observation anxiety were administered to 197 Iraq/Afghanistan combat veterans. Results As expected, combat exposure, behavioral inhibition system (BIS) sensitivity, and fight-flight-freeze system (FFFS) sensitivity were positively associated with both social interaction anxiety and social observation anxiety. In contrast, BAS sensitivity was negatively associated with social interaction anxiety only. An analysis of the BAS subscales revealed that the Reward Responsiveness subscale was the only BAS subscale associated with social interaction anxiety. BAS-Reward Responsiveness was also associated with social observation anxiety. Conclusion The findings from the present research provide further evidence that low BAS sensitivity may be associated with social anxiety over and above the effects of BIS and FFFS sensitivity. PMID:28966424

  15. Dutch National Plan combat nuclear accidents

    International Nuclear Information System (INIS)

    1988-01-01

    This document presents the Dutch National Plan combat nuclear accidents (NPK). Ch. 2 discusses some important starting points which are determining for the framework and the performance of the NPK, in particular the accident typology which underlies the plan. Also the new accident-classification system for the Dutch nuclear power plants, the standardization for the measures to be taken and the staging around nuclear power plants are pursued. In ch. 3 the legal framework of the combat nuclear accidents is described. In particular the Nuclear-power law, the Accident law and the Municipality law are pursued. Also the role of province and municipality are described. Ch. 4 deals with the role of the owner/licensee of the object where the accident occurs, in the combat of accident. In ch. 5 the structure of the nuclear-accident combat at national level is outlined, subdivided in alarm phase, combat phase and the winding-up phase. In ch.'s 6-12 these phases are elaborated more in detail. In ch.'s 10-13 the measures to be taken in nuclear accidents, are described. These measures are distinguished with regard to: protection of the population and medical aspects, water economy, drinking-water supply, agriculture and food supply. Ch. 14 describes the responsibility of the burgomaster. Ch.'s 15 and 16 present an overview of the personnel, material, procedural and juridical modifications and supplements of existing structures which are necessary with regard to the new and modified parts of the structure. Ch. 17 indicates how by means of the appropriate education and exercise it can be achieved that all personnel, services and institutes concerned possess the knowledge and experience necessary for the activities from the NKP to be executed as has been described. Ch. 18 contains a survey of activities to be performed and a proposal how these can be realized. (H.W.). figs.; tabs

  16. Personality Factors Affecting Pilot Combat Performance: A Preliminary Investigation

    National Research Council Canada - National Science Library

    Siem, Frederick M; Murray, Michael W

    1997-01-01

    .... The present research was designed to examine the relationship between personality and combat performance using the "Big Five" model of personality and a multicomponent model of pilot combat performance...

  17. Combat desertification, arret deforestation

    International Nuclear Information System (INIS)

    Tin-Latt; Soe-Win-Hlaing

    2000-01-01

    This article presents the major progress on the actions of the Forest Department and Dry Zone Greening Department to arrest forestation and to combat desertification in the dry zone of central Myanmar

  18. Combating illegal nuclear traffic - Poland's experience

    International Nuclear Information System (INIS)

    Smagala, G.

    1998-01-01

    International non-proliferation efforts have been taken to reduce the risk related to nuclear materials and radioactive sources. The physical security of nuclear facilities to prevent acts of sabotage or terrorism and to protect nuclear materials against loss or seizure is an essential element of the nuclear non-proliferation regime. Iraq case and the end of the Cold War have influenced the development of co-operation and openness in many countries. Poland due to: - its geolocation, - a growing number of post Chernobyl contamination transports and - high risk to become a transit country in illicit trafficking of nuclear materials and radioactive sources, initiated deployment of the fixed installation instruments at the border check-points. Since the end of 1990 to now 103 such devices have been installed. Broader involvement in combating illicit nuclear trafficking of Border Guards, Customs Services, Police and Intelligence Security has been noticed. Paper presents Poland's experience in implementing national prevention measures to reduce nuclear proliferation risk and in detecting capabilities against illicit nuclear traffic. (author)

  19. Promotion of good governance and combating corruption and ...

    African Journals Online (AJOL)

    Melvin Mbao and G.G Komboni criticise the legal regime and institutional arrangements designed to promote good government and to combat corruption and maladministration in Botswana, a country widely acclaimed as Africa's success story. Using internationally accepted benchmarks on good governance and combating ...

  20. The Capability Portfolio Analysis Tool (CPAT): A Mixed Integer Linear Programming Formulation for Fleet Modernization Analysis (Version 2.0.2).

    Energy Technology Data Exchange (ETDEWEB)

    Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Muldoon, Frank [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Henry, Stephen Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hoffman, Matthew John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Zwerneman, April Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backlund, Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Melander, Darryl J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lawton, Craig R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rice, Roy Eugene [Teledyne Brown Engineering, Huntsville, AL (United States)

    2017-09-01

    In order to effectively plan the management and modernization of their large and diverse fleets of vehicles, Program Executive Office Ground Combat Systems (PEO GCS) and Program Executive Office Combat Support and Combat Service Support (PEO CS&CSS) commis- sioned the development of a large-scale portfolio planning optimization tool. This software, the Capability Portfolio Analysis Tool (CPAT), creates a detailed schedule that optimally prioritizes the modernization or replacement of vehicles within the fleet - respecting numerous business rules associated with fleet structure, budgets, industrial base, research and testing, etc., while maximizing overall fleet performance through time. This paper contains a thor- ough documentation of the terminology, parameters, variables, and constraints that comprise the fleet management mixed integer linear programming (MILP) mathematical formulation. This paper, which is an update to the original CPAT formulation document published in 2015 (SAND2015-3487), covers the formulation of important new CPAT features.

  1. Quantifying capability of a local seismic network in terms of locations and focal mechanism solutions of weak earthquakes

    Science.gov (United States)

    Fojtíková, Lucia; Kristeková, Miriam; Málek, Jiří; Sokos, Efthimios; Csicsay, Kristián; Zahradník, Jiří

    2016-01-01

    Extension of permanent seismic networks is usually governed by a number of technical, economic, logistic, and other factors. Planned upgrade of the network can be justified by theoretical assessment of the network capability in terms of reliable estimation of the key earthquake parameters (e.g., location and focal mechanisms). It could be useful not only for scientific purposes but also as a concrete proof during the process of acquisition of the funding needed for upgrade and operation of the network. Moreover, the theoretical assessment can also identify the configuration where no improvement can be achieved with additional stations, establishing a tradeoff between the improvement and additional expenses. This paper presents suggestion of a combination of suitable methods and their application to the Little Carpathians local seismic network (Slovakia, Central Europe) monitoring epicentral zone important from the point of seismic hazard. Three configurations of the network are considered: 13 stations existing before 2011, 3 stations already added in 2011, and 7 new planned stations. Theoretical errors of the relative location are estimated by a new method, specifically developed in this paper. The resolvability of focal mechanisms determined by waveform inversion is analyzed by a recent approach based on 6D moment-tensor error ellipsoids. We consider potential seismic events situated anywhere in the studied region, thus enabling "mapping" of the expected errors. Results clearly demonstrate that the network extension remarkably decreases the errors, mainly in the planned 23-station configuration. The already made three-station extension of the network in 2011 allowed for a few real data examples. Free software made available by the authors enables similar application in any other existing or planned networks.

  2. Combating student plagiarism an academic librarian's guide

    CERN Document Server

    Lampert, Lynn D

    2014-01-01

    This practical book introduces readers to the current issues facing todays academic reference and instruction librarians grappling with the growing problem of student plagiarism. The book provides up-to-date overviews of student plagiarism, examples of ways in which librarians can educate students through proven instructional techniques, collaboration approaches and outreach methods, and discusses common problems and questions librarians may encounter when incorporating current anti-plagiarism instruction into their instructional services. Topics include: role of the academic librarian in combating student plagiarism, discipline-based approaches to combating student plagiarism, information literacy techniques and faculty/librarian collaboration. Investigates the issues surrounding the growth of instances of student plagiarism Discusses the academic librarian's role in combating student plagiarism Recommends effective outreach techniques and instructional methods for preventing plagiarism.

  3. The Global Detection Capability of the IMS Seismic Network in 2013 Inferred from Ambient Seismic Noise Measurements

    Science.gov (United States)

    Gaebler, P. J.; Ceranna, L.

    2016-12-01

    All nuclear explosions - on the Earth's surface, underground, underwater or in the atmosphere - are banned by the Comprehensive Nuclear-Test-Ban Treaty (CTBT). As part of this treaty, a verification regime was put into place to detect, locate and characterize nuclear explosion testings at any time, by anyone and everywhere on the Earth. The International Monitoring System (IMS) plays a key role in the verification regime of the CTBT. Out of the different monitoring techniques used in the IMS, the seismic waveform approach is the most effective technology for monitoring nuclear underground testing and to identify and characterize potential nuclear events. This study introduces a method of seismic threshold monitoring to assess an upper magnitude limit of a potential seismic event in a certain given geographical region. The method is based on ambient seismic background noise measurements at the individual IMS seismic stations as well as on global distance correction terms for body wave magnitudes, which are calculated using the seismic reflectivity method. From our investigations we conclude that a global detection threshold of around mb 4.0 can be achieved using only stations from the primary seismic network, a clear latitudinal dependence for the detection thresholdcan be observed between northern and southern hemisphere. Including the seismic stations being part of the auxiliary seismic IMS network results in a slight improvement of global detection capability. However, including wave arrivals from distances greater than 120 degrees, mainly PKP-wave arrivals, leads to a significant improvement in average global detection capability. In special this leads to an improvement of the detection threshold on the southern hemisphere. We further investigate the dependence of the detection capability on spatial (latitude and longitude) and temporal (time) parameters, as well as on parameters such as source type and percentage of operational IMS stations.

  4. Experimental integration of quantum key distribution and gigabit-capable passive optical network

    Science.gov (United States)

    Sun, Wei; Wang, Liu-Jun; Sun, Xiang-Xiang; Mao, Yingqiu; Yin, Hua-Lei; Wang, Bi-Xiao; Chen, Teng-Yun; Pan, Jian-Wei

    2018-01-01

    Quantum key distribution (QKD) ensures information-theoretic security for the distribution of random bits between two remote parties. To extend QKD applications to fiber-to-the-home optical communications, such as gigabit-capable passive optical networks (GPONs), an effective method is the use of wavelength-division multiplexing. However, the Raman scattering noise from intensive classical traffic and the huge loss introduced by the beam splitter in a GPON severely limits the performance of QKD. Here, we demonstrate the integration of QKD and a commercial GPON system with fiber lengths up to 14 km, in which the maximum splitting ratio of the beam splitter reaches 1:64. By placing the QKD transmitter on the optical line terminal side, we reduce the Raman noise collected at the QKD receiver. Using a bypass structure, the loss of the beam splitter is circumvented effectively. Our results pave the way to extending the applications of QKD to last-mile communications.

  5. Capabilities and prospects of the East Asia Very Long Baseline Interferometry Network

    Science.gov (United States)

    An, T.; Sohn, B. W.; Imai, H.

    2018-02-01

    The very long baseline interferometry (VLBI) technique offers angular resolutions superior to any other instruments at other wavelengths, enabling unique science applications of high-resolution imaging of radio sources and high-precision astrometry. The East Asia VLBI Network (EAVN) is a collaborative effort in the East Asian region. The EAVN currently consists of 21 telescopes with diverse equipment configurations and frequency setups, allowing flexible subarrays for specific science projects. The EAVN provides the highest resolution of 0.5 mas at 22 GHz, allowing the fine imaging of jets in active galactic nuclei, high-accuracy astrometry of masers and pulsars, and precise spacecraft positioning. The soon-to-be-operational Five-hundred-meter Aperture Spherical radio Telescope (FAST) will open a new era for the EAVN. This state-of-the-art VLBI array also provides easy access to and crucial training for the burgeoning Asian astronomical community. This Perspective summarizes the status, capabilities and prospects of the EAVN.

  6. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    International Nuclear Information System (INIS)

    2000-01-01

    of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be established

  7. Transient analysis capabilities at ABB-CE

    International Nuclear Information System (INIS)

    Kling, C.L.

    1992-01-01

    The transient capabilities at ABB-Combustion Engineering (ABB-CE) Nuclear Power are a function of the computer hardware and related network used, the computer software that has evolved over the years, and the commercial technical exchange agreements with other related organizations and customers. ABB-CEA is changing from a mainframe/personal computer network to a distributed workstation/personal computer local area network. The paper discusses computer hardware, mainframe computing, personal computers, mainframe/personal computer networks, workstations, transient analysis computer software, design/operation transient analysis codes, safety (licensed) analysis codes, cooperation with ABB-Atom, and customer support

  8. Fresh whole blood transfusions in coalition military, foreign national, and enemy combatant patients during Operation Iraqi Freedom at a U.S. combat support hospital.

    Science.gov (United States)

    Spinella, Philip C; Perkins, Jeremy G; Grathwohl, Kurt W; Repine, Thomas; Beekley, Alec C; Sebesta, James; Jenkins, Donald; Azarow, Kenneth; Holcomb, John B

    2008-01-01

    United States military doctrine permits the use of fresh whole blood (FWB), donated by U.S. military personnel on site, for casualties with life-threatening injuries at combat support hospitals. U.S. Military Medical Department policy dictates that all patients treated at military facilities during combat (coalition military personnel, foreign nationals, and enemy combatants) are to be treated equally. The objectives of this study were to describe admission vital signs and laboratory values and injury location for patients transfused with FWB, and to determine if FWB was employed equally among all patient personnel categories at a combat support hospital. This retrospective cohort study evaluated admission vital signs and laboratory values, injury location, and personnel category for all patients receiving FWB at a U.S. Army combat support hospital in Baghdad, Iraq, between January and December 2004. Eighty-seven patients received 545 units of FWB. Upon admission, the average (+/-S.D.) heart rate was 144 bpm (+/-25); systolic blood pressure, 106 mmHg (+/-33); base deficit, 9 (+/-6.5); hemoglobin, 9.0 g/dl (+/-2.6); platelet concentration, 81.9 x 10(3)/mm(3) (+/-81); international normalized ratio (INR), 2.0 (+/-1.1); and temperature 95.7 degrees F (+/-2.6). The percentages of intensive care patients who received FWB by personnel category were as follows: coalition soldiers, 51/592 (8.6%); foreign nationals, 25/347 (7.2%); and enemy combatants, 11/128 (8.5% (p = 0.38). The amount of FWB transfused by personnel category was as follows: coalition soldier, 4 units (1-35); foreign national, 4 units (1-36); and enemy combatant, 4 units (1-11) (p = 0.9). Fresh whole blood was used for anemic, acidemic, hypothermic, coagulopathic patients with life-threatening traumatic injuries in hemorrhagic shock, and it was transfused in equal percentages and amounts for coalition soldiers, foreign nationals, and enemy combatants.

  9. Appetitive Aggression in Women: Comparing Male and Female War Combatants

    Directory of Open Access Journals (Sweden)

    Danie eMeyer-Parlapanis

    2016-01-01

    Full Text Available Appetitive aggression refers to positive feelings being associated with the perpetration of violent behavior and has been shown to provide resilience against the development of PTSD in combatants returning from the battlefield. Until this point, appetitive aggression has been primarily researched in males. This study investigates appetitive aggression in females. Female and male combatants and civilians from Burundi were assessed for levels of appetitive aggression. In contrast to non-combatants, no sex difference in appetitive aggression could be detected for combatants. Furthermore, each of the female and male combatant groups displayed substantially higher levels of appetitive aggression than each of the male and female civilian control groups. This study demonstrates that in violent contexts, such as armed conflict, in which individuals perpetrate numerous aggressive acts against others, the likelihood for an experience of appetitive aggression increases- regardless of whether the individuals are male or female.

  10. Will the Current Solution Survive the Future Battlespace? An examination of the Combatant Role of the Australian Army’s Protected mobility capability

    Science.gov (United States)

    2010-12-10

    Interim Infantry Mobility Vehicle IMV Infantry Mobility Vehicle INTERFET International Force East Timor LOE Lines of Effort LWD -1 Land Warfare...produce strategically relevant and combat ready forces.”39 This doctrinal publication, Land Warfare Doctrine 1 ( LWD 1), echoes the difficulties outlined...time. The acknowledgement of this concern is further underlined in LWD 1 which enunciates that “while the strategic situation can change quickly

  11. From the combat medic to the forward surgical team: the Madigan model for improving trauma readiness of brigade combat teams fighting the Global War on Terror.

    Science.gov (United States)

    Sohn, Vance Y; Miller, Joseph P; Koeller, Craig A; Gibson, Steven O; Azarow, Kenneth S; Myers, Jerome B; Beekley, Alec C; Sebesta, James A; Christensen, Jon B; Rush, Robert M

    2007-03-01

    Medics assigned to combat units have a notable paucity of trauma experience. Our goal was to provide intense trauma refresher training for the conventional combat medic to better prepare them for combat casualty care in the War on Terror. Our Tactical Combat Casualty Care Course (TC3) consisted of the following five phases: (1) One and one-half-day didactic session; (2) Half-day simulation portion with interactive human surgical simulators for anatomical correlation of procedures and team building; (3) Half-day of case presentations and triage scenarios from Iraq/Afghanistan and associated skills stations; (4) Half-day live tissue lab where procedures were performed on live anesthetized animals in a controlled environment; and (5) One-day field phase where live anesthetized animals and surgical simulators were combined in a real-time, field-training event to simulate realistic combat injuries, evacuation problems, and mass casualty scenarios. Data collection consisted of surveys, pre- and posttests, and after-action comments. A total of 1317 personnel participated in TC3 from October 2003 through May 2005. Over the overlapping study period from December 2004 to April 2005, 327 soldiers participated in the formal five-phase course. Three hundred four (94%) students were combat medics who were preparing for combat operations in Iraq or Afghanistan. Of those completing the training, 97% indicated their confidence and ability to treat combat casualties were markedly improved. Moreover, of those 140 medics who took the course and deployed to Iraq for 1 year, 99% indicated that the principles taught in the TC3 course helped with battlefield management of injured casualties during their deployment. The hybrid training model is an effective method for training medical personnel to deal with modern battle injuries. This course increases the knowledge and confidence of combat medics deploying and fighting the Global War on Terrorism.

  12. Combating gender stereotypes in the education system: success stories

    OpenAIRE

    Alvarez, Teresa

    2015-01-01

    GEC 2015. Conferência realizada em Helsínquia, de 9-10 october 2014. Conferência de Abertura do Painel 2 – Combating gender stereotypes in the education system: success stories, da Conferência promovida pelo Conselho da Europa sobre “Combating gender stereotypes in and through education”. Apresentam-se alguns desafios decorrentes do combate ao sexismo na escola e propõem-se algumas linhas de ação, ao nível individual, coletivo, organizacional e institucional. info:eu-repo/semantics/pub...

  13. Differentiation of pain ratings in combat-related posttraumatic stress disorder.

    Science.gov (United States)

    Kraus, Anja; Geuze, Elbert; Schmahl, Christian; Greffrath, Wolfgang; Treede, Rolf-Detlef; Bohus, Martin; Vermetten, Eric

    2009-06-01

    Although posttraumatic stress disorder (PTSD) is associated with chronic pain, preliminary evidence suggests reduced experimental pain sensitivity in this disorder. The questions addressed in the present study were whether pain perception would also be reduced in PTSD patients who are not suffering from chronic pain symptoms, and whether a reduction in pain sensitivity would also be present in combat veterans who did not develop PTSD. For this, we determined thermal detection and pain thresholds in 10 male combat-related PTSD patients, 10 combat control subjects (no PTSD) and 10 healthy controls without combat experience. All subjects were pain free. First, we measured thermal sensory thresholds with ramped heat and cold stimuli using the method of limits. Ramped thermal sensory stimulation revealed no deficits for the detection of (non-noxious) f2.1thermal stimuli between groups. In contrast, heat and cold pain thresholds in both combat groups (PTSD and combat controls) were significantly increased compared to healthy controls. However, these stimuli could not distinguish between the two groups due to ceiling effects. When using longer-lasting heat stimulation at different temperatures (30s duration; method of fixed stimuli), we found significantly lower frequency of pain reports in PTSD patients compared with both combat and healthy controls, as well as significantly lower pain ratings. Our results suggest an association of PTSD with reduced pain sensitivity, which could be related to PTSD-related (neuro-)psychological alterations or to a pre-existing risk factor for the disorder.

  14. Impact of Combat Duty in Iraq and Afghanistan on Family Functioning: Findings from the Walter Reed Army Institute of Research Land Combat Study

    National Research Council Canada - National Science Library

    Huge, Charles W; Castro, Carl A; Eaton, Karen M

    2006-01-01

    .... However, most studies of the impact of combat on military families have not been conducted proximal to the time of deployments, and there are many research gaps in understanding the full impact of combat deployment...

  15. DEVELOPING A WIRELESS SENSOR NETWORD WITH RFID CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Dan LICA

    2016-05-01

    Full Text Available The concept underlying the pervasive communications systems is Internet of Objects, defined as a global network of smart objects, resulting in "attachment" of communication functions, data acquisition, data processing objects we interact with daily. Internet of Objects will be based on 4th generation of Internet systems. In such systems, each intelligent networked device must offer its users a number of services, which constitute a development of the current model of Web services. Such services will result from aggregation of micro services offered by each pervasive device connected to the Internet. Aggregating these micro services requires that each node in the network has the opportunity to present / expose its capabilities (so-called "advertising" in a standard way for client applications to be integrated into complex services. Therefore there appears the need to introduce a coding scheme to identity the nodes in the network, enabling the identification of their capabilities. An alternative to implementing such a system of encoding / identifying characteristics of network nodes is active RFID technology. The aim of this chapter is to develop a method to ensure the convergence of wireless sensor networks with active RFID systems within a pervasive hybrid network based on the IEEE 802.15.4 standard, which satisfies the Internet of Objects network.

  16. University Research Initiative Program for Combat Readiness

    Science.gov (United States)

    1999-05-01

    microscope image of one of the lenses. This array was selected for testing because it is fabricated in a relatively inexpensive polyacrylic material, the...potent analogues of the potassium -sparing diuretic, amiloride. However, our results 179 University Reasearch Initiative for Combat Readiness Annual Report...for Combat Readiness Annual Report for the period June 1, 1998 - June 30, 1999 Roger H. Sawyer University of South Carolina Columbia, SC 29208 May

  17. An automated methodology development. [software design for combat simulation

    Science.gov (United States)

    Hawley, L. R.

    1985-01-01

    The design methodology employed in testing the applicability of Ada in large-scale combat simulations is described. Ada was considered as a substitute for FORTRAN to lower life cycle costs and ease the program development efforts. An object-oriented approach was taken, which featured definitions of military targets, the capability of manipulating their condition in real-time, and one-to-one correlation between the object states and real world states. The simulation design process was automated by the problem statement language (PSL)/problem statement analyzer (PSA). The PSL/PSA system accessed the problem data base directly to enhance the code efficiency by, e.g., eliminating non-used subroutines, and provided for automated report generation, besides allowing for functional and interface descriptions. The ways in which the methodology satisfied the responsiveness, reliability, transportability, modifiability, timeliness and efficiency goals are discussed.

  18. Are there atheists in foxholes? Combat intensity and religious behavior.

    Science.gov (United States)

    Wansink, Brian; Wansink, Craig S

    2013-09-01

    After battle, the moral and mortality stresses influence different soldiers in different ways. Using two large-scale surveys of World War II veterans, this research investigates the impact of combat on religiosity. Study 1 shows that as combat became more frightening, the percentage of soldiers who reported praying rose from 42 to 72%. Study 2 shows that 50 years later, many soldiers still exhibited religious behavior, but it varied by their war experience. Soldiers who faced heavy combat (vs. no combat) attended church 21% more often if they claimed their war experience was negative, but those who claimed their experience was positive attended 26% less often. The more a combat veteran disliked the war, the more religious they were 50 years later. While implications for counselors, clergy, support groups, and health practitioners are outlined, saying there are no atheists in foxholes may be less of an argument against atheism than it is against foxholes.

  19. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  20. LOS tercios en España: el combate

    Directory of Open Access Journals (Sweden)

    Lorraine WHITE

    2009-12-01

    Full Text Available RESUMEN: Durante el siglo ??? hubo un importante incremento de la actividad militar en la Península Ibérica. Las tropas hubieron de luchar en su propio territorio y contra otros subditos del rey de España. Este artículo se centra en el combate de los ejércitos españoles en la Península. Examina el componente humano de estas fuerzas, los motivos para servir o para desertar, el conflicto de lealtades, los riesgos y las realidades del combate, así como la asistencia médica y espiritual que recibían.ABSTRACT: There was a significant rise in military activity in the Iberian Peninsula during the seventeenth century. Troops fought on 'home' territory and against fellow subjects of the Spanish king. This article looks at combat in Spain's home-based armies. It explores the human component of these forces, the motives and disincentives for serving, the conflict of loyalties, the risks and realities of combat, and medical and spiritual care.

  1. Crowd Behavior Algorithm Development for COMBAT XXI

    Science.gov (United States)

    2017-05-30

    non-combatants to military operations in an urban area. We show how to link this model with COMBATXXI at the application programming interface (API...level so that the model can be run in tight conjunction with COMBATXXI. TRAC and other anaytic organizations can use this type of crowd model to... organizations , and materiel. crowd, agent-based modeling , combat models , COMBATXXI, NetLogo, mega-cities, civilians on the battlefield Unclassified U U U U 39

  2. 597 Days: A Division’s Morale During Sustained Combat

    Science.gov (United States)

    2014-05-22

    The army broke combat exhaustion into two groups: new replacements and veterans. For new replacements the symptoms of combat exhaustion appeared...through the initial effects of combat to fall into the veteran group. The manifestation of symptoms for veterans generally occurred around the 120th...concentrated strength” that the German Army was simply overrun. The battle turned into a “ gigantic mopping- up operation,” one that saw the Red Bulls solidify

  3. Network Security Validation Using Game Theory

    Science.gov (United States)

    Papadopoulou, Vicky; Gregoriades, Andreas

    Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.

  4. Designing Networks that are Capable of Self-Healing and Adapting

    Science.gov (United States)

    2017-04-01

    from statistical mechanics, combinatorics, boolean networks, and numerical simulations, and inspired by design principles from biological networks, we... principles for self-healing networks, and applications, and construct an all-possible-paths model for network adaptation. 2015-11-16 UNIT CONVERSION...kg m –3 ) pound-force (lbf avoirdupois) 4.448 222 newton (N) Energy/Work/Power electron volt (eV) 1.602 177 × 10 –19 joule (J) erg 1 × 10 –7

  5. Combating Training-Stress Syndromes.

    Science.gov (United States)

    Voight, Mike

    2002-01-01

    Addresses the nature and ramifications of various training stress syndromes (overtraining, under-recovery, distress, staleness, and burnout) that can accompany inappropriate training practices, examining the interventions that players and coaches can use to combat these syndromes (including physical, psychological, and performance interventions),…

  6. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  7. Readiness for the Patient-Centered Medical Home: structural capabilities of Massachusetts primary care practices.

    Science.gov (United States)

    Friedberg, Mark W; Safran, Dana G; Coltin, Kathryn L; Dresser, Marguerite; Schneider, Eric C

    2009-02-01

    The Patient-Centered Medical Home (PCMH), a popular model for primary care reorganization, includes several structural capabilities intended to enhance quality of care. The extent to which different types of primary care practices have adopted these capabilities has not been previously studied. To measure the prevalence of recommended structural capabilities among primary care practices and to determine whether prevalence varies among practices of different size (number of physicians) and administrative affiliation with networks of practices. Cross-sectional analysis. One physician chosen at random from each of 412 primary care practices in Massachusetts was surveyed about practice capabilities during 2007. Practice size and network affiliation were obtained from an existing database. Presence of 13 structural capabilities representing 4 domains relevant to quality: patient assistance and reminders, culture of quality, enhanced access, and electronic health records (EHRs). Three hundred eight (75%) physicians responded, representing practices with a median size of 4 physicians (range 2-74). Among these practices, 64% were affiliated with 1 of 9 networks. The prevalence of surveyed capabilities ranged from 24% to 88%. Larger practice size was associated with higher prevalence for 9 of the 13 capabilities spanning all 4 domains (P < 0.05). Network affiliation was associated with higher prevalence of 5 capabilities (P < 0.05) in 3 domains. Associations were not substantively altered by statistical adjustment for other practice characteristics. Larger and network-affiliated primary care practices are more likely than smaller, non-affiliated practices to have adopted several recommended capabilities. In order to achieve PCMH designation, smaller non-affiliated practices may require the greatest investments.

  8. New Technologies for Treating Severe Bleeding in Far-Forward Combat Areas

    Science.gov (United States)

    2010-04-01

    conditions have been utilized to evaluate the safety and efficacy of Combat Gauze. Combat Gauze ( kaolin -coated gauze) was recently distributed by US...woven medical gauze (50% polyester and 50% rayon) impregnated with a contact (intrinsic) pathway activating clotting agent, kaolin . The prototype...Military Tourniquet (EMT). 5.0 CONCLUSION Future combat scenarios where the troops will be more dispersed , imply that evacuation times of

  9. The use of QuikClot combat gauze in cervical and vaginal hemorrhage

    Directory of Open Access Journals (Sweden)

    Nicole Vilardo

    2017-08-01

    Full Text Available QuikClot combat gauze is a synthetic hemostatic dressing used for hemorrhage control. There is a paucity of data describing the clinical use and hemostatic results of combat gauze in the obstetric and gynecologic setting. This case series demonstrates the use of combat gauze as an effective hemostatic agent when used as vaginal packing in cervical and vaginal hemorrhage. Hemostasis was achieved rapidly in all cases and further interventions were avoided. The combat gauze remained in place for a mean time of 15 h with no adverse side effects observed. The use of combat gauze as vaginal packing may provide an alternative option in the treatment of cervical and vaginal hemorrhage when other traditional conservative and surgical interventions fail or are unavailable.

  10. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  11. The Application of Work Domain Analysis to Defining Australia’s Air Combat Capability

    Science.gov (United States)

    2014-03-01

    Capability. References Brady, A., Naikar, N., & Treadwell, A. (2013). Organisational storytelling with work domain analysis: Case study of air power...UNCLASSIFIED 20 Brady, A., Naikar, N., & Treadwell, A. (2013). Organisational storytelling with work domain analysis: Case study of air power doctrine and...maturity model? A framework of general design principles for maturity model and its demonstration in business process management. Proceedings of the

  12. Casualties of War: Combat Trauma and the Return of the Combat Veteran

    Science.gov (United States)

    Kiely, Denis O.; Swift, Lisa

    2009-01-01

    The experience of the combat soldier and the road back to civilian life are recurrent themes in American literature and cinema. Whether the treatment is tragic (Stephen Crane's "Red Badge of Courage", Tim O'Brien's "The Things They Carried", or Tony Scott's "Blackhawk Down"), satirical (Joseph Heller's "Catch Twenty-Two" and Robert Altman's…

  13. International cooperation in combating illicit trafficking of nuclear materials by technical means

    International Nuclear Information System (INIS)

    Herbillon, J; Koch, L; Mason, G; Niemeyer, S; Nikiforov, N

    1999-01-01

    A consensus has been emerging during the past several years that illicit trafficking of nuclear materials is a problem that needs a more focused international response. One possible component of a program to combat illicit trafficking is nuclear forensics whereby intercepted nuclear materials are analyzed to provide clues for answering attribution questions. In this report we focus on international cooperation that is specifically addressing the development of nuclear forensics. First we will describe the role of the Nuclear Smuggling International Technical Working Group (ITWG) in developing nuclear forensics, and then we will present some specific examples of cooperative work by the Institute for Transuranium Elements of the European Commission with various European states. Recognizing the potential importance of a nuclear forensics capability, the P-8 countries in 1995 encouraged technical experts to evaluate the role of nuclear forensics in combating nuclear smuggling and possibly developing mechanisms for international cooperation. As a result, an International Conference on Nuclear Smuggling Forensic Analysis was held in November, 1995, at Lawrence Livermore National Laboratory to investigate technical cooperation on nuclear forensics. The International Conference provided a unique mix of scientists, law enforcement, and intelligence experts from 14 countries and organizations. All participants were invited to make presentations, and the format of the Conference was designed to encourage open discussion and broad participation

  14. Combat amputees' health-related quality of life and psychological outcomes: A brief report from the wounded warrior recovery project.

    Science.gov (United States)

    Woodruff, Susan I; Galarneau, Michael R; Sack, Daniel I; McCabe, Cameron T; Dye, Judy L

    2017-03-01

    This study extends what is known about long-term health-related quality of life (HrQoL) and other psychosocial outcomes (i.e., depression, posttraumatic stress disorder [PTSD]) among US military combat amputees serving in Operation Enduring Freedom, Operation Iraqi Freedom, and Operation New Dawn. A total of 63 combat amputees were identified from the Wounded Warrior Recovery Project, a study assessing long-term self-reported HrQoL and psychological outcomes among those wounded during military service. Another 477 service members from the Wounded Warrior Recovery Project were identified as a comparison group (i.e., nonamputees with moderate to severe extremity injuries). After adjusting for age, time since injury, overall injury severity, and traumatic brain injury, amputees had poorer functional HrQoL than those in the nonamputee comparison group overall and in the specific area related to performance of usual activities, and, to some degree, chronic and acute symptoms, and mobility/self-care. On the other hand, depression and PTSD symptoms were not different for the two groups. Results suggest that when assessed over 5 years postinjury, on average, amputees have unique physical and functional limitations, yet do not report greater depression or PTSD symptoms than others seriously injured in combat. It may be that state-of-the-art integrated amputee care that includes support networks and emphasis on adjustment and psychological health may increase successful coping and adjustment, at least to a level that is on par with other types of serious combat injury. Epidemiologic/prognostic study, level III.

  15. Smoking among troops deployed in combat areas and its association with combat exposure among navy personnel in Sri Lanka

    Directory of Open Access Journals (Sweden)

    de Silva Varuni

    2012-07-01

    Full Text Available Abstract Background Among military personnel alcohol consumption and binge-drinking have increased but cigarette smoking has declined in the recent past. Although there is a strong association between smoking and PTSD the association between combat exposure and smoking is not clear. Methods This cross sectional study was carried out among representative samples of SLN Special Forces and regular forces deployed in combat areas. Both Special Forces and regular forces were selected using simple random sampling. Only personnel who had served continuously in combat areas during the one year period prior to end of combat operations were included in the study. Females were not included in the sample. The study assessed several mental health outcomes as well as alcohol use, smoking and cannabis use. Sample was classified according to smoking habits as never smokers, past smokers (those who had smoked in the past but not within the past year and current smokers (those smoking at least one cigarette within the past 12 months. Results Sample consisted of 259 Special Forces and 412 regular navy personnel. Prevalence of current smoking was 17.9% (95% CI 14.9-20.8. Of the sample 58.4% had never smoked and 23.7% were past smokers. Prevalence of current smoking was significantly higher among Special Forces personnel compared to regular forces. (OR 1.90 (95% CI 1.20-3.02. Personnel aged ≥35 years had the lowest prevalence of smoking (14.0%. Commissioned officers had a lower prevalence (12.1% than non commissioned officers or other ranks. After adjustment for demographic variables and service type there was significant association between smoking and combat experiences of seeing dead or wounded [OR 1.79 (95%CI 1.08-2.9], handling dead bodies [OR 2.47(95%CI 1.6-3.81], coming under small arms fire [OR 2.01(95%CI 1.28-3.15] and coming under mortar, missile and artillery fire [OR 2.02(95%CI 1.29-3.17]. There was significant association between the number of

  16. Assessment of dissociation among combat-exposed soldiers with and without posttraumatic stress disorder

    Directory of Open Access Journals (Sweden)

    Barbaros Özdemir

    2015-04-01

    Full Text Available Background: Dissociation is a disruption of and/or discontinuity in the normal, subjective integration of one or more aspects of psychological functioning, including memory, identity, consciousness, perception, and motor control. A limited number of studies investigated combat-related dissociation. Objective: The primary aim of this study was to evaluate the relationship between dissociative symptoms and combat-related trauma. Method: This study included 184 individuals, including 84 patients who were exposed to combat and diagnosed with posttraumatic stress disorder (PTSD (Group I, 50 subjects who were exposed to combat but were not diagnosed with PTSD (Group II, and 50 healthy subjects without combat exposure (Group III. The participants were evaluated using the Dissociative Experiences Scale (DES to determine their total and sub-factor (i.e., amnesia, depersonalization/derealization, and absorption dissociative symptom levels. In addition, Group I and Group II were compared with respect to the relationship between physical injury and DES scores. Results: The mean DES scores (i.e., total and sub-factors of Group I were higher than those of Group II (p30 was highest in Group I, followed by Group II and Group III. When we compared combat-exposed subjects with high total DES scores, Group I had higher scores than Group II. In contrast, no relationship between the presence of bodily injury and total DES scores could be demonstrated. In addition, our results demonstrated that high depersonalization/derealization factor scores were correlated with bodily injury in PTSD patients. A similar relationship was found between high absorption factor scores and bodily injury for Group II. Conclusions: Our results demonstrated that the level of dissociation was significantly higher in subjects with combat-related PTSD than in subjects without combat-related PTSD. In addition, combat-exposed subjects without PTSD also had higher dissociation levels than

  17. Combating the counterfeits with web portal technology

    Science.gov (United States)

    Ting, S. L.; Ip, W. H.

    2015-10-01

    Due to the globalisation of counterfeiting activities, the penetration of fake products in open market is growing. So far, the technologies to combat counterfeiting are mostly applied to high-value products (e.g. premium wine and branded handbags); however, in the medium- and low-value products' perspective, there is no secure way for consumers to identify whether the purchased items are genuine or not. To address the counterfeiting problems effectively, a platform for identifying authenticated products and promoting anti-counterfeit activities is very important. The aim of this paper is to design and develop an anti-counterfeit platform which includes two functions: providing customers a secure network to ascertain the genuineness of their purchased product and increasing public awareness of the current counterfeit problems and updated anti-counterfeit solutions. By combining these two functions, it enables public to fight against fake and beware of counterfeit. Results of adopting portal technology in anti-counterfeiting show high accuracy in product checking and improved creditability. This reveals that the applicability and advantage of the proposed methodology are satisfactory.

  18. Technical-tactical and physiological demands of wrestling combats

    OpenAIRE

    Bianka Miarka

    2016-01-01

    Technical-tactical and physiological demand analyses of wrestling combats are important because they reveal essential information for the development of contextual training and specific physical preparation of wrestlers. Therefore, the aim of this review is to describe the characteristics of wrestling combats in freestyle, female and Greco-roman styles. The time-motion analysis presented in this article is the main component to carry out inferences on intensity and effort: pause ratio of comb...

  19. Note nuclear accidents combat

    International Nuclear Information System (INIS)

    1989-01-01

    In this document the starting points are described which underlie the new framework for the nuclear-accident combat in the Netherlands. All the elaboration of this is indicated in main lines. The juridical consequences of the proposed structure are enlightened and the sequel activities are indicated. (H.W.). 6 figs.; 8 tabs

  20. The role of social networks for combating money laundering

    NARCIS (Netherlands)

    Imanpour, M.

    2017-01-01

    Money laundering is the disguising of the illegal origin of money by bringing it back into the legal financial circuit. Therefore, in this dissertation I try to establish a theoretical framework to understand the role of social networks, and the link between criminals and legal actors in the money

  1. Immune networks: multi-tasking capabilities at medium load

    International Nuclear Information System (INIS)

    Agliari, E; Annibale, A; Barra, A; Coolen, A C C; Tantari, D

    2013-01-01

    Associative network models featuring multi-tasking properties have been introduced recently and studied in the low-load regime, where the number P of simultaneously retrievable patterns scales with the number N of nodes as P ∼ log N. In addition to their relevance in artificial intelligence, these models are increasingly important in immunology, where stored patterns represent strategies to fight pathogens and nodes represent lymphocyte clones. They allow us to understand the crucial ability of the immune system to respond simultaneously to multiple distinct antigen invasions. Here we develop further the statistical mechanical analysis of such systems, by studying the medium-load regime, P ∼ N δ with δ ∈ (0, 1]. We derive three main results. First, we reveal the nontrivial architecture of these networks: they exhibit a high degree of modularity and clustering, which is linked to their retrieval abilities. Second, by solving the model we demonstrate for δ < 1 the existence of large regions in the phase diagram where the network can retrieve all stored patterns simultaneously. Finally, in the high-load regime δ = 1 we find that the system behaves as a spin-glass, suggesting that finite-connectivity frameworks are required to achieve effective retrieval. (paper)

  2. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  3. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    Science.gov (United States)

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  4. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad; Atat, Rachad; Alouini, Mohamed-Slim

    2012-01-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network

  5. New Russian Combat Small Boats

    Directory of Open Access Journals (Sweden)

    Aleksandr F. Mitrofanov

    2016-12-01

    Full Text Available The article presents an overview of small combat boats. The author provides a description and gives an analysis of the characteristics of the boat "Raptor", boat "BK-16", boat "Strizh-4-1 DSh", and assault boat "BK-10".

  6. [International cooperation in combatting illicit drugs in Mozambique].

    Science.gov (United States)

    Buvana, Flávia; Ventura, Carla Aparecida Arena

    2011-06-01

    Countries from Southern Africa have formed a Development Community (SADC) to stimulate common actions in several areas, among them illicit drugs combat. In this context, the goal of this qualitative study was to identify information and perception about the cooperation set up between Mozambique and other SADC members in combatting illicit drugs. Data were collected through semi-structured interviews with public employees developing actions directed at the implementation of the Protocol to Combat Drugs in SADC. After transcriptions, the interviews were analyzed by content analysis and resulted in the categories: "Mozambique as a drugs corridor", "Cooperation Initiatives on Drugs among African countries", "Cooperation Difficulties in Africa", "Problems in Protocol Implementation" and "Difficulties to implement a control policy". As a consequence, there is a need to review and update the policies and strategies in the drugs area, as they are not contextualized in the country's current reality.

  7. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  8. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  9. THE POSSIBLY PREVENTION AND COMBATING TAX EVASION

    Directory of Open Access Journals (Sweden)

    Daniela P. POPA

    2014-11-01

    - A faulty legislation that allows them to circumvent the failure to pay taxes. Measures to combat tax evasion must act in the areas of legislative, administrative and educational. The legislative drafting tax legislation seeks appropriate, clear, concise, stable and consistent. It is also necessary to eliminate or withdrawal of exemptions, reductions and deductions that give rise to multiple interpretations. In terms of administrative measures aimed at creating a comprehensive and operational information system, ensuring adequate administrative structures and instruments effectively combating tax evasion and training specialists with morality and professionalism required of shapes and sizes evasion.

  10. Combating corruption in global health.

    Science.gov (United States)

    Mackey, Tim K; Kohler, Jillian; Lewis, Maureen; Vian, Taryn

    2017-08-09

    Corruption is a critical challenge to global health efforts, and combating it requires international action, advocacy, and research. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  11. Towards a Global Hub and a Network for Collaborative Advancing of Space Weather Predictive Capabilities.

    Science.gov (United States)

    Kuznetsova, M. M.; Heynderickz, D.; Grande, M.; Opgenoorth, H. J.

    2017-12-01

    The COSPAR/ILWS roadmap on space weather published in 2015 (Advances in Space Research, 2015: DOI: 10.1016/j.asr.2015.03.023) prioritizes steps to be taken to advance understanding of space environment phenomena and to improve space weather forecasting capabilities. General recommendations include development of a comprehensive space environment specification, assessment of the state of the field on a 5-yr basis, standardization of meta-data and product metrics. To facilitate progress towards roadmap goals there is a need for a global hub for collaborative space weather capabilities assessment and development that brings together research, engineering, operational, educational, and end-user communities. The COSPAR Panel on Space Weather is aiming to build upon past progress and to facilitate coordination of established and new international space weather research and development initiatives. Keys to the success include creating flexible, collaborative, inclusive environment and engaging motivated groups and individuals committed to active participation in international multi-disciplinary teams focused on topics addressing emerging needs and challenges in the rapidly growing field of space weather. Near term focus includes comprehensive assessment of the state of the field and establishing an internationally recognized process to quantify and track progress over time, development of a global network of distributed web-based resources and interconnected interactive services required for space weather research, analysis, forecasting and education.

  12. Is Persuasive Advertising Always Combative in a Distribution Channel?

    OpenAIRE

    Chi-Cheng Wu; Ying-Ju Chen; Chih-Jen Wang

    2009-01-01

    The existing marketing literature suggests that persuasive advertising elicits counteractions from competing manufacturers and consequently leads to wasteful cancellation of the advertising effects. Thus, persuasive advertising is widely perceived to be combative in nature. A series of previously published papers demonstrates that appropriate targeting may partially mitigate the combative nature of persuasive advertising in that either the rival manufacturer or the retailer may benefit. In th...

  13. Trained and Ready Combat Forces: The Role of Training Devices in Sustaining Combat Force Proficiency During Deployments

    National Research Council Canada - National Science Library

    Taylor, James

    1997-01-01

    ... (MOOTW). The Army's ground combat forces, even while engaged in MOOTW activities, must maintain proficiency to wage war in the event that peacetime engagement, deterrence and conflict prevention fail...

  14. Prevalence estimates of combat-related post-traumatic stress disorder: critical review.

    Science.gov (United States)

    Richardson, Lisa K; Frueh, B Christopher; Acierno, Ronald

    2010-01-01

    The aim of the present study was to provide a critical review of prevalence estimates of combat-related post-traumatic stress disorder (PTSD) among military personnel and veterans, and of the relevant factors that may account for the variability of estimates within and across cohorts, including methodological and conceptual factors accounting for differences in prevalence rates across nations, conflicts/wars, and studies. MEDLINE and PsycINFO databases were examined for literature on combat-related PTSD. The following terms were used independently and in combinations in this search: PTSD, combat, veterans, military, epidemiology, prevalence. The point prevalence of combat-related PTSD in US military veterans since the Vietnam War ranged from approximately 2% to 17%. Studies of recent conflicts suggest that combat-related PTSD afflicts between 4% and 17% of US Iraq War veterans, but only 3-6% of returning UK Iraq War veterans. Thus, the prevalence range is narrower and tends to have a lower ceiling among combat veterans of non-US Western nations. Variability in prevalence is likely due to differences in sampling strategies; measurement strategies; inclusion and measurement of the DSM-IV clinically significant impairment criterion; timing and latency of assessment and potential for recall bias; and combat experiences. Prevalence rates are also likely affected by issues related to PTSD course, chronicity, and comorbidity; symptom overlap with other psychiatric disorders; and sociopolitical and cultural factors that may vary over time and by nation. The disorder represents a significant and costly illness to veterans, their families, and society as a whole. Further carefully conceptualized research, however, is needed to advance our understanding of disorder prevalence, as well as associated information on course, phenomenology, protective factors, treatment, and economic costs.

  15. INTRODUCTION TO THE SPECIAL ISSUE ON COMBAT SPORT

    Directory of Open Access Journals (Sweden)

    Andrew M. Lane

    2006-07-01

    Full Text Available Combat Sports Special Issue Editorial INTRODUCTION TO THE SPECIAL ISSUE ON COMBAT SPORT The World heavyweight professional boxing championship is arguable the biggest prize in sport. Why is this the case? It is not just the glamour that is appealing, but also the intriguing appeal of two combatants in a fixed environment. All combat sports share this similarity and in doing so, combat sports become appealing for spectators to watch, provide competitors with their ultimate challenge, and provide sport scientists and medics with a rich environment to apply their work. The role of research and theory driven interventions is key to the credibility of sport science and sports medicine. An intervention and/or treatment must be based on sound reason and the effects should be considered beforehand, both positive and negative. Equally, the nature of combat sport, where the aim is to strike, throw, or grapple with an opponent which can lead to injury, invariably raises questions on whether it is morally acceptable for these activities to be called a sport. Therefore, thorough investigation of the nature of medical issues is needed. The case for banning boxing in inextricably linked to the notion that the aim of the sport is to cause harm to the opponent; if harm was minimized and injury became less of an injury, the case for banning boxing would be weak. Quite clearly there are a plethora of arguments that point to a need for theory driven research in combat sport, and plugging this gap in the literature is an aim of this special issue of the Journal of Sports Science and Medicine. Possibly the most convincing argument for me to get involved in driving this issue stems from experiences in applied work with professional boxers (Hall and Lane, 2001; Lane and Hall, 2003, amateur boxers (Lane, 2002, kickboxers (Lane, et al., 1999 and tae-kwon-do athletes (Chapman et al., 1997 in which a raft of situations and issues were presented that required answers based

  16. Combat Internist: The Internal Medicine Experience in a Combat Hospital in Afghanistan

    Science.gov (United States)

    2015-01-01

    massive trans- fusion protocol.6 As such, critical care included frequent monitoring of hemoglobin and coagulation parameters with administration of...ongoing resuscitation. With the rise in nutritional supplement use, it was no sur- prise that they were frequently used in the combat zone. Numerous...recommendations on standard precautions and further care of his vaccine site. Education and Administration There were many opportunities to train and

  17. Personality traits and combat exposure as predictors of psychopathology over time.

    Science.gov (United States)

    Koffel, E; Kramer, M D; Arbisi, P A; Erbes, C R; Kaler, M; Polusny, M A

    2016-01-01

    Research suggests that personality traits have both direct and indirect effects on the development of psychological symptoms, with indirect effects mediated by stressful or traumatic events. This study models the direct influence of personality traits on residualized changes in internalizing and externalizing symptoms following a stressful and potentially traumatic deployment, as well as the indirect influence of personality on symptom levels mediated by combat exposure. We utilized structural equation modeling with a longitudinal prospective study of 522 US National Guard soldiers deployed to Iraq. Analyses were based on self-report measures of personality, combat exposure, and internalizing and externalizing symptoms. Both pre-deployment Disconstraint and externalizing symptoms predicted combat exposure, which in turn predicted internalizing and externalizing symptoms. There was a significant indirect effect for pre-deployment externalizing symptoms on post-deployment externalizing via combat exposure (p personality on residualized changes in externalizing symptoms were found. Baseline symptom dimensions had significant direct and indirect effects on post-deployment symptoms. Controlling for both pre-exposure personality and symptoms, combat experiences remained positively related to both internalizing and externalizing symptoms. Implications for diagnostic classification are discussed.

  18. Stigma associated with PTSD: perceptions of treatment seeking combat veterans.

    Science.gov (United States)

    Mittal, Dinesh; Drummond, Karen L; Blevins, Dean; Curran, Geoffrey; Corrigan, Patrick; Sullivan, Greer

    2013-06-01

    Although stigma associated with serious mental illness, substance abuse disorders, and depression has been studied very little is known about stigma associated with Posttraumatic Stress Disorder (PTSD). This study explored stigma related to PTSD among treatment-seeking Operation Enduring Freedom and Operation Iraqi Freedom (OEF/OIF) combat veterans. Sixteen treatment-seeking OEF/OIF veterans with combat-related PTSD participated in focus groups. We used qualitative methods to explore PTSD-related stigma. Common perceived stereotypes of treatment-seeking veterans with PTSD included labels such as "dangerous/violent," or "crazy," and a belief that combat veterans are responsible for having PTSD. Most participants reported avoiding treatment early on to circumvent a label of mental illness. Participants initially reported experiencing some degree of self-stigma; however, following engagement in treatment they predominantly resisted these stereotypes. Although most participants considered combat-related PTSD as less stigmatizing than other mental illnesses, they reported difficulties with reintegration. Such challenges likely stem from both PTSD symptoms and veterans' perceptions of how the public views them. Most reported that fellow combat veterans best understood them. Awareness of public stereotypes impacts help seeking at least early in the course of illness. Peer-based outreach and therapy groups may help veterans engage in treatment early and resist stigma. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  19. IPSN monitoring capabilities and information networks in accidental situation

    International Nuclear Information System (INIS)

    Calmet, D.; Robeau, D.

    1992-01-01

    In 1989, a Radiological Transmission and Early Warning System (SYTAR) came into being in order to harmonize radioactivity surveillance methodologies and furthermore to trigger off an alert throughout the networks whenever an unusual degree of radioactivity is detected. SYTAR is a remote permanent system linking up a national electronic access and the radiation protection services of nuclear facilities located on the mainland. The structure of the network are particularly presented in the framework of a drill organized on october 1991 in the south-east of France. During this drill, an accident was simulated on a ghost nuclear power plant located in the Cadarache Nuclear Center. A large number of samples were taken from filtered aerosols, soils, grass, milk, vegetables, food stuff; they were contaminated with Caesium 137 and Iodine 131 before to be sent to laboratories for measurements. The results of measurements were transmitted to the actors of the drill using SYTAR network. They permit to determine the exclusion area, the radiological impacts and counter-measures. (author)

  20. A Multiple Mobility Support Approach (MMSA Based on PEAS for NCW in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bong-Joo Koo

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs can be implemented as one of sensor systems in Network Centric Warfare (NCW. Mobility support and energy efficiency are key concerns for this application, due to multiple mobile users and stimuli in real combat field. However, mobility support approaches that can be adopted in this circumstance are rare. This paper proposes Multiple Mobility Support Approach (MMSA based on Probing Environment and Adaptive Sleeping (PEAS to support the simultaneous mobility of both multiple users and stimuli by sharing the information of stimuli in WSNs. Simulations using Qualnet are conducted, showing that MMSA can support multiple mobile users and stimuli with good energy efficiency. It is expected that the proposed MMSA can be applied to real combat field.

  1. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  2. Improving global laboratory capabilities for emergency radionuclide bioassay

    International Nuclear Information System (INIS)

    Li, C.; Jourdain, J.; Kramer, G. H.

    2012-01-01

    During a radiological or nuclear emergency, first-responders and the general public may be internally contaminated with the radionuclide(s) involved. A timely radionuclide bioassay provides important information about contamination, for subsequent dose assessment and medical management. Both technical and operational gaps are discussed in this paper. As many people may need to be assessed in a short period of time, any single laboratory may find its capabilities insufficient. Laboratories from other regions or other countries may be called upon for assistance. This paper proposes a road-map to improve global capabilities in emergency radionuclide bioassay, suggesting a phased approach for establishing a global laboratory network. Existing international collaboration platforms could provide the base on which to build such a network. (authors)

  3. Improving Relative Combat Power Estimation: The Road to Victory

    Science.gov (United States)

    2014-06-13

    was unthinkable before. Napoleon Bonaparte achieved a superior warfighting system compared to his opponents, which resulted in SOF. Napoleon’s...observations about combat power estimation and force empoloyment, remain valid. Napoleon also offered thoughts about combat power and superiority whe he...force. However, Napoleon did not think one- sidedly about the problem. He also said: “The moral is to the physical as three to one.”11 This dual

  4. Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Burnette, John R.; Thibodeau, Christopher C.; Greitzer, Frank L.

    2002-02-28

    As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data between the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.

  5. Transfusion-Associated Microchimerism in Combat Casualties

    National Research Council Canada - National Science Library

    Dunne, James R; Lee, Tzong-Hae; Burns, Christopher; Cardo, Lisa J; Curry, Kathleen; Busch, Michael P

    2007-01-01

    ...) in civilian trauma patients receiving allogenic red blood cell (RBC) transfusions. We explored the incidence of TA-MC in combat casualties receiving FrWB compared with patients receiving standard stored RBC transfusions. Methods...

  6. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  7. Regulating and Combating Underground Banking

    NARCIS (Netherlands)

    Borgers, M.J.

    2009-01-01

    In combating and regulating underground banking, a choice can be made of roughly two models, the risk model and the assimilation model. The risk model comes down to a complete prohibition of underground banking combined with an active investigation and prosecution policy. In the assimilation model,

  8. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  9. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  10. A wireless-sensor scoring and training system for combative sports

    Science.gov (United States)

    Partridge, Kane; Hayes, Jason P.; James, Daniel A.; Hill, Craig; Gin, Gareth; Hahn, Allan

    2005-02-01

    Although historically among the most popular of sports, today, combative sports are often viewed as an expression of our savage past. Of primary concern are the long term effects of participating in these sports on the health of participants. The scoring of such sports has also been the subject of much debate, with a panel of judges making decisions about very quick events involving large sums of prize money. This paper describes an electronic system for use primarily in the sport of boxing, though it is suitable for martial arts such as karate and taekwondo. The technology is based on a previously described sensor platform and integrates a network of sensors on the athlete"s head, body and hands. Using a Bluetooth network, physical contacts are monitored in near real-time or post event on a remote computer to determine legal hits and hence derivative measures like scoring and final outcomes. It is hoped that this system can be applied to reduce the need for full contact contests as well as provide a more reliable method of determining the outcome of a bout. Other benefits presented here include the ability to analyse an athlete's performance post match or training session, such as assessing the efficacy of training drills and effects of fatigue.

  11. Combat Risk and Pay: Theory and Some Evidence

    Science.gov (United States)

    2011-10-01

    1776) theory of compensating differences, and Rosen (1986) devised what has become the standard neoclassical economic theory relating wages to the...I N S T I T U T E F O R D E F E N S E A N A L Y S E S IDA Paper P-4774 October 2011 Combat Risk and Pay: Theory and Some Evidence Curtis J. Simon...OCT 2011 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Combat Risk and Pay: Theory and Some Evidence 5a. CONTRACT NUMBER 5b

  12. Combat Resource Management (11bm) Applied Research Project (ARP)

    Science.gov (United States)

    2009-12-01

    tactiques de combat embarquées, comme partie du processus C2 naval militaire, définit un domaine application qui implique à la fois des décideurs humains ...combat ships defending against incoming threats and where coordination of their respective resources is a complex problem of capital importance...the case of the several frigates defending against incoming threats, multi-agent coordi- nation is a complex problem of capital importance. Better

  13. Business and IT Capabilities for Cloud Platform Success

    DEFF Research Database (Denmark)

    Hahn, Christopher; Huntgeburth, Jan; Winkler, Till J.

    2016-01-01

    The growing proliferation of cloud platform ecosystems demands a deeper understanding of the capabilities that help existing and emerging platform providers to be successful by creating and appropriating value. This multiple case study of four cloud platform providers (three large, one SME......) instantiates Rai and Tang’s (2014) framework of dyadic IT and network IT capabilities for a cloud platform context and extends it by exploring previously undertheorized cloud platform business capabilities. We further build on this extended framework by employing a configurational perspective to elucidate...... the complementary role of the three proposed business capabilities (incentives and rules, ecosystem marketing and sales, partner development and support) for relevant value creation and appropriation mechanisms. In addition to providing a capability framework catered to the cloud platform context, our findings...

  14. Global operations networks in motion: Managing configurations and capabilities

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Jørgensen, Claus

    2010-01-01

    In the past, the ‘Made in the World’ label, although capturing what may lie ahead, seemed awkward and futuristic. Today, it has become a reality. An ample array of global products are built up of numerous components and modules manufactured by global networks of differentiated partners rather than...... within the boundaries of one national entity. The purpose of this paper is to contribute to bridging the empirical gap in the area of global operations networks and provide insights into how they change over time. The paper is based on the cases of three Danish companies and their global operations...

  15. The food and weight combat. A problematic fight for the elite combat sports athlete.

    Science.gov (United States)

    Pettersson, Stefan; Pipping Ekström, Marianne; Berg, Christina M

    2012-10-01

    Weight reduction in athletes is motivated by optimisation of performance, aesthetic reasons or to achieve a pre-designated weight. Previous research has shown that dietary restraint and short term weight regulation frequently takes place among combat sports athletes such as wrestlers and judokas. The aim of this study was to explore negative experiences related to dietary strategies and weight-making practises used by elite combat sports athletes. Using semi-structured interviews, 14 Swedish national team athletes in wrestling, judo and taekwondo were asked about their dietary intake and their engagement in both long- and short-term weight regulation practises. Content analysis of the transcribed interviews, display a constant struggle regarding nutritional standpoints. Sport demands such as achieving an optimal weight and nutritional intake were considered as central in order for excellent performance. Adhering to these demands was found to be problematic however, primarily because of; (1) negative physiological responses and (2) opposing ideals of a non-sport related nature, such as the importance of the athletes to be healthy and social in their everyday lives. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. EDCTP regional networks of excellence: initial merits for planned clinical trials in Africa.

    Science.gov (United States)

    Miiro, George M; Oukem-Boyer, Odile Ouwe Missi; Sarr, Ousmane; Rahmani, Maerangis; Ntoumi, Francine; Dheda, Keertan; Pym, Alexander; Mboup, Souleymane; Kaleebu, Pontiano

    2013-03-22

    Achieving the Millennium Development Goals (MDGs) and combating hotspots with escalating but preventable communicable diseases remain major challenges in Africa. The European and Developing Countries Clinical Trials Partnership (EDCTP) intervened to combat poverty-related diseases including malaria, tuberculosis and HIV/AIDS, and to conduct multi-centre clinical trials and multi-disciplinary health research through an innovative model of regional Networks of Excellence (NoEs). We participated in a quasi-formative evaluation between October and December 2011 on the 4 regional-led research networks. These included the: Central Africa Network on Tuberculosis, HIV/AIDS and Malaria (CANTAM); East African Consortium for Clinical Research (EACCR); West African Network of Excellence for TB, AIDS and Malaria (WANETAM), and the Trials of Excellence for Southern Africa (TESA) launched between 2009 and 2010. We shared a participatory appraisal of field reports, progress reports and presentations from each network to jointly outline the initial experiences of the merits, outputs and lessons learnt. The self-regulating democratic networks, with 64 institutions in 21 African countries, have trained over 1, 000 African scientists, upgraded 36 sites for clinical trials, leveraged additional € 24 million and generated 38 peer-reviewed publications through networking and partnerships. The shared initial merits and lessons learnt portray in part the strengthened capacity of these networks for improved research coordination and conduct of planned multi-center clinical trials in Africa. Increased funding by African agencies, governments and international health partners will ensure sustainability of these networks for research capacity development and demonstrate their commitment to achieving the MDGs in Africa.

  17. "Shell Shock": An Entity that Predated Combat-related Posttraumatic Stress Disorder

    Directory of Open Access Journals (Sweden)

    Ragul Ganesh

    2015-01-01

    Full Text Available In the last century, numerous soldiers had been diagnosed with various post combat disorders. The terminology that has been utilized to describe such patients include combat fatigue, combat stress reaction, soldier′s heart, effort syndrome, non-ulcer dyspepsia, effects of agent orange and gulf war syndrome. The initial description of such post combat disorder was probably ′shell shock′ which came into vogue during the World War I. The soldiers, undergoing unyielding artillery bombardment, in the trenches suffered persistent symptoms of headache, behavioural changes and memory impairment, and was designated at the time as ′shell shock′. Myers and Mott, independently studied numerous soldiers to elucidate the features and aetiology of the entity. An attempt was made to restrict the usage of the term, but the psychological distress of the soldiers persisted to be addressed in some manner or the other, culminating in the genesis of Post Traumatic Stress Disorder.

  18. Immune networks: multi-tasking capabilities at medium load

    Science.gov (United States)

    Agliari, E.; Annibale, A.; Barra, A.; Coolen, A. C. C.; Tantari, D.

    2013-08-01

    Associative network models featuring multi-tasking properties have been introduced recently and studied in the low-load regime, where the number P of simultaneously retrievable patterns scales with the number N of nodes as P ˜ log N. In addition to their relevance in artificial intelligence, these models are increasingly important in immunology, where stored patterns represent strategies to fight pathogens and nodes represent lymphocyte clones. They allow us to understand the crucial ability of the immune system to respond simultaneously to multiple distinct antigen invasions. Here we develop further the statistical mechanical analysis of such systems, by studying the medium-load regime, P ˜ Nδ with δ ∈ (0, 1]. We derive three main results. First, we reveal the nontrivial architecture of these networks: they exhibit a high degree of modularity and clustering, which is linked to their retrieval abilities. Second, by solving the model we demonstrate for δ frameworks are required to achieve effective retrieval.

  19. 2001 Industry Studies: Land Combat Systems

    National Research Council Canada - National Science Library

    Alyaqout, Faisal

    2001-01-01

    .... The days when production lines and factories hummed at peak capacity are gone. Orders for land combat systems have been reduced by nearly two-thirds since 1990, and competition for what few procurement dollars remain is stiff...

  20. The consistency of combat exposure reporting and course of PTSD in Vietnam War veterans.

    Science.gov (United States)

    Koenen, K C; Stellman, S D; Dohrenwend, B P; Sommer, J F; Stellman, J M

    2007-02-01

    Self-reports of traumatic events are often used in clinical and epidemiologic studies. Nevertheless, research suggests combat exposure reports may be biased by posttraumatic stress disorder (PTSD) symptom severity, leading to an inflated dose-response relation between combat exposure and PTSD. The authors examined the consistency in combat exposure reports and their relation to PTSD symptoms in Vietnam Veteran American Legionnaires who responded to two mailed surveys (1984, 1998; N = 1,462). Combat exposure reports were highly reliable (test-retest correlation = 0.87). However, changes in exposure reporting were related to changes in PTSD symptoms, specifically reexperiencing symptoms. The effect size of the dose-response relation attributable to changes in reporting was smaller for continuous than categorical measures. Findings are discussed in relation to recent controversies over veterans' combat exposure reports.

  1. Women in Combat: The Medical and Behavioral Health Effects on Women Who Have Served in Combat

    Science.gov (United States)

    2014-06-13

    urinary tract infections or bacterial vaginosis while deployed, and with limited medical care available, could lead to long-term reproductive issues......experience (Gaylord 2006). Several studies have been conducted on pregnancy outcomes in female Soldiers who have deployed to combat, such as fertility

  2. Childhood trauma, combat trauma, and substance use in National Guard and reserve soldiers.

    Science.gov (United States)

    Vest, Bonnie M; Hoopsick, Rachel A; Homish, D Lynn; Daws, Rachel C; Homish, Gregory G

    2018-02-27

    The goal of this work was to examine associations among childhood trauma, combat trauma, and substance use (alcohol problems, frequent heavy drinking [FHD], current cigarette smoking, and current/lifetime drug use) and the interaction effects of childhood trauma and combat exposure on those associations among National Guard/reserve soldiers. Participants (N = 248) completed an electronic survey asking questions about their military experiences, physical and mental health, and substance use. Childhood trauma and combat exposure were examined jointly in regression models, controlling for age, marital satisfaction, and number of deployments. Childhood trauma was associated with current drug use (trend level, odds ratio [OR] = 1.44, 95% confidence interval [CI]: 0.97, 2.14; P = .072) in the main effect model; however, there was not a significant interaction with combat. Combat exposure had a significant interaction with childhood trauma on alcohol problems (b = -0.56, 95% CI: -1.12, -0.01; P = .048), FHD (b = -0.27, 95% CI: -0.47, -0.08; P = .007), and lifetime drug use (OR = 1.78, 95% CI: 1.04, 3.04; P = .035). There were no associations with either of the trauma measures and current cigarette smoking. These results demonstrate that childhood and combat trauma have differential effects on alcohol use, such that combat trauma may not add to the effect on alcohol use in those with greater child maltreatment but may contribute to greater alcohol use among those with low child maltreatment. As expected, childhood and combat trauma had synergistic effects on lifetime drug use. Screening for multiple types of trauma prior to enlistment and/or deployment may help to identify at-risk individuals and allow time for early intervention to prevent future adverse outcomes.

  3. Prevalence and patterns of combat sport related maxillofacial injuries

    OpenAIRE

    Shirani, Gholamreza; Kalantar Motamedi, Mohammad Hosein; Ashuri, Alireza; Eshkevari, Pooyan Sadr

    2010-01-01

    Aim: This study was designed to assess the prevalence, distribution, and patterns of injury among athletes engaged in combat sports and compare the prevalence, pattern, and types of oral and maxillofacial trauma in these athletes. Materials and Methods: A total of 120 male athletes engaged in four combat sports (boxing, taekwondo, kickboxing, and Muay Thai) who had sustained bodily trauma were studied; 95 subjects with at least one traumatic injury to the face requiring treatment were referre...

  4. Stakeholder Analysis of Integrating Women Into Ground Combat Units

    Science.gov (United States)

    2014-06-01

    number 21 was titled, “ Nike Store, Men’s Clearance Shoes, Clothing and Gear.” If a link to an article or media site did not work, then that data...Brown, K. (2007). Co-ed combat: The new evidence that women shouldn’t fight the nation’s wars. New York: Penguin Group (USA), Inc . Burrelli, David...L. (2013). Deadly consequences: How cowards are pushing women into combat. Washington, DC: Regnery Publishing, Inc . 110 Maginnis, R. L. (n.d

  5. Rapid Network Design

    Science.gov (United States)

    2013-09-01

    control GCE ground combat element LCE logistics combat element MAGTF Marine Air Ground Task Force MWCS Marine Wing Communications Squadron NPS Naval...elements: command element (CE), ground combat el- ement ( GCE ), aviation combat element (ACE), and logistics combat element (LCE). Each ele- ment...This layer provides unimpeded high-speed connectivity between remote sites and the Internet. Limited security policies are applied at this level to

  6. Use of recombinant factor VIIA for control of combat-related haemorrhage.

    Science.gov (United States)

    Woodruff, Susan I; Dougherty, Amber L; Dye, Judy L; Mohrle, Charlene R; Galarneau, Michael R

    2010-02-01

    Recombinant activated human coagulation factor VII (rFVIIa), an intravascular strategy to promote clotting, is being used as an adjunct to surgical control of bleeding in combat trauma patients. To describe the initial experiences with rFVIIa administered to combat casualties at US Navy-Marine Corps medical treatment facilities in Iraq, and to compare survival outcomes of those treated with rFVIIa to controls not receiving rFVIIa. Medical encounter data from the US Navy-Marine Corps Combat Trauma Registry were retrospectively reviewed to identify all battle-injured patients documented as having received rFVIIa during the period May 2004 to January 2006 of Operation Iraqi Freedom. Available clinical and injury related data are presented to characterise the patients. To assess effects of rFVIIa on survival outcomes, rFVIIa cases were matched to controls on injury severity and age. 22 battle-injured patients from the Combat Trauma Registry received rFVIIa. Primarily young US Marines, these patients typically had penetrating injuries from improvised explosive devices and gunshot wounds. Injuries were often abdominal. The average dose used was similar to that reported in another study of civilian trauma patients, although dosing varies widely in the existing experimental and anecdotal literature. Over two-thirds (68%) of the rFVIIa patients survived-an identical outcome seen for a matched control group of 22 patients. Survival of seriously injured combat casualties was good, although identical to that of a control group. Methodological limitations of this retrospective study preclude making firm conclusions about the effectiveness of rFVIIa. Future controlled studies are needed for safety and efficacy testing of rFVIIa in combat trauma patients.

  7. Combat Neurosis in the Battered Teacher.

    Science.gov (United States)

    Science News, 1978

    1978-01-01

    Investigates the effect of school violence on classroom teachers. The study of 253 Los Angeles inner city classroom teachers reveals that many of them have developed conditions similar to the combat neurosis found in soldiers at war. (HM)

  8. Cultural and Religious Awareness: The Key to Analyzing and Combating the Relative Combat Power for Islamic-Based Terrorism

    National Research Council Canada - National Science Library

    Khan, Muhammad M

    2005-01-01

    ... terrorists. Second, the United States must conduct cultural awareness/cultural intelligence training for all military personnel who are deploying to combat the GWOT, and for all staff in the regional standing...

  9. Is effective mass in combat sports punching above its weight?

    Science.gov (United States)

    Lenetsky, Seth; Nates, Roy J; Brughelli, Matt; Harris, Nigel K

    2015-04-01

    The segmental and muscular complexity of the human body can result in challenges when examining the kinetics of impacts. To better understand this complexity, combat sports literature has selected effective mass as a measure of an athlete's inertial contribution to the momentum transfer during the impact of strikes. This measure helps to clarify the analysis of striking kinetics in combat sports. This paper will review: (1) effective mass as a concept and its usage as a measure of impact intensity in combat sports, (2) the neuromuscular pattern known as "double peak muscle activation" which has been theorized to help enhance initial hand velocity upon impact and joint stiffening during impact, (3) the methods and equations used to calculate effective mass, and (4) practitioner recommendations based on the literature. We will argue in this manuscript that the act of punching presents unique challenges to the current understanding of effective mass due to additional force application during impact. This review will improve the understanding of effective mass and its roles in effective striking serving to underpin future research into performance enhancement in striking based combat sports. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. Assessment of combating-desertification strategies using the linear assignment method

    Science.gov (United States)

    Hassan Sadeghravesh, Mohammad; Khosravi, Hassan; Ghasemian, Soudeh

    2016-04-01

    Nowadays desertification, as a global problem, affects many countries in the world, especially developing countries like Iran. With respect to increasing importance of desertification and its complexity, the necessity of attention to the optimal combating-desertification alternatives is essential. Selecting appropriate strategies according to all effective criteria to combat the desertification process can be useful in rehabilitating degraded lands and avoiding degradation in vulnerable fields. This study provides systematic and optimal strategies of combating desertification by use of a group decision-making model. To this end, the preferences of indexes were obtained through using the Delphi model, within the framework of multi-attribute decision making (MADM). Then, priorities of strategies were evaluated by using linear assignment (LA) method. According to the results, the strategies to prevent improper change of land use (A18), development and reclamation of plant cover (A23), and control overcharging of groundwater resources (A31) were identified as the most important strategies for combating desertification in this study area. Therefore, it is suggested that the aforementioned ranking results be considered in projects which control and reduce the effects of desertification and rehabilitate degraded lands.

  11. Effective Protection or Effective Combat

    DEFF Research Database (Denmark)

    Lemberg-Pedersen, Martin

    2016-01-01

    alternative routes. On the other hand, European border control and its ‘combat against smugglers’ has emerged as a massively lucrative market for the European arms industry, both in terms of contracts to guard the EU’s external borders and in terms of the export of weapons and control systems to North African...

  12. Teaching Combative Sports through Tactics

    Science.gov (United States)

    Kozub, Francis M.; Kozub, Mary L.

    2004-01-01

    Martial arts have become popular in the United States and have transitioned from being spectator sports to avenues for active participation by people of all ages. The purpose of this article is to highlight tactical similarities in selected combative sport activities and to provide martial arts and wrestling instructors with an alternative…

  13. The Effect of a Golden Hour Policy on the Morbidity and Mortality of Combat Casualties.

    Science.gov (United States)

    Kotwal, Russ S; Howard, Jeffrey T; Orman, Jean A; Tarpey, Bruce W; Bailey, Jeffrey A; Champion, Howard R; Mabry, Robert L; Holcomb, John B; Gross, Kirby R

    2016-01-01

    The term golden hour was coined to encourage urgency of trauma care. In 2009, Secretary of Defense Robert M. Gates mandated prehospital helicopter transport of critically injured combat casualties in 60 minutes or less. To compare morbidity and mortality outcomes for casualties before vs after the mandate and for those who underwent prehospital helicopter transport in 60 minutes or less vs more than 60 minutes. A retrospective descriptive analysis of battlefield data examined 21,089 US military casualties that occurred during the Afghanistan conflict from September 11, 2001, to March 31, 2014. Analysis was conducted from September 1, 2014, to January 21, 2015. Data for all casualties were analyzed according to whether they occurred before or after the mandate. Detailed data for those who underwent prehospital helicopter transport were analyzed according to whether they occurred before or after the mandate and whether they occurred in 60 minutes or less vs more than 60 minutes. Casualties with minor wounds were excluded. Mortality and morbidity outcomes and treatment capability-related variables were compared. For the total casualty population, the percentage killed in action (16.0% [386 of 2411] vs 9.9% [964 of 9755]; P mean injury severity score, 17.3; mortality, 10.1% [457 of 4542]) with detailed data, there was a decrease in median transport time after the mandate (90 min vs 43 min; P < .001) and an increase in missions achieving prehospital helicopter transport in 60 minutes or less (24.8% [181 of 731] vs 75.2% [2867 of 3811]; P < .001). When adjusted for injury severity score and time period, the percentage killed in action was lower for those critically injured who received a blood transfusion (6.8% [40 of 589] vs 51.0% [249 of 488]; P < .001) and were transported in 60 minutes or less (25.7% [205 of 799] vs 30.2% [84 of 278]; P < .01), while the percentage died of wounds was lower among those critically injured initially treated by combat

  14. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  15. Weight Loss Strategies in Combat Sports and Concerning Habits in Mixed Martial Arts.

    Science.gov (United States)

    Barley, Oliver R; Chapman, Dale W; Abbiss, Chris R

    2017-12-28

    Combat sports are typically divided into weight classes and body mass manipulation to reach a weight class is commonplace. Previous research suggests that mixed martial arts (MMA) weight loss practices may be more extreme than other combat sports. We sought to investigate the magnitude of weight lost and prevalence of weight loss strategies in different combat sports. Competitors (n=637) from Brazilian jiu jitsu (BJJ), boxing, judo, MMA, muay Thai/kickboxing (MT/K), taekwondo (TKD) and wrestling completed an online questionnaire seeking information regarding their weight loss practices. Body mass manipulation was commonly undertaken by all combat sports athletes, with a particularly high incidence of gradual dieting, increased exercise and fluid restriction. Skipping meals was higher in TKD and wrestling (84%) compared with the other combat sports (~58%), whilst training in heated rooms and forced oral fluid loss (spitting) was higher in wrestling (83% and 47%, respectively) compared with other combat sports (~45% and ~19%, respectively). MMA athletes reported the highest usage of sauna (76%) and water loading (67%) whilst also reporting the second highest use of training in rubber/plastic suits (63%). Body mass manipulation was present in all combat sports with the prevalence and magnitude of acute weight loss greater in MMA. The incidence of and practices reported will assist support staff to be fully aware of the variety of methods these athletes and coaches may use to achieve weight loss. Additionally, the results could aid regulatory bodies in the further development of policies on weight cutting.

  16. Secure Fiberoptic Communications

    Science.gov (United States)

    Hodara, Henri

    At the heart of our current information explosion is the communication network. Networks are now an intrinsic part of our daily activities, whether they are for Internet business transactions or military communications in Future Combat Systems. Protection of this communication infrastructure is a must. In this article, we discuss two approaches for securing all-optical networks. The first is an optical encryption technique that denies the information to intruders. The second is an authentication scheme capable of detecting and identifying unauthorized users.

  17. Defense Science Board Task Force on Military Satellite Communication and Tactical Networking. Executive Summary

    Science.gov (United States)

    2017-03-01

    Interface Processor BCT Brigade Combat Team BFT Blue Force Tracking BLOS Beyond Line-of-Sight C2 Command And Control C2E Communications in...Satellite Communications and Tactical Networking Appendix D-2 GIG Global Information Grid GMR Ground Mobile Radio GPS Global Positioning System...System SIPRNet Secret Internet Protocol Router Network SITREPS Situational Reports SMART -T Secure Mobile Anti-Jam Reliable Tactical Terminal SMC Space

  18. A Pilot Project Demonstrating that Combat Medics Can Safely Administer Parenteral Medications in the Emergency Department.

    Science.gov (United States)

    Schauer, Steven G; Cunningham, Cord W; Fisher, Andrew D; DeLorenzo, Robert A

    2017-12-01

    Introduction Select units in the military have improved combat medic training by integrating their functions into routine clinical care activities with measurable improvements in battlefield care. This level of integration is currently limited to special operations units. It is unknown if regular Army units and combat medics can emulate these successes. The goal of this project was to determine whether US Army combat medics can be integrated into routine emergency department (ED) clinical care, specifically medication administration. Project Design This was a quality assurance project that monitored training of combat medics to administer parenteral medications and to ensure patient safety. Combat medics were provided training that included direct supervision during medication administration. Once proficiency was demonstrated, combat medics would prepare the medications under direct supervision, followed by indirect supervision during administration. As part of the quality assurance and safety processes, combat medics were required to document all medication administrations, supervising provider, and unexpected adverse events. Additional quality assurance follow-up occurred via complete chart review by the project lead. Data During the project period, the combat medics administered the following medications: ketamine (n=13), morphine (n=8), ketorolac (n=7), fentanyl (n=5), ondansetron (n=4), and other (n=6). No adverse events or patient safety events were reported by the combat medics or discovered during the quality assurance process. In this limited case series, combat medics safely administered parenteral medications under indirect provider supervision. Future research is needed to further develop this training model for both the military and civilian setting. Schauer SG , Cunningham C W, Fisher AD , DeLorenzo RA . A pilot project demonstrating that combat medics can safely administer parenteral medications in the emergency department. Prehosp Disaster Med. 2017;32(6):679-681.

  19. Combat aircraft noise

    Science.gov (United States)

    Sgarbozza, M.; Depitre, A.

    1992-04-01

    A discussion of the characteristics and the noise levels of combat aircraft and of a transport aircraft in taking off and landing are presented. Some methods of noise reduction are discussed, including the following: operational anti-noise procedures; and concepts of future engines (silent post-combustion and variable cycle). Some measurement results concerning the noise generated in flight at great speeds and low altitude will also be examined. Finally, the protection of the environment of French air bases against noise will be described and the possibilities of regulation examined.

  20. Building Server Capabilities

    DEFF Research Database (Denmark)

    Adeyemi, Oluseyi

    2013-01-01

    Many western companies have moved part of their operations to China in order to take advantage of cheap resources and/or to gain access to a high potential market. Depending on motive, offshore facilities usually start either as “sales-only” of products exported by headquarters or “production......-only”, exporting parts and components back to headquarter for sales in the home country. In the course of time, the role of offshore subsidiaries in a company’s operations network tends to change and, with that, the capabilities, of the subsidiaries. Focusing on Danish subsidiaries in China, the objective...

  1. Building server capabilities

    DEFF Research Database (Denmark)

    Adeyemi, Oluseyi

    Many western companies have moved part of their operations to China in order to take advantage of cheap resources and/or to gain access to a high potential market. Depending on motive, offshore facilities usually start either as “sales-only” of products exported by headquarters or “production......-only”, exporting parts and components back to headquarter for sales in the home country. In the course of time, the role of offshore subsidiaries in a company’s operations network tends to change and, with that, the capabilities, of the subsidiaries. Focusing on Danish subsidiaries in China, the objective...

  2. The role of intrinsic and extrinsic rewards in committing violence during combat: A cross-sectional study with former combatants in the DR Congo.

    Science.gov (United States)

    Haer, Roos; Hermenau, Katharin; Elbert, Thomas; Moran, James K; Hecker, Tobias

    2017-05-01

    It has been postulated that the violent behavior that characterizes armed conflict is reinforced by the possibility of receiving rewards. The present study examined the potential influence of two types of rewards in an ongoing setting of conflict: extrinsic and intrinsic rewards. Former combatants active in the Democratic Republic of the Congo (N = 198) were interviewed and questioned about the way they were recruited, the offenses they committed during combat, their level of perceived intrinsic rewards (i.e., appetitive perception of violence), and the number of received extrinsic rewards during their time in the armed group (e.g., money, extra food, alcohol, or drugs). A moderated multiple regression analysis showed that the number of received extrinsic rewards and the level of intrinsic rewards were significantly positively related to the number of different types of offenses committed. In contrast to our expectations and previous findings, the recruitment type (forced conscription vs. voluntary enlistment) did not moderate this relation. Our findings suggest that both types of rewards play a role in committing violence during combat. We suggest, therefore, that reintegration programs should not only consider the influence of extrinsic rewards, but also need to address the influence of intrinsic rewards to counter violent behavior among former combatants. Aggr. Behav. 43:241-250, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  3. Integrating Space Communication Network Capabilities via Web Portal Technologies

    Science.gov (United States)

    Johnston, Mark D.; Lee, Carlyn-Ann; Lau, Chi-Wung; Cheung, Kar-Ming; Levesque, Michael; Carruth, Butch; Coffman, Adam; Wallace, Mike

    2014-01-01

    We have developed a service portal prototype as part of an investigation into the feasibility of using Java portlet technology as a means of providing integrated access to NASA communications network services. Portal servers provide an attractive platform for this role due to the various built-in collaboration applications they can provide, combined with the possibility to develop custom inter-operating portlets to extent their functionality while preserving common presentation and behavior. This paper describes various options for integration of network services related to planning and scheduling, and results based on use of a popular open-source portal framework. Plans are underway to develop an operational SCaN Service Portal, building on the experiences reported here.

  4. Rushing to Failure Impacts of a Gender-Neutral Military on Combat Effectiveness

    Science.gov (United States)

    2016-02-16

    muscular strength and aerobic capacity place women at a distinct disadvantage when performing tasks required for direct ground combat specialties...order to preserve readiness, grow the talented pool of women, and ensure combat effectiveness of the military force. Proponents that advocate for

  5. New approaches to combat Porphyromonas gingivalis biofilms

    Science.gov (United States)

    Gerits, Evelien; Verstraeten, Natalie; Michiels, Jan

    2017-01-01

    ABSTRACT In nature, bacteria predominantly reside in structured, surface-attached communities embedded in a self-produced, extracellular matrix. These so-called biofilms play an important role in the development and pathogenesis of many infections, as they are difficult to eradicate due to their resistance to antimicrobials and host defense mechanisms. This review focusses on the biofilm-forming periodontal bacterium Porphyromonas gingivalis. Current knowledge on the virulence mechanisms underlying P. gingivalis biofilm formation is presented. In addition, oral infectious diseases in which P. gingivalis plays a key role are described, and an overview of conventional and new therapies for combating P. gingivalis biofilms is given. More insight into this intriguing pathogen might direct the development of better strategies to combat oral infections. PMID:28473880

  6. Towards a theory of ex-combatant reintegration

    Directory of Open Access Journals (Sweden)

    Stina Torjesen

    2013-12-01

    Full Text Available This paper encourages the development of a theoretical framework for the study of the reintegration of ex-combatants after war. It takes the first steps towards this by proposing a new definition of reintegration, where the processes ex-combatants experience, rather than the programmatic support offered by international and national agencies, take centre stage. The article links the study of reintegration to two broader disciplines; political economy and sociology, and in particular to the two disciplines’ account of power and group belonging. It argues that a political economy approach is particularly useful for making sense of the context in which reintegration processes unfold. The article also suggests some relevant research questions and highlights methodological concerns related to research on reintegration.

  7. Planning the annual cycle in groups of cadet combat sports perfection

    Directory of Open Access Journals (Sweden)

    Ananchenko Konstantin

    2016-08-01

    Full Text Available Within a large training cycle in conditions of high general level of stress the authors recommend optimal implementation of planning undulating dynamics of cadets’ combat exercise stress. The article proves the efficiency of one-cycle construction of training highly- qualified single-combat cadets at the stage of maximal realization of sporting possibilities, which includes both features of traditional cycles (preparatory, competitional, transitional and module-sectional composition of training. It scientifically substantiates, that the choice of those or other types of microcycles which present the structure of mesocycles is determined by a few basic factors which must be necessarily taken into account while planning the training process of sportsmen of different qualification. It is suggested to use certain varieties of microcycles in the practice of preparation of single combat cadets. It is substantiated that accounting in planning the annual cycle in groups of sporting perfection of students of the educed types of microcycles for every type of single combats is an actual task of further scientific research.

  8. Excellence in fleet combat replacement squadrons: predicting carrier qualification success

    OpenAIRE

    Smith, Martin P.

    1988-01-01

    This thesis presents a two-part analysis of excellence criteria for fleet combat replacement squadrons. Part one focuses on the qualitative issues and management techniques identified in outstanding fleet combat replacement squadrons. Part two develops and presents a regression model for predicting a fleet replacement squadron pilot's carrier qualification grade. The model was derived using standard linear regression techniques and the SPSSx software package of the Naval Postgraduate School. ...

  9. U.S. Navy Bloodhounds: Establishing A New Maritime Security Combatant

    Science.gov (United States)

    2016-06-01

    economy- car ’ standards, but it would move on Corvette engines: twin HP General Electric LM2500 gas turbine engines.”55 Considered sports cars of...and defense leaders craving something more high tech than inexpensive combat workhorses. Based on this assumption, the Perry class’ high-end...to restructure the LCS program for development of a new small surface combatant.195 This brief identifies that, beginning with FY 2019 construction

  10. A New Approach to Weapon-Target Assignment in Cooperative Air Combat

    Directory of Open Access Journals (Sweden)

    Yi-zhe Chang

    2017-01-01

    Full Text Available A new approach to solving weapon-target assignment (WTA problem is proposed in this paper. Firstly, relative superiority that lays the foundation for assignment is calculated based on the combat power energy of the fighters. Based on the relative superiority, WTA problem is formulated. Afterwards, a hybrid algorithm consisting of improved artificial fish swarm algorithm (AFSA and improved harmony search (HS is introduced and furthermore applied to solve the assignment formulation. Finally, the proposed approach is validated by eight representative benchmark functions and two concrete cooperative air combat examples. The results show that the approach proposed in this paper achieves good performances in solving WTA problem in cooperative air combat.

  11. Enhancing Brigade Combat Team Adaptability

    Science.gov (United States)

    2010-06-11

    Developing Learning Infrastructures (Training, Education , Practice, Research, Doctrine) -Create a shared vision -Build the business case (assess/Buy...To effectively respond to the characteristics of the operational environment, Brigade Combat Teams must be able to learn constantly from experience...behavior. Organizational adaptive behavior consists of three supporting emergent behaviors which are: self-organization, learning , and organizational

  12. Maturity In The Petrochemical Industry Features, Motives And Combating

    International Nuclear Information System (INIS)

    Farag, H.; El Messirie, A.

    2004-01-01

    Petrochemicals give the highest value from crude oil and natural gas but suffers from maturity like any other business. Petrochemicals companies are promoting their business in the direction from oil and gas commodities. Specialities and life science. Reasons of maturity are expired patents, low demand, over capacity, intense competition. Actions to combat maturity are to restructure capacity achieving mega sizes, do downstream, and restructuring business practices. Strategies followed by some companies to combat maturity include exit, focus on core business and exploit a competitive advantage

  13. Networking the Global Maritime Partnership

    Science.gov (United States)

    2016-04-13

    Strike, and Sea Basing) as “old wine in new bottles,” but with them Admiral Clark introduced a new term, “FORCEnet,” which referred to “an initiative...the primary reasons for the overwhelming combat power demonstrated in recent operations.18 C4ISR advances not only benefit so-called high-end...of the benefits of the adoption by coalition naval forces of a networked force structure. The report of AG-1 prompted leaders of the MAR in 2005 to

  14. Effect of Parachute Jump in the Psychophysiological Response of Soldiers in Urban Combat.

    Science.gov (United States)

    Sánchez-Molina, Joaquín; Robles-Pérez, José J; Clemente-Suárez, Vicente J

    2017-06-01

    The study of organic and psychological response during combat situations has been poorly reported despite its importance for soldiers training and specific instruction, so it was proposed as aim of the present investigation to analyze the effect of a tactical parachute simulated jump in psycho-physiological response of paratroopers' warfighters during an urban combat simulation. 19 male paratroopers (31.9 ± 6.2 year old; 173.6 ± 5.3 cm; 73.8 ± 8.3 Kg) of the Spanish Army were divided in two groups: parachute jump group (n:11) that conducted a simulated parachute jump and a urban combat maneuver and a non-parachute jump group (n:8) that only conducted an urban combat maneuver. We analyzed before and after the maneuver the rated perceived exertion, legs strength manifestation, blood lactate, cortical activation, heart rate variability, blood oxygen saturation and pressure, skin temperature, fine motor skills, and anxiety state. A tactical parachute simulated jump prior to an urban combat maneuver produce significantly (p jump situation in professional Army paratroopers. Independently of the parachute jump, an urban combat maneuver produces a significant increase in rated perceived exertion, blood lactate, heart rate, legs strength, sympathetic modulation and anxiety response as well as a significant decrease in blood oxygen saturation and parasympathetic modulation.

  15. Project VALOR: Trajectories of Change in PTSD in Combat-Exposed Veterans

    Science.gov (United States)

    2015-10-01

    Post - traumatic stress disorder ( PTSD ), military sexual trauma (MST), suicide, combat-exposed veterans, PTSD ...develop the first longitudinal registry of combat-exposed men and women with post - traumatic stress disorder ( PTSD ), 1649 participants from across the...Keane, T. M. (2012). Project VALOR: Design and methods of a longitudinal registry of post - traumatic stress disorder ( PTSD ) in

  16. EphB1 as a Novel Drug Target to Combat Pain and Addiction

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-14-1-0220 TITLE: EphB1 as a Novel Drug Target to Combat Pain and Addiction PRINCIPAL INVESTIGATOR: Mark Henkemeyer...as a Novel Drug Target to Combat Pain and Ad 5a. CONTRACT NUMBER EphB1 as a Novel Drug Target to Combat Pain and Addiction 5b. GRANT NUMBER W81XWH...neuronal and has functions in vascular endothelial cells. 6. We have also carried out computational analysis of potantial docking/binding of chemical

  17. Architecture of firm dynamic capabilities across inter-organizational activities: Explaining innovativeness in the context of nanotechnology

    Science.gov (United States)

    Petricevic, Olga

    In this dissertation I first develop a theoretical framework that explores different components of dynamic capabilities related to firm's boundary-spanning linkages across two different types of inter-organizational activities---alliances and networks. I argue that there are four different subsets of dynamic capabilities simultaneously at work: alliance opportunity-sensing, alliance opportunity-seizing, network opportunity-sensing and network opportunity-seizing. Furthermore, I argue that there are significant interaction effects between these distinctive subsets driving the firm's overall effectiveness in sensing and seizing of novel and innovative external opportunities. In order to explore potential interdependencies and draw distinctions among different dynamic capability subsets I integrate concepts from the two theoretical perspectives that often neglect the emphasis of the other---the dynamic capability view and the social network perspective. I then test the hypothesized relationships in the context of firms actively patenting in nanotechnology. Nanotechnology innovations are multidisciplinary in nature and require search and discovery across multiple inter-organizational, scientific, geographic, industry, or technological domains by a particular firm. The findings offer support for the conceptualizations of dynamic capabilities as consisting of distinct subsets of capabilities for the sensing and the seizing of external new-knowledge opportunities. The findings suggest that firm's innovativeness in an interdisciplinary scientific field such as nanotechnology is the function of the vector of multi-dimensional dynamic capabilities that are context-specific. Furthermore, the findings also suggest that there are inherent trade-offs embedded in different dimensions of dynamic capabilities when deployed across a wide range of inter-organizational relationships.

  18. Legislations combating counterfeit drugs in Hong Kong.

    Science.gov (United States)

    Lai, C W; Chan, W K

    2013-08-01

    To understand legislation combating counterfeit drugs in Hong Kong. This study consisted of two parts. In part I, counterfeit drugs–related ordinances and court cases were reviewed. In part II, indepth interviews of the stakeholders were described. Hong Kong. All Hong Kong ordinances were screened manually to identify those combating counterfeit drugs. Court cases were searched for each of the identified cases. Then, the relevant judgement justifications were analysed to identify sentencing issues. Indepth interviews with the stakeholders were conducted to understand their perceptions about such legislation. Trade Marks Ordinance, Patents Ordinance, Trade Descriptions Ordinance, and Pharmacy and Poisons Ordinance were current legislative items combating counterfeit drugs. Sentencing criteria depended on: intention to deceive, quantity of seized drugs, presence of expected therapeutic effect or toxic ingredients, previous criminal records, cooperativeness with Customs officers, honest confessions, pleas of guilty, types of drugs, and precautionary measures to prevent sale of counterfeit drugs. Stakeholders’ perceptions were explored with respect to legislation regarding the scale and significance of the counterfeit drug problem, penalties and deterrents, drug-specific legislation and authority, and inspections and enforcement. To plug the loopholes, a specific law with heavy penalties should be adopted. This could be supplemented by non-legal measures like education of judges, lawyers, and the public; publishing the names of offending pharmacies; and emphasising the role of pharmacists to the public.

  19. MEDICIÓN DE LA IRA EN EL DEPORTE DE COMBATE: VALIDACIÓN DEL STAXI-2 EN DEPORTISTAS MEXICANOS/ MEASUREMENT OF ANGER IN COMBAT SPORT:VALIDATION OF STAXI-2 IN MEXICAN SPORTSMEN

    Directory of Open Access Journals (Sweden)

    Nazira Calleja Bello**

    2010-05-01

    Full Text Available RESUMENLa ira es una emoción que juega un papel fundamental en la ejecución de los deportes de combate. El propósito delpresente estudio fue desarrollar una versión para deportistas de combate del Inventario de Expresión de la Ira Estado-Rasgo, STAXI-2, versión española. La muestra estuvo conformada por 303 deportistas que formaban parte de las seleccionesnacionales mexicanas de cinco deportes de combate. Los resultados mostraron una estructura factorial similar a la versiónespañola, que reporta tres escalas: Ira-Estado, Ira-Rasgo y Expresión de Ira; sin embargo, de los 49 reactivos iniciales sólose conservaron 28, que se agruparon en siete factores y no en las nueve subescalas que conformaban el instrumento original.Los índices de consistencia interna fueron aceptables y se obtuvieron correlaciones significativas entre los factores, exceptocon el Control de la ira. El inventario obtenido es un instrumento válido y confiable para su utilización en la medición de laira en el deporte de combate.ABSTRACTThe anger is an emotion that plays a fundamental role in combat sports execution. The purpose of the present study wasto develop a version for combat sportsmen of the State-Trait Anger Expression Inventory, STAXI-2, Spanish version. Thesample was conformed by 303 sportsmen that were part of the selections national Mexicans of five combat sports. Theresults showed a similar factorial structure to the Spanish version which reports three scales: Anger-State, Anger-Trait andAnger-Expression; however, of the 49 initial items only 28 were conserved that grouped in seven factors and not in the ninesubscales that consisted the original instrument. The indexes of internal consistency were acceptable and significantcorrelations were obtained among the factors, except with the Anger-Control. The obtained inventory is a reliable and validfor its use in anger mensuration in combat sports.

  20. Critical concerns in Iraq/Afghanistan war veteran-forensic interface: combat-related postdeployment criminal violence.

    Science.gov (United States)

    Sreenivasan, Shoba; Garrick, Thomas; McGuire, James; Smee, Daniel E; Dow, Daniel; Woehl, Daniel

    2013-01-01

    Identifying whether there is a nexus between Iraq and Afghanistan combat injuries and civilian violence on return from deployment is complicated by differences in reactions of individuals to combat exposure, the overlapping effects of traumatic brain injury (TBI) and posttraumatic stress disorder (PTSD), and the low base rate of civilian violence after combat exposure. Moreover, the overall prevalence of violence among returning Iraq and Afghanistan combat war veterans has not been well documented. Malingered symptoms and either exaggeration or outright fabrication of war zone exposure are challenges to rendering forensic opinions, with the risk reduced by accessing military documents that corroborate war zone duties and exposure. This article serves as a first step toward understanding what may potentiate violence among returning Iraq and Afghanistan veterans. We offer a systematic approach toward the purpose of forensic case formulation that addresses whether combat duty/war zone exposure and associated clinical conditions are linked to criminal violence on return to civilian life.

  1. Business-IT alignment in PSS value networks : a capability-based framework

    NARCIS (Netherlands)

    Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; Camarinha-Matos, L.M.; Afsarmanesh, H.

    2014-01-01

    Advanced information technology (IT) is regarded as a foundation for the operation of product-service system (PSS) value networks. This requires alignment between IT and PSS business strategy. Business‐IT alignment (BIA) in a value network can raise the ability of partners to collaborate effectively

  2. Indirect Relations Between Transgressive Acts and General Combat Exposure and Moral Injury.

    Science.gov (United States)

    Frankfurt, Sheila B; Frazier, Patricia; Engdahl, Brian

    2017-11-01

    Moral injury describes the deleterious effects of acts of commission (e.g., killing noncombatants), omission (e.g., failing to prevent a massacre), or betrayal (i.e., by a trusted authority figure) during military service that transgress accepted behavioral boundaries and norms. Transgressive acts are proposed to lead to a guilt- and shame-based syndrome consisting of post-traumatic stress disorder (PTSD) symptoms, demoralization, self-handicapping, and self-injury. In this study, we tested a frequently cited model of moral injury and assessed the associations between potentially transgressive acts, moral injury outcomes, and guilt and fear. Additionally, we sought to clarify the relative contribution of transgressive and nontransgressive/general combat exposure to moral injury. On the basis of previous research and theory, we anticipated that the transgressive acts would be related to outcomes through guilt and that nontransgressive combat exposure would be related to outcomes through fear. Secondary analysis was conducted on data from a sample of combat-exposed male veterans at a Midwestern Veterans Affairs (VA) medical center (N = 190) who participated in a larger parent study on postdeployment readjustment. Structural equation modeling was used to test the pathways from transgressive and nontransgressive combat exposure to PTSD symptoms and suicidality through combat-related guilt and combat-related fear. The institutional review boards of the Midwestern VA medical center and the university of the affiliated researchers approved the study. In total, 38% (n = 72) of the sample reported a potentially transgressive act as one of their three worst traumatic events. The most common potentially transgressive act was killing an enemy combatant (17%; n = 32). In structural equation modeling analyses. potentially transgressive acts were indirectly related to both suicidality (β = 0.09, p < 0.01) and PTSD symptoms (β = 0.06, p < 0.05) through guilt. General combat

  3. Women in Combat Compendium

    Science.gov (United States)

    2008-01-01

    support area • Location of unit TOC or HQ • Location of actual combat operations • No basis to answer this question 4. Given the U.S. Army’s current...welfare issue. I recall that part of General Order #1 was no sexual relations when deployed. Obviously, soldiers discovering pregnancy in the middle of...and had discussion about sexual relations and the 60 effect on unit cohesion, pregnancy testing, and affairs of the heart; whether appropriate or

  4. Global Combat Support System - Army Increment 2 (GCSS-A Inc 2)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Global Combat Support System - Army Increment 2 (GCSS-A Inc 2) Defense Acquisition...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...Date Assigned: Program Information Program Name Global Combat Support System - Army Increment 2 (GCSS-A Inc 2) DoD Component Army Responsible

  5. MANAGING GLOBAL OPERATIONS NETWORKS IN MOTION

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum

    2008-01-01

    capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities.......Most industrial companies are, for reasons related to cost, market access or knowledge, working with some aspect of offshore operations. This may take form of captive operations or through outsourcing of activities overseas. With this trend, global operations networks are emerging resulting...... in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...

  6. An Embedded Wireless Sensor Network with Wireless Power Transmission Capability for the Structural Health Monitoring of Reinforced Concrete Structures.

    Science.gov (United States)

    Gallucci, Luca; Menna, Costantino; Angrisani, Leopoldo; Asprone, Domenico; Moriello, Rosario Schiano Lo; Bonavolontà, Francesco; Fabbrocino, Francesco

    2017-11-07

    Maintenance strategies based on structural health monitoring can provide effective support in the optimization of scheduled repair of existing structures, thus enabling their lifetime to be extended. With specific regard to reinforced concrete (RC) structures, the state of the art seems to still be lacking an efficient and cost-effective technique capable of monitoring material properties continuously over the lifetime of a structure. Current solutions can typically only measure the required mechanical variables in an indirect, but economic, manner, or directly, but expensively. Moreover, most of the proposed solutions can only be implemented by means of manual activation, making the monitoring very inefficient and then poorly supported. This paper proposes a structural health monitoring system based on a wireless sensor network (WSN) that enables the automatic monitoring of a complete structure. The network includes wireless distributed sensors embedded in the structure itself, and follows the monitoring-based maintenance (MBM) approach, with its ABCDE paradigm, namely: accuracy, benefit, compactness, durability, and easiness of operations. The system is structured in a node level and has a network architecture that enables all the node data to converge in a central unit. Human control is completely unnecessary until the periodic evaluation of the collected data. Several tests are conducted in order to characterize the system from a metrological point of view and assess its performance and effectiveness in real RC conditions.

  7. An Embedded Wireless Sensor Network with Wireless Power Transmission Capability for the Structural Health Monitoring of Reinforced Concrete Structures

    Directory of Open Access Journals (Sweden)

    Luca Gallucci

    2017-11-01

    Full Text Available Maintenance strategies based on structural health monitoring can provide effective support in the optimization of scheduled repair of existing structures, thus enabling their lifetime to be extended. With specific regard to reinforced concrete (RC structures, the state of the art seems to still be lacking an efficient and cost-effective technique capable of monitoring material properties continuously over the lifetime of a structure. Current solutions can typically only measure the required mechanical variables in an indirect, but economic, manner, or directly, but expensively. Moreover, most of the proposed solutions can only be implemented by means of manual activation, making the monitoring very inefficient and then poorly supported. This paper proposes a structural health monitoring system based on a wireless sensor network (WSN that enables the automatic monitoring of a complete structure. The network includes wireless distributed sensors embedded in the structure itself, and follows the monitoring-based maintenance (MBM approach, with its ABCDE paradigm, namely: accuracy, benefit, compactness, durability, and easiness of operations. The system is structured in a node level and has a network architecture that enables all the node data to converge in a central unit. Human control is completely unnecessary until the periodic evaluation of the collected data. Several tests are conducted in order to characterize the system from a metrological point of view and assess its performance and effectiveness in real RC conditions.

  8. Combating illicit trafficking

    International Nuclear Information System (INIS)

    Biro, L.L.; Grama, E.V.

    2002-01-01

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national authority, which is contact point for illicit trafficking and coordinates all measures and activities to combat and prevent illicit trafficking with nuclear material and radioactive sources. Legal framework regarding illicit trafficking has been improved due to new Physical Protection Regulations, Regulations on using the DBT, Regulations on requirements for qualification of guards and physical protection personnel, Design Basis Threat for each nuclear facility to avoid the unauthorized removal or theft of nuclear material or radioactive sources. New amendments of the Law for the safe deployment of nuclear activities, Law no. 111/1996, republished, in respect of illicit trafficking with nuclear material and radioactive sources are in the process to be approved by the Parliament. CNCAN is member of the Romanian Non-proliferation Group that is an interdepartmental mechanism of cooperation entered into force in August 1999. During the sessions of this group there are discussions focused on the preventing and combating illicit trafficking with nuclear material and radioactive sources. CNCAN is member of the Interministerial Council that controls import and export with strategic products including nuclear material, non nuclear material and equipment pertinent for proliferation of nuclear weapons. An Emergency Mobile Unit has been created in 2001 that contains instruments (gamma dose rate instruments portable and personal, contaminometers, mini MCA with CdZnTe detector, a CANBERRA Inspector with Nal, CdZnTe and HPGe detectors and 2 FiedSPEC, a mobile laboratory, 2 cars and individual equipment). CNCAN is cooperating with the Police through a National Plan to verify the authorization holders in order to prevent and combat illicit trafficking, and to find the orphan sources. CNCAN is the beneficiary of the PECO Project initiated by the European Commission in cooperation with the IAEA and

  9. Amphibious Combat Vehicle: Some Acquisition Activities Demonstrate Best Practices; Attainment of Amphibious Capability to be Determined

    Science.gov (United States)

    2015-10-01

    Defense EFV Expeditionary Fighting Vehicle EPF Expeditionary Fast Transport ESD Expeditionary Transfer Dock JCIDS Joint Capabilities...materials, propulsion, maintainability, and habitability. Production for the SC(X)R is planned to begin in 2018. Expeditionary Fast Transport ( EPF ...The EPF , formerly known as the Joint High Speed Vessel, is a commercial-based catamaran that provides heavy-lift, high-speed sealift mobility. The

  10. Integrated Assessment of Prevention and Restoration Actions to Combat Desertification

    Science.gov (United States)

    Bautista, S.; Orr, B. J.; Vallejo, R.

    2009-12-01

    Recent advances in desertification and land degradation research have provided valuable conceptual and analytical frameworks, degradation indicators, assessment tools and surveillance systems with respect to desertification drivers, processes, and impacts. These findings, together with stakeholders’ perceptions and local/regional knowledge, have helped to define and propose measures and strategies to combat land degradation. However, integrated and comprehensive assessment and evaluation of prevention and restoration strategies and techniques to combat desertification is still lacking, and knowledge on the feasibility and cost-effectiveness of the proposed strategies over a wide range of environmental and socio-economic conditions is very scarce. To address this challenge, we have launched a multinational project (PRACTICE - Prevention and Restoration Actions to Combat Desertification. An Integrated Assessment), funded by the European Commission, in order to link S & T advances and traditional knowledge on prevention and restoration practices to combat desertification with sound implementation, learning and adaptive management, knowledge sharing, and dissemination of best practices. The key activities for pursuing this goal are (1) to establish a platform and information system of long-term monitoring sites for assessing sustainable management and actions to combat desertification, (2) to define an integrated protocol for the assessment of these actions, and (3) to link project assessment and evaluation with training and education, adaptive management, and knowledge sharing and dissemination through a participatory approach involving scientists, managers, technicians, financial officers, and members of the public who are/were impacted by the desertification control projects. Monitoring sites are distributed in the Mediterranean Europe (Greece, Italy, Spain, and Portugal), Africa (Morocco, Namibia, South Africa), Middle East (Israel), China, and South and North

  11. Innovative contracting strategies for combating climate change.

    Science.gov (United States)

    2011-11-01

    The state of Maryland has made a strong commitment to combating climate change and reducing : greenhouse gas emissions. This research investigated the state of practice of innovative contracting : solutions to reduce emissions from highway constructi...

  12. Immunizations on small worlds of tree-based wireless sensor networks

    DEFF Research Database (Denmark)

    Li, Qiao; Zhang, Bai-Hai; Cui, Ling-Guo

    2012-01-01

    , are conducted on small worlds of tree-based wireless sensor networks to combat the sensor viruses. With the former strategy, the infection extends exponentially, although the immunization effectively reduces the contagion speed. With the latter strategy, recurrent contagion oscillations occur in the small world......The sensor virus is a serious threat, as an attacker can simply send a single packet to compromise the entire sensor network. Epidemics become drastic with link additions among sensors when the small world phenomena occur. Two immunization strategies, uniform immunization and temporary immunization...

  13. The Aftermath of Combat-Related PTSD: Toward an Understanding of Transgenerational Trauma

    Science.gov (United States)

    Pearrow, Melissa; Cosgrove, Lisa

    2009-01-01

    The number of military personnel who are involved in combat situations continues to increase. As a result, researchers have identified risk factors associated with the development of combat-related posttraumatic stress disorder (PTSD). The authors of this article review some of the characteristics of military personnel involved in these conflicts,…

  14. Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2013-01-01

    This paper introduces a design and simulation of a locally optimized network coding protocol, called PlayNCool, for wireless mesh networks. PlayN-Cool is easy to implement and compatible with existing routing protocols and devices. This allows the system to gain from network coding capabilities i...

  15. Reconfigurable network processing platforms

    NARCIS (Netherlands)

    Kachris, C.

    2007-01-01

    This dissertation presents our investigation on how to efficiently exploit reconfigurable hardware to design flexible, high performance, and power efficient network devices capable to adapt to varying processing requirements of network applications and traffic. The proposed reconfigurable network

  16. Effectiveness of battlefield-ethics training during combat deployment: a programme assessment.

    Science.gov (United States)

    Warner, Christopher H; Appenzeller, George N; Mobbs, Angela; Parker, Jessica R; Warner, Carolynn M; Grieger, Thomas; Hoge, Charles W

    2011-09-03

    Breakdowns in the ethical conduct of soldiers towards non-combatants on the battlefield are of grave concern in war. Evidence-based training approaches to prevent unethical conduct are scarce. We assessed the effectiveness of battlefield-ethics training and factors associated with unethical battlefield conduct. The training package, based on movie vignettes and leader-led discussions, was administered 7 to 8 months into a 15-month high-intensity combat deployment in Iraq, between Dec 11, 2007, and Jan 30, 2008. Soldiers from an infantry brigade combat team (total population about 3500) were randomly selected, on the basis of company and the last four digits of each soldier's social security number, and invited to complete an anonymous survey 3 months after completion of the training. Reports of unethical behaviour and attitudes in this sample were compared with a randomly selected pre-training sample from the same brigade. The response patterns for ethical behaviour and reporting of ethical violations were analysed with chi-square analyses. We developed two logistic regression models using self-reported unethical behaviours as dependent variables. Factors associated with unethical conduct, including combat experiences and post-traumatic stress disorder (PTSD), were assessed with validated scales. Of 500 randomly selected soldiers 421 agreed to participate in the anonymous post-training survey. A total of 397 soldiers of the same brigade completed the pre-training survey. Training was associated with significantly lower rates of unethical conduct of soldiers and greater willingness to report and address misconduct than in those before training. For example, reports of unnecessary damage or destruction of private property decreased from 13·6% (54 of 397; 95% CI 10·2-17·0) before training to 5·0% (21 of 421; 2·9-7·1) after training (percent difference -63·2%; pethics training positively influenced soldiers' understanding of how to interact with and treat non-combatants

  17. Weight Management Practices of Australian Olympic Combat Sport Athletes.

    Science.gov (United States)

    Reale, Reid; Slater, Gary; Burke, Louise M

    2017-09-05

    Combat sport athletes undertake chronic and rapid weight loss (RWL) practices to qualify for weight divisions lower than their training weight. Variation between sports in the prevalence, methods, and magnitude of weight loss as well as recovery practices may be influenced by factors including competition level and culture. Differences in methodologies of previous research in combat sports make direct comparisons difficult, thus this study aimed to examine weight loss practices among all Olympic combat sports in Australia, using standardised methodology. High calibre competitors in wrestling, boxing, judo and taekwondo (n=260) at Australian competitions were surveyed using a validated tool which provides quantification of how extreme an athlete's weight loss practices are; the RWL score (RWLS). Additional qualitative and quantitative survey data were also collected. Neither sport, sex or weight division group had an effect on RWLS however a significant effect of athlete calibre was detected [F (2,215) = 4.953, MSE = 4.757, p = 0.00792]. Differences between sports were also evident for: most weight ever lost in order to compete [H = 19.92, p = 0.0002), age at which weight cutting began (H = 16.34, p = 0.001) and selected methods/patterns of RWL (p < 0.001). Weight cycling between competitions was common among all sports as were influences on athlete's behaviours. While many similarities in weight loss practices and experiences exist between combat sports, specific differences were evident. Nuanced, context/culturally specific guidelines should be devised to assist fighters' in optimising performance while minimising health implications.

  18. Service-Oriented Architecture Afloat: A Capabilities-Based Prioritization Scheme

    Science.gov (United States)

    2013-04-01

    to “information superiority,” ultimately enhancing warfighting capability. Introduction The Program Executive Office for Command, Control...gateway architecture for IP satellite networks with dynamic resource mangement and DiffServ QoS provision. International Journal of Satellite

  19. A Simple Probabilistic Combat Model

    Science.gov (United States)

    2016-06-13

    Government may violate any copyrights that exist in this work. This page intentionally left blank. ABSTRACT The Lanchester ...page intentionally left blank. TABLE OF CONTENTS Page No.Abstract iii List of Illustrations vii 1. INTRODUCTION 1 2. DETERMINISTIC LANCHESTER MODEL...This page intentionally left blank. 1. INTRODUCTION The Lanchester combat model1 is a simple way to assess the effects of quantity and quality

  20. Characterizing Center of Mass and Moment of Inertia of Soldiers' Loads Packed for Combat

    National Research Council Canada - National Science Library

    Hasselquist, Leif; Bensel, Carolyn K; Norton, Karen; Piscitelle, Louis; Schiffman, Jeffrey M

    2004-01-01

    ...) location and moment of inertia (MOI) may be influenced in combat load packing. In addition, the physical properties of the combat loads were compared to the properties of a laboratory fabricated backpack...

  1. NET-2 Network Analysis Program

    International Nuclear Information System (INIS)

    Malmberg, A.F.

    1974-01-01

    The NET-2 Network Analysis Program is a general purpose digital computer program which solves the nonlinear time domain response and the linearized small signal frequency domain response of an arbitrary network of interconnected components. NET-2 is capable of handling a variety of components and has been applied to problems in several engineering fields, including electronic circuit design and analysis, missile flight simulation, control systems, heat flow, fluid flow, mechanical systems, structural dynamics, digital logic, communications network design, solid state device physics, fluidic systems, and nuclear vulnerability due to blast, thermal, gamma radiation, neutron damage, and EMP effects. Network components may be selected from a repertoire of built-in models or they may be constructed by the user through appropriate combinations of mathematical, empirical, and topological functions. Higher-level components may be defined by subnetworks composed of any combination of user-defined components and built-in models. The program provides a modeling capability to represent and intermix system components on many levels, e.g., from hole and electron spatial charge distributions in solid state devices through discrete and integrated electronic components to functional system blocks. NET-2 is capable of simultaneous computation in both the time and frequency domain, and has statistical and optimization capability. Network topology may be controlled as a function of the network solution. (U.S.)

  2. Strategic Misstep: ’Immortal’ Robotic Warfare, Inviting Combat to Suburban America

    Science.gov (United States)

    2010-03-01

    locations of those combatants.59 Predator “ Porn ” – Immoral, or Just “Freaking Cool” Air Force RPA combatant operators and those around them will likely...accessed February 4, 2010). Predator “feeds” have been renamed in military circles to Predator “ porn ”. For reference see Mockenhaupt, “We’ve Seen the

  3. Contributions of Women to U.S. Combat Operations

    National Research Council Canada - National Science Library

    Burnes, Thresa

    2008-01-01

    .... combat operations from the Revolutionary War to present-day conflicts. The U.S. military continues to fight a transnational, dispersed enemy that employs irregular tactics and asymmetric warfare...

  4. Combat veterans and the death penalty: a forensic neuropsychiatric perspective.

    Science.gov (United States)

    Wortzel, Hal S; Arciniegas, David B

    2010-01-01

    With our nation's present conflicts, a new generation of veterans are returning home, many of whom have substantial psychopathology and are encountering significant barriers in accessing care. Headlines from around the nation reflect that some of these wounded warriors go on to commit offenses that are potentially punishable by death. Existing circumstances speak to the urgency with which the subject of combat veterans with post-traumatic stress disorder (PTSD), traumatic brain injury (TBI), or both facing capital crimes ought to be addressed. This publicity has led to a recent call for a legislatively or judicially enacted, narrow, categorical exclusion for combat veterans who were affected by either PTSD or TBI at the time of their capital offenses. In the present article, we illustrate the reality that combat veterans who commit capital offenses may face execution, summarize legal arguments offered in favor of a categorical exclusion, and provide a neuropsychiatric perspective on PTSD, TBI, and aggression, to help inform further dialogue on this weighty subject.

  5. Systems Engineering Approach To Ground Combat Vehicle Survivability In Urban Operations

    Science.gov (United States)

    2016-09-01

    GROUND COMBAT VEHICLE SURVIVABILITY IN URBAN OPERATIONS 5. FUNDING NUMBERS N/A 6. AUTHOR(S) Luhai Wong 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS...distance of 100m in the model , which is reasonable due to the constrained nature of an urban environment. This thesis also uses the key parameters...ENGINEERING APPROACH TO GROUND COMBAT VEHICLE SURVIVABILITY IN URBAN OPERATIONS by Luhai Wong September 2016 Thesis Advisor: Christopher A

  6. Rebelle De Fatou Keita Ou le Combat Feminin Contre la Patriarchie ...

    African Journals Online (AJOL)

    Le combat féministe est un sujet d'actualité dans une Afrique toujours gouvernée par des systèmes phallocentriques qui emprisonnent la femme ou l'enterrent dans la misère. L'écriture, parmi d'autres moyens, est une arme par excellence utilisée dans le combat contre le système patriarcal. L'écrivaine féministe s'en sert ...

  7. Injuries associated with combat sports, active component, U.S. Armed Forces, 2010-2013.

    Science.gov (United States)

    2014-05-01

    The practice of combat sports creates a potential for training- and sports-related injuries among military members. During the 4-year surveillance period, there were 12,108 cases of injuries associated with combat sports among active component service members; the overall incidence rate was 21.0 per 10,000 person-years (p-yrs). The rates were higher among service members who were male, Hispanic, in the youngest age groups, in the Army, junior enlisted, and in combat-specific occupations. The rate among recruit/ trainees (779.4 per 10,000 p-yrs) was more than 165 times the rate among all other active component service members (non-recruits) (4.7 per 10,000 p-yrs). Sprains, strains, and contusions accounted for more than one-half of the primary (first-listed) diagnoses associated with combat sports cases. More serious conditions such as concussions/head injuries and skull/face fractures/intracranial injuries were reported among 3.9% and 2.1% of all cases and were more common among boxing-related cases. Hand/wrist fractures were also common among boxing cases. Wrestling had comparatively greater proportions of dislocations and open wounds. Although the combat sport training provides many physical and mental benefits to the individual, safety practices should be enforced to reduce the most frequent and serious injuries.

  8. On the Capability of Smartphones to Perform as Communication Gateways in Medical Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    María José Morón

    2014-01-01

    Full Text Available This paper evaluates and characterizes the technical performance of medicalwireless personal area networks (WPANs that are based on smartphones. For this purpose,a prototype of a health telemonitoring system is presented. The prototype incorporates acommercial Android smartphone, which acts as a relay point, or “gateway”, between a setof wireless medical sensors and a data server. Additionally, the paper investigates if theconventional capabilities of current commercial smartphones can be affected by their useas gateways or “Holters” in health monitoring applications. Specifically, the profiling hasfocused on the CPU and power consumption of the mobile devices. These metrics havebeen measured under several test conditions modifying the smartphone model, the type ofsensors connected to the WPAN, the employed Bluetooth profile (SPP (serial port profile orHDP (health device profile, the use of other peripherals, such as a GPS receiver, the impactof the use of theWi-Fi interface or the employed method to encode and forward the data thatare collected from the sensors.

  9. Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks

    Science.gov (United States)

    2015-11-01

    Gholamreza, and Ester, Martin. “Modeling the Temporal Dynamics of Social Rating Networks Using Bidirectional Effects of Social Relations and Rating...1.1.2 β-disruptor Problems Besides the homogeneous network model consisting of uniform nodes and bidirectional links, the heterogeneous network model... neural and metabolic networks .” Biological Cybernetics 90 (2004): 311–317. 10.1007/s00422-004-0479-1. URL http://dx.doi.org/10.1007/s00422-004-0479-1 [51

  10. Object-Oriented Modular Architecture for Ground Combat Simulation

    National Research Council Canada - National Science Library

    Luqi; Berzins, V; Shing, M; Saluto, M; Williams, J

    2000-01-01

    .... It describes the effective use of computer-aided prototyping techniques for re-engineering the legacy software to develop an object-oriented modular architecture for the Janus combat simulation system. Janus...

  11. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  12. Networking: the view from HEP

    Science.gov (United States)

    McKee, Shawn

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. National and global-scale collaborations that characterize HEP would not be feasible without ubiquitous capable networks. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. This paper will briefly discuss the history of networking in HEP, the current activities and challenges we are facing, and try to provide some understanding of where networking may be going in the next 5 to 10 years.

  13. Virtual Individual Combatant Trainer for Embedded Rehearsal (VICTER)

    National Research Council Canada - National Science Library

    Barham, Paul

    2002-01-01

    Report developed under SBIR contract. Reality by Design, Inc. (RBD) presents its Phase 2 Plus results of developing a modular, man-in-the-loop, embedded simulation system for Individual Combatant (IC...

  14. Combat exposure severity as a moderator of genetic and environmental liability to post-traumatic stress disorder.

    Science.gov (United States)

    Wolf, E J; Mitchell, K S; Koenen, K C; Miller, M W

    2014-05-01

    Twin studies of veterans and adults suggest that approximately 30-46% of the variance in post-traumatic stress disorder (PTSD) is attributable to genetic factors. The remaining variance is attributable to the non-shared environment, which, by definition, includes combat exposure. This study used a gene by measured environment twin design to determine whether the effects of genetic and environmental factors that contribute to the etiology of PTSD are dependent on the level of combat exposure. The sample was drawn from the Vietnam Era Twin Registry (VETR) and included 620 male-male twin pairs who served in the US Military in South East Asia during the Vietnam War era. Analyses were based on data from a clinical diagnostic interview of lifetime PTSD symptoms and a self-report measure of combat exposure. Biometric modeling revealed that the effects of genetic and non-shared environment factors on PTSD varied as a function of level of combat exposure such that the association between these factors and PTSD was stronger at higher levels of combat exposure. Combat exposure may act as a catalyst that augments the impact of hereditary and environmental contributions to PTSD. Individuals with the greatest exposure to combat trauma were at increased risk for PTSD as a function of both genetic and environmental factors. Additional work is needed to determine the biological and environmental mechanisms driving these associations.

  15. Neural indicators of interpersonal anger as cause and consequence of combat training stress symptoms.

    Science.gov (United States)

    Gilam, G; Lin, T; Fruchter, E; Hendler, T

    2017-07-01

    Angry outbursts are an important feature of various stress-related disorders, and commonly lead to aggression towards other people. Findings regarding interpersonal anger have linked the ventromedial prefrontal cortex (vmPFC) to anger regulation and the locus coeruleus (LC) to aggression. Both regions were previously associated with traumatic and chronic stress symptoms, yet it is unclear if their functionality represents a consequence of, or possibly also a cause for, stress symptoms. Here we investigated the relationship between the neural trajectory of these indicators of anger and the development and manifestation of stress symptoms. A total of 46 males (29 soldiers, 17 civilians) participated in a prospective functional magnetic resonance imaging experiment in which they played a modified interpersonal anger-provoking Ultimatum Game (UG) at two-points. Soldiers were tested at the beginning and end of combat training, while civilians were tested at the beginning and end of civil service. We assumed that combat training would induce chronic stress and result in increased stress symptoms. Soldiers showed an increase in stress symptoms following combat training while civilians showed no such change following civil service. All participants were angered by the modified UG irrespective of time point. Higher post-combat training stress symptoms were associated with lower pre-combat training vmPFC activation and with higher activation increase in the LC between pre- and post-combat training. Results suggest that during anger-provoking social interactions, flawed vmPFC functionality may serve as a causal risk factor for the development of stress symptoms, and heightened reactivity of the LC possibly reflects a consequence of stress-inducing combat training. These findings provide potential neural targets for therapeutic intervention and inoculation for stress-related psychopathological manifestations of anger.

  16. Regenerative medicine applications in combat casualty care.

    Science.gov (United States)

    Fleming, Mark E; Bharmal, Husain; Valerio, Ian

    2014-03-01

    The purpose of this report is to describe regenerative medicine applications in the management of complex injuries sustained by service members injured in support of the wars in Afghanistan and Iraq. Improvements in body armor, resuscitative techniques and faster transport have translated into increased patient survivability and more complex wounds. Combat-related blast injuries have resulted in multiple extremity injuries, significant tissue loss and amputations. Due to the limited availability and morbidity associated with autologous tissue donor sites, the introduction of regenerative medicine has been critical in managing war extremity injuries with composite massive tissue loss. Through case reports and clinical images, this report reviews the application of regenerative medicine modalities employed to manage combat-related injuries. It illustrates that the novel use of hybrid reconstructions combining traditional and regenerative medicine approaches are an effective tool in managing wounds. Lessons learned can be adapted to civilian care.

  17. [Psychiatric, Cognitive and Emotional Profile in Ex-combatants of Illegal Armed Groups in Colombia].

    Science.gov (United States)

    Tobón, Carlos; Aguirre-Acevedo, Daniel Camilo; Velilla, Lina; Duque, Jon; Ramos, Claudia Patricia; Pineda, David

    2016-01-01

    Exposure to armed conflict produces biological adaptations oriented to handle the highly stressful conditions in war environments. The special features of The Colombian armed create a special scenario to evaluate the human behavior. In this study, psychiatric, cognitive and emotional processing characteristics of a group of Colombian armed illegal forces of ex-combatants are described. Sixty-three ex combatants and 22 controls were assessed with WAIS (IQ), INECO frontal screening (executive functions), Interpersonal Reactivity Index (empathy), emotional features recognition and MINI (psychiatric profile). When compared to the control group, ex-combatants showed higher frequency of antisocial personality disorder (P=.031) and behavioral dissocial disorder (P=.017). In cognitive profile, the ex-combatants showed a lower score in the executive function test (Me=18.50; RQ=4.00), control (Me=23.00; RQ=5.25), with a poor personal distress in emphatic profile (Me=10.00; RQ=5.00) compared to control group (Me=37.00; RQ=7.25). We found differences in cognitive and psychiatric profile in ex-combatants in comparison with controls. Copyright © 2015 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  18. THE HARMONISATION OF LEGISLATION ON COMBATTING TAX EVASION IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    DANIELA IANCU

    2011-04-01

    Full Text Available Combating tax evasion is part of the Lisbon Strategy. Tax fraud created a significant distortion in the functioning of the internal market and prevented fair competition.In its resolution of 2th of September 2008 on a coordinated strategy to improve the fight against fiscal fraud (2008/2033 (INI the European Parliament stressed that the Member States cannot combat cross-border fraud in isolation and called on the Commission to propose mechanisms to promote cooperation between Member States.This paper aims to analyse the main mechanisms to combat the tax evasion at the European level and, also, the changes that our country had to make in the field of legislation in order to achieve the EU standard on the fight against tax evasion.

  19. Worldwide actions to combat abuse.

    Science.gov (United States)

    1998-01-01

    This paper reports several developments on the global efforts to combat abuse and violence against women and children. It is noted that in South Africa, Belem, Brazil, and Lesotho, protest actions were conducted against women and child abuse. Although the protests were made separately, the protests generally called for implementation of initiatives from the government to address the issue of child and women abuse. In the context of preventing abusive behaviors, a study by the University of Cape Town in South Africa on the appropriateness and feasibility of short-term community-based group therapy concluded that such an approach might be effective in treating delinquent behavior. In Indonesia, the Rifka Annisa Women's Crisis Centre is working to combat violence against women by providing services to victims; while in Israel, a media campaign is aiming to increase awareness and support for women's help centers. In addition, the government of Bangladesh has established a Cell Against Violence Against Women that provides legal counseling and assistance for civil and criminal cases related to violence against women. Furthermore, the WHO and the International Federation of Obstetricians and Gynecologists have collaborated to conduct a joint workshop to explore how violence against women can be eliminated.

  20. Arctic Observing Network Data Management: Current Capabilities and Their Promise for the Future

    Science.gov (United States)

    Collins, J.; Fetterer, F.; Moore, J. A.

    2008-12-01

    CADIS (the Cooperative Arctic Data and Information Service) serves as the data management, discovery and delivery component of the Arctic Observing Network (AON). As an International Polar Year (IPY) initiative, AON comprises 34 land, atmosphere and ocean observation sites, and will acquire much of the data coming from the interagency Study of Environmental Arctic Change (SEARCH). CADIS is tasked with ensuring that these observational data are managed for long term use by members of the entire Earth System Science community. Portions of CADIS are either in use by the community or available for testing. We now have an opportunity to evaluate the feedback received from our users, to identify any design shortcomings, and to identify those elements which serve their purpose well and will support future development. This presentation will focus on the nuts-and-bolts of the CADIS development to date, with an eye towards presenting lessons learned and best practices based on our experiences so far. The topics include: - How did we assess our users' needs, and how are those contributions reflected in the end product and its capabilities? - Why did we develop a CADIS metadata profile, and how does it allow CADIS to support preservation and scientific interoperability? - How can we shield the user from metadata complexities (especially those associated with various standards) while still obtaining the metadata needed to support an effective data management system? - How can we bridge the gap between the data storage formats considered convenient by researchers in the field, and those which are necessary to provide data interoperability? - What challenges have been encountered in our efforts to provide access to federated data (data stored outside of the CADIS system)? - What are the data browsing and visualization needs of the AON community, and which tools and technologies are most promising in terms of supporting those needs? A live demonstration of the current

  1. Effects of external stores on the air combat capability of a delta wing fighter

    Science.gov (United States)

    Spearman, M. L.; Sawyer, W. C.

    1977-01-01

    Delta wing point-design fighters with two pylon mounted missiles and aft tail controls (similar to several Soviet designs) have been investigated for a Mach number range from about 0.6 to 2.0. Whereas minimum drag penalties that are expected with the addition of external stores do occur, the effects at higher lifts, corresponding to maneuvering flight, are less severe and often favorable. The drag-due-to-lift factor is less with stores on although the lift curve slope is unaffected. The longitudinal stability level is reduced by the addition of stores while the pitch control effectiveness is unchanged. The directional stability was generally reduced at subsonic speeds and increased at supersonic speeds by the addition of stores but sufficiently high stability levels are obtainable that are compatible with the longitudinal maneuvering limits. Some examples of the potential maneuvering capability in terms of normal acceleration and turn radius are included.

  2. Former Military Networks a Threat to Peace? The Demobilisation and Remobilization of Renamo in Central Mozambique

    Directory of Open Access Journals (Sweden)

    Nikkie Wiegink

    2015-11-01

    Full Text Available Renamo’s recent upsurge against the Mozambican Frelimo-led government after 22 years of relative stability has challenged the country’s often celebrated disarmament, demobilization and reintegration process (1992 to 1994. Drawing on ethnographic fieldwork conducted in Maringue (Sofala province, the location of the rebels’ wartime headquarters and a post-war Renamo stronghold, this paper shows that while the DDR program supposedly ended Renamo’s command and control structure, the former rebel network continued to be a central feature of ex-combatants’ social worlds. Former Renamo combatants spend most of their time in the company of their ‘colleagues of the trenches’ and engaged in relationships of dependency with political Renamo leaders and former commanders. These relationships were not only shaped by the former military structure, but also by friendship, marriage, and patronage dynamics, providing ex-Renamo combatants with physical and economic safety, a sense of belonging and economic possibilities. Recent events in Mozambique suggest that the post-conflict continuation of informal wartime networks is a threat to peace and a failure of demobilization. Nevertheless, the fieldwork conducted in Maringue reveals that the dismantling of the command and control structure is often in vain, as it may be worthwhile for ex-combatants to maintain ties with their former military group for various reasons. Therefore, I argue that it may be useful to consider these networks based on the former armed group in processes of violence reduction, also in the development of DDR programs, as these may offer possibilities for the re-positioning and transformation of (former armed actors.

  3. Leveraging the Methodological Affordances of Facebook: Social Networking Strategies in Longitudinal Writing Research

    Science.gov (United States)

    Sheffield, Jenna Pack; Kimme Hea, Amy C.

    2016-01-01

    While composition studies researchers have examined the ways social media are impacting our lives inside and outside of the classroom, less attention has been given to the ways in which social media--specifically Social Network Sites (SNSs)--may enhance our own research methods and methodologies by helping to combat research participant attrition…

  4. Assessment of Psychophysiological Response and Specific Fine Motor Skills in Combat Units.

    Science.gov (United States)

    Sánchez-Molina, Joaquín; Robles-Pérez, José J; Clemente-Suárez, Vicente J

    2018-03-02

    Soldiers´ training and experience can influence the outcome of the missions, as well as their own physical integrity. The objective of this research was to analyze the psycho-physiological response and specific motor skills in an urban combat simulation with two units of infantry with different training and experience. psychophysiological parameters -Heart Rate, blood oxygen saturation, glucose and blood lactate, cortical activation, anxiety and heart rate variability-, as well as fine motor skills were analyzed in 31 male soldiers of the Spanish Army, 19 belonging to the Light Infantry Brigade, and 12 to the Heavy Forces Infantry Brigade, before and after an urban combat simulation. A combat simulation provokes an alteration of the psycho-physiological basal state in soldiers and a great unbalance in the sympathetic-vagal interaction. The specific training of Light Infantry unit involves lower metabolic, cardiovascular, and anxiogenic response not only previous, but mainly after a combat maneuver, than Heavy Infantry unit's. No differences were found in relation with fine motor skills, improving in both cases after the maneuver. This fact should be taken into account for betterment units´ deployment preparation in current theaters of operations.

  5. Environmental management in the Dutch food and beverage industry : a longitudinal study into the joint impact of business network and firm characteristics on the adoption of environmental management capabilities

    NARCIS (Netherlands)

    Haverkamp, D.J.

    2007-01-01

    The present study aims for a deeper understanding of the internal and external factors, such as firm strategy and pressure from the business network (government, buyers, suppliers, local inhabitants, etc.), that have an impact on the adoption of environmental management capabilities in firms in the

  6. Legitimacy, capability, effectiveness and the future of the NPT

    International Nuclear Information System (INIS)

    Keeley, J.F.

    1987-01-01

    This chapter looks at the relationship between legitimacy and capability in conceptually and politically contestable regions. This issue was highlighted by India's nuclear test of May 1974 and the Osiraq raid of 1981. These illustrated the general problem of the threat to the coherence and legitimacy of the non-proliferation regime. This threat arose from the spread of nuclear technological capabilities. Two developments in the non-proliferation regime that have helped produce the more specific problems of that regime are discussed. These are the spread of nuclear technological capabilities and the development of complex co-operation networks. The prospects for the modification of the NPT in response to these challenges are considered finally. (U.K.)

  7. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  8. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  9. Network-Centric Environment: A Modular Modeling and Simulation/Synthetic Environment (M&S/SE) framework

    Science.gov (United States)

    2004-11-01

    military effectiveness, history provides us the answer: In “ Megatrends ”, John Naisbitt, writes about technology itself without knowing that a...Control Simulations; viii. Urban Planning; ix. Urban Combat; x. Chemical Biological Radiological, and Nuclear (CBRN) Evaluations; xi. Military...Capability Management. DRDC Ottawa TM 2004-221 83 References 1. Naisbitt, J. Megatrends . Warner Books, 290 pages, 1982. 2

  10. Guilt is more strongly associated with suicidal ideation among military personnel with direct combat exposure.

    Science.gov (United States)

    Bryan, Craig J; Ray-Sannerud, Bobbie; Morrow, Chad E; Etienne, Neysa

    2013-05-15

    Suicide rates in the U.S. military have been rising rapidly in the past decade. Research suggests guilt is a significant predictor of suicidal ideation among military personnel, and may be especially pronounced among those who have been exposure to combat-related traumas. The current study explored the interactive effect of direct combat exposure and guilt on suicidal ideation in a clinical sample of military personnel. Ninety-seven active duty U.S. Air Force personnel receiving outpatient mental health treatment at two military clinics completed self-report symptom measures of guilt, depression, hopelessness, perceived burdensomeness, posttraumatic stress disorder, and suicidal ideation. Generalized multiple regression analyses indicated a significant interaction of guilt and direct combat exposure (B=.124, SE=.053, p=.020), suggesting a stronger relationship of guilt with suicidal ideation among participants who had direct combat exposure as compared to those who had not. The interactions of direct combat exposure with depression (B=.004, SE=.040, p=.926), PTSD symptoms (B=.016, SE=.018, p=.382), perceived burdensomeness (B=.159, SE=.152, p=.300) and hopelessness (B=.069, SE=.036, p=.057) were nonsignificant. Although guilt is associated with more severe suicidal ideation in general among military personnel, it is especially pronounced among those who have had direct combat exposure. Copyright © 2013 Elsevier B.V. All rights reserved.

  11. Cooperative Learning for Distributed In-Network Traffic Classification

    Science.gov (United States)

    Joseph, S. B.; Loo, H. R.; Ismail, I.; Andromeda, T.; Marsono, M. N.

    2017-04-01

    Inspired by the concept of autonomic distributed/decentralized network management schemes, we consider the issue of information exchange among distributed network nodes to network performance and promote scalability for in-network monitoring. In this paper, we propose a cooperative learning algorithm for propagation and synchronization of network information among autonomic distributed network nodes for online traffic classification. The results show that network nodes with sharing capability perform better with a higher average accuracy of 89.21% (sharing data) and 88.37% (sharing clusters) compared to 88.06% for nodes without cooperative learning capability. The overall performance indicates that cooperative learning is promising for distributed in-network traffic classification.

  12. Immune networks: multitasking capabilities near saturation

    International Nuclear Information System (INIS)

    Agliari, E; Annibale, A; Barra, A; Coolen, A C C; Tantari, D

    2013-01-01

    Pattern-diluted associative networks were recently introduced as models for the immune system, with nodes representing T-lymphocytes and stored patterns representing signalling protocols between T- and B-lymphocytes. It was shown earlier that in the regime of extreme pattern dilution, a system with N T T-lymphocytes can manage a number N B =O(N T δ ) of B-lymphocytes simultaneously, with δ B = αN T , with a high degree of pattern dilution, in agreement with immunological findings. We use graph theory and statistical mechanical analysis based on replica methods to show that in the finite-connectivity regime, where each T-lymphocyte interacts with a finite number of B-lymphocytes as N T → ∞, the T-lymphocytes can coordinate effective immune responses to an extensive number of distinct antigen invasions in parallel. As α increases, the system eventually undergoes a second order transition to a phase with clonal cross-talk interference, where the system’s performance degrades gracefully. Mathematically, the model is equivalent to a spin system on a finitely connected graph with many short loops, so one would expect the available analytical methods, which all assume locally tree-like graphs, to fail. Yet it turns out to be solvable. Our results are supported by numerical simulations. (paper)

  13. BBN technical memorandum W1310 hydroacoustic network capability studies

    Energy Technology Data Exchange (ETDEWEB)

    Angell, J., LLNL

    1997-12-01

    This report summarizes work performed under contract to Lawrence Livermore National Laboratory during the period 1 August to 30 November 1997. Four separate tasks were undertaken during this period which investigated various aspects of hydroacoustic network performance using the Hydroacoustic Coverage Assessment Model (HydroCAM). The purpose of this report is to document each of these tasks.

  14. Mobile wireless network for the urban environment

    Science.gov (United States)

    Budulas, Peter; Luu, Brian; Gopaul, Richard

    2005-05-01

    As the Army transforms into the Future Force, particular attention must be paid to operations in Complex and Urban Terrain. Our adversaries increasingly draw us into operations in the urban environment and one can presume that this trend will continue in future battles. In order to ensure that the United States Army maintains battlefield dominance, the Army Research Laboratory (ARL) is developing technology to equip our soldiers for the urban operations of the future. Sophisticated soldier borne systems will extend sensing to the individual soldier, and correspondingly, allow the soldier to establish an accurate picture of their surrounding environment utilizing information from local and remote assets. Robotic platforms will be an integral part of the future combat team. These platforms will augment the team with remote sensing modalities, task execution capabilities, and enhanced communication systems. To effectively utilize the products provided by each of these systems, collected data must be exchanged in real time to all affected entities. Therefore, the Army Research Laboratory is also developing the technology that will be required to support high bandwidth mobile communication in urban environments. This technology incorporates robotic systems that will allow connectivity in areas unreachable by traditional systems. This paper will address some of the issues of providing wireless connectivity in complex and urban terrain. It will further discuss approaches developed by the Army Research Laboratory to integrate communications capabilities into soldier and robotic systems and provide seamless connectivity between the elements of a combat team, and higher echelons.

  15. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  16. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  17. Estratégias utilizadas no combate a resistência bacteriana Recent achievements to combat bacterial resistance

    OpenAIRE

    Gustavo Pozza Silveira; Faruk Nome; José Carlos Gesser; Marcus Mandolesi Sá; Hernán Terenzi

    2006-01-01

    This article provides an overview on the recent achievements to combat Gram-positive bacteria and the mechanisms related to antimicrobial activity and bacterial resistance. Selected synthetic methodologies to access structurally diverse bioactive compounds are presented in order to emphasize the most important substances currently developed to overcome multiresistant strains. The main properties of vancomycin and related glycopeptide antibiotics are also discussed as a background to understan...

  18. New Equipping Strategies for Combat Support Hospitals

    Science.gov (United States)

    2010-01-01

    Combat and Doctrine Development and COL Timothy Lamb , supported by MAJ Gary Cooper, included members of our team in visits to Sierra Army Depot and...aspect of improving materiel stew - ardship is improving the quality of data related to the procurement, maintenance, and upgrading of equipment

  19. On shelterbelt design for combating sand invasion.

    NARCIS (Netherlands)

    Mohammed, A.E.; Stigter, C.J.; Adam, H.S.

    1996-01-01

    After a review of the scarce literature on using trees against sand encroachment, a quantitative experiment with a wide shelterbelt to combat sand invasion is reported on. Experimental work was carried out at the northwestern border of the Gezira Scheme (Sudan), an area of severe land degradation

  20. Unintended Relevance: The Role of the Stryker Brigade Combat Team in the Decisive Action Environment

    Science.gov (United States)

    2017-05-25

    its_time_to_create_a_megacities_combat_unit_110717.html. 47 Steve Krippel and Chris Ricci, “The Stryker Brigade Combat Team: America’s Early Entry Force,” Infantry, July...vehicles to transport the large amounts of equipment to do their job , which is to fight dismounted in complex terrain. Light infantry is necessary...2015_National_Military_Strategy.pdf. Krippel, Steve , and Chris Ricci. “The Stryker Brigade Combat Team: America’s Early Entry Force.” Infantry, July-September 2014

  1. Patch models and their applications to multivehicle command and control.

    Science.gov (United States)

    Rao, Venkatesh G; D'Andrea, Raffaello

    2007-06-01

    We introduce patch models, a computational modeling formalism for multivehicle combat domains, based on spatiotemporal abstraction methods developed in the computer science community. The framework yields models that are expressive enough to accommodate nontrivial controlled vehicle dynamics while being within the representational capabilities of common artificial intelligence techniques used in the construction of autonomous systems. The framework allows several key design requirements of next-generation network-centric command and control systems, such as maintenance of shared situation awareness, to be achieved. Major features include support for multiple situation models at each decision node and rapid mission plan adaptation. We describe the formal specification of patch models and our prototype implementation, i.e., Patchworks. The capabilities of patch models are validated through a combat mission simulation in Patchworks, which involves two defending teams protecting a camp from an enemy attacking team.

  2. Roles of scholars in the practice of combating-desertification: a case study in northwest China.

    Science.gov (United States)

    Yang, Lihua; Lan, Zhiyong; Wu, Jianguo

    2010-08-01

    This study investigated the perceived importance of scholars' participation in combating-desertification programs in northwest China and analyzed the underlying factors and mechanisms. Our results show that, while various experts, professors, and researchers have participated in combating-desertification programs, their actions were often not effective. Only those scholars who understood the local situations adequately had important and positive impacts. These scholars served as information brokers between the governments and other stakeholders, entrepreneurial activity organizers for farmers, governmental representatives, or advocators for local affairs themselves. They played indispensible roles in facilitating efforts in combating desertification. The study also identified key factors that led to the success of scholars' participation in combating-desertification activities. Our findings have practical implications for improving the effectiveness of scholars' participation in land restoration and environmental management.

  3. Training Strategies to Mitigate Expectancy-Induced Response Bias in Combat Identification: A Research Agenda

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Andrews, Dee H.

    2008-04-15

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, continuous operations or sleep deprivation, poor situational awareness, emotions, and lack of training. This paper discusses what and how improvements in combat identification (CID) may be achieved through training. In addition to skill-based training, CID training must focus on countering the negative effects of expectancy in the face of heightened anxiety and stressors of continuous operations that lead to combat errors or fratricide. The paper examines possible approaches to training for overcoming erroneous expectancies and emotional factors that may distort or limit accurate "blue force" identification.

  4. Training Strategies to Mitigate Expectancy-Induced Response Bias in Combat Identification: A Research Agenda

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Andrews, Dee H.

    2009-12-01

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, continuous operations or sleep deprivation, poor situational awareness, emotions, and lack of training. This paper discusses what and how improvements in combat identification (CID) may be achieved through training. In addition to skill-based training, CID training must focus on countering the negative effects of expectancy in the face of heightened anxiety and stressors of continuous operations that lead to combat errors or fratricide. The paper examines possible approaches to training for overcoming erroneous expectancies and emotional factors that may distort or limit accurate "blue force" identification.

  5. Quantum network theory

    International Nuclear Information System (INIS)

    Yurke, B.; Denker, J.S.

    1984-01-01

    A general approach, within the framework of canonical quantization, is described for analyzing the quantum behavior of complicated electronic circuits. This approach is capable of dealing with electrical networks having nonlinear or dissipative elements. The techniques are used to analyze a degenerate parametric amplifier, a device capable of generating squeezed coherent state signals. A circuit capable of performing back-action-evading electrical measurements is also discussed. (author)

  6. Global Monitoring of the CTBT: Progress, Capabilities and Plans (Invited)

    Science.gov (United States)

    Zerbo, L.

    2013-12-01

    The Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO), established in 1996, is tasked with building up the verification regime of the CTBT. The regime includes a global system for monitoring the earth, the oceans and the atmosphere for nuclear tests, and an on-site inspection (OSI) capability. More than 80% of the 337 facilities of the International Monitoring System (IMS) have been installed and are sending data to the International Data Centre (IDC) in Vienna, Austria for processing. These IMS data along with IDC processed and reviewed products are available to all States that have signed the Treaty. Concurrent with the build-up of the global monitoring networks, near-field geophysical methods are being developed and tested for OSIs. The monitoring system is currently operating in a provisional mode, as the Treaty has not yet entered into force. Progress in installing and operating the IMS and the IDC and in building up an OSI capability will be described. The capabilities of the monitoring networks have progressively improved as stations are added to the IMS and IDC processing techniques refined. Detection thresholds for seismic, hydroacoustic, infrasound and radionuclide events have been measured and in general are equal to or lower than the predictions used during the Treaty negotiations. The measurements have led to improved models and tools that allow more accurate predictions of future capabilities and network performance under any configuration. Unplanned tests of the monitoring network occurred when the DPRK announced nuclear tests in 2006, 2009, and 2013. All three tests were well above the detection threshold and easily detected and located by the seismic monitoring network. In addition, noble gas consistent with the nuclear tests in 2006 and 2013 (according to atmospheric transport models) was detected by stations in the network. On-site inspections of these tests were not conducted as the Treaty has not entered

  7. Marksmanship Requirements from the Perspective of Combat Veterans - Volume 2: Summary Report

    Science.gov (United States)

    2016-02-01

    M. McInroy who provided input to the questionnaire and insured that the Army’s Centers of Excellence were aware of the importance of their students ...combat gear Qualify with weapon in combat gear Hit targets at night using aiming lights & night vision goggles Hit targets at night with thermal ...conditions, the junior and some of the senior enlisted were not comfortable under these conditions making it unsatisfactory. 10 Engineer. Different

  8. Glasgow Coma Scores, Early Opioids, and Posttraumatic Stress Disorder Among Combat Amputees

    Science.gov (United States)

    2014-04-01

    extracted from in- theater patient encounter forms by Expeditionary Medical En- counter Database trauma nurses . GCS scores of 3 to 12 in- dicate moderate to...that may negatively impact hemodynamics (Fox et al., 1995). Combat-trauma anes- thesiologists are advised to minimize these side effects when managing...the most seriously injured and/or hemodynamically unstable patients. The present findings are consistent with this principle of combat casualty care by

  9. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  10. Conforming and nonconforming personality and stress coping styles in combat athletes

    Directory of Open Access Journals (Sweden)

    Bernacka Ryszarda Ewa

    2016-06-01

    Full Text Available The main objective of this study was to investigate whether the personality dimension of conformism/nonconformism was a predictor of stress coping styles in athletes training combat sports, and to present the characteristics of this personality dimension in the context of the competitors’ adaptive/innovative sport performance. Scores of 346 males practising combat sports such as kick boxing, MMA, thai boxing, boxing and wrestling were analyzed. The participants completed the Creative Behaviour Questionnaire (KANH III measuring the conformity/nonconformity personality dimension and the Coping Inventory for Stressful Situations (CISS measuring stress coping styles. The comparative analyses were conducted only for the groups of conformists and nonconformists. Differences in stress coping styles between conformists and nonconformists training combat sports were found as nonconformists tended to prefer the task-oriented coping style. Conclusively, a higher rate of nonconformity was associated with increasingly frequent occurrence of task-oriented coping and decreasingly frequent emotion-oriented coping.

  11. Combatives for Alienated Youth: Problems and Prospects.

    Science.gov (United States)

    Hellison, Don

    Combative activities (boxing, wrestling, kung fu, etc.) are seen as having a positive influence on alienated inner city youth. Potential contributions of such activities in a school curriculum or recreation program include involvement, security, self-concept, and self-realization. Participants may be able to free themselves from such stereotype…

  12. Review of Rateless-Network-Coding-Based Packet Protection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    A. S. Abdullah

    2015-01-01

    Full Text Available In recent times, there have been many developments in wireless sensor network (WSN technologies using coding theory. Fast and efficient protection schemes for data transfer over the WSN are some of the issues in coding theory. This paper reviews the issues related to the application of the joint rateless-network coding (RNC within the WSN in the context of packet protection. The RNC is a method in which any node in the network is allowed to encode and decode the transmitted data in order to construct a robust network, improve network throughput, and decrease delays. To the best of our knowledge, there has been no comprehensive discussion about RNC. To begin with, this paper briefly describes the concept of packet protection using network coding and rateless codes. We therefore discuss the applications of RNC for improving the capability of packet protection. Several works related to this issue are discussed. Finally, the paper concludes that the RNC-based packet protection scheme is able to improve the packet reception rate and suggests future studies to enhance the capability of RNC protection.

  13. Analysis of Traffic Engineering capabilities for SDN-based Data Center Networks

    DEFF Research Database (Denmark)

    Pilimon, Artur; Kentis, Angelos Mimidis; Ruepp, Sarah Renée

    2018-01-01

    In the recent years more and more existing services have moved from local execution environments into the cloud. In addition, new cloud-based services are emerging, which are characterized by very stringent delay requirements. This trend puts a stress in the existing monolithic architecture of Data...... techniques focusing on their limitations. Then, it highlights the benefits of incorporating the Software Defined Networking (SDN) paradigm to address these limitations. Furthermore, it illustrates two methodologies and addresses the scalability aspect of DCN-oriented TE, network and service testing...

  14. Prevalence and patterns of combat sport related maxillofacial injuries.

    Science.gov (United States)

    Shirani, Gholamreza; Kalantar Motamedi, Mohammad Hosein; Ashuri, Alireza; Eshkevari, Pooyan Sadr

    2010-10-01

    This study was designed to assess the prevalence, distribution, and patterns of injury among athletes engaged in combat sports and compare the prevalence, pattern, and types of oral and maxillofacial trauma in these athletes. A total of 120 male athletes engaged in four combat sports (boxing, taekwondo, kickboxing, and Muay Thai) who had sustained bodily trauma were studied; 95 subjects with at least one traumatic injury to the face requiring treatment were referred to us by the physician team. The type of injury (facial laceration, facial fractures, jaw dislocation, etc.), site of facial injury (jaw, nose, malar bone, teeth, etc.), dental injuries (tooth fracture, displacement, luxation, and avulsion), causative sport (boxing, taekwondo, kickboxing, and Muay Thai) as well as demographic data were recorded. Injuries were examined clinically and radiographically, and treated accordingly by a specialist. Treatment data and demographics were recorded for each subject. Recorded data were assessed, and χ(2), ANOVA, and Kruskal-Wallis tests were used to statistically analyze and compare the data. Of 120 subjects, 95 male subjects (79.2%), aged 18-25 years (avg. 20 years), had at least one traumatic injury to the face requiring medical treatment. These injuries included facial laceration, bone fractures (nose, mandible, and zygoma), dental injuries (displacement, luxation, fracture, and avulsion), and mandibular dislocation which were recorded in 83 (69.2%), 55 (45.1%), 53 (44.2%), and 8 (6.7%) cases respectively. Statistically significant differences were encountered among various injuries and the sports; kickboxing caused the most maxillofacial injuries and was identified as more injurious. Tooth fractures (59.7%) were the most common dental injuries, and the nose (84.7%) was the most frequently fractured facial bone. Lacerations were more common in Thai-boxers (93.3%). Injuries were significantly greater in professional rather than amateur athletes. In this study

  15. Prevalence and patterns of combat sport related maxillofacial injuries

    Directory of Open Access Journals (Sweden)

    Shirani Gholamreza

    2010-01-01

    Full Text Available Aim: This study was designed to assess the prevalence, distribution, and patterns of injury among athletes engaged in combat sports and compare the prevalence, pattern, and types of oral and maxillofacial trauma in these athletes. Materials and Methods: A total of 120 male athletes engaged in four combat sports (boxing, taekwondo, kickboxing, and Muay Thai who had sustained bodily trauma were studied; 95 subjects with at least one traumatic injury to the face requiring treatment were referred to us by the physician team. The type of injury (facial laceration, facial fractures, jaw dislocation, etc., site of facial injury (jaw, nose, malar bone, teeth, etc., dental injuries (tooth fracture, displacement, luxation, and avulsion, causative sport (boxing, taekwondo, kickboxing, and Muay Thai as well as demographic data were recorded. Injuries were examined clinically and radiographically, and treated accordingly by a specialist. Treatment data and demographics were recorded for each subject. Recorded data were assessed, and c2 , ANOVA, and Kruskal-Wallis tests were used to statistically analyze and compare the data. Results: Of 120 subjects, 95 male subjects (79.2%, aged 18-25 years (avg. 20 years, had at least one traumatic injury to the face requiring medical treatment. These injuries included facial laceration, bone fractures (nose, mandible, and zygoma, dental injuries (displacement, luxation, fracture, and avulsion, and mandibular dislocation which were recorded in 83 (69.2%, 55 (45.1%, 53 (44.2%, and 8 (6.7% cases respectively. Statistically significant differences were encountered among various injuries and the sports; kickboxing caused the most maxillofacial injuries and was identified as more injurious. Tooth fractures (59.7% were the most common dental injuries, and the nose (84.7% was the most frequently fractured facial bone. Lacerations were more common in Thai-boxers (93.3%. Injuries were significantly greater in professional rather

  16. Disruption of bradycardia associated with discriminative conditioning in combat veterans with PTSD

    Directory of Open Access Journals (Sweden)

    Jay P Ginsberg

    2008-06-01

    Full Text Available Jay P Ginsberg1,2, Edwin Ayers3, Louisa Burriss1, Donald A Powell1,41Shirley L. Buchanan Neuroscience Laboratory, Dorn VA Medical Center, Columbia, SC, USA; 2Department of Pharmacology, Physiology, and Neuroscience, School of Medicine, 4Department of Psychology, University of South Carolina, Columbia, SC, USA; 3Department of Psychology, South Carolina State University, Orangeburg, SC, USAAbstract: The effects of combat-related posttraumatic stress disorder (PTSD on heart rate (HR responding associated with a discriminative delay eyeblink (EB conditioning paradigm are reported. Combat PTSD+, Combat PTSD−, and Noncombat PTSD− veterans were assessed with psychometric self-report measures, and baseline heart rate variability (HRV was measured before receiving a 72-trial session of discriminative EB classical conditioning. Two types (red or green light of conditioned stimuli (CS were used: one (CS+ predicted a tone, followed immediately by an aversive stimulus (corneal airpuff; the other (CS− predicted a tone alone, not followed by the airpuff. The light signal was presented for 5 seconds, during which HR was measured. On all psychometric measures, the PTSD+ subgroup was significantly different from the PTSD− subgroups (Combat + Noncombat, and the PTSD− subgroups did not significantly differ from each other. A linear deceleration in HR to CS+ and CS− signals was found in the combined PTSD− subgroup and on CS− trials in the PTSD+ subgroup, but was not present on CS+ trials in the PTSD+ subgroup. Results are interpreted with respect to a behavioral stages model of conditioned bradycardia and in terms of neural substrates which are both critical to HR conditioning and known to be abnormal in PTSD.Keywords: bradycardia, PTSD, combat veterans, classical conditioning

  17. Screening for Posttraumatic Stress Disorder among Somali ex-combatants: A validation study

    Directory of Open Access Journals (Sweden)

    Rockstroh Brigitte

    2007-09-01

    Full Text Available Abstract Background In Somalia, a large number of active and former combatants are affected by psychological problems such as Posttraumatic Stress Disorder (PTSD. This disorder impairs their ability to re-integrate into civilian life. However, many screening instruments for Posttraumatic Stress Disorder used in post-conflict settings have limited validity. Here we report on development and validation of a screening tool for PTSD in Somali language with a sample of ex-combatants. Methods We adapted the Posttraumatic Diagnostic Scale (PDS to reflect linguistic and cultural differences within the Somali community so that local interviewers could be trained to administer the scale. For validation purposes, a randomly selected group of 135 Somali ex-combatants was screened by trained local interviewers; 64 of them were then re-assessed by trained clinical psychologists using the Composite International Diagnostic Interview (CIDI and the Self-Report Questionnaire (SRQ-20. Results The screening instrument showed good internal consistency (Cronbach's α = .86, convergent validity with the CIDI (sensitivity = .90; specificity = .90 as well as concurrent validity: positive cases showed higher SRQ-20 scores, higher prevalence of psychotic symptoms, and higher levels of intake of the local stimulant drug khat. Compared to a single cut-off score, the multi-criteria scoring, in keeping with the DSM-IV, produced more diagnostic specificity. Conclusion The results provide evidence that our screening instrument is a reliable and valid method to detect PTSD among Somali ex-combatants. A future Disarmament, Demobilization and Reintegration Program in Somalia is recommended to screen for PTSD in order to identify ex-combatants with special psycho-social needs.

  18. The role of Europol in the field of combating the illicit trafficking of nuclear material and radioactive substances

    International Nuclear Information System (INIS)

    Gridling, P.

    2002-01-01

    Full text: The paper contains a short general presentation of Europol and of its links to the various agencies dealing with combating the illicit trafficking of radioactive substances, inside and outside the European Union. The main difficulties we have to face in this mission are from various origins. The collection of intelligence, from both law-enforcement and scientific sides, seems to be the most efficient way to detect smuggling networks. The necessary co-operation between these two communities is a challenge for both parties, but its beginnings are encouraging. However, multiple constraints still remain that hamper the process. Europol commits itself to bridging the gap between police or intelligence agencies and the nuclear scientific community, and plans to increase its involvement in the near future, by organizing training sessions for law enforcement personnel in co-operation with our partners. Europol is also busy with producing threat assessments and possible scenarios of terrorist attacks, which also show that, in a general manner, the collection of intelligence on the criminal groups or individuals, modus operandi, or smuggling routes is a much more efficient way of prevention than the on-site physical protection, even if this latter method is indispensable. But, if despite preventive actions, a terrorist attack using mass destruction weapons actually occurs, its effects would be lessened by an appropriate reaction of the concerned authorities. That is why our organization is also involved in a process of awareness of our Member States, as only a few of them have set up a response capability in this domain. (author)

  19. The role of Europol in the field of combating the illicit trafficking of nuclear materials and radioactive substances

    International Nuclear Information System (INIS)

    Gridling, P.

    2002-01-01

    Full text: The paper contains a short general presentation of Europol and of its links to the various agencies dealing with combating the illicit trafficking of radioactive substances, inside and outside the European Union. The main difficulties we have to face in this mission are from various origins. The collection of intelligence, from both law-enforcement and scientific sides, seems to be the most efficient way to detect smuggling networks. The necessary co-operation between these two communities is a challenge for both parties, but its beginnings are encouraging. However, multiple constraints still remain that hamper the process. Europol commits itself to bridging the gap between police or intelligence agencies and the nuclear scientific community, and plans to increase its involvement in the near future, by organizing training sessions for law-enforcement personnel in co-operation with our partners. Europol is also busy with producing threat assessments and possible scenarios of terrorist attacks, which also show that, in a general manner, the collection of intelligence on the criminal groups or individuals, modus operandi, or smuggling routes is a much more efficient way of prevention than the on-site physical protection, even if this latter method is indispensable. But, if despite preventive actions, a terrorist attack using mass destruction weapons actually occurs, its effects would be lessened by an appropriate reaction of the concerned authorities. That is why our organization is also involved in a process of awareness of our member states, as only a few of them have set up a response capability in this domain. (author)

  20. Mining biological networks from full-text articles.

    Science.gov (United States)

    Czarnecki, Jan; Shepherd, Adrian J

    2014-01-01

    The study of biological networks is playing an increasingly important role in the life sciences. Many different kinds of biological system can be modelled as networks; perhaps the most important examples are protein-protein interaction (PPI) networks, metabolic pathways, gene regulatory networks, and signalling networks. Although much useful information is easily accessible in publicly databases, a lot of extra relevant data lies scattered in numerous published papers. Hence there is a pressing need for automated text-mining methods capable of extracting such information from full-text articles. Here we present practical guidelines for constructing a text-mining pipeline from existing code and software components capable of extracting PPI networks from full-text articles. This approach can be adapted to tackle other types of biological network.

  1. Role of Occupational Therapy in Combating Human Trafficking.

    Science.gov (United States)

    Gorman, Kathleen W; Hatkevich, Beth Ann

    Human trafficking is a modern-day form of slavery that includes sex trafficking, labor trafficking, and trafficking of children. It is estimated that 35.8 million people are enslaved around the world. Because of the traumatic experiences that victims of human trafficking encounter, the needs of victims are extensive and require the services of several providers, including health care providers, for victims to transform into survivors and thrivers. Currently, the role of occupational therapy is minimal and unexplored. The profession of occupational therapy has the capacity of having a profound role in both providing client-centered care services to victims and survivors of human trafficking and partaking in preventive advocacy efforts to combat human trafficking. Further advocacy efforts are required to promote the profession of occupational therapy in combating human trafficking. Copyright © 2016 by the American Occupational Therapy Association, Inc.

  2. Development of an oil skimming and separating system to combat oil spills at sea

    Energy Technology Data Exchange (ETDEWEB)

    Klimek, R.; Clauss, G.

    1983-02-01

    For efficiently combatting oil pollution at sea, it is intended to combine a hopper dredger with two oil skimmers. This system consists of two oil skimmers, which are permanently stowed on deck of the ship. In case of operation, the oil skimmers work connected beside the ship, but decoupled from the ship concerning motions of sea. Hopper dredgers have already sufficient pump and tank capacity and are well-suited for operation in offshore areas and river deltas. They are characterized by low draught and are capable of lightening their cargo very quickly so that they are ready for oil skimming operation within 2 hours. Model tests with regard to the behaviour and function of the oil skimmer system were carried out at scales of 1:15, 1:10, and 1:5. Tests with the system ship/oil skimmer were performed at a scale of 1:15.

  3. Combating Corruption Relates Money Laundering Activities in Indonesia: a Hope and Reality

    OpenAIRE

    Handoyo, Sigit

    2008-01-01

    Corruption in Indonesia has become a culture and systemic so that it could not be eradicated in the short period of time. As corruption is closely related to money laundering activities, it is not impossible that combating corruption also means combating money laun-dering activities. PPATK (Pusat Pengkajian dan Analisis Transaksi Keuangan) as the Indone-sia's FIU (Financial Intelligence Unit) has hard works to reveal those money laundering and corruptions activities. Beside its obstacles, PPA...

  4. PTSD, combat injury, and headache in Veterans Returning from Iraq/Afghanistan.

    Science.gov (United States)

    Afari, Niloofar; Harder, Laura H; Madra, Naju J; Heppner, Pia S; Moeller-Bertram, Tobias; King, Clay; Baker, Dewleen G

    2009-10-01

    To examine the relationship between posttraumatic stress disorder, combat injury, and headache in Operation Iraqi Freedom and Operation Enduring Freedom veterans at the VA San Diego Healthcare System. Previous investigations suggest that a relationship between posttraumatic stress disorder and primary headache disorders exists and could be complicated by the contribution of physical injury, especially one that results in loss of consciousness. These associations have not been systematically examined in Operation Iraqi Freedom and Operation Enduring Freedom veterans. In this observational cross-sectional study, a battery of self-report, standardized questionnaires was completed by 308 newly registered veterans between March and October 2006. The Davidson Trauma Scale was used to determine the degree of posttraumatic stress disorder symptoms and combat-related physical injury was assessed by self-report. The presence of headache was based on a symptom checklist measure and self-reported doctor diagnoses. Logistic regression analysis was performed to predict presence of headache and determine odds ratios and 95% confidence intervals associated with demographic, military, in-theatre, and mental health characteristics. About 40% of the veterans met the criteria for posttraumatic stress disorder; 40% self-reported current headache, 10% reported a physician diagnosis of migraine, 12% a physician diagnosis of tension-type headache, and 6% reported both types of headache. Results from the logistic regression model indicated that combat-related physical injury (odds ratio: 2.25; 95% confidence interval: 1.17-4.33) and posttraumatic stress disorder (odds ratio: 4.13; 95% confidence interval: 2.44-6.99) were independent predictors of self-reported headache. Additional analyses found that veterans with both tension and migraine headache had higher rates of posttraumatic stress disorder (chi-square [d.f. = 3] = 15.89; P = .001) whereas veterans with migraine headache alone had

  5. Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities.

    Science.gov (United States)

    Roybal, Kole T; Lim, Wendell A

    2017-04-26

    The ability of immune cells to survey tissues and sense pathologic insults and deviations makes them a unique platform for interfacing with the body and disease. With the rapid advancement of synthetic biology, we can now engineer and equip immune cells with new sensors and controllable therapeutic response programs to sense and treat diseases that our natural immune system cannot normally handle. Here we review the current state of engineered immune cell therapeutics and their unique capabilities compared to small molecules and biologics. We then discuss how engineered immune cells are being designed to combat cancer, focusing on how new synthetic biology tools are providing potential ways to overcome the major roadblocks for treatment. Finally, we give a long-term vision for the use of synthetic biology to engineer immune cells as a general sensor-response platform to precisely detect disease, to remodel disease microenvironments, and to treat a potentially wide range of challenging diseases.

  6. A Theory of Combative Advertising

    OpenAIRE

    Yuxin Chen; Yogesh V. Joshi; Jagmohan S. Raju; Z. John Zhang

    2009-01-01

    In mature markets with competing firms, a common role for advertising is to shift consumer preferences towards the advertiser in a tug-of-war, with no effect on category demand. In this paper, we analyze the effect of such “combative” advertising on market power. We show that, depending on the nature of consumer response, combative advertising can reduce price competition to benefit competing firms. However, it can also lead to a procompetitive outcome where individual firms advertise to incr...

  7. Role of infection control in combating antibiotic resistance

    African Journals Online (AJOL)

    ] that impacts on human health and may potentially have a major effect on the global economy.[2] The United States Centers for Disease Control and Prevention (CDC) has identified four core actions to combat this challenge, i.e. surveillance, ...

  8. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  9. Simulation and Effectiveness Analysis on One versus One Beyond Visual Range Air Combat

    Directory of Open Access Journals (Sweden)

    Haoyu Liu

    2018-01-01

    Full Text Available A kind of one versus one beyond visual range (BVR air combat model has been established, which includes functional models of radar, missile and fighter and the process of several combat stages. Air combat effectiveness ratio (ACER is defined to analyse the result. The 2k factor design method is used to design combat test case and analyses the influence of three factors (fighter stealth character, missile range and flight height on ACER. Simulation result reveals that when RCS of one fighter is reduced from 0dBm2 to -10dBm2 which cannot remarkably affect the opposition fighter’s radar detection distance and missile launch distance, the RCS factor has small influence and the missile range factor has great influence. When RCS of one fighter is reduced from -10dBm2 to -20dBm2, the opposition fighter’s radar detection distance will be reduced and lead the result of its missile launch distance be less than its missile range. Compared with the former case, the effect of RCS factor increases and the effect of missile range factor decreases. However, the effect of height is not significant.

  10. Warfighter Information Network-Tactical Increment 2 (WIN-T Inc 2)

    Science.gov (United States)

    2015-12-01

    Company- level . Using equipment mounted on combat platforms, WIN-T Inc 2 delivers a mobile capability that reduces reliance on fixed infrastructure...Cost Estimate Reference Army Cost Position (ACP) dated April 28, 2015 Confidence Level Confidence Level of cost estimate for current APB: 50% The...Development Estimate Changes PAUC Production Estimate Econ Qty Sch Eng Est Oth Spt Total 2.064 -0.055 -0.063 0.016 0.000 0.093 0.000 0.200 0.191 2.255

  11. Is Democratization a Sound Strategy for Combating Fundamentalist Islam

    National Research Council Canada - National Science Library

    Johnson, Anthony J

    2008-01-01

    .... This paper examines the premise that "universal human rights", as the basis for democracy, is compatible with Islamic culture and is therefore a sound strategy for combating the spread of "Islamic...

  12. Evaluation of prediction capability, robustness, and sensitivity in non-linear landslide susceptibility models, Guantánamo, Cuba

    Science.gov (United States)

    Melchiorre, C.; Castellanos Abella, E. A.; van Westen, C. J.; Matteucci, M.

    2011-04-01

    This paper describes a procedure for landslide susceptibility assessment based on artificial neural networks, and focuses on the estimation of the prediction capability, robustness, and sensitivity of susceptibility models. The study is carried out in the Guantanamo Province of Cuba, where 186 landslides were mapped using photo-interpretation. Twelve conditioning factors were mapped including geomorphology, geology, soils, landuse, slope angle, slope direction, internal relief, drainage density, distance from roads and faults, rainfall intensity, and ground peak acceleration. A methodology was used that subdivided the database in 3 subsets. A training set was used for updating the weights. A validation set was used to stop the training procedure when the network started losing generalization capability, and a test set was used to calculate the performance of the network. A 10-fold cross-validation was performed in order to show that the results are repeatable. The prediction capability, the robustness analysis, and the sensitivity analysis were tested on 10 mutually exclusive datasets. The results show that by means of artificial neural networks it is possible to obtain models with high prediction capability and high robustness, and that an exploration of the effect of the individual variables is possible, even if they are considered as a black-box model.

  13. MEG Working Memory N-Back Task Reveals Functional Deficits in Combat-Related Mild Traumatic Brain Injury.

    Science.gov (United States)

    Huang, Ming-Xiong; Nichols, Sharon; Robb-Swan, Ashley; Angeles-Quinto, Annemarie; Harrington, Deborah L; Drake, Angela; Huang, Charles W; Song, Tao; Diwakar, Mithun; Risbrough, Victoria B; Matthews, Scott; Clifford, Royce; Cheng, Chung-Kuan; Huang, Jeffrey W; Sinha, Anusha; Yurgil, Kate A; Ji, Zhengwei; Lerman, Imanuel; Lee, Roland R; Baker, Dewleen G

    2018-04-13

    Combat-related mild traumatic brain injury (mTBI) is a leading cause of sustained cognitive impairment in military service members and Veterans. However, the mechanism of persistent cognitive deficits including working memory (WM) dysfunction is not fully understood in mTBI. Few studies of WM deficits in mTBI have taken advantage of the temporal and frequency resolution afforded by electromagnetic measurements. Using magnetoencephalography (MEG) and an N-back WM task, we investigated functional abnormalities in combat-related mTBI. Study participants included 25 symptomatic active-duty service members or Veterans with combat-related mTBI and 20 healthy controls with similar combat experiences. MEG source-magnitude images were obtained for alpha (8-12 Hz), beta (15-30 Hz), gamma (30-90 Hz), and low-frequency (1-7 Hz) bands. Compared with healthy combat controls, mTBI participants showed increased MEG signals across frequency bands in frontal pole (FP), ventromedial prefrontal cortex, orbitofrontal cortex (OFC), and anterior dorsolateral prefrontal cortex (dlPFC), but decreased MEG signals in anterior cingulate cortex. Hyperactivations in FP, OFC, and anterior dlPFC were associated with slower reaction times. MEG activations in lateral FP also negatively correlated with performance on tests of letter sequencing, verbal fluency, and digit symbol coding. The profound hyperactivations from FP suggest that FP is particularly vulnerable to combat-related mTBI.

  14. Combat exposure and mental health: the long-term effects among US Vietnam and Gulf War veterans.

    Science.gov (United States)

    Gade, Daniel M; Wenger, Jeffrey B

    2011-04-01

    Using a random sample of more than 4000 veterans, we test the effects of combat exposure on mental health. We focus on two cohorts of veterans: those who served in Vietnam (1964-1975) and the Gulf War (1990-1991). Combat exposure differed between these groups in intensity, duration and elapsed time since exposure. We find that combat exposure generally, and exposure to dead, dying, or wounded people, specifically, is a significant predictor of mental health declines as measured by an individual's Mental Component Summary score. Under our general specifications, the negative effects of combat on mental health were larger for Gulf war veterans than for Vietnam veterans as of 2001. These effects persist after controlling for demographic characteristics, insurance coverage, income and assets. Using discrete factor, nonparametric maximum likelihood (DFML) estimation we controlled for unobserved heterogeneity as well as the factors above. In the DFML specifications we find a negative impact of exposure to dead, wounded or dying people for both Gulf and Vietnam veterans, but find no statistically significant effect for combat exposure overall for Vietnam veterans as of 2001. Based on our Gulf war parameters, we estimate that the costs of mental health declines to be between $87 and $318 per year for each soldier with combat service and exposure to dead, dying and wounded people. Copyright © 2010 John Wiley & Sons, Ltd.

  15. Microwave-Driven Multifunctional Capability of Membrane Structures

    Science.gov (United States)

    Choi, Sang H.; Chu, Sang-Hyong; Song, Kyo D.; King, Glen C.

    2002-01-01

    A large, ultra lightweight space structure, such as solar sails and Gossamer spacecrafts, requires a distributed power source to alleviate wire networks, unlike the localized on-board power infrastructures typically found in most small spacecrafts. The concept of microwave-driven multifunctional capability for membrane structures is envisioned as the best option to alleviate the complexity associated with hard-wired control circuitry and on-board power infrastructures. A rectenna array based on a patch configuration for high voltage output was developed to drive membrane actuators, sensors, probes, or other devices. Networked patch rectenna array receives and converts microwave power into a DC power for an array of smart actuators. To use microwave power effectively, the concept of a power allocation and distribution (PAD) circuit is adopted for networking a rectenna/actuator patch array. The use of patch rectennas adds a significant amount of rigidity to membrane flexibility and they are relatively heavy. A dipole rectenna array (DRA) appears to be ideal for thin-film membrane structures, since DRA is flexible and light. Preliminary design and fabrication of PAD circuitry that consists of a few nodal elements were made for laboratory testing. The networked actuators were tested to correlate the network coupling effect, power allocation and distribution, and response time.

  16. Effectiveness of a Littoral Combat Ship as a Major Node in a Wireless Mesh Network

    Science.gov (United States)

    2017-03-01

    responsible for connection management, handover control and measurement control (Scalable Network Technologies, 2014c). The final layer in the LTE ...26 2. Oceus Networks 4G LTE ...32 2. LTE Library .................................................................................32 3

  17. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  18. Social Cognitive Training Improves Emotional Processing and Reduces Aggressive Attitudes in Ex-combatants

    Science.gov (United States)

    Trujillo, Sandra; Trujillo, Natalia; Lopez, Jose D.; Gomez, Diana; Valencia, Stella; Rendon, Jorge; Pineda, David A.; Parra, Mario A.

    2017-01-01

    Emotional processing (EP) is a complex cognitive function necessary to successfully adjust to social environments where we need to interpret and respond to cues that convey threat or reward signals. Ex-combatants have consistently shown atypical EP as well as poor social interactions. Available reintegration programs aim to facilitate the re-adaptation of ex-combatants to their communities. However, they do not incorporate actions to improve EP and to enhance cognitive-emotional regulation. The present study was aimed at evaluating the usefulness of an intervention focused on Social Cognitive Training (SCT), which was designed to equip ex-combatants enrolled in the Social Reintegration Route with EP and social cognition skills. A group of 31 ex-combatants (mean age of 37.2, 29 men) from Colombian illegal armed groups were recruited into this study. Of these, 16 were invited to take part in a SCT and the other continued with the conventional reintegration intervention. Both groups underwent 12 training sessions in a period 12–14 weeks. They were assessed with a comprehensive protocol which included Psychosocial, Behavioral, and Emotion Processing instruments. The scores on these instruments prior to and after the intervention were compared within and between groups. Both groups were matched at baseline. Ex-combatants receiving the SCT experienced significant improvements in EP and a reduction in aggressive attitudes, effects not observed in those continuing the conventional reintegration intervention. This is the first study that achieves such outcomes in such a population using SCT intervention. We discuss the implications of such results toward better social reintegration strategies. PMID:28428767

  19. Motion analysis systems as optimization training tools in combat sports and martial arts

    Directory of Open Access Journals (Sweden)

    Ewa Polak

    2016-01-01

    Full Text Available Introduction: Over the past years, a few review papers about possibilities of using motion analysis systems in sport were published, but there are no articles that discuss this problem in the field of combat sports and martial arts. Aim: This study presents the diversity of contemporary motion analysis systems both, those that are used in scientific research, as well as those that can be applied in daily work of coaches and athletes in combat sports and martial arts. An additional aim is the indication of example applications in scientific research and range of applications in optimizing the training process. It presents a brief description of each type of systems that are currently used in sport, specific examples of systems and the main advantages and disadvantages of using them. The presentation and discussion takes place in the following sections: motion analysis utility for combat sports and martial arts, systems using digital video and systems using markers, sensors or transmitters. Conclusions: Not all types of motion analysis systems used in sport are suitable for combat sports and martial arts. Scientific studies conducted so far showed the usefulness of video-based, optical and electromechanical systems. The use of research results made with complex motion analysis systems, or made with simple systems, local application and immediate visualization is important for the preparation of training and its optimization. It may lead to technical and tactical improvement in athletes as well as the prevention of injuries in combat sports and martial arts.

  20. Sodium bicarbonate ingestion increases glycolytic contribution and improves performance during simulated taekwondo combat.

    Science.gov (United States)

    Lopes-Silva, João Paulo; Da Silva Santos, Jonatas Ferreira; Artioli, Guilherme Giannini; Loturco, Irineu; Abbiss, Chris; Franchini, Emerson

    2018-04-01

    To investigate the effect of sodium bicarbonate (NaHCO 3 ) on performance and estimated energy system contribution during simulated taekwondo combat. Nine taekwondo athletes completed two experimental sessions separated by at least 48 h. Athletes consumed 300 mg/kg body mass of NaHCO 3 or placebo (CaCO 3 ) 90 min before the combat simulation (three rounds of 2 min separated by 1 min passive recovery), in a double-blind, randomized, repeated-measures crossover design. All simulated combat was filmed to quantify the time spent fighting in each round. Lactate concentration [La - ] and rating of perceived exertion (RPE) were measured before and after each round, whereas heart rate (HR) and the estimated contribution of the oxidative (W OXI ), ATP (adenosine triphosphate)-phosphocreatine (PCr) (W PCR ), and glycolytic (W [ La - ] ) systems were calculated during the combat simulation. [La - ] increased significantly after NaHCO 3 ingestion, when compared with the placebo condition (+14%, P = 0.04, d = 3.70). NaHCO 3 ingestion resulted in greater estimated glycolytic energy contribution in the first round when compared with the placebo condition (+31%, P = 0.01, d = 3.48). Total attack time was significantly greater after NaHCO 3 when compared with placebo (+13%, P = 0.05, d = 1.15). W OXI , W PCR , VO 2 , HR and RPE were not different between conditions (P > 0.05). NaHCO 3 ingestion was able to increase the contribution of glycolytic metabolism and, therefore, improve performance during simulated taekwondo combat.

  1. Legal Principles and Solutions to Combat Money Laundering in the International System

    OpenAIRE

    Majid Karimi

    2013-01-01

    This study focuse on combat money laundering legal principles and solutions to in the International System. As its clear Money laundering is the attempt to disguise the proceeds of illegal activity so that they appear to come from legitimate sources. Money is laundered through banking systems and credit institutions, non financial institutions and non financial economic activities. Combating money laundering phenomenon dates back to the 1980s. In 1989, Financial Action Task Force was set up t...

  2. Combating Corruption Relates Money Laundering Activities in Indonesia: A Hope and Reality

    OpenAIRE

    Handoyo, Sigit

    2009-01-01

    Corruption in Indonesia has become a culture and systemic so that it could not be eradicated in the short period of time. As corruption is closely related to money laundering activities, it is not impossible that combating corruption also means combating money laun-dering activities. PPATK (Pusat Pengkajian dan Analisis Transaksi Keuangan) as the Indone-sia’s FIU (Financial Intelligence Unit) has hard works to reveal those money laundering and corruptions activities. Beside its obstacles, PPA...

  3. The role of locus of control and coping style in predicting longitudinal PTSD-trajectories after combat exposure.

    Science.gov (United States)

    Karstoft, Karen-Inge; Armour, Cherie; Elklit, Ask; Solomon, Zahava

    2015-05-01

    While longitudinal posttraumatic stress responses are known to be heterogeneous, little is known about predictors of those responses. We investigated if locus of control (LOC) and coping style are associated with long-term PTSD-trajectories after exposure to combat. Six hundred and seventy five Israeli soldiers with or without combat stress reaction (CSR) from the Lebanon war were assessed 1, 2, and 20 years after the war. Combat exposure, LOC, and coping style were then investigated as covariates of the trajectories of resilience, recovery, delayed onset, and chronicity. Symptomatic trajectories in the CSR and the non-CSR group were significantly associated to varying degrees with perceived life threat during combat (ORs: 1.76-2.53), internal LOC (0.77-0.87), emotional coping style (0.28-0.34), and low use of problem-focused coping (2.12-3.11). In conclusion, assessment of LOC and coping can aid prediction of chronic PTSD outcomes of combat exposure. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Online fathering: the experience of first-time fatherhood in combat-deployed troops.

    Science.gov (United States)

    Schachman, Kathleen A

    2010-01-01

    More than 90% of fathers in the United States attend the births of their children. Each year, thousands of fathers are absent during this important life transition because of military deployment in combat regions; however, it is unknown how this population experiences new fatherhood. The purpose of this study was to explore the lived experience of first-time fatherhood from the unique perspective of military men deployed to combat regions during birth. A phenomenological approach was used. Seventeen men who were stationed in Okinawa, Japan, and had returned recently from a combat deployment participated. Unstructured, in-depth interviews were conducted 2 to 6 months after the births. Interviews were audiotaped, transcribed, and analyzed using Colaizzi's method. Disruption of the protector and provider role was a main theme that encompassed four theme clusters: (a) worry-a traumatic and lonely childbirth; (b) lost opportunity; (c) guilt-an absent father; and (d) fear of death and dismemberment-who will be the father? Although their absence interfered with their ability to fulfill the fatherhood role as they perceived it, this was offset by the theme cluster Communication: The ties that bind, highlighting the role of online communication with their partner (e.g., e-mail, instant messaging, Facebook, blogs, and chat rooms) in restoring balance to the protector and provider role. Insight is provided into the needs of first-time fathers who are combat-deployed during the births of their babies. Understanding these experiences assists nurses in identifying better ways to prepare and to support men in an involved fatherhood role, despite the limitations of a stressful combat environment and geographic separation. This information can set the stage for a healthy reunion, which may take place at military bases and within communities across the globe, and thus is of benefit to all nurses working with military families.

  5. The strategic capability of Asian network airlines to compete with low-cost carriers

    OpenAIRE

    Pearson, James; O'Connell, John F.; Pitfield, David; Ryley, Tim

    2015-01-01

    Never before have network airlines been so exposed and vulnerable to low-cost carriers (LCCs). While LCCs had 26.3% of all world seats in 2013, Southeast Asia had 57.7% and South Asia 58.4% – and these figures will only increase. There are many consequences of LCCs on network airlines, including inadequately meeting the expectations of customers, so increasing dissatisfaction, and not offering sufficient value-for-money. Clearly, it is fundamentally important for Asian network airlines to res...

  6. 75 FR 56558 - Office of the Secretary: Combating Exploitative Child Labor by Promoting Sustainable Livelihoods...

    Science.gov (United States)

    2010-09-16

    ... and its root causes, and the importance of education for all children and mobilizing a wide array of..., education, and sustainable livelihoods, and the capacity of national institutions to combat child labor... DEPARTMENT OF LABOR Office of the Secretary: Combating Exploitative Child Labor by Promoting...

  7. Energy Harvesting Combat Boot for Satellite Positioning

    Directory of Open Access Journals (Sweden)

    Haluk Akay

    2018-05-01

    Full Text Available Most portable electronic devices are power-limited by battery capacity, and recharging these batteries often interrupts the user’s experience with the device. The product presented in this paper provides an alternative to powering portables by converting regular human walking motion to electricity. The device harvests electric power using air bulbs, distributed in the sole of a shoe to drive a series of micro-turbines connected to small DC motors. The number and position of air bulbs is optimized to harvest the maximum airflow from each foot-strike. The system is designed to continuously drive the micro-turbines by utilizing both outflow and inflow from the air bulbs. A prototype combat boot was fitted on the right foot of a 75 kg test subject, and produced an average continuous power on the order of 10 s of mW over a 22 Ω load during walking at 3.0 mph. This combat boot provides enough electric power to a passive GPS tracker that periodically relays geographical coordinates to a smartphone via satellite without battery replacement.

  8. Combat Trains Command Post (CTCP) Operations

    Science.gov (United States)

    2016-10-28

    development through the execution of several validation exercises leading up to the NTC rotation. The squadron utilized home station training opportunities at...evolving problem as the troop 1SG had the responsibility to tie in all disabled vehicles awaiting parts into the security plan. The crews of those...Additionally, depth of knowledge in critical equipment would have assisted the CTCP [i.e. only one operator for the Combat-Service- Support Automated

  9. Combat Stress and Substance Use Intervention

    Science.gov (United States)

    2017-06-01

    Additionally, excessive alcohol use in the military has been linked to serious consequences and loss of productivity , both of which are detrimental...and absenteeism among Iraq war veterans. The American Journal of Psychiatry, 164(1), 150– 153. Jakupcak, M., Tull, M. T., McDermott, M. J., Kaysen, D...2015, 2016) 106 1 Product Line Review (PLR) Meeting Technology- Facilitated Monitoring and Treatment in Mental Health 21 August 2012 Combat

  10. Combating Corruption in International Business Transactions

    OpenAIRE

    Celentani, Marco; Ganuza, Juan-José; Peydró, José-Luis

    2004-01-01

    International business transactions pose the problem of deterring bribing of public officials by foreign firms. We first analyse a convention styled after the OECD's 'Convention on Combating Bribery of Foreign Public Officials in International Business Transactions', which requires signatory countries to proceed against firms that have bribed public officials of any foreign country. We then study the case in which the convention requires signatory countries to proceed against firms that have ...

  11. Combating cyberspace fraud in Africa

    CSIR Research Space (South Africa)

    Grobler, M

    2009-12-01

    Full Text Available in Africa Marthie Grobler, Joey Jansen van Vuuren Council for Scientific and Industrial Research Defence, Peace, Safety & Security © CSIR 2007 www.csir.co.za Combating cyber crime in Africa is a reality • Computer crime... www.csir.co.za Reduction of Cyber Crime was given as one of the major objectives during the State of the Nation address by President Zuma on 3 June 2009. “Amongst other key initiatives, we will start the process of setting up a Border Management...

  12. Social, psychological and psychosomatic disorders in the people with combat stress in their medical histories

    Directory of Open Access Journals (Sweden)

    L. V. Gracheva

    2013-01-01

    Full Text Available The authors examined three groups of patients – military men (40 men in each group with combat stress of different intensity in their medical histories (two main groups and a  control group – without combat stress. The results showed that the military men with a high level combat stress in the past (more than 5 years ago more frequently demonstrated socialmental disadaptation against the background of subclinical chronic posttraumatic stress disorder (PTSD. The conclusion is that this group of people requires dynamic followup and adequate medicopsychological aid.

  13. Russia's Chechen Wars 1994-2000: Lessons from Urban Combat

    National Research Council Canada - National Science Library

    Oliker, Olga

    2001-01-01

    This report provides an analysis of Russian combat in Chechnya beginning with the first modern Chechen war of 1994-1996 and comparing and contrasting it with the ongoing conflict that began in 1999...

  14. Management of colonic injuries in the combat theater.

    Science.gov (United States)

    Cho, S David; Kiraly, Laszlo N; Flaherty, Stephen F; Herzig, Daniel O; Lu, Kim C; Schreiber, Martin A

    2010-05-01

    Combat injuries are more often associated with blast, penetrating, and high-energy mechanisms than civilian trauma, generating controversy about the management of combat colonic injury. Despite implementation of mandatory colostomy in World War II, recent civilian data suggest that primary repair without diversion is safe and feasible. This study describes the modern management of battle-related colonic injuries and seeks to determine whether management strategy affects early complications. Records from the combat theater (downrange) and tertiary referral center in Germany were retrospectively reviewed from 2005 to 2006. Patient characteristics, management strategy, treatment course, and early complications were recorded. Comparison groups by management strategy were as follows: primary repair, diversion, and damage control. A total of 133 (97% male) patients sustained colonic injuries from penetrating (71%), blunt (5%), and blast (23%) mechanisms. Average injury severity score was 21 and length of stay in the referral center was 7.1 days. Injury distribution was 21% ascending, 21% descending, 15% transverse, 27% sigmoid, and 25% rectum. Downrange complications for primary repair, initial ostomy, and damage control groups were 14%, 15%, and 30%, respectively. On discharge from the center, 62% of patients had undergone a diversion. The complication rate was 18% overall and was unrelated to management strategy (P = .16). Multivariate analysis did not identify independent predictors of complications. Early complications were similar by mechanism, anatomic location, severity of injury, and management strategy. More diversions were performed for rectosigmoid injury. Good surgical judgment allows for low morbidity and supports primary repair in selected cases. Damage control surgery is effective in a multinational theater of operations.

  15. Changes in Resting EEG in Colombian Ex-combatants ith Antisocial Personality Disorder.

    Science.gov (United States)

    Ramos, Claudia; Duque-Grajales, Jon; Rendón, Jorge; Montoya-Betancur, Alejandro; Baena, Ana; Pineda, David; Tobón, Carlos

    Although the social and economic consequences of Colombian internal conflicts mainly affected the civilian population, they also had other implications. The ex-combatants, the other side of the conflict, have been the subject of many studies that question their personality structures and antisocial features. Results suggest that ex-combatants usually have characteristics of an antisocial personality disorder (ASPD) that is related with their behaviour. Quantitative EEG (qEEG) was used to evaluate differences in cortical activity patterns between an ex-combatants group and a control group. The Psychopathy Checklist-Revised (PCL-R) was used to assess the presence of ASPD in the ex-combatants group, as well as the Diagnostic Interview for Genetic Studies (DIGS) for other mental disorders classified in the DCI-10. There are significant differences in psychopathy levels between groups, as well as in alpha-2 and beta waves, especially in left temporal and frontal areas for alpha-2 waves and left temporal-central regions for beta waves. qEEG measurements allow spectral resting potential to be differentiated between groups that are related with features typically involved in antisocial personality disorder, and to correlate them with patterns in the questionnaires and clinical interview. Copyright © 2017 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  16. Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    ... phenomenon through the analysis of its various definitions, its nature and consequences. Based on the analysis, the paper proffers a ten-point policy recommendation for enhancing the existing instruments and frameworks in the security services that would foster interagency cooperation in combating terrorism in Nigeria.

  17. Time concurrency/phase-time synchronization in digital communications networks

    Science.gov (United States)

    Kihara, Masami; Imaoka, Atsushi

    1990-01-01

    Digital communications networks have the intrinsic capability of time synchronization which makes it possible for networks to supply time signals to some applications and services. A practical estimation method for the time concurrency on terrestrial networks is presented. By using this method, time concurrency capability of the Nippon Telegraph and Telephone Corporation (NTT) digital communications network is estimated to be better than 300 ns rms at an advanced level, and 20 ns rms at final level.

  18. Beyond dark and bright: towards a more holistic understanding of inter-group networks.

    Science.gov (United States)

    Hejnova, Petra

    2010-01-01

    Networks are becoming a popular organizational form for structuring human activities. To date, scholars have addressed networks in a variety of fields, including sociology, economics, public administration, criminology, political science, and international security. However, little has been done so far to systematically examine the similarities, differences, and connections between network forms of organization across different academic disciplines. This has important implications for both theory and practice. The lack of attention paid to organizational similarities and differences prevents the exchange of knowledge developed across fields. In turn, policy-makers cannot take full advantage of existing research, and may miss opportunities to improve the work of some networks and combat that of others. To address this gap in the literature, this paper uses the combination of organizational environments and organizational goals to develop a new typology of inter-group networks, and thus improve our understanding of how human behaviour is coordinated through networks.

  19. Africanity: A Combative Ontology | Mafeje | CODESRIA Bulletin

    African Journals Online (AJOL)

    Africanity: A Combative Ontology. Archie Mafeje. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact AJOL · News. OTHER RESOURCES... for Researchers · for Journals · for Authors · for Policy ...

  20. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    OpenAIRE

    Ikram, Muhammad; Onwuzurike, Lucky; Farooqi, Shehroze; De Cristofaro, Emiliano; Friedman, Arik; Jourjon, Guillaume; Kaafar, Mohammad Ali; Shafiq, M. Zubair

    2015-01-01

    As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between genuine likes and those generated by farm-controlled profiles. However, as we show in this paper,...

  1. The effects of surfing and the natural environment on the well-being of combat veterans.

    Science.gov (United States)

    Caddick, Nick; Smith, Brett; Phoenix, Cassandra

    2015-01-01

    Although researchers have identified the benefits of physical activity on well-being, there is little evidence concerning the effects of nature-based physical activity. We investigated the effect of one nature-based activity-surfing-on the well-being of combat veterans experiencing posttraumatic stress disorder (PTSD). We conducted interviews and participant observations with a group of combat veterans belonging to a United Kingdom-based veterans' surfing charity. Our primary analytical approach was dialogical narrative analysis. Based on our rigorous analysis and findings, we suggest that surfing facilitated a sense of respite from PTSD. Respite was a fully embodied feeling of release from suffering that was cultivated through surfing and shaped by the stories veterans told of their experiences. We significantly extend previous knowledge on physical activity, combat veterans, and PTSD by highlighting how nature-based physical activity, encapsulated in the conceptual notion of the "blue gym," can promote well-being among combat veterans. © The Author(s) 2014.

  2. POSTTRAUMATIC STRESS SYMPTOMS AND AVERSION TO AMBIGUOUS LOSSES IN COMBAT VETERANS.

    Science.gov (United States)

    Ruderman, Lital; Ehrlich, Daniel B; Roy, Alicia; Pietrzak, Robert H; Harpaz-Rotem, Ilan; Levy, Ifat

    2016-07-01

    Psychiatric symptoms typically cut across traditional diagnostic categories. In order to devise individually tailored treatments, there is a need to identify the basic mechanisms that underlie these symptoms. Behavioral economics provides a framework for studying these mechanisms at the behavioral level. Here, we utilized this framework to examine a widely ignored aspect of trauma-related symptomatology-individual uncertainty attitudes-in combat veterans with and without posttraumatic stress disorder (PTSD). Fifty-seven combat veterans, including 30 with PTSD and 27 without PTSD, completed a risk and ambiguity decision-making task that characterizes individual uncertainty attitudes, distinguishing between attitudes toward uncertain outcomes with known ("risk") and unknown ("ambiguity") probabilities, and between attitudes toward uncertain gains and uncertain losses. Participants' choices were used to estimate risk and ambiguity attitudes in the gain and loss domains. Veterans with PTSD were more averse to ambiguity, but not risk, compared to veterans without PTSD, when making choices between possible losses, but not gains. The degree of aversion was associated with anxious arousal (e.g., hypervigilance) symptoms, as well as with the degree of combat exposure. Moreover, ambiguity attitudes fully mediated the association between combat exposure and anxious arousal symptoms. These results provide a foundation for prospective studies of the causal association between ambiguity attitudes and trauma-related symptoms, as well as etiologic studies of the neural underpinnings of these behavioral outcomes. More generally, these results demonstrate the potential of neuroeconomic and behavioral economic techniques for devising objective and incentive-compatible diagnostic tools, and investigating the etiology of psychiatric disorders. © 2016 Wiley Periodicals, Inc.

  3. Cooperative and supportive neural networks

    International Nuclear Information System (INIS)

    Sree Hari Rao, V.; Raja Sekhara Rao, P.

    2007-01-01

    This Letter deals with the concepts of co-operation and support among neurons existing in a network which contribute to their collective capabilities and distributed operations. Activational dynamical properties of these networks are discussed

  4. Traffic Policing in Dynamic Military Networks Using Software Defined Networking

    OpenAIRE

    Skappel, Hans Fredrik

    2016-01-01

    This thesis looks at how Software Defined Networking (SDN) can be used to provide traffic engineering and to police traffic in an Operational Military Network (OMN). SDN is a concept where the control plane is separated from the forwarding plane, and the control plane is capable of controlling forwarding plane elements located on multiple network nodes using the OpenFlow protocol. Specifically, we have discussed the problems in OMNs, and possible SDN approaches to mitigate the challenges. Bas...

  5. Enabling Technologies for Cognitive Optical Networks

    DEFF Research Database (Denmark)

    Borkowski, Robert

    Cognition is a new paradigm for optical networking, in which the network has capabilities to observe, plan, decide, and act autonomously in order to optimize the end-to-end performance and minimize the need for human supervision. This PhD thesis expands the state of the art on cognitive optical......, and machine learning algorithms that make cognition possible. Secondly, advanced optical performance monitoring (OPM) capabilities performed via digital signal processing (DSP) that provide CONs with necessary feedback information allowing for autonomous network optimization. The research results presented...... in this thesis were carried out in the framework of the EU project Cognitive Heterogeneous Reconfigurable Optical Network (CHRON), whose aim was to develop an architecture and implement a testbed of a cognitive network able to self-configure and self-optimize to efficiently use available resources. In order...

  6. Combat exposure, social relationships, and subjective well-being among middle-aged and older Veterans.

    Science.gov (United States)

    Yang, Mai See; Burr, Jeffrey A

    2016-01-01

    This study described the association of subjective well-being with combat exposure and social relationships among middle-aged and older Veteran men in the USA. The stress-buffering hypothesis, which predicts social relationships may moderate the association between combat exposure and subjective well-being, was also examined. Data from the 2008 Health and Retirement Study (N = 2961) were used to estimate logistic regression models, focusing on three measures of subjective well-being: depression, life satisfaction, and self-reported health. In the fully adjusted models, there were no statistically significant relationships between combat exposure and the three indicators of subjective well-being. However, compared to Veterans who had lower scores on the social relationship index, Veterans who had higher scores were less likely to be depressed and less likely to report poor or fair health. Veterans who had higher scores on the social relationships index reported higher levels of life satisfaction than those Veterans who had lower scores. There was no evidence for a social relationships buffering effect. The results of this study demonstrated that combat exposure did not have a long-term relationship with subjective well-being. Longitudinal research designs with more comprehensive indicators of combat exposure may help researchers better understand some of the underlying complexity of this relationship. Complementary research with samples of women Veterans, as well as samples of Hispanic, and non-Black, non-White Veterans, is also needed.

  7. Combating Political Police: An Overview of National Action’s Counterintelligence Program, 1982–1990

    Directory of Open Access Journals (Sweden)

    Troy Whitford

    2013-06-01

    Full Text Available During the mid to late 1980s the radical nationalist group National Action was targeted by domestic intelligence agencies. Known as “Operation Odessa” it was part of Australian Security Intelligence Organisation’s (ASIO program to combat what it saw as a rise in politically motivated violence. ASIO and state police Special Branch officers placed the group under surveillance and sent agents to disrupt meetings and recruit informants. Concurrently, National Action had developed its own counterintelligence program structuring the group in an effort to preserve secrecy, educating its membership in situational awareness and designating a senior member as an intelligence officer. Ultimately National Action counterintelligence program was unable to match the highly resourced government agencies and internal discipline issues meant the group was eventually disbanded. However, National Action’s effort to develop a counterintelligence program provides some examples of what low resourced Issue Motivated Groups are capable of achieving.

  8. Patent citation network in nanotechnology (1976-2004)

    International Nuclear Information System (INIS)

    Li Xin; Chen Hsinchun; Huang Zan; Roco, Mihail C.

    2007-01-01

    The patent citation networks are described using critical node, core network, and network topological analysis. The main objective is understanding of the knowledge transfer processes between technical fields, institutions and countries. This includes identifying key influential players and subfields, the knowledge transfer patterns among them, and the overall knowledge transfer efficiency. The proposed framework is applied to the field of nanoscale science and engineering (NSE), including the citation networks of patent documents, submitting institutions, technology fields, and countries. The NSE patents were identified by keywords 'full-text' searching of patents at the United States Patent and Trademark Office (USPTO). The analysis shows that the United States is the most important citation center in NSE research. The institution citation network illustrates a more efficient knowledge transfer between institutions than a random network. The country citation network displays a knowledge transfer capability as efficient as a random network. The technology field citation network and the patent document citation network exhibit a less efficient knowledge diffusion capability than a random network. All four citation networks show a tendency to form local citation clusters

  9. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.

    Science.gov (United States)

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-09-20

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices' operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors' messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  10. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Dong Guo

    2016-09-01

    Full Text Available Cyber Physical Social Sensing makes mobile social networks (MSNs popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  11. To reiterate the concept of self-aid and buddy-aid for combat wounded

    Directory of Open Access Journals (Sweden)

    Zhong-jie HE

    2015-11-01

    Full Text Available Explore new concept of self-aid and buddy-aid for combat wounded based on the emergency timeliness and the challenges we are going to face in the future combats, the importance of self-aid, buddy-aid and rescue are discussed. The concept and characteristics of self-aid and buddy-aid in our army are reviewed, and the care of the wounded in foreign armies were reviewed. Based on the experiences gained from previous combats, and the results of "Medical Service Mission-2014 Drill", it was believed that the emergency rescue of battle wounded should follow the timeliness rule and the principle of self-aid and buddy-aid technology. It might be beneficial to use cell protective agent, urgent relief of life-threatening conditions such as profuse bleeding from extremities, suffocation, pneumothorax, and traumatic shock etc., in order to stabilize the general condition of the wounded, according to the regime of "Platinum 10 minutes" and "golden 1 hour", self-aid and buddy-aid might play an important role in preventing early death and late morbidity of the wounded, thus helps reduce the mortality rate or the victims of combat wounds. DOI: 10.11855/j.issn.0577-7402.2015.11.01

  12. Videojuego de rol táctico de estética retro basado en combates por turnos

    OpenAIRE

    García García, Juan de la Cruz

    2010-01-01

    Videojuego de rol basado en combates por turnos con estética retro, de nombre comercial TierraCuadrada, donde el jugador podrá llevar a cabo partidas en modo historia, involucrando combates con la Inteligencia Artificial, y partidas contra rivales humanos.

  13. Atypical Modulations of N170 Component during Emotional Processing and Their Links to Social Behaviors in Ex-combatants.

    Science.gov (United States)

    Trujillo, Sandra P; Valencia, Stella; Trujillo, Natalia; Ugarriza, Juan E; Rodríguez, Mónica V; Rendón, Jorge; Pineda, David A; López, José D; Ibañez, Agustín; Parra, Mario A

    2017-01-01

    Emotional processing (EP) is crucial for the elaboration and implementation of adaptive social strategies. EP is also necessary for the expression of social cognition and behavior (SCB) patterns. It is well-known that war contexts induce socio-emotional atypical functioning, in particular for those who participate in combats. Thus, ex-combatants represent an ideal non-clinical population to explore EP modulation and to evaluate its relation with SCB. The aim of this study was to explore EP and its relation with SCB dimensions such as empathy, theory of mind and social skills in a sample of 50 subjects, of which 30 were ex-combatants from illegally armed groups in Colombia, and 20 controls without combat experience. We adapted an Emotional Recognition Task for faces and words and synchronized it with electroencephalographic recording. Ex-combatants presented with higher assertion skills and showed more pronounced brain responses to faces than Controls. They did not show the bias toward anger observed in control participants whereby the latter group was more likely to misclassify neutral faces as angry. However, ex-combatants showed an atypical word valence processing. That is, words with different emotions yielded no differences in N170 modulations. SCB variables were successfully predicted by neurocognitive variables. Our results suggest that in ex-combatants the links between EP and SCB functions are reorganized. This may reflect neurocognitive modulations associated to chronic exposure to war experiences.

  14. Atypical Modulations of N170 Component during Emotional Processing and Their Links to Social Behaviors in Ex-combatants

    Directory of Open Access Journals (Sweden)

    Sandra P. Trujillo

    2017-05-01

    Full Text Available Emotional processing (EP is crucial for the elaboration and implementation of adaptive social strategies. EP is also necessary for the expression of social cognition and behavior (SCB patterns. It is well-known that war contexts induce socio-emotional atypical functioning, in particular for those who participate in combats. Thus, ex-combatants represent an ideal non-clinical population to explore EP modulation and to evaluate its relation with SCB. The aim of this study was to explore EP and its relation with SCB dimensions such as empathy, theory of mind and social skills in a sample of 50 subjects, of which 30 were ex-combatants from illegally armed groups in Colombia, and 20 controls without combat experience. We adapted an Emotional Recognition Task for faces and words and synchronized it with electroencephalographic recording. Ex-combatants presented with higher assertion skills and showed more pronounced brain responses to faces than Controls. They did not show the bias toward anger observed in control participants whereby the latter group was more likely to misclassify neutral faces as angry. However, ex-combatants showed an atypical word valence processing. That is, words with different emotions yielded no differences in N170 modulations. SCB variables were successfully predicted by neurocognitive variables. Our results suggest that in ex-combatants the links between EP and SCB functions are reorganized. This may reflect neurocognitive modulations associated to chronic exposure to war experiences.

  15. Plan for Combat Operations (Battlefield Function 18) as Accomplished by a Heavy Brigade. Volume 2: Assessment Package

    National Research Council Canada - National Science Library

    Mullen, William

    1997-01-01

    The purpose of the overall research program was to document the synchronization required by command and control tasks performed within the armored brigade, to include combat support and combat service support units...

  16. The Way of the Gun: Applying Lessons of Ground Combat to Pilot Training

    Science.gov (United States)

    2016-02-29

    i AU/ACSC/2016 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE WAY OF THE GUN : APPLYING LESSONS OF GROUND COMBAT...teaching officers, for example, that the guns go quiet in combat inoculates them from suspecting a bad lot of ammunition or firearm malfunction when...their guns go “pop” instead of “bang.”41 This 17 first piece of the puzzle is called Survival Stress Management, and it is the most basic level

  17. NUCLEAR NONPROLIFERATION: U.S. Efforts to Combat Nuclear Smuggling

    National Research Council Canada - National Science Library

    2002-01-01

    ...) information about efforts to combat nuclear smuggling at U.S. borders. My statement today is based on the results of our May 16, 2002, report on this subject1 and information we obtained from the U.S...

  18. Intelligent Pressure Management to Reduce Leakage in Urban Water Supply Networks, A Case Study of Sarafrazan District, Mashhad

    OpenAIRE

    Mohammad Soltani Asl; Mahmoud Faghfour Maghrebi

    2009-01-01

    Water losses are inevitable in urban water distribution systems. The two approaches adopted nowadays to combat this problem include management of hydraulic parameters such as pressure and leakage detection in the network. Intellitgent pressure management is a suitable technique for controlling leakage and reducing damages due to high operating pressures in a network. This paper aims to investigate the effects of pressure reduction on leakage. The EPANET 2.10 software is used to simulate the w...

  19. Proliferation networks: between Sopranos and Supermarket

    International Nuclear Information System (INIS)

    Schlumberger, Guillaume; Gruselle, Bruno

    2006-01-01

    One success in the struggle against proliferation during the last decade has been that Western countries have reinforced mechanisms for control over exports of goods and technologies intended for the perfection of weapons of mass destruction. These new constraints have probably resulted in the appearance of a genuine proliferation economy, partly underground, organized around contacts between acquisition and sales networks, searching to exploit weaknesses in existing control systems to obtain wanted goods and technologies. This phenomenon is particularly worrying, because the level of technical skills attained by some suppliers is sufficiently high to guarantee that their customers will have a functional product satisfying their demand. Apart from systematic exploitation of vulnerabilities in export control systems, the capacity of these networks of suppliers to conduct their operations is reinforced by access to technologies and globalization of the market and financial tools. This article is the first of a series of two and explores the operation of these proliferation networks. The second article will be dedicated to an analysis of existing tools or other tools that can be implemented to combat them. (authors)

  20. Physical Training Strategies for Military Women's Performance Optimization in Combat-Centric Occupations.

    Science.gov (United States)

    Nindl, Bradley C

    2015-11-01

    The physiological differences, particularly of upper-body strength and power, between women and men, and the rigors of combat-centric occupational demands would seem to place women at a significant disadvantage, as the U.S. military opens up previously closed combat-arms military occupational specialties (MOSs) to women. This inherent disadvantage can be significantly mitigated by implementing effective and comprehensive physical training (PT) regimens for women targeting those fitness components most critical for those tasks considered most essential for solider warfighting duties (i.e., strength and power). Regrettably, the military historical and legacy overemphasis on aerobic fitness and on "field expediency" as the major criteria for implementing training have limited the extent to which the military has fully operationalized state-of-the-science PT policies. This continued legacy approach could be problematic regarding fully enhancing women's abilities to perform physically demanding combat-centric occupations and could place the successful integration of women into ground combat MOSs at significant risk. Seminal studies from the literature indicate that (a) a minimum of 6 months of periodized combined resistance/endurance training preparedness is recommended for untrained women considering entering combat-arms MOS training; (b) any comprehensive PT program should incorporate and emphasize progressive load carriage training; (c) a greater emphasis on upper body on strength/power development in military women is needed; (d) heavy resistance training in the range of 3-8 repetition maximum sets should be incorporated into training programs to target type II motor units and muscle fibers (those fibers that produce the most force and have the greatest capacity to hypertrophy); (e) low-volume, high-intensity interval training should be considered as a time-efficient training method to improve aerobic fitness while protecting against lower-body musculoskeletal

  1. E-Cheating: Combating a 21st Century Challenge.

    Science.gov (United States)

    McMurtry, Kim

    2001-01-01

    Discusses electronic cheating in higher education made possible by new technologies. Highlights include statistics on plagiarism; using Web search engines and paper mills; and ways to combat cheating, including academic honesty policies, designing writing assignments with specific goals and instructions, being aware of what is available on the…

  2. Combating Ukraine’s Health Crisis : Lessons from Europe

    OpenAIRE

    Rekha Menon

    2010-01-01

    This knowledge brief synthesizes the important findings of a recent study. It spotlights key issues and challenges facing Ukraine's health sector and suggests strategies for improvement. To combat the current health crisis, Ukraine could look at the lessons learned by other European countries that have faced similar health crises.

  3. Wireless Integrated Network Sensors Next Generation

    National Research Council Canada - National Science Library

    Merrill, William

    2004-01-01

    ..., autonomous networking, and distributed operations for wireless networked sensor systems. Multiple types of sensor systems were developed and provided including capabilities for acoustic, seismic, passive infrared detection, and visual imaging...

  4. Cumulative trauma and midlife well-being in American women who served in Vietnam: effects of combat exposure and postdeployment social support.

    Science.gov (United States)

    Park, Crystal L; Wachen, Jennifer Schuster; Kaiser, Anica Pless; Mager Stellman, Jeanne

    2015-01-01

    Research increasingly demonstrates that trauma exposure can have cumulative effects, yet much remains to be learned about effects of cumulative trauma, particularly regarding longer term adjustment. One such trauma, combat exposure, is insufficiently understood, especially for women, who are increasingly engaged in professional combat activities. The study comprised a cross-sectional survey assessing multiple aspects of current well-being in women approximately 25 years after their service in Vietnam during the Vietnam War. Participants were 1374 women (78% military and 22% nonmilitary; mean age = 59.7). This study investigated the relations between three separate categories of trauma exposure (childhood, adulthood, and combat) and well-being and examined whether perceived social support at return from Vietnam moderated the association between combat exposure and well-being. While both childhood and adulthood trauma exposure related to midlife well-being, combat exposure still uniquely predicted outcomes. Further, postdeployment perceived social support moderated the association of combat and well-being: recollected higher perceived social support at homecoming buffered participants from the links between combat exposure and well-being. These results may have important implications for interventions to reduce the impact of traumatic experiences, particularly in light of the increasing exposure of women to direct combat events.

  5. Future Combat Systems (FCS) Creates Cannon and Mortar Synergy

    National Research Council Canada - National Science Library

    Beard, Kirby; James, Jeff; Tolbert, Vincent J

    2008-01-01

    .... The NLOS-C is one of the eight MGVs. Program Manager FCS (Brigade Combat Team (PM FCS(BCT)) is leveraging previous and current research and development efforts to create synergy between cannons and mortars, without duplication of effort...

  6. Tactical Network Load Balancing in Multi-Gateway Wireless Sensor Networks

    Science.gov (United States)

    2013-12-01

    communication technology ARPANET Advanced Research Projects Agency Network ASN autonomous sensor network CBR constant bit rate CDMA code...transmission energy NFC near field communication OV1 operational view xxii PA power amplifier RFC request for comment RFID radio frequency identification...fact that the integrated chip (IC) technology boom during the past 20+ years has miniaturized IC hardware while increasing computational capability

  7. Decreased somatosensory activity to non-threatening touch in combat veterans with posttraumatic stress disorder.

    Science.gov (United States)

    Badura-Brack, Amy S; Becker, Katherine M; McDermott, Timothy J; Ryan, Tara J; Becker, Madelyn M; Hearley, Allison R; Heinrichs-Graham, Elizabeth; Wilson, Tony W

    2015-08-30

    Posttraumatic stress disorder (PTSD) is a severe psychiatric disorder prevalent in combat veterans. Previous neuroimaging studies have demonstrated that patients with PTSD exhibit abnormal responses to non-threatening visual and auditory stimuli, but have not examined somatosensory processing. Thirty male combat veterans, 16 with PTSD and 14 without, completed a tactile stimulation task during a 306-sensor magnetoencephalography (MEG) recording. Significant oscillatory neural responses were imaged using a beamforming approach. Participants also completed clinical assessments of PTSD, combat exposure, and depression. We found that veterans with PTSD exhibited significantly reduced activity during early (0-125 ms) tactile processing compared with combat controls. Specifically, veterans with PTSD had weaker activity in the left postcentral gyrus, left superior parietal area, and right prefrontal cortex in response to nonthreatening tactile stimulation relative to veterans without PTSD. The magnitude of activity in these brain regions was inversely correlated with symptom severity, indicating that those with the most severe PTSD had the most abnormal neural responses. Our findings are consistent with a resource allocation view of perceptual processing in PTSD, which directs attention away from nonthreatening sensory information. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  8. Project Guardian: Optimizing Electronic Warfare Systems for Ground Combat Vehicles

    National Research Council Canada - National Science Library

    Parks, Jack G; Jackson, William; Revello, James; Soltesz, James

    1995-01-01

    .... The study, Project Guardian, represents a new process for determining the optimum set of sensors and countermeasures for a specific vehicle class under the constraints of threat projection, combat...

  9. Brain response to primary blast wave using validated finite element models of human head and advanced combat helmet

    Directory of Open Access Journals (Sweden)

    Liying eZhang

    2013-08-01

    Full Text Available Blast-induced traumatic brain injury has emerged as a signature injury in combat casualty care. Present combat helmets are designed primarily to protect against ballistic and blunt impacts, but the current issue with helmets is protection concerning blasts. In order to delineate the blast wave attenuating capability of the Advanced Combat Helmet (ACH, a finite element (FE study was undertaken to evaluate the head response against blast loadings with and without helmet using a partially validated FE model of the human head and ACH. Four levels of overpressures (0.27-0.66 MPa from the Bowen’s lung iso-damage threshold curves were used to simulate blast insults. Effectiveness of the helmet with respect to head orientation was also investigated. The resulting biomechanical responses of the brain to blast threats were compared for human head with and without the helmet. For all Bowen’s cases, the peak intracranial pressures (ICP in the head ranged from 0.68-1.8 MPa in the coup cortical region. ACH was found to mitigate ICP in the head by 10-35%. Helmeted head resulted in 30% lower average peak brain strains and product of strain and strain rate. Among three blast loading directions with ACH, highest reduction in peak ICP (44% was due to backward blasts whereas the lowest reduction in peak ICP and brain strains was due to forward blast (27%. The biomechanical responses of a human head to primary blast insult exhibited directional sensitivity owing to the different geometry contours and coverage of the helmet construction and asymmetric anatomy of the head. Thus, direction-specific tolerances are needed in helmet design in order to offer omni-directional protection for the human head. The blasts of varying peak overpressures and durations that are believed to produce the same level of lung injury produce different levels of mechanical responses in the brain, and hence "iso-damage" curves for brain injury are likely different than the Bowen curves

  10. A novel strategy involved in [corrected] anti-oxidative defense: the conversion of NADH into NADPH by a metabolic network.

    Directory of Open Access Journals (Sweden)

    Ranji Singh

    Full Text Available The reduced nicotinamide adenine dinucleotide phosphate (NADPH is pivotal to the cellular anti-oxidative defence strategies in most organisms. Although its production mediated by different enzyme systems has been relatively well-studied, metabolic networks dedicated to the biogenesis of NADPH have not been fully characterized. In this report, a metabolic pathway that promotes the conversion of reduced nicotinamide adenine dinucleotide (NADH, a pro-oxidant into NADPH has been uncovered in Pseudomonas fluorescens exposed to oxidative stress. Enzymes such as pyruvate carboxylase (PC, malic enzyme (ME, malate dehydrogenase (MDH, malate synthase (MS, and isocitrate lyase (ICL that are involved in disparate metabolic modules, converged to create a metabolic network aimed at the transformation of NADH into NADPH. The downregulation of phosphoenol carboxykinase (PEPCK and the upregulation of pyruvate kinase (PK ensured that this metabolic cycle fixed NADH into NADPH to combat the oxidative stress triggered by the menadione insult. This is the first demonstration of a metabolic network invoked to generate NADPH from NADH, a process that may be very effective in combating oxidative stress as the increase of an anti-oxidant is coupled to the decrease of a pro-oxidant.

  11. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  12. A study of epileptogenic network structures in rat hippocampal cultures using first spike latencies during synchronization events

    International Nuclear Information System (INIS)

    Raghavan, Mohan; Amrutur, Bharadwaj; Srinivas, Kalyan V; Sikdar, Sujit K

    2012-01-01

    Study of hypersynchronous activity is of prime importance for combating epilepsy. Studies on network structure typically reconstruct the network by measuring various aspects of the interaction between neurons and subsequently measure the properties of the reconstructed network. In sub-sampled networks such methods lead to significant errors in reconstruction. Using rat hippocampal neurons cultured on a multi-electrode array dish and a glutamate injury model of epilepsy in vitro, we studied synchronous activity in neuronal networks. Using the first spike latencies in various neurons during a network burst, we extract various recurring spatio-temporal onset patterns in the networks. Comparing the patterns seen in control and injured networks, we observe that injured networks express a wide diversity in their foci (origin) and activation pattern, while control networks show limited diversity. Furthermore, we note that onset patterns in glutamate injured networks show a positive correlation between synchronization delay and physical distance between neurons, while control networks do not. (paper)

  13. Strategic Implications of U.S. Fighter Force Reductions: Air-to-Air Combat Modeling Using Lanchester Equations

    Science.gov (United States)

    2011-06-01

    STRATEGIC IMPLICATIONS OF US FIGHTER FORCE REDUCTIONS: AIR-TO-AIR COMBAT MODELING USING LANCHESTER ...TO-AIR COMBAT MODELING USING LANCHESTER EQUATIONS GRADUATE RESEARCH PAPER Presented to the Faculty Department of Operational Sciences...MODELING USING LANCHESTER EQUATIONS Ronald E. Gilbert, BS, MBA Major, USAF Approved

  14. Decreased Somatosensory Activity to Non-threatening Touch in Combat Veterans with Posttraumatic Stress Disorder

    OpenAIRE

    Badura-Brack, Amy S.; Becker, Katherine M.; McDermott, Timothy J.; Ryan, Tara J.; Becker, Madelyn M.; Hearley, Allison R.; Heinrichs-Graham, Elizabeth; Wilson, Tony W.

    2015-01-01

    Posttraumatic stress disorder (PTSD) is a severe psychiatric disorder prevalent in combat veterans. Previous neuroimaging studies have demonstrated that patients with PTSD exhibit abnormal responses to non-threatening visual and auditory stimuli, but have not examined somatosensory processing. Thirty male combat veterans, 16 with PTSD and 14 without, completed a tactile stimulation task during a 306-sensor magnetoencephalography (MEG) recording. Significant oscillatory neural responses were i...

  15. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  16. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  17. Strategic Knowledge Networks for Global Education

    Science.gov (United States)

    Peterson, J. Fiona

    2009-01-01

    The inherent opportunities for communication, collaboration and experiential learning in an online and global network create the impetus for the new network paradigm in higher education. A strategic knowledge network in education was designed and developed to build "Mode 2" knowledge capabilities; create new knowledge for innovative…

  18. Advanced Query and Data Mining Capabilities for MaROS

    Science.gov (United States)

    Wang, Paul; Wallick, Michael N.; Allard, Daniel A.; Gladden, Roy E.; Hy, Franklin H.

    2013-01-01

    The Mars Relay Operational Service (MaROS) comprises a number of tools to coordinate, plan, and visualize various aspects of the Mars Relay network. These levels include a Web-based user interface, a back-end "ReSTlet" built in Java, and databases that store the data as it is received from the network. As part of MaROS, the innovators have developed and implemented a feature set that operates on several levels of the software architecture. This new feature is an advanced querying capability through either the Web-based user interface, or through a back-end REST interface to access all of the data gathered from the network. This software is not meant to replace the REST interface, but to augment and expand the range of available data. The current REST interface provides specific data that is used by the MaROS Web application to display and visualize the information; however, the returned information from the REST interface has typically been pre-processed to return only a subset of the entire information within the repository, particularly only the information that is of interest to the GUI (graphical user interface). The new, advanced query and data mining capabilities allow users to retrieve the raw data and/or to perform their own data processing. The query language used to access the repository is a restricted subset of the structured query language (SQL) that can be built safely from the Web user interface, or entered as freeform SQL by a user. The results are returned in a CSV (Comma Separated Values) format for easy exporting to third party tools and applications that can be used for data mining or user-defined visualization and interpretation. This is the first time that a service is capable of providing access to all cross-project relay data from a single Web resource. Because MaROS contains the data for a variety of missions from the Mars network, which span both NASA and ESA, the software also establishes an access control list (ACL) on each data record

  19. A study on the nondestructive test optimum design for a ground tracked combat vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Kim Byeong Ho; Seo, Jae Hyun; Gil, Hyeon Jun [Defence Agency for Technology and Quality, Seoul (Korea, Republic of); Kim, Seon Hyeong [Hanwha Techwin Co.,Ltd., Changwon (Korea, Republic of); Seo, Sang Chul [Changwon National University, Changwon (Korea, Republic of)

    2015-10-15

    In this study, a nondestructive test (NDT) is performed to inspect the optimal design of a ground tracked combat vehicle for self-propelled artillery, tank, and armored vehicles. The minimum qualification required for personnel performing the NDT of a ground tracked combat vehicle was initially established in US military standards, and then applied to the Korean defense specifications to develop a ground tracked combat vehicle. However, the qualification standards of an NDT inspector have been integrated into NAS410 through the military and commercial specifications unification project that were applied in the existing aerospace/defense industry public standard. The design method for this study was verified by applying the optimal design to the liquid penetrant testing Al forging used in self-propelled artillery. This confirmed the reliability and soundness of the product.

  20. Method of Geometric Connected Disk Cover Problem for UAV realy network deployment

    Directory of Open Access Journals (Sweden)

    Chuang Liu

    2017-01-01

    Full Text Available Aiming at the problem of the effective connectivity of a large number of mobile combat units in the future aeronautic swarm operation, this paper proposes an idea of using UAV(Unmanned Aerial Vehicle to build, and studies the deployment of the network. User coverage and network connectivity are important for a relay network planning which are studied separately in traditional ways. In order to effectively combine these two factors while the network’s survivability is taken into account. Firstly, the concept of node aggregation degree is proposed. Secondly, a performance evaluation parameter for UAV relay network is proposed based on node aggregation degree, then analyzes the lack of deterministic deployment and presents one a PSO (VFA-PSO deployment algorithm based on virtual force. Finally, compared with the existing algorithms, the validity and stability of the algorithm are verified. The experimental results show that the VFA-PSO algorithm can effectively improve the network coverage and the survivability of the network under the premise of ensuring the network connectivity, and has better deployment effect.

  1. Networking for philanthropy: increasing volunteer behavior via social networking sites.

    Science.gov (United States)

    Kim, Yoojung; Lee, Wei-Na

    2014-03-01

    Social networking sites (SNSs) provide a unique social venue to engage the young generation in philanthropy through their networking capabilities. An integrated model that incorporates social capital into the Theory of Reasoned Action is developed to explain volunteer behavior through social networks. As expected, volunteer behavior was predicted by volunteer intention, which was influenced by attitudes and subjective norms. In addition, social capital, an outcome of the extensive use of SNSs, was as an important driver of users' attitude and subjective norms toward volunteering via SNSs.

  2. Blended Training for Combat Medics

    Science.gov (United States)

    Fowlkes, Jennifer; Dickinson, Sandra; Lazarus, Todd

    2010-01-01

    Bleeding from extremity wounds is the number one cause of preventable death on the battlefield and current research stresses the importance of training in preparing every Soldier to use tourniquets. HapMed is designed to provide tourniquet application training to combat medics and Soldiers using a blended training solution encompassing information, demonstration, practice, and feedback. The system combines an instrumented manikin arm, PDA, and computer. The manikin arm provides several training options including stand-alone, hands-on skills training in which soldiers can experience the actual torque required to staunch bleeding from an extremity wound and be timed on tourniquet application. This is more realistic than using a block of wood to act as a limb, which is often how training is conducted today. Combining the manikin arm with the PDA allows instructors to provide scenario based training. In a classroom or field setting, an instructor can specify wound variables such as location, casualty size, and whether the wound is a tough bleed. The PDA also allows more detailed feedback to be provided. Finally, combining the manikin arm with game-based technologies, the third component, provides opportunities to build knowledge and to practice battlefield decision making. Not only do soldiers learn how to apply a tourniquet, but when to apply a tourniquet in combat. The purpose of the paper is to describe the learning science underlying the design of HapMed, illustrate the training system and ways it is being expanded to encompass other critical life-saving tasks, and report on feedback received from instructors and trainees at military training and simulation centers.

  3. Mediation and Moderation of the Relationship Between Combat Experiences and Post-Traumatic Stress Symptoms in Active Duty Military Personnel.

    Science.gov (United States)

    Steele, Marshall; Germain, Anne; Campbell, Justin S

    2017-05-01

    Post-traumatic stress disorder (PTSD) is a major health concern among the U.S. military population, affecting up to 12% to 24% of veterans returning from Iraq and Afghanistan. Sleep disturbances, neuroticism, and childhood trauma have all been associated with the development of PTSD in military populations, especially in relation to combat experiences. The effects of disrupted sleep and post-traumatic stress can affect the physical well-being of soldier and sailors in the field and impact them for years after deployment. This study aimed to evaluate the relationship between self-reported measures of combat experiences, PTSD symptoms, sleep, neuroticism, and childhood adversity in an active duty military population. 972 U.S. Navy Sailors serving in Afghanistan were given anonymous surveys that assess scales of combat stressors, PTSD symptoms, sleep problems, neuroticism, adverse child experiences (ACEs), and other covariates. Sleep disturbances were hypothesized as moderators, having an indirect effect on the relationship between combat experiences and PTSD symptoms. Neuroticism scores and ACEs were proposed as moderators of the combat-PTSD symptom relationship. Mediation and moderation models were developed and tested using logistic regressions. Increased number of combat experiences was found to be a significant predictor of PTSD, even when adjusting for all covariates (p moderating factor. These results indicate that the presence of nightmares may partially explain how traumatic combat experiences lead to the development of PTSD. The study also reaffirms neuroticism as risk factor for developing PTSD symptoms. These findings highlight the importance of sleep hygiene and operational stress models in combat situations and may help stress control professionals address risk factors associated with PTSD symptoms. Reprint & Copyright © 2017 Association of Military Surgeons of the U.S.

  4. THE EFFECT OF SOCIAL CAPITAL AND KNOWLEDGE SHARING ON INNOVATION CAPABILITY

    Directory of Open Access Journals (Sweden)

    Dhyah Harjanti

    2017-09-01

    Full Text Available This research examines social capital and knowledge sharing effect on innovation capability among lectures in universities. Social capital was analyzed using three constructs, namely trust, norm and network, while knowledge sharing was broken down into two variables, namely knowledge collecting and knowledge donating. Innovation capability was explained on an individual level based on personality, behavioral and output perspectives. The research model and hypotheses were developed from the literature. Data collection is conducted through a survey on lecturers of private universities in Surabaya. The obtained data from the questionnaires were analyzed with the Partial Least Square (PLS to investigate the research model. The results suggest that social capital significantly influences innovation capability, while high level of knowledge collecting and knowledge donating can lead to high level of innovation capability. This study offers a foundation to analyze the relationships between social capital, knowledge-sharing process, consisting of knowledge collecting and knowledge donating, and innovation capability

  5. Environments for online maritime simulators with cloud computing capabilities

    Science.gov (United States)

    Raicu, Gabriel; Raicu, Alexandra

    2016-12-01

    This paper presents the cloud computing environments, network principles and methods for graphical development in realistic naval simulation, naval robotics and virtual interactions. The aim of this approach is to achieve a good simulation quality in large networked environments using open source solutions designed for educational purposes. Realistic rendering of maritime environments requires near real-time frameworks with enhanced computing capabilities during distance interactions. E-Navigation concepts coupled with the last achievements in virtual and augmented reality will enhance the overall experience leading to new developments and innovations. We have to deal with a multiprocessing situation using advanced technologies and distributed applications using remote ship scenario and automation of ship operations.

  6. An acoustical model based monitoring network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der

    2010-01-01

    In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the

  7. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  8. Barriers to combating human trafficking in Colombia

    OpenAIRE

    Wilcox, Daniel Joseph

    2015-01-01

    Approved for public release; distribution is unlimited Despite international and domestic policies and programs intended to combat human trafficking, Colombia remains one of the countries with the highest instances of human trafficking in the Western Hemisphere. Factors contributing to human trafficking in Colombia, such as internal violence and displacement, drug trafficking, a weak central government, and widespread corruption, have overpowered what energies the government marshaled agai...

  9. A model management system for combat simulation

    OpenAIRE

    Dolk, Daniel R.

    1986-01-01

    The design and implementation of a model management system to support combat modeling is discussed. Structured modeling is introduced as a formalism for representing mathematical models. A relational information resource dictionary system is developed which can accommodate structured models. An implementation is described. Structured modeling is then compared to Jackson System Development (JSD) as a methodology for facilitating discrete event simulation. JSD is currently better at representin...

  10. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  11. U.S. Military Operations in Iraq: Planning, Combat, and Occupation

    National Research Council Canada - National Science Library

    Phillips, Kate; Lauth, Shane; Schenck, Erin

    2006-01-01

    On November 2, 2005, a colloquium entitled "U.S. Military Operations in Iraq: Planning, Combat and Occupation" was held in Washington, DC, at the Johns Hopkins School of Advanced International Studies (SAIS...

  12. Structural Capability of an Organization toward Innovation Capability

    DEFF Research Database (Denmark)

    Nielsen, Susanne Balslev; Momeni, Mostafa

    2016-01-01

    The scholars in the field of strategic management have developed two major approaches for attainment of competitive advantage: an approach based on environmental opportunities, and another one based on internal capabilities of an organization. Some investigations in the last two decades have...... indicated that the advantages relying on the internal capabilities of organizations may determine the competitive position of organizations better than environmental opportunities do. Characteristics of firms shows that one of the most internal capabilities that lead the organizations to the strongest...... competitive advantage in the organizations is the innovation capability. The innovation capability is associated with other organizational capabilities, and many organizations have focused on the need to identify innovation capabilities.This research focuses on recognition of the structural aspect...

  13. GSFC network operations with Tracking and Data Relay Satellites

    Science.gov (United States)

    Spearing, R.; Perreten, D. E.

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  14. Cooperative HARQ Assisted NOMA Scheme in Large-scale D2D Networks

    KAUST Repository

    Shi, Zheng; Ma, Shaodan; Elsawy, Hesham; Yang, Guanghua; Alouini, Mohamed-Slim

    2017-01-01

    spatial and temporal correlation in interference, highly overestimates the NOMA performance and produces misleading design insights. An interference oblivious selection for the power and/or transmission rates leads to violating the network outage constraints. To this end, the results demonstrate the effectiveness of NOMA transmission and manifest the importance of the cooperative HARQ to combat the negative effect of the network aggregate interference. For instance, comparing to the non-cooperative HARQ assisted NOMA, the proposed scheme can yield an outage probability reduction by $32$%. Furthermore, an interference aware optimal design that maximizes the LTAT given outage constraints leads to $47$% throughput improvement over HARQ-assisted orthogonal multiple access (OMA) scheme.

  15. EphB1 as a Novel Drug Target to Combat Pain and Addiction

    Science.gov (United States)

    2016-09-01

    Award Number: W81XWH-14-1-0220 Project Title: EphB1 as a Novel Drug Target to Combat Pain and Addiction Principal Investigator Name: Mark...Pain and Addiction 5a. CONTRACT NUMBER EphB1 as a Novel Drug Target to Combat Pain and Addiction 5b. GRANT NUMBER W81XWH-14-1-0220 5c. PROGRAM...SUBJECT TERMS Chronic neuropathic pain, opioid addiction , synaptic plasticity, EphB1 receptor, ephrin-B2, NMDA receptor, drug discovery 16. SECURITY

  16. Deep Learning for Real-Time Capable Object Detection and Localization on Mobile Platforms

    Science.gov (United States)

    Particke, F.; Kolbenschlag, R.; Hiller, M.; Patiño-Studencki, L.; Thielecke, J.

    2017-10-01

    Industry 4.0 is one of the most formative terms in current times. Subject of research are particularly smart and autonomous mobile platforms, which enormously lighten the workload and optimize production processes. In order to interact with humans, the platforms need an in-depth knowledge of the environment. Hence, it is required to detect a variety of static and non-static objects. Goal of this paper is to propose an accurate and real-time capable object detection and localization approach for the use on mobile platforms. A method is introduced to use the powerful detection capabilities of a neural network for the localization of objects. Therefore, detection information of a neural network is combined with depth information from a RGB-D camera, which is mounted on a mobile platform. As detection network, YOLO Version 2 (YOLOv2) is used on a mobile robot. In order to find the detected object in the depth image, the bounding boxes, predicted by YOLOv2, are mapped to the corresponding regions in the depth image. This provides a powerful and extremely fast approach for establishing a real-time-capable Object Locator. In the evaluation part, the localization approach turns out to be very accurate. Nevertheless, it is dependent on the detected object itself and some additional parameters, which are analysed in this paper.

  17. Plan for Combat Operations (Battlefield Function 18) as Accomplished by a Forward Support Battalion. Volume 1: Function Analysis

    National Research Council Canada - National Science Library

    Whitley, Sam

    1998-01-01

    The purpose of the overall research program was to document the synchronization required by command and control tasks performed within the armored brigade, to include combat support and combat service support units...

  18. Inter-domain networking innovation on steroids: empowering ixps with SDN capabilities

    KAUST Repository

    Chiesa, Marco

    2016-10-14

    While innovation in inter-domain routing has remained stagnant for over a decade, Internet exchange points (IXPs) are consolidating their role as economically advantageous interconnection points for reducing path latencies and exchanging ever increasing amounts of traffic. As such, IXPs appear as a natural place to foster network innovation and assess the benefits of SDN, a recent technological trend that has already boosted innovation within data center networks. In this article, we give a comprehensive overview of use cases for SDN at IXPs, which leverage the superior vantage point of an IXP to introduce advanced features like load balancing and DDoS mitigation. We discuss the benefits of SDN solutions by analyzing real-world data from one of the largest IXPs. We also leverage insights into IXP operations to shape benefits not only for members but also for operators.

  19. Male combat veterans' narratives of PTSD, masculinity, and health.

    Science.gov (United States)

    Caddick, Nick; Smith, Brett; Phoenix, Cassandra

    2015-01-01

    This article uniquely examines the ways a group of male combat veterans talk about masculinity and how, following post-traumatic stress disorder (PTSD), they performed masculinities in the context of a surfing group, and what effects this had upon their health and wellbeing. Participant observations and life history interviews were conducted with a group of combat veterans who belonged to a surfing charity for veterans experiencing PTSD. Data were rigorously explored via narrative analysis. Our findings revealed the ways in which veterans enacted masculinities in accordance with the values that were cultivated during military service. These masculine performances in the surfing group had important effects both on and for the veterans' wellbeing. Significantly, the study highlights how masculine performances can be seen alternately as a danger and as a resource for health and wellbeing in relation to PTSD. The article advances knowledge on combat veterans and mental health with critical implications for the promotion of male veterans' mental health. These include the original suggestion that health-promoting masculine performances might be recognised and supported in PTSD treatment settings. Rather than automatically viewing masculinity as problematic, this article moves the field forward by highlighting how hegemonic masculinities can be reconstructed in positive ways which might improve veterans' health and wellbeing. A video abstract of this article can be found at: https://www.youtube.com/watch?v=BaYzaOP1kAY. © 2015 The Authors. Sociology of Health & Illness © 2015 Foundation for the Sociology of Health & Illness/John Wiley & Sons Ltd.

  20. Surface Combatant Planning Since the End of the Cold War

    National Research Council Canada - National Science Library

    Gillen, Daniel

    1998-01-01

    .... This reduction was part of the U.S. military transformation in the post-Cold War period. This thesis examined the major factors that influenced the change in surface combatant planning since 1990, i.e...

  1. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  2. Role of proper response schemes, legislation and regional cooperation in combating illicit trafficking of nuclear materials in developing countries

    International Nuclear Information System (INIS)

    Sterzov, A.

    2002-01-01

    proper model scheme for the developing countries is important for starting the initial process of preventing and combating the illicit traffic of nuclear materials. There is a need of reinforcing strategy to control the existing stockpiles of fissile material and to lower the future production and use of such materials. The illicit traffic of nuclear materials is a new threat, which requires rapid implementation of comprehensive, mutually measures and efforts, new approaches, coordination of services and institutions and even new legislation. IV. Action Scheme for illicit radioactive or nuclear material It was felt that the application of a new model scheme would allow better and quicker response of Bulgarian capabilities for combating illicit nuclear trafficking. First Step 1. Health physics analysis (gamma and neutron dose) 2. Preservation of evidence (proper protocols adopted by the law enforcement forces) Second Step 1. NDA analysis to categorize the radioactive material on site: radioactive, non-fissile material; nuclear fuel ( 235 U content less 20 %); Pu and/or enriched U ( 235 U content higher 20 %) 2. Ge(Li) high Resolution Gamma Spectroscopy 3. Passive Neutron interrogation for Pu Third Step 1. In-Depth Analysis by Specialized laboratory: Analysis of the matrix, of packaging material; element composition of nuclear material; impurities, traces etc. V. Setting up a Legal and Administrative Frame. The creation and proposition of a model scheme procedure for the developing countries is important for starting the initial process of preventing and combating the illicit traffic of nuclear materials. The proposition of a model procedure will allow better and quicker upgrade of developing countries capabilities for combating illicit nuclear trafficking. It is also important to initiate the contacts between neighbouring countries by regional collaboration of law enforcement authorities, customs, analytical laboratories etc. which will make combating illicit trafficking

  3. Military nurses and combat-wounded patients: a qualitative analysis of psychosocial care.

    Science.gov (United States)

    Hagerty, Bonnie M; Williams, Reg Arthur; Bingham, Mona; Richard, Maggie

    2011-04-01

    The aims were to explore the lived experience of combat-wounded patients and the military nurses who care for them. The study was a qualitative phenomenological design, and focus groups were conducted with 20 nurses and 8 combat-wounded patients. Themes common to nurses and patients were coping, shared experiences, finding meaning, psychosocial nursing care, families, and bureaucratic structure. Thematic differences were the patients' perspectives "changed self" while nurses described "professional boundaries." The importance of finding meaning presents ideas that could help nurses and patients cope better with stressful situations regardless of the setting. © 2010 Wiley Periodicals, Inc.

  4. Development and evaluation of an emulsion containing lycopene for combating acceleration of skin aging

    Directory of Open Access Journals (Sweden)

    Letícia Caramori Cefali

    2015-09-01

    Full Text Available Lycopene, a carotenoid and potent antioxidant is found in large quantities in tomatoes. Lycopene combats diseases, such as cardiovascular disease and different types of cancer, including prostate cancer. However, its topical use in emulsion form for the combat of skin aging is under-explored. The aim of the present study was to develop an emulsion containing lycopene extracted from salad tomatoes and evaluate its cytotoxicity, stability, rheological behavior, antioxidant activity and phytocosmetic permeation. The developed cosmetic comprised an oil phase made up of shea derivatives and was evaluated in terms of its physiochemical stability, spreadability, thermal analysis, rheological behavior, microbiological quality, cytotoxicity, antioxidant activity, cutaneous permeation and retention. The results demonstrate that this phytocosmetic is stable, exhibits satisfactory rheological behavior for a topical formula and is a promising product for combating skin aging.

  5. More than Just a Game? Combat-Themed Gaming Among Recent Veterans with Posttraumatic Stress Disorder.

    Science.gov (United States)

    Elliott, Luther; Golub, Andrew; Price, Matthew; Bennett, Alexander

    2015-08-01

    This article examines recent combat veterans' experiences of "first-person shooter" (FPS) gaming and its relationship to posttraumatic stress disorder (PTSD). Current PTSD treatment approaches increasingly use virtual reality (VR) technologies, which have many similarities with FPS games. To explore these similarities, this article presents six case studies from recently separated veterans in New York City who reported both current PTSD symptoms and regular use of combat-themed FPS games. In open-ended interviews, participants discussed a range of benefits as well as the importance of regulating use and avoiding particular contextual dimensions of gaming to maintain healthy gaming habits. Findings demonstrate the need for more comprehensive study and dissemination of best-practices information about FPS gaming in the context of combat-related PTSD symptomatology.

  6. Architecture oriented modeling and simulation method for combat mission profile

    Directory of Open Access Journals (Sweden)

    CHEN Xia

    2017-05-01

    Full Text Available In order to effectively analyze the system behavior and system performance of combat mission profile, an architecture-oriented modeling and simulation method is proposed. Starting from the architecture modeling,this paper describes the mission profile based on the definition from National Military Standard of China and the US Department of Defense Architecture Framework(DoDAFmodel, and constructs the architecture model of the mission profile. Then the transformation relationship between the architecture model and the agent simulation model is proposed to form the mission profile executable model. At last,taking the air-defense mission profile as an example,the agent simulation model is established based on the architecture model,and the input and output relations of the simulation model are analyzed. It provides method guidance for the combat mission profile design.

  7. Optimization of Lyophilized Plasma for Use in Combat Casualties

    Science.gov (United States)

    2016-03-01

    ratio of NS infused at a rate of 165 ml/min, minus any given during the controlled hemorrhage to induce acidosis and coagulopathy. This reflects...antioxidant effect suggesting the potential to reduce acute respiratory distress syndrome and multiple organ failure in combat casualties. This model

  8. 48 CFR 52.222-50 - Combating Trafficking in Persons.

    Science.gov (United States)

    2010-10-01

    ....222-50 Combating Trafficking in Persons. As prescribed in 22.1705(a), insert the following clause...: ________ ________ ________ ________ ________ ________ [Contracting Officer shall insert title of directive/notice; indicate the document is attached or provide source (such as website link) for obtaining document; and, indicate the contract performance location...

  9. Network-Centric Operations Case Study: Air-to-Air Combat With and Without Link 16

    National Research Council Canada - National Science Library

    Gonzales, Daniel; Hollywood, John; Kingston, Gina; Signori, David

    2005-01-01

    ...) Operational Special Project. In this exercise, the capabilities of F-15 air superiority aircraft equipped with voice-only communications were compared with F-15s equipped with voice and JTIDS Link 16 data link communications...

  10. Security Shift in Future Network Architectures

    NARCIS (Netherlands)

    Hartog, T.; Schotanus, H.A.; Verkoelen, C.A.A.

    2010-01-01

    In current practice military communication infrastructures are deployed as stand-alone networked information systems. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements which current communication architectures cannot deliver. This paper informs IT

  11. Local Network Wideband Interconnection Alternatives.

    Science.gov (United States)

    1984-01-01

    signal. 3.2.2 Limitations Although satellites offer the advantages of insensitivity to distance, point-to-multipoint communication capability and...Russell, the CATV franchisee for the town of Bedford, has not yit set rates for leasing channels on their network. If this network were interconnected

  12. Groundwork for a Theory of the Combatant

    Science.gov (United States)

    2017-01-03

    moral status of an individual combatant might have to be relativized to particular roles, or particular missions, rather than the justice of his or her...contemporary scholars understand killing in war. However, such arguments can be very complex, which makes them of little practical value in actual moral ...is the collectivist, because it better captures the nature of the various morally relevant relationships involved. Those relationships are between

  13. The Big Issue: Command and Combat in the Information Age

    National Research Council Canada - National Science Library

    Potts, David

    2003-01-01

    This Occasional Paper considers command and combat in the information age. A small team in the British Army's conceptual "think tank," the Directorate General Development and Doctrine, worked together on this issue for 18 months...

  14. Defining the protein interaction network of human malaria parasite Plasmodium falciparum

    KAUST Repository

    Ramaprasad, Abhinay

    2012-02-01

    Malaria, caused by the protozoan parasite Plasmodium falciparum, affects around 225. million people yearly and a huge international effort is directed towards combating this grave threat to world health and economic development. Considerable advances have been made in malaria research triggered by the sequencing of its genome in 2002, followed by several high-throughput studies defining the malaria transcriptome and proteome. A protein-protein interaction (PPI) network seeks to trace the dynamic interactions between proteins, thereby elucidating their local and global functional relationships. Experimentally derived PPI network from high-throughput methods such as yeast two hybrid (Y2H) screens are inherently noisy, but combining these independent datasets by computational methods tends to give a greater accuracy and coverage. This review aims to discuss the computational approaches used till date to construct a malaria protein interaction network and to catalog the functional predictions and biological inferences made from analysis of the PPI network. © 2011 Elsevier Inc.

  15. Personalized Social Network Activity Feeds for Increased Interaction and Content Contribution

    Directory of Open Access Journals (Sweden)

    Shlomo eBerkovsky

    2015-10-01

    Full Text Available Online social networks were originally conceived as means of sharing information and activities with friends, and their success has been one of the primary contributors of the tremendous growth of the Web. Social network activity feeds were devised as a means to aggregate recent actions of friends into a convenient list. But the volume of actions and content generated by social network users is overwhelming, such that keeping users up-to-date with friend activities is an ongoing challenge for social network providers. Personalization has been proposed as a solution to combat social network information overload and help users to identify the nuggets of relevant information in the incoming flood of network activities. In this paper, we propose and thoroughly evaluate a personalized model for predicting the relevance of the activity feed items, which informs the ranking of the feeds and facilitates personalization. Results of a live study show that the proposed feed personalization approach successfully identifies and promotes relevant feed items and boosts the uptake of the feeds. In addition, it increases the contribution of user-generated content to the social network and spurs interaction between users.

  16. ANTECEDENTS OF CUSTOMER RELATIONSHIP MANAGEMENT CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Tuleu Daniela

    2015-07-01

    Full Text Available Customer relationship management, as a process to manage customer relationship initiation, maintenance and termination to maximize the value of the relationship portfolio, is an evolving process. In recent years, the development of interactive technologies (social media have revolutionized the interaction between firms and their customers and between customers. The impact of technology on CRM is improving ways of collecting and processing customer information and transforming communication with customers. In the context of the development of social networks, the introduction of social media applications in customer relationship management activities bring important changes in this area. Thus, managers need to pay attention to the interaction management as an important process of CRM and enhance the customer relationship management capabilities. The study propose a conceptual research model of several antecedents of customer relationship managements capabilities and provide the linkage between this antecedents and CRM capabilities. First, following review of existing research literature related to customer relationship management, there are some conceptual clarification on customer relationship management. Second, are presented the working concepts: the adoption of interactive technologies, customer concept, customer empowerment, customer relationship orientation and customer-centric management system. Then, it is proposed the conceptual model and finally are presented conclusions, managerial implications, limitations and research directions. From a theoretical perspective, this paper highlights the importance of marketing actions at the individual customer level and reveal the impact of adoption by companies of interactive technologies so that organizations have the opportunity to engage in conversations with customers and respond in real time the requirements that they launched the online environment. Nowadays, customers feel empowered and play

  17. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  18. Technologies to Combat Aedes Mosquitoes: A Model Based on Smart City.

    Science.gov (United States)

    de Souza Silva, Geovanna Cristine; Peltonen, Laura-Maria; Pruinelli, Lisiane; Yoshikazu Shishido, Henrique; Jacklin Eler, Gabrielle

    2018-01-01

    Aedes aegypti and Aedes albopictus mosquitoes are responsible for the transmission of diseases such as dengue fever, yellow fever, chikungunya fever, zika virus fever, some of which can cause irreversible central nervous system problems and death. This study investigates what technologies are being used for combatting and monitoring the Aedes mosquitoes and to propose joining these technologies into a single and complete solution using the Smart Cities concept. A search for newscasts on Google and mobile apps in app stores were performed to identify technological solutions for combat to Aedes mosquitoes. Also, a model for joint technology was proposed. Results identified the following technologies: 170 software, two sensors, two drones, one electronic device, ten mosquito traps/lures, seven biological tools, six biotechnologies, and eight chemical formulations. Technological resources and adoption of preventive measures by the population could be a useful method for the mosquito control. Examples include a georeferenced model for identification and examination of larvae, application of chemical/biological products, real-time mapping, sending of educational materials via email or social media for the population, and alerts to health professionals in the zones of combat/risk. In combination, these technologies may indicate a better solution to the current problem.

  19. Network value and optimum analysis on the mode of networked marketing in TV media

    Directory of Open Access Journals (Sweden)

    Xiao Dongpo

    2012-12-01

    Full Text Available Purpose: With the development of the networked marketing in TV media, it is important to do the research on network value and optimum analysis in this field.Design/methodology/approach: According to the research on the mode of networked marketing in TV media and Correlation theory, the essence of media marketing is creating, spreading and transferring values. The Participants of marketing value activities are in network, and value activities proceed in networked form. Network capability is important to TV media marketing activities.Findings: This article raises the direction of research of analysis and optimization about network based on the mode of networked marketing in TV media by studying TV media marketing Development Mechanism , network analysis and network value structure.

  20. Y-Source Impedance Network

    DEFF Research Database (Denmark)

    Siwakoti, Yam Prasad; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    This letter introduces a new versatile Y-shaped impedance network for realizing converters that demand a very high-voltage gain, while using a small duty ratio. To achieve that, the proposed network uses a tightly coupled transformer with three windings, whose obtained gain is presently not matched...... by existing networks operated at the same duty ratio. The proposed impedance network also has more degrees of freedom for varying its gain, and hence, more design freedom for meeting requirements demanded from it. This capability has been demonstrated by mathematical derivation, and proven in experiment...