WorldWideScience

Sample records for networked combat capability

  1. Abductive networks applied to electronic combat

    Science.gov (United States)

    Montgomery, Gerard J.; Hess, Paul; Hwang, Jong S.

    1990-08-01

    A practical approach to dealing with combinatorial decision problems and uncertainties associated with electronic combat through the use of networks of high-level functional elements called abductive networks is presented. It describes the application of the Abductory Induction Mechanism (AIMTM) a supervised inductive learning tool for synthesizing polynomial abductive networks to the electronic combat problem domain. From databases of historical expert-generated or simulated combat engagements AIM can often induce compact and robust network models for making effective real-time electronic combat decisions despite significant uncertainties or a combinatorial explosion of possible situations. The feasibility of applying abductive networks to realize advanced combat decision aiding capabilities was demonstrated by applying AIM to a set of electronic combat simulations. The networks synthesized by AIM generated accurate assessments of the intent lethality and overall risk associated with a variety of simulated threats and produced reasonable estimates of the expected effectiveness of a group of electronic countermeasures for a large number of simulated combat scenarios. This paper presents the application of abductive networks to electronic combat summarizes the results of experiments performed using AIM discusses the benefits and limitations of applying abductive networks to electronic combat and indicates why abductive networks can often result in capabilities not attainable using alternative approaches. 1. ELECTRONIC COMBAT. UNCERTAINTY. AND MACHINE LEARNING Electronic combat has become an essential part of the ability to make war and has become increasingly complex since

  2. Networked sensors for the combat forces

    Science.gov (United States)

    Klager, Gene

    2004-11-01

    Real-time and detailed information is critical to the success of ground combat forces. Current manned reconnaissance, surveillance, and target acquisition (RSTA) capabilities are not sufficient to cover battlefield intelligence gaps, provide Beyond-Line-of-Sight (BLOS) targeting, and the ambush avoidance information necessary for combat forces operating in hostile situations, complex terrain, and conducting military operations in urban terrain. This paper describes a current US Army program developing advanced networked unmanned/unattended sensor systems to survey these gaps and provide the Commander with real-time, pertinent information. Networked Sensors for the Combat Forces plans to develop and demonstrate a new generation of low cost distributed unmanned sensor systems organic to the RSTA Element. Networked unmanned sensors will provide remote monitoring of gaps, will increase a unit"s area of coverage, and will provide the commander organic assets to complete his Battlefield Situational Awareness (BSA) picture for direct and indirect fire weapons, early warning, and threat avoidance. Current efforts include developing sensor packages for unmanned ground vehicles, small unmanned aerial vehicles, and unattended ground sensors using advanced sensor technologies. These sensors will be integrated with robust networked communications and Battle Command tools for mission planning, intelligence "reachback", and sensor data management. The network architecture design is based on a model that identifies a three-part modular design: 1) standardized sensor message protocols, 2) Sensor Data Management, and 3) Service Oriented Architecture. This simple model provides maximum flexibility for data exchange, information management and distribution. Products include: Sensor suites optimized for unmanned platforms, stationary and mobile versions of the Sensor Data Management Center, Battle Command planning tools, networked communications, and sensor management software. Details

  3. Combating Forest Corruption: the Forest Integrity Network

    NARCIS (Netherlands)

    Gupta, A.; Siebert, U.

    2004-01-01

    This article describes the strategies and activities of the Forest Integrity Network. One of the most important underlying causes of forest degradation is corruption and related illegal logging. The Forest Integrity Network is a timely new initiative to combat forest corruption. Its approach is to

  4. Dynamic capabilities and network benefits

    Directory of Open Access Journals (Sweden)

    Helge Svare

    2017-01-01

    Full Text Available The number of publicly funded initiatives to establish or strengthen networks and clusters, in order to enhance innovation, has been increasing. Returns on such investments vary, and the aim of this study is to explore to what extent the variation in benefits for firms participating in networks or clusters can be explained by their dynamic capabilities (DC. Based on survey data from five Norwegian networks, the results suggest that firms with higher DC are more successful in harvesting the potential benefits of being member of a network.

  5. Establishing capabilities for combating illicit trafficking: the Syrian experience

    International Nuclear Information System (INIS)

    Othman, I.; Suman, H.

    2008-01-01

    Since the late 80 's, Syria has been taking steps towards combating illicit trafficking or inadvertent movement involving radioactive or nuclear material within the country or across its border. By applying the proper combination of technical and procedural measures, an acceptable level of performance has been achieved. The measures undertaken by AECS include anticipative measures, which aim at identifying potential loss of control over radioactive sources and potential illicit trafficking within the country, as well as defensive measures which aim at detection of and response to events of illicit trafficking. In addition, a tight follow up of radiation source along their entire lifetime in the Syrian territory, supported by proper data analysis is one of the most efficient tools for identifying potential loss of control over sources. AECS has established Border Monitoring Centers (BMC) in almost all border crossings. They work in close cooperation with the customs and other relevant authorities at the Syrian borders. AECS has been also providing the necessary training for the front-line officers. (author)

  6. Establishing capabilities for combating illicit trafficking: the Syrian experience

    International Nuclear Information System (INIS)

    Othman, I.; Suman, H.

    2008-01-01

    Since the late 80's, Syria has been taking steps towards combating illicit trafficking or inadvertent movement involving radioactive or nuclear material within the country or across its border. By applying the proper combination of technical and procedural measures, an acceptable level of performance has been achieved. The measures undertaken by AECS include anticipative measures, which aim at identifying potential loss of control over radioactive sources and potential illicit trafficking within the country, as well as defensive measures which aim at detection of and response to events of illicit trafficking. In addition, a tight follow up of radiation source along their entire lifetime in the Syrian territory, supported by proper data analysis is one of the most efficient tools for identifying potential loss of control over sources. AECS has established Border Monitoring Centers (BMC) in almost all border crossings. They work in close cooperation with the customs and other relevant authorities at the Syrian borders. AECS has been also providing the necessary training for the frontline officers. (author)

  7. Medical capability team: the clinical microsystem for combat healthcare delivery in counterinsurgency operations.

    Science.gov (United States)

    Clark, Susz; Van Steenvort, Jon K

    2008-01-01

    Today's operational environment in the support of counterinsurgency operations requires greater tactical and operational flexibility and diverse medical capabilities. The skills and organizations required for full spectrum medical operations are different from those of the past. Combat healthcare demands agility and the capacity for rapid change in clinical systems and processes to better support the counterinsurgency environment. This article proposes the Army Medical Department (AMEDD) develop and implement the medical capability team (MCT) for combat healthcare delivery. It discusses using the concept of the brigade combat team to develop medical capability teams as the unit of effectiveness to transform frontline care; provides a theoretical overview of the MCT as a "clinical microsystem"; discusses MCT leadership, training, and organizational support, and the deployment and employment of the MCT in a counterinsurgency environment. Additionally, this article proposes that the AMEDD initiate the development of an AMEDD Combat Training Center of Excellence to train and validate the MCTs. The complexity of combat healthcare demands an agile and campaign quality AMEDD with joint expeditionary capability in order to promote the best patient outcomes in a counterinsurgency environment.

  8. Networking capability and new product development

    NARCIS (Netherlands)

    Mu, J.; Di Benedetto, A.C.

    2012-01-01

    Current research on network theory remains largely focused on structures and outcomes without exploring the capability that firms need to build efficient and effective networks to their advantage. In this paper, we take a networking capability view in studying inter-firm relationships. We assume

  9. Meta-path based heterogeneous combat network link prediction

    Science.gov (United States)

    Li, Jichao; Ge, Bingfeng; Yang, Kewei; Chen, Yingwu; Tan, Yuejin

    2017-09-01

    The combat system-of-systems in high-tech informative warfare, composed of many interconnected combat systems of different types, can be regarded as a type of complex heterogeneous network. Link prediction for heterogeneous combat networks (HCNs) is of significant military value, as it facilitates reconfiguring combat networks to represent the complex real-world network topology as appropriate with observed information. This paper proposes a novel integrated methodology framework called HCNMP (HCN link prediction based on meta-path) to predict multiple types of links simultaneously for an HCN. More specifically, the concept of HCN meta-paths is introduced, through which the HCNMP can accumulate information by extracting different features of HCN links for all the six defined types. Next, an HCN link prediction model, based on meta-path features, is built to predict all types of links of the HCN simultaneously. Then, the solution algorithm for the HCN link prediction model is proposed, in which the prediction results are obtained by iteratively updating with the newly predicted results until the results in the HCN converge or reach a certain maximum iteration number. Finally, numerical experiments on the dataset of a real HCN are conducted to demonstrate the feasibility and effectiveness of the proposed HCNMP, in comparison with 30 baseline methods. The results show that the performance of the HCNMP is superior to those of the baseline methods.

  10. Staging Options for the Air Force’s Electronic Combat Test Capability: a Cost Analysis

    Science.gov (United States)

    1990-09-01

    strategic in nature and completely different than daily operating decisions (20:6). Horngren , in his book Cost Accounting : A Managerial Emphasis...AFIT/GCA/LSY/90S-3 DTTC S E-191 J) C, STAGING OPTIONS FOR THE AIR FORCE’S ELECTRONIC COMBAT TEST CAPABILITY: A COST ANALYSIS THESIS Joseph J. Landino...Alternative Costs ......... 56 v AFIT/GCA/LSY/90S-3 Abstract This study’s purpose was to identify the lowest cost aircraft staging base( s ) for the Air

  11. China’s Near Seas Combat Capabilities (China Maritime Study, Number 11)

    Science.gov (United States)

    2014-02-01

    include FY- 2G and -2H in 2014, FY-3D/PM1 and FY-4 M in 2015, FY-3E/AM1 in 2017, FY-3F/PM2 in 2019, china’s near seas combat capabilities 97 FY- 3G ...on ASCMs. This is indicated by the display of land-based, mobile YJ-62 transporter-erector-launchers (TELs) during the 1 October 2009 National Day...air defenses and a supporting targeting system that can detect fleeting mobile targets and rapidly relay the data underwater, submarines would

  12. Architecture for an integrated real-time air combat and sensor network simulation

    Science.gov (United States)

    Criswell, Evans A.; Rushing, John; Lin, Hong; Graves, Sara

    2007-04-01

    An architecture for an integrated air combat and sensor network simulation is presented. The architecture integrates two components: a parallel real-time sensor fusion and target tracking simulation, and an air combat simulation. By integrating these two simulations, it becomes possible to experiment with scenarios in which one or both sides in a battle have very large numbers of primitive passive sensors, and to assess the likely effects of those sensors on the outcome of the battle. Modern Air Power is a real-time theater-level air combat simulation that is currently being used as a part of the USAF Air and Space Basic Course (ASBC). The simulation includes a variety of scenarios from the Vietnam war to the present day, and also includes several hypothetical future scenarios. Modern Air Power includes a scenario editor, an order of battle editor, and full AI customization features that make it possible to quickly construct scenarios for any conflict of interest. The scenario editor makes it possible to place a wide variety of sensors including both high fidelity sensors such as radars, and primitive passive sensors that provide only very limited information. The parallel real-time sensor network simulation is capable of handling very large numbers of sensors on a computing cluster of modest size. It can fuse information provided by disparate sensors to detect and track targets, and produce target tracks.

  13. Combating Rhino Horn Trafficking: The Need to Disrupt Criminal Networks.

    Directory of Open Access Journals (Sweden)

    Timothy C Haas

    Full Text Available The onslaught on the World's wildlife continues despite numerous initiatives aimed at curbing it. We build a model that integrates rhino horn trade with rhino population dynamics in order to evaluate the impact of various management policies on rhino sustainability. In our model, an agent-based sub-model of horn trade from the poaching event up through a purchase of rhino horn in Asia impacts rhino abundance. A data-validated, individual-based sub-model of the rhino population of South Africa provides these abundance values. We evaluate policies that consist of different combinations of legal trade initiatives, demand reduction marketing campaigns, increased anti-poaching measures within protected areas, and transnational policing initiatives aimed at disrupting those criminal syndicates engaged in horn trafficking. Simulation runs of our model over the next 35 years produces a sustainable rhino population under only one management policy. This policy includes both a transnational policing effort aimed at dismantling those criminal networks engaged in rhino horn trafficking-coupled with increases in legal economic opportunities for people living next to protected areas where rhinos live. This multi-faceted approach should be the focus of the international debate on strategies to combat the current slaughter of rhino rather than the binary debate about whether rhino horn trade should be legalized. This approach to the evaluation of wildlife management policies may be useful to apply to other species threatened by wildlife trafficking.

  14. Tactical Reconnaissance and Security for the Armor Battalion Commander: Is the Scout Platoon Combat Capable or Combat Ineffective?

    Science.gov (United States)

    1990-12-27

    reconnaissance force back to a heavy ele ,._.it capable of security missions and limited 10 reconnaissance. Vletnam continued the platoon’s emphasis on...College, Fort Leavenworth, KS, 30 November 1988 (CARL Ref. AOR215860). JouroaI ~ el Bacevich, LTC A. J. "Training Scouts." Armor, September 1987, pp. 37...Swanson, Major Steven G. " Bronco Nine Speaks His Mind." MIlitaryInteigence, April-June 1990, pp. 8- 10, 12. "The Bustle Rack." Armo,; March-April 1990

  15. Predictive Methods for Dense Polymer Networks: Combating Bias with Bio-Based Structures

    Science.gov (United States)

    2016-03-16

    Combating bias with bio - based structures 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Andrew J. Guenthner...unlimited. PA Clearance 16152 Integrity  Service  Excellence Predictive methods for dense polymer networks: Combating bias with bio -based...Architectural Bias • Comparison of Petroleum-Based and Bio -Based Chemical Architectures • Continuing Research on Structure-Property Relationships using

  16. Littoral Combat Ship: Knowledge of Survivability and Lethality Capabilities Needed Prior to Making Major Funding Decisions

    Science.gov (United States)

    2015-12-01

    USS Port Royal hit a coral reef in order to provide an independent review of the damage the ship sustained. Our classified report discussed...Improved Weight Management Needed Prior to Further Investments, GAO-14-349SU (Washington, D.C.: Apr. 8, 2014); Littoral Combat Ship: Knowledge of...Early in the program, the Navy decided to forgo a number of traditional ship requirements in order to help reduce the costs and the weight and size

  17. Do social networks and technological capabilities help knowledge management?

    Directory of Open Access Journals (Sweden)

    Encarnación García-Sánchez

    2017-12-01

    Full Text Available Dynamic capabilities are currently becoming an important extension of the theory of resources and capabilities that enables companies to adapt better in the current competitive environment. This paper examines how knowledge management, a dynamic function related to management or administration of a set of knowledge flows, develops thanks to the greater dynamism of social networks. It then shows how this relationship is especially strengthened by different technological capabilities. To achieve these goals, the paper examines the main tools that permit companies to develop an ability to achieve competitive advantage relative to the technological capabilities of managers and workers, social networks and knowledge management.

  18. Defense Acquisitions: 2009 Review of Future Combat System Is Critical to Program's Direction

    National Research Council Canada - National Science Library

    Francis, Paul L

    2008-01-01

    The Future Combat System (FCS) program which comprises 14 integrated weapon systems and an advanced information network is the centerpiece of the Army's effort to transition to a lighter, more agile, and more capable combat force...

  19. Immune networks: multitasking capabilities near saturation

    International Nuclear Information System (INIS)

    Agliari, E; Annibale, A; Barra, A; Coolen, A C C; Tantari, D

    2013-01-01

    Pattern-diluted associative networks were recently introduced as models for the immune system, with nodes representing T-lymphocytes and stored patterns representing signalling protocols between T- and B-lymphocytes. It was shown earlier that in the regime of extreme pattern dilution, a system with N T T-lymphocytes can manage a number N B =O(N T δ ) of B-lymphocytes simultaneously, with δ B = αN T , with a high degree of pattern dilution, in agreement with immunological findings. We use graph theory and statistical mechanical analysis based on replica methods to show that in the finite-connectivity regime, where each T-lymphocyte interacts with a finite number of B-lymphocytes as N T → ∞, the T-lymphocytes can coordinate effective immune responses to an extensive number of distinct antigen invasions in parallel. As α increases, the system eventually undergoes a second order transition to a phase with clonal cross-talk interference, where the system’s performance degrades gracefully. Mathematically, the model is equivalent to a spin system on a finitely connected graph with many short loops, so one would expect the available analytical methods, which all assume locally tree-like graphs, to fail. Yet it turns out to be solvable. Our results are supported by numerical simulations. (paper)

  20. Specifying Orchestrating Capability in Network Organization and Interfirm Innovation Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    -tech industry. Besides interfirm networks, some organizational researchers are interested in the internal network organizational design. Prospector firms putting innovation on top of the agenda usually has a network organization which is more flexible. This paper analyzes how an SME from a traditional industry...

  1. Data Farming Process and Initial Network Analysis Capabilities

    Directory of Open Access Journals (Sweden)

    Gary Horne

    2016-01-01

    Full Text Available Data Farming, network applications and approaches to integrate network analysis and processes to the data farming paradigm are presented as approaches to address complex system questions. Data Farming is a quantified approach that examines questions in large possibility spaces using modeling and simulation. It evaluates whole landscapes of outcomes to draw insights from outcome distributions and outliers. Social network analysis and graph theory are widely used techniques for the evaluation of social systems. Incorporation of these techniques into the data farming process provides analysts examining complex systems with a powerful new suite of tools for more fully exploring and understanding the effect of interactions in complex systems. The integration of network analysis with data farming techniques provides modelers with the capability to gain insight into the effect of network attributes, whether the network is explicitly defined or emergent, on the breadth of the model outcome space and the effect of model inputs on the resultant network statistics.

  2. Neural network modeling of a dolphin's sonar discrimination capabilities

    OpenAIRE

    Andersen, Lars Nonboe; René Rasmussen, A; Au, WWL; Nachtigall, PE; Roitblat, H.

    1994-01-01

    The capability of an echo-locating dolphin to discriminate differences in the wall thickness of cylinders was previously modeled by a counterpropagation neural network using only spectral information of the echoes [W. W. L. Au, J. Acoust. Soc. Am. 95, 2728–2735 (1994)]. In this study, both time and frequency information were used to model the dolphin discrimination capabilities. Echoes from the same cylinders were digitized using a broadband simulated dolphin sonar signal with the transducer ...

  3. Empirical research on complex networks modeling of combat SoS based on data from real war-game, Part I: Statistical characteristics

    Science.gov (United States)

    Chen, Lei; Kou, Yingxin; Li, Zhanwu; Xu, An; Wu, Cheng

    2018-01-01

    We build a complex networks model of combat System-of-Systems (SoS) based on empirical data from a real war-game, this model is a combination of command & control (C2) subnetwork, sensors subnetwork, influencers subnetwork and logistical support subnetwork, each subnetwork has idiographic components and statistical characteristics. The C2 subnetwork is the core of whole combat SoS, it has a hierarchical structure with no modularity, of which robustness is strong enough to maintain normal operation after any two nodes is destroyed; the sensors subnetwork and influencers subnetwork are like sense organ and limbs of whole combat SoS, they are both flat modular networks of which degree distribution obey GEV distribution and power-law distribution respectively. The communication network is the combination of all subnetworks, it is an assortative Small-World network with core-periphery structure, the Intelligence & Communication Stations/Command Center integrated with C2 nodes in the first three level act as the hub nodes in communication network, and all the fourth-level C2 nodes, sensors, influencers and logistical support nodes have communication capability, they act as the periphery nodes in communication network, its degree distribution obeys exponential distribution in the beginning, Gaussian distribution in the middle, and power-law distribution in the end, and its path length obeys GEV distribution. The betweenness centrality distribution, closeness centrality distribution and eigenvector centrality are also been analyzed to measure the vulnerability of nodes.

  4. The Application of Work Domain Analysis to Defining Australia’s Air Combat Capability

    Science.gov (United States)

    2014-03-01

    Capability. References Brady, A., Naikar, N., & Treadwell, A. (2013). Organisational storytelling with work domain analysis: Case study of air power...UNCLASSIFIED 20 Brady, A., Naikar, N., & Treadwell, A. (2013). Organisational storytelling with work domain analysis: Case study of air power doctrine and...maturity model? A framework of general design principles for maturity model and its demonstration in business process management. Proceedings of the

  5. Amphibious Combat Vehicle: Some Acquisition Activities Demonstrate Best Practices; Attainment of Amphibious Capability to be Determined

    Science.gov (United States)

    2015-10-01

    Defense EFV Expeditionary Fighting Vehicle EPF Expeditionary Fast Transport ESD Expeditionary Transfer Dock JCIDS Joint Capabilities...materials, propulsion, maintainability, and habitability. Production for the SC(X)R is planned to begin in 2018. Expeditionary Fast Transport ( EPF ...The EPF , formerly known as the Joint High Speed Vessel, is a commercial-based catamaran that provides heavy-lift, high-speed sealift mobility. The

  6. Interference suppression capabilities of smart cognitive-femto networks (SCFN)

    KAUST Repository

    Shakir, Muhammad; Atat, Rachad; Alouini, Mohamed-Slim

    2013-01-01

    Cognitive Radios are considered a standard part of future heterogeneous mobile network architectures. In this chapter, a two tier heterogeneous network with multiple Radio Access Technologies (RATs) is considered, namely (1) the secondary network, which comprises of Cognitive-Femto BS (CFBS), and (2) the macrocell network, which is considered a primary network. By exploiting the cooperation among the CFBS, the multiple CFBS can be considered a single base station with multiple geographically dispersed antennas, which can reduce the interference levels by directing the main beam toward the desired femtocell mobile user. The resultant network is referred to as Smart Cognitive-Femto Network (SCFN). In order to determine the effectiveness of the proposed smart network, the interference rejection capabilities of the SCFN is studied. It has been shown that the smart network offers significant performance improvements in interference suppression and Signal to Interference Ratio (SIR) and may be considered a promising solution to the interference management problems in future heterogeneous networks. © 2013, IGI Global.

  7. Neural network modeling of a dolphin's sonar discrimination capabilities

    DEFF Research Database (Denmark)

    Andersen, Lars Nonboe; René Rasmussen, A; Au, WWL

    1994-01-01

    The capability of an echo-locating dolphin to discriminate differences in the wall thickness of cylinders was previously modeled by a counterpropagation neural network using only spectral information of the echoes [W. W. L. Au, J. Acoust. Soc. Am. 95, 2728–2735 (1994)]. In this study, both time a...

  8. Neural network fusion capabilities for efficient implementation of tracking algorithms

    Science.gov (United States)

    Sundareshan, Malur K.; Amoozegar, Farid

    1997-03-01

    The ability to efficiently fuse information of different forms to facilitate intelligent decision making is one of the major capabilities of trained multilayer neural networks that is now being recognized. While development of innovative adaptive control algorithms for nonlinear dynamical plants that attempt to exploit these capabilities seems to be more popular, a corresponding development of nonlinear estimation algorithms using these approaches, particularly for application in target surveillance and guidance operations, has not received similar attention. We describe the capabilities and functionality of neural network algorithms for data fusion and implementation of tracking filters. To discuss details and to serve as a vehicle for quantitative performance evaluations, the illustrative case of estimating the position and velocity of surveillance targets is considered. Efficient target- tracking algorithms that can utilize data from a host of sensing modalities and are capable of reliably tracking even uncooperative targets executing fast and complex maneuvers are of interest in a number of applications. The primary motivation for employing neural networks in these applications comes from the efficiency with which more features extracted from different sensor measurements can be utilized as inputs for estimating target maneuvers. A system architecture that efficiently integrates the fusion capabilities of a trained multilayer neural net with the tracking performance of a Kalman filter is described. The innovation lies in the way the fusion of multisensor data is accomplished to facilitate improved estimation without increasing the computational complexity of the dynamical state estimator itself.

  9. Impact of self-healing capability on network robustness

    Science.gov (United States)

    Shang, Yilun

    2015-04-01

    A wide spectrum of real-life systems ranging from neurons to botnets display spontaneous recovery ability. Using the generating function formalism applied to static uncorrelated random networks with arbitrary degree distributions, the microscopic mechanism underlying the depreciation-recovery process is characterized and the effect of varying self-healing capability on network robustness is revealed. It is found that the self-healing capability of nodes has a profound impact on the phase transition in the emergence of percolating clusters, and that salient difference exists in upholding network integrity under random failures and intentional attacks. The results provide a theoretical framework for quantitatively understanding the self-healing phenomenon in varied complex systems.

  10. Effects of external stores on the air combat capability of a delta wing fighter

    Science.gov (United States)

    Spearman, M. L.; Sawyer, W. C.

    1977-01-01

    Delta wing point-design fighters with two pylon mounted missiles and aft tail controls (similar to several Soviet designs) have been investigated for a Mach number range from about 0.6 to 2.0. Whereas minimum drag penalties that are expected with the addition of external stores do occur, the effects at higher lifts, corresponding to maneuvering flight, are less severe and often favorable. The drag-due-to-lift factor is less with stores on although the lift curve slope is unaffected. The longitudinal stability level is reduced by the addition of stores while the pitch control effectiveness is unchanged. The directional stability was generally reduced at subsonic speeds and increased at supersonic speeds by the addition of stores but sufficiently high stability levels are obtainable that are compatible with the longitudinal maneuvering limits. Some examples of the potential maneuvering capability in terms of normal acceleration and turn radius are included.

  11. Moving image compression and generalization capability of constructive neural networks

    Science.gov (United States)

    Ma, Liying; Khorasani, Khashayar

    2001-03-01

    To date numerous techniques have been proposed to compress digital images to ease their storage and transmission over communication channels. Recently, a number of image compression algorithms using Neural Networks NNs have been developed. Particularly, several constructive feed-forward neural networks FNNs have been proposed by researchers for image compression, and promising results have been reported. At the previous SPIE AeroSense conference 2000, we proposed to use a constructive One-Hidden-Layer Feedforward Neural Network OHL-FNN for compressing digital images. In this paper, we first investigate the generalization capability of the proposed OHL-FNN in the presence of additive noise for network training and/ or generalization. Extensive experimental results for different scenarios are presented. It is revealed that the constructive OHL-FNN is not as robust to additive noise in input image as expected. Next, the constructive OHL-FNN is applied to moving images, video sequences. The first, or other specified frame in a moving image sequence is used to train the network. The remaining moving images that follow are then generalized/compressed by this trained network. Three types of correlation-like criteria measuring the similarity of any two images are introduced. The relationship between the generalization capability of the constructed net and the similarity of images is investigated in some detail. It is shown that the constructive OHL-FNN is promising even for changing images such as those extracted from a football game.

  12. The role of social networks for combating money laundering

    NARCIS (Netherlands)

    Imanpour, M.

    2017-01-01

    Money laundering is the disguising of the illegal origin of money by bringing it back into the legal financial circuit. Therefore, in this dissertation I try to establish a theoretical framework to understand the role of social networks, and the link between criminals and legal actors in the money

  13. Network Communication as a Service-Oriented Capability

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, William; Johnston, William; Metzger, Joe; Collins, Michael; Burrescia, Joseph; Dart, Eli; Gagliardi, Jim; Guok, Chin; Oberman, Kevin; O' Conner, Mike

    2008-01-08

    In widely distributed systems generally, and in science-oriented Grids in particular, software, CPU time, storage, etc., are treated as"services" -- they can be allocated and used with service guarantees that allows them to be integrated into systems that perform complex tasks. Network communication is currently not a service -- it is provided, in general, as a"best effort" capability with no guarantees and only statistical predictability. In order for Grids (and most types of systems with widely distributed components) to be successful in performing the sustained, complex tasks of large-scale science -- e.g., the multi-disciplinary simulation of next generation climate modeling and management and analysis of the petabytes of data that will come from the next generation of scientific instrument (which is very soon for the LHC at CERN) -- networks must provide communication capability that is service-oriented: That is it must be configurable, schedulable, predictable, and reliable. In order to accomplish this, the research and education network community is undertaking a strategy that involves changes in network architecture to support multiple classes of service; development and deployment of service-oriented communication services, and; monitoring and reporting in a form that is directly useful to the application-oriented system so that it may adapt to communications failures. In this paper we describe ESnet's approach to each of these -- an approach that is part of an international community effort to have intra-distributed system communication be based on a service-oriented capability.

  14. Assessing the weather monitoring capabilities of cellular microwave link networks

    Science.gov (United States)

    Fencl, Martin; Vrzba, Miroslav; Rieckermann, Jörg; Bareš, Vojtěch

    2016-04-01

    Using of microwave links for rainfall monitoring was suggested already by (Atlas and Ulbrich, 1977). However, this technique attracted broader attention of scientific community only in the recent decade, with the extensive growth of cellular microwave link (CML) networks, which form the backbone of today's cellular telecommunication infrastructure. Several studies have already shown that CMLs can be conveniently used as weather sensors and have potential to provide near-ground path-integrated observations of rainfall but also humidity or fog. However, although research is still focusing on algorithms to improve the weather sensing capabilities (Fencl et al., 2015), it is not clear how to convince cellular operators to provide the power levels of their network. One step in this direction is to show in which regions or municipalities the networks are sufficiently dense to provide/develop good services. In this contribution we suggest a standardized approach to evaluate CML networks in terms of rainfall observation and to identify suitable regions for CML rainfall monitoring. We estimate precision of single CML based on its sensitivity to rainfall, i.e. as a function of frequency, polarization and path length. Capability of a network to capture rainfall spatial patterns is estimated from the CML coverage and path lengths considering that single CML provides path-integrated rain rates. We also search for suitable predictors for regions where no network topologies are available. We test our approach on several European networks and discuss the results. Our results show that CMLs are very dense in urban areas (> 1 CML/km2), but less in rural areas (online tool. In summary, our results demonstrate that CML represent promising environmental observation network, suitable especially for urban rainfall monitoring. The developed approach integrated into an open source online tool can be conveniently used e.g. by local operators or authorities to evaluate the suitability of

  15. The United States Army Concept Capability Plan for Combating Weapons of Mass Destruction for the Futer Modular Force 2015-2024

    Science.gov (United States)

    2009-03-25

    development and pest control, also have deleterious dual use potential. By replicating themselves after introduction into a target population, a small...N national NATO North Atlantic Treaty Organization NEBC network-enabled battle command NMSCWMD National Military Strategy for Combating...within the continental U.S., Alaska, Hawaii, the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, American Samoa

  16. Antecedents of network capability and their effects on innovation performance: an empirical test of hi-tech firms in China

    NARCIS (Netherlands)

    Fang, Gang; Ma, Xiang Yuan; Brouwers-Ren, Liqin; Zhou, Qing

    2014-01-01

    A firm’s competitive advantage can come not only from internal resources but also from inter-firm innovation networks. This paper shows that network capabilities (i.e., network visioning capability, network constructing capability, network operating capability and network centring capability) are

  17. Enhancing the Radio Astronomy Capabilities at NASA's Deep Space Network

    Science.gov (United States)

    Lazio, Joseph; Teitelbaum, Lawrence; Franco, Manuel M.; Garcia-Miro, Cristina; Horiuchi, Shinji; Jacobs, Christopher; Kuiper, Thomas; Majid, Walid

    2015-08-01

    NASA's Deep Space Network (DSN) is well known for its role in commanding and communicating with spacecraft across the solar system that produce a steady stream of new discoveries in Astrophysics, Heliophysics, and Planetary Science. Equipped with a number of large antennas distributed across the world, the DSN also has a history of contributing to a number of leading radio astronomical projects. This paper summarizes a number of enhancements that are being implemented currently and that are aimed at increasing its capabilities to engage in a wide range of science observations. These enhancements include* A dual-beam system operating between 18 and 27 GHz (~ 1 cm) capable of conducting a variety of molecular line observations, searches for pulsars in the Galactic center, and continuum flux density (photometry) of objects such as nearby protoplanetary disks* Enhanced spectroscopy and pulsar processing backends for use at 1.4--1.9 GHz (20 cm), 18--27 GHz (1 cm), and 38--50 GHz (0.7 cm)* The DSN Transient Observatory (DTN), an automated, non-invasive backend for transient searching* Larger bandwidths (>= 0.5 GHz) for pulsar searching and timing; and* Improved data rates (2048 Mbps) and better instrumental response for very long baseline interferometric (VLBI) observations with the new DSN VLBI processor (DVP), which is providing unprecedented sensitivity for maintenance of the International Celestial Reference Frame (ICRF) and development of future versions.One of the results of these improvements is that the 70~m Deep Space Station 43 (DSS-43, Tidbinbilla antenna) is now the most sensitive radio antenna in the southern hemisphere. Proposals to use these systems are accepted from the international community.Part of this research was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics & Space Administration.

  18. Optimizing the recovery efficiency of Finnish oil combating vessels in the Gulf of Finland using Bayesian Networks.

    Science.gov (United States)

    Lehikoinen, Annukka; Luoma, Emilia; Mäntyniemi, Samu; Kuikka, Sakari

    2013-02-19

    Oil transport has greatly increased in the Gulf of Finland over the years, and risks of an oil accident occurring have risen. Thus, an effective oil combating strategy is needed. We developed a Bayesian Network (BN) to examine the recovery efficiency and optimal disposition of the Finnish oil combating vessels in the Gulf of Finland (GoF), Eastern Baltic Sea. Four alternative home harbors, five accident points, and ten oil combating vessels were included in the model to find the optimal disposition policy that would maximize the recovery efficiency. With this composition, the placement of the oil combating vessels seems not to have a significant effect on the recovery efficiency. The process seems to be strongly controlled by certain random factors independent of human action, e.g. wave height and stranding time of the oil. Therefore, the success of oil combating is rather uncertain, so it is also important to develop activities that aim for preventing accidents. We found that the model developed is suitable for this type of multidecision optimization. The methodology, results, and practices are further discussed.

  19. Building capability through networking with investors and researchers

    DEFF Research Database (Denmark)

    Wang, Daojuan; Schøtt, Thomas

    A startup requires financing, typically, and the startup is based on innovation, often. Capabilities for innovation and financing may be built simultaneously and created jointly at inception. Co-creation of capabilities for financing and innovation is accounted for in this study. Co...

  20. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  1. Global operations networks in motion: Managing configurations and capabilities

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Jørgensen, Claus

    2010-01-01

    In the past, the ‘Made in the World’ label, although capturing what may lie ahead, seemed awkward and futuristic. Today, it has become a reality. An ample array of global products are built up of numerous components and modules manufactured by global networks of differentiated partners rather than...... within the boundaries of one national entity. The purpose of this paper is to contribute to bridging the empirical gap in the area of global operations networks and provide insights into how they change over time. The paper is based on the cases of three Danish companies and their global operations...

  2. Dynamic Resource Allocation and QoS Control Capabilities of the Japanese Academic Backbone Network

    Directory of Open Access Journals (Sweden)

    Michihiro Aoki

    2010-08-01

    Full Text Available Dynamic resource control capabilities have become increasingly important for academic networks that must support big scientific research projects at the same time as less data intensive research and educational activities. This paper describes the dynamic resource allocation and QoS control capabilities of the Japanese academic backbone network, called SINET3, which supports a variety of academic applications with a wide range of network services. The article describes the network architecture, networking technologies, resource allocation, QoS control, and layer-1 bandwidth on-demand services. It also details typical services developed for scientific research, including the user interface, resource control, and management functions, and includes performance evaluations.

  3. BBN technical memorandum W1310 hydroacoustic network capability studies

    Energy Technology Data Exchange (ETDEWEB)

    Angell, J., LLNL

    1997-12-01

    This report summarizes work performed under contract to Lawrence Livermore National Laboratory during the period 1 August to 30 November 1997. Four separate tasks were undertaken during this period which investigated various aspects of hydroacoustic network performance using the Hydroacoustic Coverage Assessment Model (HydroCAM). The purpose of this report is to document each of these tasks.

  4. Immune networks: multi-tasking capabilities at medium load

    Science.gov (United States)

    Agliari, E.; Annibale, A.; Barra, A.; Coolen, A. C. C.; Tantari, D.

    2013-08-01

    Associative network models featuring multi-tasking properties have been introduced recently and studied in the low-load regime, where the number P of simultaneously retrievable patterns scales with the number N of nodes as P ˜ log N. In addition to their relevance in artificial intelligence, these models are increasingly important in immunology, where stored patterns represent strategies to fight pathogens and nodes represent lymphocyte clones. They allow us to understand the crucial ability of the immune system to respond simultaneously to multiple distinct antigen invasions. Here we develop further the statistical mechanical analysis of such systems, by studying the medium-load regime, P ˜ Nδ with δ ∈ (0, 1]. We derive three main results. First, we reveal the nontrivial architecture of these networks: they exhibit a high degree of modularity and clustering, which is linked to their retrieval abilities. Second, by solving the model we demonstrate for δ frameworks are required to achieve effective retrieval.

  5. Integrating Space Communication Network Capabilities via Web Portal Technologies

    Science.gov (United States)

    Johnston, Mark D.; Lee, Carlyn-Ann; Lau, Chi-Wung; Cheung, Kar-Ming; Levesque, Michael; Carruth, Butch; Coffman, Adam; Wallace, Mike

    2014-01-01

    We have developed a service portal prototype as part of an investigation into the feasibility of using Java portlet technology as a means of providing integrated access to NASA communications network services. Portal servers provide an attractive platform for this role due to the various built-in collaboration applications they can provide, combined with the possibility to develop custom inter-operating portlets to extent their functionality while preserving common presentation and behavior. This paper describes various options for integration of network services related to planning and scheduling, and results based on use of a popular open-source portal framework. Plans are underway to develop an operational SCaN Service Portal, building on the experiences reported here.

  6. IPSN monitoring capabilities and information networks in accidental situation

    International Nuclear Information System (INIS)

    Calmet, D.; Robeau, D.

    1992-01-01

    In 1989, a Radiological Transmission and Early Warning System (SYTAR) came into being in order to harmonize radioactivity surveillance methodologies and furthermore to trigger off an alert throughout the networks whenever an unusual degree of radioactivity is detected. SYTAR is a remote permanent system linking up a national electronic access and the radiation protection services of nuclear facilities located on the mainland. The structure of the network are particularly presented in the framework of a drill organized on october 1991 in the south-east of France. During this drill, an accident was simulated on a ghost nuclear power plant located in the Cadarache Nuclear Center. A large number of samples were taken from filtered aerosols, soils, grass, milk, vegetables, food stuff; they were contaminated with Caesium 137 and Iodine 131 before to be sent to laboratories for measurements. The results of measurements were transmitted to the actors of the drill using SYTAR network. They permit to determine the exclusion area, the radiological impacts and counter-measures. (author)

  7. Immune networks: multi-tasking capabilities at medium load

    International Nuclear Information System (INIS)

    Agliari, E; Annibale, A; Barra, A; Coolen, A C C; Tantari, D

    2013-01-01

    Associative network models featuring multi-tasking properties have been introduced recently and studied in the low-load regime, where the number P of simultaneously retrievable patterns scales with the number N of nodes as P ∼ log N. In addition to their relevance in artificial intelligence, these models are increasingly important in immunology, where stored patterns represent strategies to fight pathogens and nodes represent lymphocyte clones. They allow us to understand the crucial ability of the immune system to respond simultaneously to multiple distinct antigen invasions. Here we develop further the statistical mechanical analysis of such systems, by studying the medium-load regime, P ∼ N δ with δ ∈ (0, 1]. We derive three main results. First, we reveal the nontrivial architecture of these networks: they exhibit a high degree of modularity and clustering, which is linked to their retrieval abilities. Second, by solving the model we demonstrate for δ < 1 the existence of large regions in the phase diagram where the network can retrieve all stored patterns simultaneously. Finally, in the high-load regime δ = 1 we find that the system behaves as a spin-glass, suggesting that finite-connectivity frameworks are required to achieve effective retrieval. (paper)

  8. Prioritization Assessment for Capability Gaps in Weapon System of Systems Based on the Conditional Evidential Network

    Directory of Open Access Journals (Sweden)

    Dong Pei

    2018-02-01

    Full Text Available The prioritization of capability gaps for weapon system of systems is the basis for design and capability planning in the system of systems development process. In order to address input information uncertainties, the prioritization of capability gaps is computed in two steps using the conditional evidential network method. First, we evaluated the belief distribution of degree of required satisfaction for capabilities, and then calculated the reverse conditional belief function between capability hierarchies. We also provided verification for the feasibility and effectiveness of the proposed method through a prioritization of capability gaps calculation using an example of a spatial-navigation-and-positioning system of systems.

  9. Optical implementations of associative networks with versatile adaptive learning capabilities.

    Science.gov (United States)

    Fisher, A D; Lippincott, W L; Lee, J N

    1987-12-01

    Optical associative, parallel-processing architectures are being developed using a multimodule approach, where a number of smaller, adaptive, associative modules are nonlinearly interconnected and cascaded under the guidance of a variety of organizational principles to structure larger architectures for solving specific problems. A number of novel optical implementations with versatile adaptive learning capabilities are presented for the individual associative modules, including holographic configurations and five specific electrooptic configurations. The practical issues involved in real optical architectures are analyzed, and actual laboratory optical implementations of associative modules based on Hebbian and Widrow-Hoff learning rules are discussed, including successful experimental demonstrations of their operation.

  10. Intelligent Surveillance Robot with Obstacle Avoidance Capabilities Using Neural Network

    Directory of Open Access Journals (Sweden)

    Widodo Budiharto

    2015-01-01

    Full Text Available For specific purpose, vision-based surveillance robot that can be run autonomously and able to acquire images from its dynamic environment is very important, for example, in rescuing disaster victims in Indonesia. In this paper, we propose architecture for intelligent surveillance robot that is able to avoid obstacles using 3 ultrasonic distance sensors based on backpropagation neural network and a camera for face recognition. 2.4 GHz transmitter for transmitting video is used by the operator/user to direct the robot to the desired area. Results show the effectiveness of our method and we evaluate the performance of the system.

  11. Consumer preferences relative to the price and network capability of small urban vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Burns, L.D.

    1979-09-01

    Preferences of consumers for small urban vehicle concepts differing only with respect to their hypothetical purchase prices and network capabilities (i.e., whether they are capable of operating on expressways, major arterials, or local streets) are analyzed using statistical techniques based on psychological scaling theories. Results from these analyses indicate that a vast majority of consumers are not readily willing to give up the accessibility provided by conventional automobiles. More specifically, over the range of hypothetical prices considered here, network capability dominates as a determinant of preferences for vehicle concepts. Also, the ability to operate vehicles on expressways is of utmost importance to consumers.

  12. Combating trafficking: the Swiss approach

    OpenAIRE

    Sebastian Rauber

    2006-01-01

    Switzerland is committed to combating and preventingtrafficking in human beings. Effective policy implementationin a federal structure depends on networking,effective information exchange and development ofrobust cooperation mechanisms.

  13. Comprehensive evaluation index system of total supply capability in distribution network

    Science.gov (United States)

    Zhang, Linyao; Wu, Guilian; Yang, Jingyuan; Jia, Shuangrui; Zhang, Wei; Sun, Weiqing

    2018-01-01

    Aiming at the lack of a comprehensive evaluation of the distribution network, based on the existing distribution network evaluation index system, combined with the basic principles of constructing the evaluation index, put forward a new evaluation index system of distribution network capacity. This paper is mainly based on the total supply capability of the distribution network, combining single index and various factors, into a multi-evaluation index of the distribution network, thus forming a reasonable index system, and various indicators of rational quantification make the evaluation results more intuitive. In order to have a comprehensive judgment of distribution network, this paper uses weights to analyse the importance of each index, verify the rationality of the index system through the example, it is proved that the rationality of the index system, so as to guide the direction of distribution network planning.

  14. Managerial capabilities of the home base in an intra-organisational global network

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona

    of the HB change in the process of its global intra-organisational network evolution. In particular, the four papers constituting this thesis investigate how global intra-organisational networks evolve, how the types of network management capabilities of the HB change along with such network evolution....... This investigation was conducted through a retrospective longitudinal case study of one Danish original equipment manufacturer and its three subsidiaries in China, Slovakia, and the US. The findings, first of all, support, extend, and modify the revised Uppsala globalisation model with regard to the types...

  15. The facilitation of groups and networks: capabilities to shape creative cooperation

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard

    2003-01-01

    The facilitator, defined as a process guide of creative cooperation, is becoming more and more in focus to assist groups,teams and networks to meet these challenges. The author defines and exemplifies different levels of creative coorperation. Core capabilities of facilitation are defined...

  16. Effectiveness of a Littoral Combat Ship as a Major Node in a Wireless Mesh Network

    Science.gov (United States)

    2017-03-01

    responsible for connection management, handover control and measurement control (Scalable Network Technologies, 2014c). The final layer in the LTE ...26 2. Oceus Networks 4G LTE ...32 2. LTE Library .................................................................................32 3

  17. Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks

    Science.gov (United States)

    2015-11-01

    Gholamreza, and Ester, Martin. “Modeling the Temporal Dynamics of Social Rating Networks Using Bidirectional Effects of Social Relations and Rating...1.1.2 β-disruptor Problems Besides the homogeneous network model consisting of uniform nodes and bidirectional links, the heterogeneous network model... neural and metabolic networks .” Biological Cybernetics 90 (2004): 311–317. 10.1007/s00422-004-0479-1. URL http://dx.doi.org/10.1007/s00422-004-0479-1 [51

  18. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network which comprises of cognitive enabled femto base stations which are referred to as cognitive-femto BS (CFBS) such that each of the BS are equipped with a single antenna and (ii) the macrocell network which is considered as a primary network. The effectiveness of the cognitive transmission is based on the efficient spectrum sensing algorithms which determine the availability of the spectrum holes. However, it is equally important for the cognitive network to minimize the cross-tier interference particularly during (i) the spectrum sensing and (ii) the cognitive transmission if spectrum is available. By exploiting the cooperation among the CFBS, the multiple CFBS can be considered as a single base station with multiple geographically dispersed antennas. In this context, we proposed a smart network where CFBS collaborates to reduce the cross-tier interference level by directing the main beam toward the desired femtocell mobile user and creating toward the cross-tier interference. The resultant network is referred to as Smart cognitive-femto network (SCFN) which requires the CFBS to be self-aware such that the CFBS are aware of their surroundings and adapt accordingly to maintain a reliable and efficient communication link. In order to determine the effectiveness of the proposed smart network, we study the interference rejection (or suppression) capabilities of the SCFN. It has been shown that the proposed smart network offers significant performance improvements in interference suppression and signal to interference ratio (SIR) and may be considered as a promising solution to the interference management problems in Heterogeneous network. © 2012 IEEE.

  19. Impact of distance on the network management capability of the home base firm

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Slepniov, Dmitrij

    For many globally dispersed organizations the home base (HB) is historically the locus of integrative, coordinating and innovating efforts, important for the overall performance. The growing concerns about the offshoring strategies posing threats to the capabilities of the HB draw attention to how...... a HB can continuously sustain its centrality. The well-known challenges of distance in the distributed working arrangements may be regarded as a major threat to the network management capabilities (NMCs) of the HB. Therefore, this paper investigates what role does distance between the HB and its...

  20. Structures and Infrastructures of International R&D Networks: A Capability Maturity Perspective

    DEFF Research Database (Denmark)

    Niang, Mohamed; Wæhrens, Brian Vejrum

    Purpose: This paper explores the process towards globally distributing R&D activities with an emphasis on organizational maturity. It discusses emerging configurations by asking how the structure and infrastructure of international R&D networks evolve along with the move from a strong R&D center...... to dispersed development. Design/Methodology/Approach: This is a qualitative study of the process of distributing R&D. By comparing selected firms, the researchers identify a pattern of dispersion of R&D activities in three Danish firms. Findings and Discussion: Drawing from the case studies, the researchers...... present a capability maturity model. Furthermore, understanding the interaction between new structures and infrastructures of the dispersed networks is viewed as a key requirement for developing organizational capabilities and formulating adequate strategies that leverage dispersed R&D. Organizational...

  1. Network-Centric Operations Case Study: Air-to-Air Combat With and Without Link 16

    National Research Council Canada - National Science Library

    Gonzales, Daniel; Hollywood, John; Kingston, Gina; Signori, David

    2005-01-01

    ...) Operational Special Project. In this exercise, the capabilities of F-15 air superiority aircraft equipped with voice-only communications were compared with F-15s equipped with voice and JTIDS Link 16 data link communications...

  2. Will the Current Solution Survive the Future Battlespace? An examination of the Combatant Role of the Australian Army’s Protected mobility capability

    Science.gov (United States)

    2010-12-10

    Interim Infantry Mobility Vehicle IMV Infantry Mobility Vehicle INTERFET International Force East Timor LOE Lines of Effort LWD -1 Land Warfare...produce strategically relevant and combat ready forces.”39 This doctrinal publication, Land Warfare Doctrine 1 ( LWD 1), echoes the difficulties outlined...time. The acknowledgement of this concern is further underlined in LWD 1 which enunciates that “while the strategic situation can change quickly

  3. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  4. Multihop Capability Analysis in Wireless Information and Power Transfer Multirelay Cooperative Networks

    Directory of Open Access Journals (Sweden)

    Qilin Wu

    2018-01-01

    Full Text Available We study simultaneous wireless information and power transfer (SWIPT in multihop wireless cooperative networks, where the multihop capability that denotes the largest number of transmission hops is investigated. By utilizing the broadcast nature of multihop wireless networks, we first propose a cooperative forwarding power (CFP scheme. In CFP scheme, the multiple relays and receiver have distinctly different tasks. Specifically, multiple relays close to the transmitter harvest power from the transmitter first and then cooperatively forward the power (not the information towards the receiver. The receiver receives the information (not the power from the transmitter first, and then it harvests the power from the relays and is taken as the transmitter of the next hop. Furthermore, for performance comparison, we suggest two schemes: cooperative forwarding information and power (CFIP and direct receiving information and power (DFIP. Also, we construct an analysis model to investigate the multihop capabilities of CFP, CFIP, and DFIP schemes under the given targeted throughput requirement. Finally, simulation results validate the analysis model and show that the multihop capability of CFP is better than CFIP and DFIP, and for improving the multihop capabilities, it is best effective to increase the average number of relay nodes in cooperative set.

  5. A study on the multiple dynamic wavelength distribution for gigabit capable passive optical networks

    Directory of Open Access Journals (Sweden)

    Gustavo Adolfo Puerto Leguizamón

    2014-04-01

    Full Text Available This paper presents a data traffic based study aiming at evaluating the impact of dynamic wavelength allocation on a Gigabit capable Passive Optical Network (GPON. In Passive Optical Networks (PON, an Optical Line Terminal (OLT feeds different PONs in such a way that a given wavelength channel is evenly distributed between the Optical Network Units (ONU at each PON. However, PONs do not specify any kind of dynamic behavior on the way the wavelengths are allocated in the network, a completely static distribution is implemented instead. In thispaper we evaluate the network performance in terms of packet losses and throughput for a number of ONUs being out-of-profile while featuring a given percentage of traffic in excess for a fixed wavelength distribution and for multiple dynamic wavelength allocation. Results show that for a multichannel operation with four wavelengths, the network throughput increases up to a rough value of 19% while the packet losses drop from 22 % to 1.8 % as compared with a static wavelength distribution.

  6. Traffic routing for multicomputer networks with virtual cut-through capability

    Science.gov (United States)

    Kandlur, Dilip D.; Shin, Kang G.

    1992-01-01

    Consideration is given to the problem of selecting routes for interprocess communication in a network with virtual cut-through capability, while balancing the network load and minimizing the number of times that a message gets buffered. An approach is proposed that formulates the route selection problem as a minimization problem with a link cost function that depends upon the traffic through the link. The form of this cost function is derived using the probability of establishing a virtual cut-through route. The route selection problem is shown to be NP-hard, and an algorithm is developed to incrementally reduce the cost by rerouting the traffic. The performance of this algorithm is exemplified by two network topologies: the hypercube and the C-wrapped hexagonal mesh.

  7. U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    OpenAIRE

    Oveyik, Kaan.; Kurkcu, Coskun

    2008-01-01

    Approved for public release; distribution is unlimited Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluat...

  8. Exploiting the In-Network Capabilities of Multicast to Discover Proximate IPTV Channels

    Directory of Open Access Journals (Sweden)

    William Donnelly

    2010-09-01

    Full Text Available IPTV has become the next generation of television due, in part, to its ability to support features that have been lacking in conventional broadcasting—for example, end-user interactivity, personalisation and localisation. Providers are also searching for the most efficient delivery methods to provide the greatest amount of contents at the lowest cost. At present IPTV uses IP multicast to deliver live TV channels in an over-provisioned walled-garden network due to issues of deploying multicast and QoS challenges in the public Internet. However, IPTV is likely to shift into some parts of the public Internet in the future as a managed service. Multicast routing is performed on a per-session destination-address basis so each router maintains a table of all of the multicast addresses to which the content is being forwarded. We exploit this information to discover and join the in-progress channels of geographically proximate users and to create a new incentivised premium service in future IPTV networks called ProxyTV. This approach is expected to minimise network bandwidth requirements as it enables ISPs to optimise bandwidth on their edge networks. This becomes increasingly significant as TV content consumes more and more bandwidth, especially with the onset of HD and 3D capabilities. In this paper, we have presented in detail the concept with the results of a survey and an analysis of network traffic to justify the proposed approach.

  9. Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    OpenAIRE

    Ikram, Muhammad; Onwuzurike, Lucky; Farooqi, Shehroze; De Cristofaro, Emiliano; Friedman, Arik; Jourjon, Guillaume; Kaafar, Mohammad Ali; Shafiq, M. Zubair

    2015-01-01

    As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between genuine likes and those generated by farm-controlled profiles. However, as we show in this paper,...

  10. 2006 Combat Vehicles Conference

    Science.gov (United States)

    2006-10-25

    stressed or worn out beyond economic repair due to combat operations by repairing, rebuilding, or procuring replacement equipment. These...lives Vehicle Hardening Logistics Solutions for the Warfighter • Unique and economical surge capability • Support in coordination with op tempo...Speed, • Diagnostics Indicators – DECU Health Check Indicator, Utility Bus Comm Failure, 1553 Bus Comm Failure; MPU Critical Failure, Cautions and

  11. Comparison of High Performance Network Options: EDR InfiniBand vs.100Gb RDMA Capable Ethernet

    Energy Technology Data Exchange (ETDEWEB)

    Kachelmeier, Luke Anthony [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Univ. of New Mexico, Albuquerque, NM (United States); Van Wig, Faith Virginia [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Missouri Univ. of Science and Technology, Rolla, MO (United States); Erickson, Kari Natania [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); New Mexico Inst. of Mining and Technology, Socorro, NM (United States)

    2016-08-08

    These are the slides for a presentation at the HPC Mini Showcase. This is a comparison of two different high performance network options: EDR InfiniBand and 100Gb RDMA capable ethernet. The conclusion of this comparison is the following: there is good potential, as shown with the direct results; 100Gb technology is too new and not standardized, thus deployment effort is complex for both options; different companies are not necessarily compatible; if you want 100Gb/s, you must get it all from one place.

  12. Effect of signal noise on the learning capability of an artificial neural network

    International Nuclear Information System (INIS)

    Vega, J.J.; Reynoso, R.; Calvet, H. Carrillo

    2009-01-01

    Digital Pulse Shape Analysis (DPSA) by artificial neural networks (ANN) is becoming an important tool to extract relevant information from digitized signals in different areas. In this paper, we present a systematic evidence of how the concomitant noise that distorts the signals or patterns to be identified by an ANN set limits to its learning capability. Also, we present evidence that explains overtraining as a competition between the relevant pattern features, on the one side, against the signal noise, on the other side, as the main cause defining the shape of the error surface in weight space and, consequently, determining the steepest descent path that controls the ANN adaptation process.

  13. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  14. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  15. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  16. Combating trafficking: the Swiss approach

    Directory of Open Access Journals (Sweden)

    Sebastian Rauber

    2006-05-01

    Full Text Available Switzerland is committed to combating and preventingtrafficking in human beings. Effective policy implementationin a federal structure depends on networking,effective information exchange and development ofrobust cooperation mechanisms.

  17. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks.

    Science.gov (United States)

    Guo, Dong; Cao, Jian; Wang, Xiaoqi; Fu, Qiang; Li, Qiang

    2016-09-20

    Cyber Physical Social Sensing makes mobile social networks (MSNs) popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR) codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices' operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors' messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System)-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  18. Combating QR-Code-Based Compromised Accounts in Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Dong Guo

    2016-09-01

    Full Text Available Cyber Physical Social Sensing makes mobile social networks (MSNs popular with users. However, such attacks are rampant as malicious URLs are spread covertly through quick response (QR codes to control compromised accounts in MSNs to propagate malicious messages. Currently, there are generally two types of methods to identify compromised accounts in MSNs: one type is to analyze the potential threats on wireless access points and the potential threats on handheld devices’ operation systems so as to stop compromised accounts from spreading malicious messages; the other type is to apply the method of detecting compromised accounts in online social networks to MSNs. The above types of methods above focus neither on the problems of MSNs themselves nor on the interaction of sensors’ messages, which leads to the restrictiveness of platforms and the simplification of methods. In order to stop the spreading of compromised accounts in MSNs effectively, the attacks have to be traced to their sources first. Through sensors, users exchange information in MSNs and acquire information by scanning QR codes. Therefore, analyzing the traces of sensor-related information helps to identify the compromised accounts in MSNs. This paper analyzes the diversity of information sending modes of compromised accounts and normal accounts, analyzes the regularity of GPS (Global Positioning System-based location information, and introduces the concepts of entropy and conditional entropy so as to construct an entropy-based model based on machine learning strategies. To achieve the goal, about 500,000 accounts of Sina Weibo and about 100 million corresponding messages are collected. Through the validation, the accuracy rate of the model is proved to be as high as 87.6%, and the false positive rate is only 3.7%. Meanwhile, the comparative experiments of the feature sets prove that sensor-based location information can be applied to detect the compromised accounts in MSNs.

  19. Detection capability of the IMS seismic network based on ambient seismic noise measurements

    Science.gov (United States)

    Gaebler, Peter J.; Ceranna, Lars

    2016-04-01

    All nuclear explosions - on the Earth's surface, underground, underwater or in the atmosphere - are banned by the Comprehensive Nuclear-Test-Ban Treaty (CTBT). As part of this treaty, a verification regime was put into place to detect, locate and characterize nuclear explosion testings at any time, by anyone and everywhere on the Earth. The International Monitoring System (IMS) plays a key role in the verification regime of the CTBT. Out of the different monitoring techniques used in the IMS, the seismic waveform approach is the most effective technology for monitoring nuclear underground testing and to identify and characterize potential nuclear events. This study introduces a method of seismic threshold monitoring to assess an upper magnitude limit of a potential seismic event in a certain given geographical region. The method is based on ambient seismic background noise measurements at the individual IMS seismic stations as well as on global distance correction terms for body wave magnitudes, which are calculated using the seismic reflectivity method. From our investigations we conclude that a global detection threshold of around mb 4.0 can be achieved using only stations from the primary seismic network, a clear latitudinal dependence for the detection threshold can be observed between northern and southern hemisphere. Including the seismic stations being part of the auxiliary seismic IMS network results in a slight improvement of global detection capability. However, including wave arrivals from distances greater than 120 degrees, mainly PKP-wave arrivals, leads to a significant improvement in average global detection capability. In special this leads to an improvement of the detection threshold on the southern hemisphere. We further investigate the dependence of the detection capability on spatial (latitude and longitude) and temporal (time) parameters, as well as on parameters such as source type and percentage of operational IMS stations.

  20. Detection and localization capability of an urban seismic sinkhole monitoring network

    Science.gov (United States)

    Becker, Dirk; Dahm, Torsten; Schneider, Fabian

    2017-04-01

    Microseismic events linked to underground processes in sinkhole areas might serve as precursors to larger mass dislocation or rupture events which can cause felt ground shaking or even structural damage. To identify these weak and shallow events, a sensitive local seismic monitoring network is needed. In case of an urban environment the performance of local monitoring networks is severely compromised by the high anthropogenic noise level. We study the detection and localization capability of such a network, which is already partly installed in the urban area of the city of Hamburg, Germany, within the joint project SIMULTAN (http://www.gfz-potsdam.de/en/section/near-surface-geophysics/projects/simultan/). SIMULTAN aims to monitor a known sinkhole structure and gain a better understanding of the underlying processes. The current network consists of six surface stations installed in the basement of private houses and underground structures of a research facility (DESY - Deutsches Elektronen Synchrotron). During the started monitoring campaign since 2015, no microseismic events could be unambiguously attributed to the sinkholes. To estimate the detection and location capability of the network, we calculate synthetic waveforms based on the location and mechanism of former events in the area. These waveforms are combined with the recorded urban seismic noise at the station sites. As detection algorithms a simple STA/LTA trigger and a more sophisticated phase detector are used. While the STA/LTA detector delivers stable results and is able to detect events with a moment magnitude as low as 0.35 at a distance of 1.3km from the source even under the present high noise conditions the phase detector is more sensitive but also less stable. It should be stressed that due to the local near surface conditions of the wave propagation the detections are generally performed on S- or surface waves and not on P-waves, which have a significantly lower amplitude. Due to the often

  1. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    OpenAIRE

    Blanco, Bego; Taboada, Ianire; Fajardo, Jose Oscar; Liberal, Fidel

    2017-01-01

    In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-awa...

  2. COMPETITIVENESS, MARKETING ACCESS, AND NETWORK CAPABILITY AND ITS IMPACTS ON MARKETING PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Teguh Iman Sayekti

    2016-12-01

    Full Text Available This study is to determine what factors influencingthe performance of SMEs. The population in this study is SMEs in the Central Java. Sample collection was conducted with a purposive sampling method. Criteriaused to take into accountis the SMEs that are already running at leastfortwo years. The sample in this study is intended as the representative of total population,67 (sixty seven. The data were processed and analyzed by computer program of SPSS 20 for Windows. Based on the results of regression analysis, it can be concluded that competitiveness has positive and significant impact on marketing performance marketing access has positive and significant impact on marketing performance. It means that the higher competitiveness and marketing access, the higher its performance. Competitiveness and marketing access have influence on SMEs’ performance through network capability.   

  3. Capabilities and prospects of the East Asia Very Long Baseline Interferometry Network

    Science.gov (United States)

    An, T.; Sohn, B. W.; Imai, H.

    2018-02-01

    The very long baseline interferometry (VLBI) technique offers angular resolutions superior to any other instruments at other wavelengths, enabling unique science applications of high-resolution imaging of radio sources and high-precision astrometry. The East Asia VLBI Network (EAVN) is a collaborative effort in the East Asian region. The EAVN currently consists of 21 telescopes with diverse equipment configurations and frequency setups, allowing flexible subarrays for specific science projects. The EAVN provides the highest resolution of 0.5 mas at 22 GHz, allowing the fine imaging of jets in active galactic nuclei, high-accuracy astrometry of masers and pulsars, and precise spacecraft positioning. The soon-to-be-operational Five-hundred-meter Aperture Spherical radio Telescope (FAST) will open a new era for the EAVN. This state-of-the-art VLBI array also provides easy access to and crucial training for the burgeoning Asian astronomical community. This Perspective summarizes the status, capabilities and prospects of the EAVN.

  4. Joint preprocesser-based detector for cooperative networks with limited hardware processing capability

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2015-02-01

    In this letter, a joint detector for cooperative communication networks is proposed when the destination has limited hardware processing capability. The transmitter sends its symbols with the help of L relays. As the destination has limited hardware, only U out of L signals are processed and the energy of the remaining relays is lost. To solve this problem, a joint preprocessing based detector is proposed. This joint preprocessor based detector operate on the principles of minimizing the symbol error rate (SER). For a realistic assessment, pilot symbol aided channel estimation is incorporated for this proposed detector. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Our proposed scheme has low computational complexity.

  5. Experimental integration of quantum key distribution and gigabit-capable passive optical network

    Science.gov (United States)

    Sun, Wei; Wang, Liu-Jun; Sun, Xiang-Xiang; Mao, Yingqiu; Yin, Hua-Lei; Wang, Bi-Xiao; Chen, Teng-Yun; Pan, Jian-Wei

    2018-01-01

    Quantum key distribution (QKD) ensures information-theoretic security for the distribution of random bits between two remote parties. To extend QKD applications to fiber-to-the-home optical communications, such as gigabit-capable passive optical networks (GPONs), an effective method is the use of wavelength-division multiplexing. However, the Raman scattering noise from intensive classical traffic and the huge loss introduced by the beam splitter in a GPON severely limits the performance of QKD. Here, we demonstrate the integration of QKD and a commercial GPON system with fiber lengths up to 14 km, in which the maximum splitting ratio of the beam splitter reaches 1:64. By placing the QKD transmitter on the optical line terminal side, we reduce the Raman noise collected at the QKD receiver. Using a bypass structure, the loss of the beam splitter is circumvented effectively. Our results pave the way to extending the applications of QKD to last-mile communications.

  6. Towards a Global Hub and a Network for Collaborative Advancing of Space Weather Predictive Capabilities.

    Science.gov (United States)

    Kuznetsova, M. M.; Heynderickz, D.; Grande, M.; Opgenoorth, H. J.

    2017-12-01

    The COSPAR/ILWS roadmap on space weather published in 2015 (Advances in Space Research, 2015: DOI: 10.1016/j.asr.2015.03.023) prioritizes steps to be taken to advance understanding of space environment phenomena and to improve space weather forecasting capabilities. General recommendations include development of a comprehensive space environment specification, assessment of the state of the field on a 5-yr basis, standardization of meta-data and product metrics. To facilitate progress towards roadmap goals there is a need for a global hub for collaborative space weather capabilities assessment and development that brings together research, engineering, operational, educational, and end-user communities. The COSPAR Panel on Space Weather is aiming to build upon past progress and to facilitate coordination of established and new international space weather research and development initiatives. Keys to the success include creating flexible, collaborative, inclusive environment and engaging motivated groups and individuals committed to active participation in international multi-disciplinary teams focused on topics addressing emerging needs and challenges in the rapidly growing field of space weather. Near term focus includes comprehensive assessment of the state of the field and establishing an internationally recognized process to quantify and track progress over time, development of a global network of distributed web-based resources and interconnected interactive services required for space weather research, analysis, forecasting and education.

  7. Network-Capable Application Process and Wireless Intelligent Sensors for ISHM

    Science.gov (United States)

    Figueroa, Fernando; Morris, Jon; Turowski, Mark; Wang, Ray

    2011-01-01

    Intelligent sensor technology and systems are increasingly becoming attractive means to serve as frameworks for intelligent rocket test facilities with embedded intelligent sensor elements, distributed data acquisition elements, and onboard data acquisition elements. Networked intelligent processors enable users and systems integrators to automatically configure their measurement automation systems for analog sensors. NASA and leading sensor vendors are working together to apply the IEEE 1451 standard for adding plug-and-play capabilities for wireless analog transducers through the use of a Transducer Electronic Data Sheet (TEDS) in order to simplify sensor setup, use, and maintenance, to automatically obtain calibration data, and to eliminate manual data entry and error. A TEDS contains the critical information needed by an instrument or measurement system to identify, characterize, interface, and properly use the signal from an analog sensor. A TEDS is deployed for a sensor in one of two ways. First, the TEDS can reside in embedded, nonvolatile memory (typically flash memory) within the intelligent processor. Second, a virtual TEDS can exist as a separate file, downloadable from the Internet. This concept of virtual TEDS extends the benefits of the standardized TEDS to legacy sensors and applications where the embedded memory is not available. An HTML-based user interface provides a visual tool to interface with those distributed sensors that a TEDS is associated with, to automate the sensor management process. Implementing and deploying the IEEE 1451.1-based Network-Capable Application Process (NCAP) can achieve support for intelligent process in Integrated Systems Health Management (ISHM) for the purpose of monitoring, detection of anomalies, diagnosis of causes of anomalies, prediction of future anomalies, mitigation to maintain operability, and integrated awareness of system health by the operator. It can also support local data collection and storage. This

  8. The Armored Brigade Combat Team (ABCT) in the Future: An Assessment of Capabilities Against the Hybrid Threat in the Future Operational Environment

    Science.gov (United States)

    2013-06-13

    requirements, followed by a tactical case study assessment, and a strengths, weaknesses, opportunities, and threats ( SWOT ) analysis of the BCTs against a...strategic and operational deployment. This information further developed the case study SWOT analysis of the BCTs against a hybrid threat. The SWOT ...a SWOT analysis . The next section addressed is the analysis . The analysis is comprised of the strategic capabilities assessment and the tactical

  9. Artificial Neural Network Application for Power Transfer Capability and Voltage Calculations in Multi-Area Power System

    Directory of Open Access Journals (Sweden)

    Palukuru NAGENDRA

    2010-12-01

    Full Text Available In this study, the use of artificial neural network (ANN based model, multi-layer perceptron (MLP network, to compute the transfer capabilities in a multi-area power system was explored. The input for the ANN is load status and the outputs are the transfer capability among the system areas, voltage magnitudes and voltage angles at concerned buses of the areas under consideration. The repeated power flow (RPF method is used in this paper for calculating the power transfer capability, voltage magnitudes and voltage angles necessary for the generation of input-output patterns for training the proposed MLP neural network. Preliminary investigations on a three area 30-bus system reveal that the proposed model is computationally faster than the conventional method.

  10. On the interference suppression capabilities of cognitive enabled femto cellular networks

    KAUST Repository

    Shakir, Muhammad; Atat, Rachad; Alouini, Mohamed-Slim

    2012-01-01

    Cognitive Radios are considered as a standard part of future Heterogeneous mobile network architecture. In this paper, we consider a two tier Heterogeneous network with multiple radio access technologies (RATS) namely; (i) the secondary network

  11. Designing Networks that are Capable of Self-Healing and Adapting

    Science.gov (United States)

    2017-04-01

    battlefield, and utility infrastructure in cities . Networks that are easy to repair after many breaks. The origi- nal networks (left), the networks after...8725 John J. Kingman Road, MS 6201 Fort Belvoir, VA 22060-6201 T E C H N IC A L R E P O R T DTRA-TR-15-78 Designing Networks that are...from statistical mechanics, combinatorics, boolean networks , and numerical simulations, and inspired by design principles from biological networks , we

  12. On the Capability of Smartphones to Perform as Communication Gateways in Medical Wireless Personal Area Networks

    Directory of Open Access Journals (Sweden)

    María José Morón

    2014-01-01

    Full Text Available This paper evaluates and characterizes the technical performance of medicalwireless personal area networks (WPANs that are based on smartphones. For this purpose,a prototype of a health telemonitoring system is presented. The prototype incorporates acommercial Android smartphone, which acts as a relay point, or “gateway”, between a setof wireless medical sensors and a data server. Additionally, the paper investigates if theconventional capabilities of current commercial smartphones can be affected by their useas gateways or “Holters” in health monitoring applications. Specifically, the profiling hasfocused on the CPU and power consumption of the mobile devices. These metrics havebeen measured under several test conditions modifying the smartphone model, the type ofsensors connected to the WPAN, the employed Bluetooth profile (SPP (serial port profile orHDP (health device profile, the use of other peripherals, such as a GPS receiver, the impactof the use of theWi-Fi interface or the employed method to encode and forward the data thatare collected from the sensors.

  13. Redes de política no combate à fome e à pobreza: a estratégia Comunidade Solidária no Brasil Policy networks combating hunger and poverty: the Solidarity Community strategy in Brazil

    Directory of Open Access Journals (Sweden)

    Luciene Burlandy

    2007-12-01

    Full Text Available Este estudo analisou a estratégia de combate à pobreza da Comunidade Solidária (Governo Federal Brasileiro -1995-2003, examinando os mecanismos institucionais utilizados para aprimorar a focalização do Programa de Distribuição de Alimentos (PRODEA e do Programa de Combate à Desnutrição Materno Infantil (PCDMI. Foram realizadas 97 entrevistas com atores governamentais e societários integrantes da CS nos níveis federal (9, estadual (6 e municipal (82 entrevistas em oito municípios do Estado do Rio de Janeiro, no ano de 2000. Concluiu-se que a CS avançou em identificar e convergir os programas para os municípios mais pobres e torná-los mais visíveis aos gestores. A inserção dos diferentes atores na rede da CS variou de acordo com o poder político e a capacidade institucional de cada setor. As estratégias utilizadas foram: a negociação com cada ministério para alocação prioritária de recursos a partir de um critério técnico (indigência; maior apoio técnico e acesso à informação para os municípios mais pobres, fortalecendo sua habilidade em captar recursos. O papel da CS no nível local foi limitado devido a deficiências na articulação intersetorial e a dificuldades no monitoramento da implementação dos programas e na seleção de beneficiários, limitando seu direcionamento para os grupos mais vulneráveis.This paper analyzes a strategy deployed by the Brazilian Government for combating hunger and poverty: the Solidarity Community (1995-2003, particularly institutional mechanisms used to fine-tune targeting processes and allocate resources to the Food Stocks Distribution Program (PRODEA and the Undernourished Child and High-Risk Pregnancy Program (PCDMI. Primary data were obtained through interviews with policy network players, including segments of government and society: nine Federal; six State and 82 from eight Municipalities in Rio de Janeiro state. Moving towards its goal of converging programs for the

  14. On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures

    OpenAIRE

    Tutschku, Kurt; Ahmadi Mehri, Vida; Carlsson, Anders; Chivukula, Krishna Varaynya; Johan, Christenson

    2016-01-01

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to e...

  15. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  16. Communication network structure parameters and new knowledge generation capabilities in companies engaged in industry control system engineering projects

    Directory of Open Access Journals (Sweden)

    Titov Sergei

    2016-01-01

    Full Text Available Engineering companies engaged in business of industry control systems need to manage the processes of generation of innovations within and across their projects. Generation and diffusion of innovations materialize through the communication networks of project teams. Therefore, it is possible to hypothesize that the characteristics of communication networks play role in generation of new knowledge. With the data from 14 industry control system projects of a Russian engineering company the communication network structure characteristics were calculated and the analysis of correlation between these characteristics and knowledge generation capabilities was performed. As a result correlation between centralization of communication and the number of new technical solutions developed in projects was discovered.

  17. Arctic Observing Network Data Management: Current Capabilities and Their Promise for the Future

    Science.gov (United States)

    Collins, J.; Fetterer, F.; Moore, J. A.

    2008-12-01

    CADIS (the Cooperative Arctic Data and Information Service) serves as the data management, discovery and delivery component of the Arctic Observing Network (AON). As an International Polar Year (IPY) initiative, AON comprises 34 land, atmosphere and ocean observation sites, and will acquire much of the data coming from the interagency Study of Environmental Arctic Change (SEARCH). CADIS is tasked with ensuring that these observational data are managed for long term use by members of the entire Earth System Science community. Portions of CADIS are either in use by the community or available for testing. We now have an opportunity to evaluate the feedback received from our users, to identify any design shortcomings, and to identify those elements which serve their purpose well and will support future development. This presentation will focus on the nuts-and-bolts of the CADIS development to date, with an eye towards presenting lessons learned and best practices based on our experiences so far. The topics include: - How did we assess our users' needs, and how are those contributions reflected in the end product and its capabilities? - Why did we develop a CADIS metadata profile, and how does it allow CADIS to support preservation and scientific interoperability? - How can we shield the user from metadata complexities (especially those associated with various standards) while still obtaining the metadata needed to support an effective data management system? - How can we bridge the gap between the data storage formats considered convenient by researchers in the field, and those which are necessary to provide data interoperability? - What challenges have been encountered in our efforts to provide access to federated data (data stored outside of the CADIS system)? - What are the data browsing and visualization needs of the AON community, and which tools and technologies are most promising in terms of supporting those needs? A live demonstration of the current

  18. Location capability of a sparse regional network (RSTN) using a multi-phase earthquake location algorithm (REGLOC)

    Energy Technology Data Exchange (ETDEWEB)

    Hutchings, L.

    1994-01-01

    The Regional Seismic Test Network (RSTN) was deployed by the US Department of Energy (DOE) to determine whether data recorded by a regional network could be used to detect and accurately locate seismic events that might be clandestine nuclear tests. The purpose of this paper is to evaluate the location capability of the RSTN. A major part of this project was the development of the location algorithm REGLOC and application of Basian a prior statistics for determining the accuracy of the location estimates. REGLOC utilizes all identifiable phases, including backazimuth, in the location. Ninty-four events, distributed throughout the network area, detected by both the RSTN and located by local networks were used in the study. The location capability of the RSTN was evaluated by estimating the location accuracy, error ellipse accuracy, and the percentage of events that could be located, as a function of magnitude. The location accuracy was verified by comparing the RSTN results for the 94 events with published locations based on data from the local networks. The error ellipse accuracy was evaluated by determining whether the error ellipse includes the actual location. The percentage of events located was assessed by combining detection capability with location capability to determine the percentage of events that could be located within the study area. Events were located with both an average crustal model for the entire region, and with regional velocity models along with station corrections obtained from master events. Most events with a magnitude <3.0 can only be located with arrivals from one station. Their average location errors are 453 and 414 km for the average- and regional-velocity model locations, respectively. Single station locations are very unreliable because they depend on accurate backazimuth estimates, and backazimuth proved to be a very unreliable computation.

  19. Designing Networks that are Capable of Self-Healing and Adapting

    Science.gov (United States)

    2017-04-01

    from statistical mechanics, combinatorics, boolean networks, and numerical simulations, and inspired by design principles from biological networks, we... principles for self-healing networks, and applications, and construct an all-possible-paths model for network adaptation. 2015-11-16 UNIT CONVERSION...kg m –3 ) pound-force (lbf avoirdupois) 4.448 222 newton (N) Energy/Work/Power electron volt (eV) 1.602 177 × 10 –19 joule (J) erg 1 × 10 –7

  20. Survey of the WHO-REMPAN network's capability for strengthening preparedness for radiological and nuclear emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Kumagai, A [Takashi Nagai Memorial International Hibakusha Medical Centre, Nagasaki Univ. Hospital, Nagasaki (Japan); Carr, Z [Dept. of Public Health and Environment, Health Security and Environment Cluster, World Health Organization, Geneva (Switzerland); Akira, O [Takashi Nagai Memorial International Hibakusha Medical Centre, Nagasaki Univ. Hospital, Nagasaki (Japan); Christie, D [Dept. of Public Health and Environment, Health Security and Environment Cluster, World Health Organization, Geneva (Switzerland); Yamashita, S [Takashi Nagai Memorial International Hibakusha Medical Centre, Nagasaki Univ. Hospital, Nagasaki (Japan); Fukushima Medical Univ. (Japan)

    2012-07-01

    This paper investigates the capacity of the World Health Organization (WHO)-REMPAN network in responding to radiological incidents and nuclear emergencies. A survey developed by the WHO Secretariat and Nagasaki Univ. was sent to all 40 WHO-REMPAN collaborating centres and liaison institutes in order to verify the current situation of the network, identify needs and collect suggestions for future improvements. Most of the responding institutions said they were satisfied with the current status of the network. However, several responses to the survey indicate that better internal communication is needed, as well as a position document to specify the roles, rights and responsibilities of the network members. (authors)

  1. Survey of the WHO-REMPAN network's capability for strengthening preparedness for radiological and nuclear emergencies

    International Nuclear Information System (INIS)

    Kumagai, A.; Carr, Z.; Akira, O.; Christie, D.; Yamashita, S.

    2012-01-01

    This paper investigates the capacity of the World Health Organization (WHO)-REMPAN network in responding to radiological incidents and nuclear emergencies. A survey developed by the WHO Secretariat and Nagasaki Univ. was sent to all 40 WHO-REMPAN collaborating centres and liaison institutes in order to verify the current situation of the network, identify needs and collect suggestions for future improvements. Most of the responding institutions said they were satisfied with the current status of the network. However, several responses to the survey indicate that better internal communication is needed, as well as a position document to specify the roles, rights and responsibilities of the network members. (authors)

  2. Business-IT alignment in PSS value networks : a capability-based framework

    NARCIS (Netherlands)

    Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; Camarinha-Matos, L.M.; Afsarmanesh, H.

    2014-01-01

    Advanced information technology (IT) is regarded as a foundation for the operation of product-service system (PSS) value networks. This requires alignment between IT and PSS business strategy. Business‐IT alignment (BIA) in a value network can raise the ability of partners to collaborate effectively

  3. Logistical Analysis of the Littoral Combat Ship

    National Research Council Canada - National Science Library

    Rudko, David

    2003-01-01

    The purpose of the Littoral Combat Ship (LCS) is to provide the Navy with an affordable, small, multi-mission ship capable of independent, interdependent, and integrated operations inside the littorals...

  4. Assured communications and combat resiliency: the relationship between effective national communications and combat efficiency

    Science.gov (United States)

    Allgood, Glenn O.; Kuruganti, Phani Teja; Nutaro, James; Saffold, Jay

    2009-05-01

    Combat resiliency is the ability of a commander to prosecute, control, and consolidate his/her's sphere of influence in adverse and changing conditions. To support this, an infrastructure must exist that allows the commander to view the world in varying degrees of granularity with sufficient levels of detail to permit confidence estimates to be levied against decisions and course of actions. An infrastructure such as this will include the ability to effectively communicate context and relevance within and across the battle space. To achieve this will require careful thought, planning, and understanding of a network and its capacity limitations in post-event command and control. Relevance and impact on any existing infrastructure must be fully understood prior to deployment to exploit the system's full capacity and capabilities. In this view, the combat communication network is considered an integral part of or National communication network and infrastructure. This paper will describe an analytical tool set developed at ORNL and RNI incorporating complexity theory, advanced communications modeling, simulation, and visualization technologies that could be used as a pre-planning tool or post event reasoning application to support response and containment.

  5. The strategic capability of Asian network airlines to compete with low-cost carriers

    OpenAIRE

    Pearson, James; O'Connell, John F.; Pitfield, David; Ryley, Tim

    2015-01-01

    Never before have network airlines been so exposed and vulnerable to low-cost carriers (LCCs). While LCCs had 26.3% of all world seats in 2013, Southeast Asia had 57.7% and South Asia 58.4% – and these figures will only increase. There are many consequences of LCCs on network airlines, including inadequately meeting the expectations of customers, so increasing dissatisfaction, and not offering sufficient value-for-money. Clearly, it is fundamentally important for Asian network airlines to res...

  6. Quantifying capability of a local seismic network in terms of locations and focal mechanism solutions of weak earthquakes

    Science.gov (United States)

    Fojtíková, Lucia; Kristeková, Miriam; Málek, Jiří; Sokos, Efthimios; Csicsay, Kristián; Zahradník, Jiří

    2016-01-01

    Extension of permanent seismic networks is usually governed by a number of technical, economic, logistic, and other factors. Planned upgrade of the network can be justified by theoretical assessment of the network capability in terms of reliable estimation of the key earthquake parameters (e.g., location and focal mechanisms). It could be useful not only for scientific purposes but also as a concrete proof during the process of acquisition of the funding needed for upgrade and operation of the network. Moreover, the theoretical assessment can also identify the configuration where no improvement can be achieved with additional stations, establishing a tradeoff between the improvement and additional expenses. This paper presents suggestion of a combination of suitable methods and their application to the Little Carpathians local seismic network (Slovakia, Central Europe) monitoring epicentral zone important from the point of seismic hazard. Three configurations of the network are considered: 13 stations existing before 2011, 3 stations already added in 2011, and 7 new planned stations. Theoretical errors of the relative location are estimated by a new method, specifically developed in this paper. The resolvability of focal mechanisms determined by waveform inversion is analyzed by a recent approach based on 6D moment-tensor error ellipsoids. We consider potential seismic events situated anywhere in the studied region, thus enabling "mapping" of the expected errors. Results clearly demonstrate that the network extension remarkably decreases the errors, mainly in the planned 23-station configuration. The already made three-station extension of the network in 2011 allowed for a few real data examples. Free software made available by the authors enables similar application in any other existing or planned networks.

  7. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    Directory of Open Access Journals (Sweden)

    Bego Blanco

    2017-01-01

    Full Text Available In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-aware placement solution using a robust optimization approach based on service demand uncertainty in order to minimize the power consumption in the system constrained by network service latency requirements and infrastructure terms. Then, we discuss the results of the proposed placement mechanism in 5G scenarios that combine several service flavours and robust protection values. Once the impact of the service flavour and robust protection on the global power consumption of the system is analyzed, numerical results indicate that our proposal succeeds in efficiently placing the virtual network functions that compose the network services in the available hardware infrastructure while fulfilling service constraints.

  8. Detection capability of seismic network based on noise analysis and magnitude of completeness

    Czech Academy of Sciences Publication Activity Database

    Fischer, Tomáš; Bachura, M.

    2014-01-01

    Roč. 18, č. 1 (2014), s. 137-150 ISSN 1383-4649 R&D Projects: GA MŠk LM2010008 Institutional support: RVO:67985530 Keywords : seismic monitoring * magnitude of completeness * detection capability Subject RIV: DC - Siesmology, Volcanology, Earth Structure OBOR OECD: Volcanology Impact factor: 1.386, year: 2014

  9. Analysis of Traffic Engineering capabilities for SDN-based Data Center Networks

    DEFF Research Database (Denmark)

    Pilimon, Artur; Kentis, Angelos Mimidis; Ruepp, Sarah Renée

    2018-01-01

    In the recent years more and more existing services have moved from local execution environments into the cloud. In addition, new cloud-based services are emerging, which are characterized by very stringent delay requirements. This trend puts a stress in the existing monolithic architecture of Data...... techniques focusing on their limitations. Then, it highlights the benefits of incorporating the Software Defined Networking (SDN) paradigm to address these limitations. Furthermore, it illustrates two methodologies and addresses the scalability aspect of DCN-oriented TE, network and service testing...

  10. Inter-domain networking innovation on steroids: empowering ixps with SDN capabilities

    KAUST Repository

    Chiesa, Marco

    2016-10-14

    While innovation in inter-domain routing has remained stagnant for over a decade, Internet exchange points (IXPs) are consolidating their role as economically advantageous interconnection points for reducing path latencies and exchanging ever increasing amounts of traffic. As such, IXPs appear as a natural place to foster network innovation and assess the benefits of SDN, a recent technological trend that has already boosted innovation within data center networks. In this article, we give a comprehensive overview of use cases for SDN at IXPs, which leverage the superior vantage point of an IXP to introduce advanced features like load balancing and DDoS mitigation. We discuss the benefits of SDN solutions by analyzing real-world data from one of the largest IXPs. We also leverage insights into IXP operations to shape benefits not only for members but also for operators.

  11. CONTEXT-CAPTURE MULTI-VALUED DECISION FUSION WITH FAULT TOLERANT CAPABILITY FOR WIRELESS SENSOR NETWORKS

    OpenAIRE

    Jun Wu; Shigeru Shimamoto

    2011-01-01

    Wireless sensor networks (WSNs) are usually utilized to perform decision fusion of event detection. Current decision fusion schemes are based on binary valued decision and do not consider bursty contextcapture. However, bursty context and multi-valued data are important characteristics of WSNs. One on hand, the local decisions from sensors usually have bursty and contextual characteristics. Fusion center must capture the bursty context information from the sensors. On the other hand, in pract...

  12. Evaluating the Capability of High-Altitude Infrasound Platforms to Cover Gaps in Existing Networks.

    Energy Technology Data Exchange (ETDEWEB)

    Bowman, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    A variety of Earth surface and atmospheric sources generate low frequency sound waves that can travel great distances. Despite a rich history of ground-based sensor studies, very few experiments have investigated the prospects of free floating microphone arrays at high altitudes. However, recent initiatives have shown that such networks have very low background noise and may sample an acoustic wave field that is fundamentally different than that at the Earth's surface. The experiments have been limited to at most two stations at altitude, limiting their utility in acoustic event detection and localization. We describe the deployment of five drifting microphone stations at altitudes between 21 and 24 km above sea level. The stations detected one of two regional ground-based explosions as well as the ocean microbarom while traveling almost 500 km across the American Southwest. The explosion signal consisted of multiple arrivals; signal amplitudes did not correlate with sensor elevation or source range. A sparse network method that employed curved wave front corrections was able to determine the backazimuth from the free flying network to the acoustic source. Episodic broad band signals similar to those seen on previous flights in the same region were noted as well, but their source remains unclear. Background noise levels were commensurate with those on infrasound stations in the International Monitoring System (IMS) below 2 seconds, but sensor self noise appears to dominate at higher frequencies.

  13. Research on the tourism resource development from the perspective of network capability-Taking Wuxi Huishan Ancient Town as an example

    Science.gov (United States)

    Bao, Yanli; Hua, Hefeng

    2017-03-01

    Network capability is the enterprise's capability to set up, manage, maintain and use a variety of relations between enterprises, and to obtain resources for improving competitiveness. Tourism in China is in a transformation period from sightseeing to leisure and vacation. Scenic spots as well as tourist enterprises can learn from some other enterprises in the process of resource development, and build up its own network relations in order to get resources for their survival and development. Through the effective management of network relations, the performance of resource development will be improved. By analyzing literature on network capability and the case analysis of Wuxi Huishan Ancient Town, the role of network capacity in the tourism resource development is explored and resource development path is built from the perspective of network capability. Finally, the tourism resource development process model based on network capacity is proposed. This model mainly includes setting up network vision, resource identification, resource acquisition, resource utilization and tourism project development. In these steps, network construction, network management and improving network center status are key points.

  14. Case study: development of a SANDF tactical data link network enabling capability

    CSIR Research Space (South Africa)

    Smith, CJ

    2011-11-01

    Full Text Available stream_source_info Smith4_2011.pdf.txt stream_content_type text/plain stream_size 24788 Content-Encoding ISO-8859-1 stream_name Smith4_2011.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Case Study: Development of a...Commander/Operational Personnel Operational Doctrine/Processes C2 and Platform applications Application 1 Application 2 Application 3 Data Data Data Communications Infrastructure DataData DataData Figure 1. TDL Capability Model In relation to Figure 1, Link...

  15. Improving Fault Ride-Through Capability of Variable Speed Wind Turbines in Distribution Networks

    DEFF Research Database (Denmark)

    Mokryani, Geev; Siano, P.; Piccolo, Antonio

    2013-01-01

    In this paper, a fuzzy controller for improving the fault ride-through (FRT) capability of variable speed wind turbines (WTs) equipped with a doubly fed induction generator (DFIG) is presented. DFIGs can be used as reactive power sources to control the voltage at the point of common coupling (PCC......). The controller is designed to compensate for the voltage at the PCC by simultaneously regulating the reactive and active power generated by WTs. The performance of the controller is evaluated in different case studies considering a different number of wind farms in different locations. Simulations carried out...

  16. Superior Generalization Capability of Hardware-Learing Algorithm Developed for Self-Learning Neuron-MOS Neural Networks

    Science.gov (United States)

    Kondo, Shuhei; Shibata, Tadashi; Ohmi, Tadahiro

    1995-02-01

    We have investigated the learning performance of the hardware backpropagation (HBP) algorithm, a hardware-oriented learning algorithm developed for the self-learning architecture of neural networks constructed using neuron MOS (metal-oxide-semiconductor) transistors. The solution to finding a mirror symmetry axis in a 4×4 binary pixel array was tested by computer simulation based on the HBP algorithm. Despite the inherent restrictions imposed on the hardware-learning algorithm, HBP exhibits equivalent learning performance to that of the original backpropagation (BP) algorithm when all the pertinent parameters are optimized. Very importantly, we have found that HBP has a superior generalization capability over BP; namely, HBP exhibits higher performance in solving problems that the network has not yet learnt.

  17. Including 10-Gigabit-capable Passive Optical Network under End-to-End Generalized Multi-Protocol Label Switching Provisioned Quality of Service

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Gavler, Anders; Wessing, Henrik

    2012-01-01

    of the network where quality of service signaling is bridged. This article proposes strategies for generalized multi-protocol label switching control over next emerging passive optical network standard, i.e., the 10-gigabit-capable passive optical network. Node management and resource allocation approaches...... are discussed, and possible issues are raised. The analysis shows that consideration of a 10-gigabit-capable passive optical network as a generalized multi-protocol label switching controlled domain is valid and may advance end-to-end quality of service provisioning for passive optical network based customers.......End-to-end quality of service provisioning is still a challenging task despite many years of research and development in this area. Considering a generalized multi-protocol label switching based core/metro network and resource reservation protocol capable home gateways, it is the access part...

  18. Real-time multiple networked viewer capability of the DIII-D EC data acquisition system

    International Nuclear Information System (INIS)

    Ponce, D.; Gorelov, I.A.; Chiu, H.K.; Baity, F.W.

    2005-01-01

    A data acquisition system (DAS) which permits real-time viewing by multiple locally networked operators is being implemented for the electron cyclotron (EC) heating and current drive system at DIII-D. The DAS is expected to demonstrate performance equivalent to standalone oscilloscopes. Participation by remote viewers, including throughout the greater DIII-D facility, can also be incorporated. The real-time system uses one computer-controlled DAS per gyrotron. The DAS computers send their data to a central data server using individual and dedicated 200 Mbps fully duplexed Ethernet connections. The server has a dedicated 10 krpm hard drive for each gyrotron DAS. Selected channels can then be reprocessed and distributed to viewers over a standard local area network (LAN). They can also be bridged from the LAN to the internet. Calculations indicate that the hardware will support real-time writing of each channel at full resolution to the server hard drives. The data will be re-sampled for distribution to multiple viewers over the LAN in real-time. The hardware for this system is in place. The software is under development. This paper will present the design details and up-to-date performance metrics of the system

  19. STICAP: A linear circuit analysis program with stiff systems capability. Volume 1: Theory manual. [network analysis

    Science.gov (United States)

    Cooke, C. H.

    1975-01-01

    STICAP (Stiff Circuit Analysis Program) is a FORTRAN 4 computer program written for the CDC-6400-6600 computer series and SCOPE 3.0 operating system. It provides the circuit analyst a tool for automatically computing the transient responses and frequency responses of large linear time invariant networks, both stiff and nonstiff (algorithms and numerical integration techniques are described). The circuit description and user's program input language is engineer-oriented, making simple the task of using the program. Engineering theories underlying STICAP are examined. A user's manual is included which explains user interaction with the program and gives results of typical circuit design applications. Also, the program structure from a systems programmer's viewpoint is depicted and flow charts and other software documentation are given.

  20. The Measurement of Combat Stress in the Field: A Product Development Study

    National Research Council Canada - National Science Library

    Cotton, A

    1998-01-01

    .... In the early nineties, however, a need was perceived to improve the individual combat capability of the infantry soldier in order to improve the combat capability of the Army as a whole. This led to the creation of Project WUNDURRA (an aboriginal word meaning "warrior"), which subsequently became known as Project LAND125 (Soldier Combat System Enhancement Study).

  1. The Global Detection Capability of the IMS Seismic Network in 2013 Inferred from Ambient Seismic Noise Measurements

    Science.gov (United States)

    Gaebler, P. J.; Ceranna, L.

    2016-12-01

    All nuclear explosions - on the Earth's surface, underground, underwater or in the atmosphere - are banned by the Comprehensive Nuclear-Test-Ban Treaty (CTBT). As part of this treaty, a verification regime was put into place to detect, locate and characterize nuclear explosion testings at any time, by anyone and everywhere on the Earth. The International Monitoring System (IMS) plays a key role in the verification regime of the CTBT. Out of the different monitoring techniques used in the IMS, the seismic waveform approach is the most effective technology for monitoring nuclear underground testing and to identify and characterize potential nuclear events. This study introduces a method of seismic threshold monitoring to assess an upper magnitude limit of a potential seismic event in a certain given geographical region. The method is based on ambient seismic background noise measurements at the individual IMS seismic stations as well as on global distance correction terms for body wave magnitudes, which are calculated using the seismic reflectivity method. From our investigations we conclude that a global detection threshold of around mb 4.0 can be achieved using only stations from the primary seismic network, a clear latitudinal dependence for the detection thresholdcan be observed between northern and southern hemisphere. Including the seismic stations being part of the auxiliary seismic IMS network results in a slight improvement of global detection capability. However, including wave arrivals from distances greater than 120 degrees, mainly PKP-wave arrivals, leads to a significant improvement in average global detection capability. In special this leads to an improvement of the detection threshold on the southern hemisphere. We further investigate the dependence of the detection capability on spatial (latitude and longitude) and temporal (time) parameters, as well as on parameters such as source type and percentage of operational IMS stations.

  2. An Embedded Wireless Sensor Network with Wireless Power Transmission Capability for the Structural Health Monitoring of Reinforced Concrete Structures.

    Science.gov (United States)

    Gallucci, Luca; Menna, Costantino; Angrisani, Leopoldo; Asprone, Domenico; Moriello, Rosario Schiano Lo; Bonavolontà, Francesco; Fabbrocino, Francesco

    2017-11-07

    Maintenance strategies based on structural health monitoring can provide effective support in the optimization of scheduled repair of existing structures, thus enabling their lifetime to be extended. With specific regard to reinforced concrete (RC) structures, the state of the art seems to still be lacking an efficient and cost-effective technique capable of monitoring material properties continuously over the lifetime of a structure. Current solutions can typically only measure the required mechanical variables in an indirect, but economic, manner, or directly, but expensively. Moreover, most of the proposed solutions can only be implemented by means of manual activation, making the monitoring very inefficient and then poorly supported. This paper proposes a structural health monitoring system based on a wireless sensor network (WSN) that enables the automatic monitoring of a complete structure. The network includes wireless distributed sensors embedded in the structure itself, and follows the monitoring-based maintenance (MBM) approach, with its ABCDE paradigm, namely: accuracy, benefit, compactness, durability, and easiness of operations. The system is structured in a node level and has a network architecture that enables all the node data to converge in a central unit. Human control is completely unnecessary until the periodic evaluation of the collected data. Several tests are conducted in order to characterize the system from a metrological point of view and assess its performance and effectiveness in real RC conditions.

  3. An Embedded Wireless Sensor Network with Wireless Power Transmission Capability for the Structural Health Monitoring of Reinforced Concrete Structures

    Directory of Open Access Journals (Sweden)

    Luca Gallucci

    2017-11-01

    Full Text Available Maintenance strategies based on structural health monitoring can provide effective support in the optimization of scheduled repair of existing structures, thus enabling their lifetime to be extended. With specific regard to reinforced concrete (RC structures, the state of the art seems to still be lacking an efficient and cost-effective technique capable of monitoring material properties continuously over the lifetime of a structure. Current solutions can typically only measure the required mechanical variables in an indirect, but economic, manner, or directly, but expensively. Moreover, most of the proposed solutions can only be implemented by means of manual activation, making the monitoring very inefficient and then poorly supported. This paper proposes a structural health monitoring system based on a wireless sensor network (WSN that enables the automatic monitoring of a complete structure. The network includes wireless distributed sensors embedded in the structure itself, and follows the monitoring-based maintenance (MBM approach, with its ABCDE paradigm, namely: accuracy, benefit, compactness, durability, and easiness of operations. The system is structured in a node level and has a network architecture that enables all the node data to converge in a central unit. Human control is completely unnecessary until the periodic evaluation of the collected data. Several tests are conducted in order to characterize the system from a metrological point of view and assess its performance and effectiveness in real RC conditions.

  4. A global, multi-disciplinary, multi-sectorial initiative to combat leptospirosis: Global Leptospirosis Environmental Action Network (GLEAN).

    Science.gov (United States)

    Durski, Kara N; Jancloes, Michel; Chowdhary, Tej; Bertherat, Eric

    2014-06-05

    Leptospirosis has emerged as a major public health problem in both animals and humans. The true burden of this epidemic and endemic disease is likely to be grossly under-estimated due to the non-specific clinical presentations of the disease and the difficulty of laboratory confirmation. The complexity that surrounds the transmission dynamics, particularly in epidemic situations, requires a coordinated, multi-disciplinary effort. Therefore, the Global Leptospirosis Environmental Action Network (GLEAN) was developed to improve global and local strategies of how to predict, prevent, detect, and intervene in leptospirosis outbreaks in order to prevent and control leptospirosis in high-risk populations.

  5. Meeting the Challenge - Developing Leaders for Army National Guard Combat Units

    National Research Council Canada - National Science Library

    Keolanui, Stan

    2000-01-01

    ...). Capable and qualified leaders are a necessity in complex organizations like the eSB. These leaders will insure that Guard combat units meet all readiness and deployment standards necessary for future combat...

  6. [The Working Group of Enforcement Officers (WGEO) : The European Network of Drug Regulatory Authorities to Combat Pharmaceutical Crime].

    Science.gov (United States)

    Wittstock, Marcus; Streit, Renz

    2017-11-01

    Ten years ago the Heads of Medicines Agencies (HMA) officially founded the Working Group of Enforcement Officers (WGEO), a European working group to reduce falsifications of human and veterinarian medicinal products in the legal and illegal supply chain. Police, customs and other international organisations are also represented in the WGEO. Partner organisations are for example the Directorate General for Health and Food Safety of the European Commission, the European Medicines Agency (EMA), the European Police Office (Europol), the International Criminal Police Organization (Interpol), the European Directorate for the Quality of Medicines and Healthcare (EDQM) and the World Health Organization (WHO). The main goal of the group is the protection of public health from harmful medicines for both humans and animals. The WGEO has created a network of its members and a rapid alert system to exchange confidential information on falsified or stolen medicinal products. There are face-to-face meetings twice a year including training using case studies.

  7. Combat Power Analysis is Combat Power Density

    Science.gov (United States)

    2012-05-17

    Lanchester equations, Weapon Effectiveness Index (WEI), Weighted Unit Value (WUV), Armored Division Equivalents (ADE), and Unit Frontages. The research...6 Lanchester Equations... Lanchester Equations ............................................................................................... 53 Appendix C: Relative Combat Power

  8. MILITARY MISSION COMBAT EFFICIENCY ESTIMATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Ighoyota B. AJENAGHUGHRURE

    2017-04-01

    Full Text Available Military infantry recruits, although trained, lacks experience in real-time combat operations, despite the combat simulations training. Therefore, the choice of including them in military operations is a thorough and careful process. This has left top military commanders with the tough task of deciding, the best blend of inexperienced and experienced infantry soldiers, for any military operation, based on available information on enemy strength and capability. This research project delves into the design of a mission combat efficiency estimator (MCEE. It is a decision support system that aids top military commanders in estimating the best combination of soldiers suitable for different military operations, based on available information on enemy’s combat experience. Hence, its advantages consist of reducing casualties and other risks that compromises the entire operation overall success, and also boosting the morals of soldiers in an operation, with such information as an estimation of combat efficiency of their enemies. The system was developed using Microsoft Asp.Net and Sql server backend. A case study test conducted with the MECEE system, reveals clearly that the MECEE system is an efficient tool for military mission planning in terms of team selection. Hence, when the MECEE system is fully deployed it will aid military commanders in the task of decision making on team members’ combination for any given operation based on enemy personnel information that is well known beforehand. Further work on the MECEE will be undertaken to explore fire power types and impact in mission combat efficiency estimation.

  9. Candid Voices - Agile Combat Support From the OC-ALC Engine Shop Viewpoint. Volume XXII, Number 4

    National Research Council Canada - National Science Library

    Larvick, Jon

    1998-01-01

    .... This article will take the Agile Combat Support initiative -the focus of combat support shifts from maintaining massive inventories to establishing a response capability-as the goal and will focus...

  10. Building dynamic capabilities in large global advertising agency networks: managing the shift from mass communication to digital interactivity

    DEFF Research Database (Denmark)

    Suheimat, Wisam; Prætorius, Thim; Brambini-Pedersen, Jan Vang

    2018-01-01

    Interactive digital technologies result in significant managerial challenges for the largest global advertising agency networks. This paper, based on original data from in-depth case research in three of the largest global advertising networks, investigates how advertising agency networks manage...

  11. Logistics Operations in Combat Operations Against an Insurgent Force

    National Research Council Canada - National Science Library

    Hatcher, Clay

    2007-01-01

    .... The road networks are generally not secure and put soldiers at risk. How do we distribute supplies and reduce the risk or avoid the enemy's threat to our combat logistics patrols in an insurgent environment...

  12. Combat desertification, arret deforestation

    International Nuclear Information System (INIS)

    Tin-Latt; Soe-Win-Hlaing

    2000-01-01

    This article presents the major progress on the actions of the Forest Department and Dry Zone Greening Department to arrest forestation and to combat desertification in the dry zone of central Myanmar

  13. Will available bit rate (ABR) services give us the capability to offer virtual LANs over wide-area ATM networks?

    Science.gov (United States)

    Ferrandiz, Ana; Scallan, Gavin

    1995-10-01

    The available bit rate (ABR) service allows connections to exceed their negotiated data rates during the life of the connections when excess capacity is available in the network. These connections are subject to flow control from the network in the event of network congestion. The ability to dynamically adjust the data rate of the connection can provide improved utilization of the network and be a valuable service to end users. ABR type service is therefore appropriate for the transmission of bursty LAN traffic over a wide area network in a manner that is more efficient and cost effective than allocating bandwdith at the peak cell rate. This paper describes the ABR service and discusses if it is realistic to operate a LAN like service over a wide area using ABR.

  14. Reliability–based economic model predictive control for generalised flow–based networks including actuators’ health–aware capabilities

    Directory of Open Access Journals (Sweden)

    Grosso Juan M.

    2016-09-01

    Full Text Available This paper proposes a reliability-based economic model predictive control (MPC strategy for the management of generalised flow-based networks, integrating some ideas on network service reliability, dynamic safety stock planning, and degradation of equipment health. The proposed strategy is based on a single-layer economic optimisation problem with dynamic constraints, which includes two enhancements with respect to existing approaches. The first enhancement considers chance-constraint programming to compute an optimal inventory replenishment policy based on a desired risk acceptability level, leading to dynamical allocation of safety stocks in flow-based networks to satisfy non-stationary flow demands. The second enhancement computes a smart distribution of the control effort and maximises actuators’ availability by estimating their degradation and reliability. The proposed approach is illustrated with an application of water transport networks using the Barcelona network as the case study considered.

  15. Combat Rescue Helicopter (CRH)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-479 Combat Rescue Helicopter (CRH) As of FY 2017 President’s Budget Defense Acquisition...Name Combat Rescue Helicopter (CRH) DoD Component Air Force Responsible Office References SAR Baseline (Development Estimate) Defense Acquisition... Helicopter (CRH) system will provide Personnel Recovery (PR) forces with a vertical takeoff and landing aircraft that is quickly deployable and

  16. The Role 1 capability review: mitigation and innovation for Op HERRICK 18 and into contingency.

    Science.gov (United States)

    Wheatley, Robert J

    2014-09-01

    The Role 1 orientated JRAMC of September 2012 was a welcome addition to the body of Role 1 literature. In particular, the Role 1 capability review by Hodgetts and Findlay detailed both current issues and future aspirations for Role 1 provision. This personal view considers issues still prevalent during Op HERRICK 18 namely the provision of primary healthcare by combat medical technicians on operations and the organisational issues that contribute to historical structural and attitudinal obstructions to the employment of combat medical technicians in firm base primary healthcare. It also considers a dynamically updating dashboard capable of displaying risk across the Role 1 network with the implied move to a model of continuous healthcare assurance. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  17. Capability Paternalism

    NARCIS (Netherlands)

    Claassen, R.J.G.|info:eu-repo/dai/nl/269266224

    A capability approach prescribes paternalist government actions to the extent that it requires the promotion of specific functionings, instead of the corresponding capabilities. Capability theorists have argued that their theories do not have much of these paternalist implications, since promoting

  18. Development of data analysis tool for combat system integration

    Directory of Open Access Journals (Sweden)

    Seung-Chun Shin

    2013-03-01

    Full Text Available System integration is an important element for the construction of naval combat ships. In particular, because impeccable combat system integration together with the sensors and weapons can ensure the combat capability and survivability of the ship, the integrated performance of the combat system should be verified and validated whether or not it fulfills the requirements of the end user. In order to conduct systematic verification and validation, a data analysis tool is requisite. This paper suggests the Data Extraction, Recording and Analysis Tool (DERAT for the data analysis of the integrated performance of the combat system, including the functional definition, architecture and effectiveness of the DERAT by presenting the test results.

  19. Assessment of Performance Measures for Security of the Maritime Transportation Network, Port Security Metrics : Proposed Measurement of Deterrence Capability

    Science.gov (United States)

    2007-01-03

    This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...

  20. Building a Capabilities Network to Improve Disaster Preparation Efforts in the European Command (EUCOM) Area of Responsibility

    Science.gov (United States)

    2012-12-01

    She planned and executed a wedding, worked full time and withstood many lonely days and nights as I traversed my way through a master’s degree. For...We believe God has equipped the church - the most diverse social network on the planet - to be at the center of these stories, leveraging time

  1. Quantifying capability of a local seismic network in terms of locations and focal mechanism solutions of weak earthquakes

    Czech Academy of Sciences Publication Activity Database

    Fojtíková, Lucia; Kristeková, M.; Málek, Jiří; Sokos, E.; Csicsay, K.; Zahradník, J.

    2016-01-01

    Roč. 20, č. 1 (2016), 93-106 ISSN 1383-4649 R&D Projects: GA ČR GAP210/12/2336 Institutional support: RVO:67985891 Keywords : Focal-mechanism uncertainty * Little Carpathians * Relative location uncertainty * Seismic network * Uncertainty mapping * Waveform inversion * Weak earthquake s Subject RIV: DC - Siesmology, Volcanology, Earth Structure Impact factor: 1.089, year: 2016

  2. Cosmic ray antiproton/electron discrimination capability of the CAPRICE silicon-tungsten calorimeter using neural networks

    International Nuclear Information System (INIS)

    Bellotti, R.; Boezio, M.; Castellano, M.; De Marzo, C.; Picozza, P.; Prigiobbe, V.; Sparvoli, R.; Tirocchi, M.

    1996-01-01

    A data analysis based on an artificial neural network classifier is proposed to identify cosmic ray antiprotons detected with the CAPRICE silicon-tungsten imaging calorimeter against electron background in the energy range 1.2-4.0 GeV. A set of new physical variables, describing the events inside the calorimeter on the base of their different patterns, are introduced in order to discriminate between hadronic and electromagnetic showers. The ability of the artificial neural network classifier to perform a careful multidimensional analysis gives the possibility to identify antiprotons with an electron rejection 408±85 (stat) at 95.0±0.2 (stat)% of signal detection efficiency. The high accuracy achieved by this method improves substantially the efficiency in the evaluation of the cosmic ray antiproton spectrum. (orig.)

  3. Note nuclear accidents combat

    International Nuclear Information System (INIS)

    1989-01-01

    In this document the starting points are described which underlie the new framework for the nuclear-accident combat in the Netherlands. All the elaboration of this is indicated in main lines. The juridical consequences of the proposed structure are enlightened and the sequel activities are indicated. (H.W.). 6 figs.; 8 tabs

  4. A genetic algorithm for optimization of neural network capable of learning to search for food in a maze

    Science.gov (United States)

    Budilova, E. V.; Terekhin, A. T.; Chepurnov, S. A.

    1994-09-01

    A hypothetical neural scheme is proposed that ensures efficient decision making by an animal searching for food in a maze. Only the general structure of the network is fixed; its quantitative characteristics are found by numerical optimization that simulates the process of natural selection. Selection is aimed at maximization of the expected number of descendants, which is directly related to the energy stored during the reproductive cycle. The main parameters to be optimized are the increments of the interneuronal links and the working-memory constants.

  5. Intelligently interactive combat simulation

    Science.gov (United States)

    Fogel, Lawrence J.; Porto, Vincent W.; Alexander, Steven M.

    2001-09-01

    To be fully effective, combat simulation must include an intelligently interactive enemy... one that can be calibrated. But human operated combat simulations are uncalibratable, for we learn during the engagement, there's no average enemy, and we cannot replicate their culture/personality. Rule-based combat simulations (expert systems) are not interactive. They do not take advantage of unexpected mistakes, learn, innovate, and reflect the changing mission/situation. And it is presumed that the enemy does not have a copy of the rules, that the available experts are good enough, that they know why they did what they did, that their combat experience provides a sufficient sample and that we know how to combine the rules offered by differing experts. Indeed, expert systems become increasingly complex, costly to develop, and brittle. They have face validity but may be misleading. In contrast, intelligently interactive combat simulation is purpose- driven. Each player is given a well-defined mission, reference to the available weapons/platforms, their dynamics, and the sensed environment. Optimal tactics are discovered online and in real-time by simulating phenotypic evolution in fast time. The initial behaviors are generated randomly or include hints. The process then learns without instruction. The Valuated State Space Approach provides a convenient way to represent any purpose/mission. Evolutionary programming searches the domain of possible tactics in a highly efficient manner. Coupled together, these provide a basis for cruise missile mission planning, and for driving tank warfare simulation. This approach is now being explored to benefit Air Force simulations by a shell that can enhance the original simulation.

  6. A survey on the measure of combat readiness

    Science.gov (United States)

    Wen, Kwong Fook; Nor, Norazman Mohamad; Soon, Lee Lai

    2014-09-01

    Measuring the combat readiness in military forces involves the measures of tangible and intangible elements of combat power. Though these measures are applicable, the mathematical models and formulae used focus mainly on either the tangible or the intangible elements. In this paper, a review is done to highlight the research gap in the formulation of a mathematical model that incorporates tangible elements with intangible elements to measure the combat readiness of a military force. It highlights the missing link between the tangible and intangible elements of combat power. To bridge the gap and missing link, a mathematical model could be formulated that measures both the tangible and intangible aspects of combat readiness by establishing the relationship between the causal (tangible and intangible) elements and its effects on the measure of combat readiness. The model uses multiple regression analysis as well as mathematical modeling and simulation which digest the capability component reflecting its assets and resources, the morale component reflecting human needs, and the quality of life component reflecting soldiers' state of satisfaction in life. The results of the review provide a mean to bridge the research gap through the formulation of a mathematical model that shows the total measure of a military force's combat readiness. The results also significantly identify parameters for each of the variables and factors in the model.

  7. Littoral Combat Ship: Need to Address Fundamental Weaknesses in LCS and Frigate Acquisition Strategies

    Science.gov (United States)

    2016-06-01

    LITTORAL COMBAT SHIP Need to Address Fundamental Weaknesses in LCS and Frigate Acquisition Strategies Report to...Office Highlights of GAO-16-356, a report to congressional committees June 2016 LITTORAL COMBAT SHIP Need to Address Fundamental Weaknesses in...capabilities of the LCS—a small surface combatant (SSC) consisting of a ship and reconfigurable mission packages built by two shipyards as different

  8. Capability ethics

    OpenAIRE

    Robeyns, Ingrid

    2012-01-01

    textabstractThe capability approach is one of the most recent additions to the landscape of normative theories in ethics and political philosophy. Yet in its present stage of development, the capability approach is not a full-blown normative theory, in contrast to utilitarianism, deontological theories, virtue ethics, or pragmatism. As I will argue in this chapter, at present the core of the capability approach is an account of value, which together with some other (more minor) normative comm...

  9. Advanced protection technology for ground combat vehicles.

    Science.gov (United States)

    Bosse, Timothy G

    2012-01-01

    Just as highway drivers use radar detectors to attempt to stay ahead of police armed with the latest radar technology, the Armed Forces are locked in a spiral to protect combat vehicles and their crews against the latest threats in both the contemporary operating environment and the anticipated operating environment (ie, beyond 2020). In response to bigger, heavier, or better-protected vehicles, adversaries build and deploy larger explosive devices or bombs. However, making improvements to combat vehicles is much more expensive than deploying larger explosives. In addition, demand is increasing for lighter-weight vehicles capable of rapid deployment. Together, these two facts give the threat a clear advantage in the future. To protect vehicles and crews, technologies focusing on detection and hit avoidance, denial of penetration, and crew survivability must be combined synergistically to provide the best chance of survival on the modern battlefield.

  10. Dynamic Capabilities

    DEFF Research Database (Denmark)

    Grünbaum, Niels Nolsøe; Stenger, Marianne

    2013-01-01

    The findings reveal a positive relationship between dynamic capabilities and innovation performance in the case enterprises, as we would expect. It was, however, not possible to establish a positive relationship between innovation performance and profitability. Nor was there any positive...... relationship between dynamic capabilities and profitability....

  11. Capability ethics

    NARCIS (Netherlands)

    I.A.M. Robeyns (Ingrid)

    2012-01-01

    textabstractThe capability approach is one of the most recent additions to the landscape of normative theories in ethics and political philosophy. Yet in its present stage of development, the capability approach is not a full-blown normative theory, in contrast to utilitarianism, deontological

  12. Women in Combat Compendium

    Science.gov (United States)

    2008-01-01

    support area • Location of unit TOC or HQ • Location of actual combat operations • No basis to answer this question 4. Given the U.S. Army’s current...welfare issue. I recall that part of General Order #1 was no sexual relations when deployed. Obviously, soldiers discovering pregnancy in the middle of...and had discussion about sexual relations and the 60 effect on unit cohesion, pregnancy testing, and affairs of the heart; whether appropriate or

  13. Regulatory Requirements to Combat Illicit Trafficking of Hazardous Materials

    International Nuclear Information System (INIS)

    Hussein, A.Z.; Zakaria, Kh.M.

    2011-01-01

    Since more than a decade illicit Trafficking of hazardous ( CBRNE), materials ( chemical, biological, radiological, nuclear and explosive ) has been identified as a key threat in national, regional, inter regional and international strategies. An Effective response to hazardous materials (CBRNE) risk and threat were realized to require a very high level of cooperation and coordination between various governments and their responsible organizations and authorities of regional and international partner. While improper policy of actions may easily be exploited by non- state members to (CBRNE) trafficking which may lead to develop weapon of mass destruction (WMD). Such strategy are of paramount important between all levels of the states and among regional agreements through comprehensive tailored assistance packages (e.g. export control, illicit trafficking of hazardous materials, redirection of scientist, emergency planning, crisis response safety and security culture. Capacity building, action plans and instruments for stability are necessary actions for efficient combating against illicit trafficking of hazardous materials. Regarding the needs of assessment phase, assistance must be based on data collection, analysis and prioritization of implanting the regulatory controls. Several activities have to be conducted to reduce CBRNE threat. The one- by- one approach, covering either nuclear and radioactive or chemical or biological materials has to be implanted on the country basis performance to mitigate CBRNE hazardous risk. On several consequent phases of intervention dealing with CBRNE risk mitigation the country has to establish a network of local, regional and international capabilities. Such network is setting up the mechanism for the country needs identifications, the guidelines for data collection, for data platform maintenance and update, the data assessment and the competent and operative organizations. This network will be to strengthen the long - term

  14. Combat Wound Initiative program.

    Science.gov (United States)

    Stojadinovic, Alexander; Elster, Eric; Potter, Benjamin K; Davis, Thomas A; Tadaki, Doug K; Brown, Trevor S; Ahlers, Stephen; Attinger, Christopher E; Andersen, Romney C; Burris, David; Centeno, Jose; Champion, Hunter; Crumbley, David R; Denobile, John; Duga, Michael; Dunne, James R; Eberhardt, John; Ennis, William J; Forsberg, Jonathan A; Hawksworth, Jason; Helling, Thomas S; Lazarus, Gerald S; Milner, Stephen M; Mullick, Florabel G; Owner, Christopher R; Pasquina, Paul F; Patel, Chirag R; Peoples, George E; Nissan, Aviram; Ring, Michael; Sandberg, Glenn D; Schaden, Wolfgang; Schultz, Gregory S; Scofield, Tom; Shawen, Scott B; Sheppard, Forest R; Stannard, James P; Weina, Peter J; Zenilman, Jonathan M

    2010-07-01

    The Combat Wound Initiative (CWI) program is a collaborative, multidisciplinary, and interservice public-private partnership that provides personalized, state-of-the-art, and complex wound care via targeted clinical and translational research. The CWI uses a bench-to-bedside approach to translational research, including the rapid development of a human extracorporeal shock wave therapy (ESWT) study in complex wounds after establishing the potential efficacy, biologic mechanisms, and safety of this treatment modality in a murine model. Additional clinical trials include the prospective use of clinical data, serum and wound biomarkers, and wound gene expression profiles to predict wound healing/failure and additional clinical patient outcomes following combat-related trauma. These clinical research data are analyzed using machine-based learning algorithms to develop predictive treatment models to guide clinical decision-making. Future CWI directions include additional clinical trials and study centers and the refinement and deployment of our genetically driven, personalized medicine initiative to provide patient-specific care across multiple medical disciplines, with an emphasis on combat casualty care.

  15. A Prescription for Internet Access: Appealing to Middle-Aged and Older Racial and Ethnic Minorities Through Social Network Sites to Combat Colorectal Cancer.

    Science.gov (United States)

    Lumpkins, Crystal Y; Mabachi, Natabhona; Lee, Jaehoon; Pacheco, Christina; Greiner, K Allen; Geana, Mugur

    2017-07-01

    The popularity and usage of social media networks or SNS (social networking sites) among American Internet users age 50 and over doubled between 2009 and 2010 and has steadily climbed. Part of this increased access may be the result of older adults who are living with a chronic disease and are reaching out for online support. Colorectal cancer (CRC) risk is among those concerns, particularly among middle-age and older minority populations where disparities exist. This exploratory study investigates information seeking behavior related to cancer factors (e.g. testing for colon cancer, cancer fatalism) and current social media usage among racial and ethnic minority groups (African American and Latinos) and Whites age 50 and older. The secondary data from the 2012 Health Information National Trends Survey (HINTS) was analyzed to compare these populations. Results show that African Americans and Latinos were only slightly more likely to use social network sites to seek out cancer information compared to Whites. However, Whites were more likely to use the Internet to seek health information compared to African Americans and Latinos. In this sample, Whites were also more likely to be informed by a physician about CRC testing (p social media networks, Internet sites) have increased among older Americans and can serve as critical channels for cancer information and education.

  16. Soldier Capability - Army Combat Effectiveness (SCACE). Volume 2. Selected Bibliography

    Science.gov (United States)

    1981-02-01

    and Horowitz, Dan. The Israeli Army. London: Allen Lane, 1975. 346. Machiavelli , Niccolo. The Discourses. In The Prince and the Dis- courses. New York...5. 1967. Fort Worth, TX: Institute of Behavioral Research, Texas Christian University, July 1958. 46 AL - - ---- ISE 490. Sells, S. B., and Rawls , J

  17. Can Health 2.0 Address Critical Healthcare Challenges? Insights from the Case of How Online Social Networks Can Assist in Combatting the Obesity Epidemic

    Directory of Open Access Journals (Sweden)

    Janine Hacker

    2017-03-01

    Full Text Available One of the serious concerns in healthcare in this 21st century is obesity. While the causes of obesity are multifaceted, social networks have been identified as one of the most important dimensions of people's social environment that may influence the adoption of many behaviours, including health-promoting behaviours. In this article, we examine the possibility of harnessing the appeal of online social networks to address the obesity epidemic currently plaguing society. Specifically, a design science research methodology is adopted to design, implement and test the Health 2.0 application called “Calorie Cruncher”. The application is designed specifically to explore the influence of online social networks on individual’s health-related behaviour. In this regard, pilot data collected based on qualitative interviews indicate that online social networks may influence health-related behaviours in several ways. Firstly, they can influence people’s norms and value system that have an impact on their health-related behaviours. Secondly, social control and pressure of social connections may also shape health-related behaviours, and operate implicitly when people make food selection decisions. Thirdly, social relationships may provide emotional support. Our study has implications for research and practice. From a theoretical perspective, the article inductively identifies three factors that influence specific types of health outcomes in the context of obesity. From a practical perspective, the study underscores the benefits of adopting a design science methodology to design and implement a technology solution for a healthcare issue as well as the key role for online social media to assist with health and wellness management and maintenance.

  18. Gossiping Capabilities

    DEFF Research Database (Denmark)

    Mogensen, Martin; Frey, Davide; Guerraoui, Rachid

    Gossip-based protocols are now acknowledged as a sound basis to implement collaborative high-bandwidth content dissemination: content location is disseminated through gossip, the actual contents being subsequently pulled. In this paper, we present HEAP, HEterogeneity Aware gossip Protocol, where...... nodes dynamically adjust their contribution to gossip dissemination according to their capabilities. Using a continuous, itself gossip-based, approximation of relative capabilities, HEAP dynamically leverages the most capable nodes by (a) increasing their fanouts (while decreasing by the same proportion...... declare a high capability in order to augment their perceived quality without contributing accordingly. We evaluate HEAP in the context of a video streaming application on a 236 PlanetLab nodes testbed. Our results shows that HEAP improves the quality of the streaming by 25% over a standard gossip...

  19. FELIN: tailored optronics and systems solutions for dismounted combat

    Science.gov (United States)

    Milcent, A. M.

    2009-05-01

    The FELIN French modernization program for dismounted combat provides the Armies with info-centric systems which dramatically enhance the performances of the soldier and the platoon. Sagem now has available a portfolio of various equipments, providing C4I, data and voice digital communication, and enhanced vision for day and night operations, through compact high performance electro-optics. The FELIN system provides the infantryman with a high-tech integrated and modular system which increases significantly their detection, recognition, identification capabilities, their situation awareness and information sharing, and this in any dismounted close combat situation. Among the key technologies used in this system, infrared and intensified vision provide a significant improvement in capability, observation performance and protection of the ground soldiers. This paper presents in detail the developed equipments, with an emphasis on lessons learned from the technical and operational feedback from dismounted close combat field tests.

  20. Communications for unattended sensor networks

    Science.gov (United States)

    Nemeroff, Jay L.; Angelini, Paul; Orpilla, Mont; Garcia, Luis; DiPierro, Stefano

    2004-07-01

    The future model of the US Army's Future Combat Systems (FCS) and the Future Force reflects a combat force that utilizes lighter armor protection than the current standard. Survival on the future battlefield will be increased by the use of advanced situational awareness provided by unattended tactical and urban sensors that detect, identify, and track enemy targets and threats. Successful implementation of these critical sensor fields requires the development of advanced sensors, sensor and data-fusion processors, and a specialized communications network. To ensure warfighter and asset survivability, the communications must be capable of near real-time dissemination of the sensor data using robust, secure, stealthy, and jam resistant links so that the proper and decisive action can be taken. Communications will be provided to a wide-array of mission-specific sensors that are capable of processing data from acoustic, magnetic, seismic, and/or Chemical, Biological, Radiological, and Nuclear (CBRN) sensors. Other, more powerful, sensor node configurations will be capable of fusing sensor data and intelligently collect and process data images from infrared or visual imaging cameras. The radio waveform and networking protocols being developed under the Soldier Level Integrated Communications Environment (SLICE) Soldier Radio Waveform (SRW) and the Networked Sensors for the Future Force Advanced Technology Demonstration are part of an effort to develop a common waveform family which will operate across multiple tactical domains including dismounted soldiers, ground sensor, munitions, missiles and robotics. These waveform technologies will ultimately be transitioned to the JTRS library, specifically the Cluster 5 requirement.

  1. Combat aircraft noise

    Science.gov (United States)

    Sgarbozza, M.; Depitre, A.

    1992-04-01

    A discussion of the characteristics and the noise levels of combat aircraft and of a transport aircraft in taking off and landing are presented. Some methods of noise reduction are discussed, including the following: operational anti-noise procedures; and concepts of future engines (silent post-combustion and variable cycle). Some measurement results concerning the noise generated in flight at great speeds and low altitude will also be examined. Finally, the protection of the environment of French air bases against noise will be described and the possibilities of regulation examined.

  2. Capability approach

    DEFF Research Database (Denmark)

    Jensen, Niels Rosendal; Kjeldsen, Christian Christrup

    Lærebogen er den første samlede danske præsentation af den af Amartya Sen og Martha Nussbaum udviklede Capability Approach. Bogen indeholder en præsentation og diskussion af Sen og Nussbaums teoretiske platform. I bogen indgår eksempler fra såvel uddannelse/uddannelsespolitik, pædagogik og omsorg....

  3. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    National Research Council Canada - National Science Library

    Tisserand, III, John B

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  4. Concepts in research capabilities strengthening positive experiences of network approaches by TDR in the People's Republic of China and Eastern Asia.

    Science.gov (United States)

    Zhou, Xiao-Nong; Wayling, Steven; Bergquist, Robert

    2010-01-01

    Strengthening human and physical resources for health research is an important function of any sustainable public health approach. The process of successfully embedding research into health systems in developing countries calls for the participation of competent, national scientists, with input and support where appropriate from international research institutions. Without a research-friendly environment, it is not easy for institutions and control programmes to engage and deliver products that can contribute to improving general health status. For example, monitoring is an important component of disease control but this can now be built upon to design surveillance systems capable of reporting activities in real time based on geographical information systems and continuous internet access. Informed surveillance can take on a stronger role than just capturing transmission foci to also become instrumental in directing swift responses in a spatially explicit and cost-effective manner. Further, whenever assessments of impact and control measures for different diseases are similar as they are, for example, with respect to schistosomiasis and food-borne trematode infections, the amalgamation of separate control programmes becomes realistic even if diverse strategies were originally developed for the diseases in question. Developments like this are guiding the expansion of research capabilities to espouse the integration of multidisciplinary research into national disease control programmes. The deployment of public-private partnerships as vehicles for operational progress and the endorsement of regional networks as platforms for driving research, while at the same time supporting and promoting training and dispersion of new knowledge, represent further manifestations of innovation in disease control. Some Asian examples of how this can be accomplished are provided. Copyright 2010 Elsevier Ltd. All rights reserved.

  5. Combating illicit trafficking

    International Nuclear Information System (INIS)

    Biro, L.L.; Grama, E.V.

    2002-01-01

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national authority, which is contact point for illicit trafficking and coordinates all measures and activities to combat and prevent illicit trafficking with nuclear material and radioactive sources. Legal framework regarding illicit trafficking has been improved due to new Physical Protection Regulations, Regulations on using the DBT, Regulations on requirements for qualification of guards and physical protection personnel, Design Basis Threat for each nuclear facility to avoid the unauthorized removal or theft of nuclear material or radioactive sources. New amendments of the Law for the safe deployment of nuclear activities, Law no. 111/1996, republished, in respect of illicit trafficking with nuclear material and radioactive sources are in the process to be approved by the Parliament. CNCAN is member of the Romanian Non-proliferation Group that is an interdepartmental mechanism of cooperation entered into force in August 1999. During the sessions of this group there are discussions focused on the preventing and combating illicit trafficking with nuclear material and radioactive sources. CNCAN is member of the Interministerial Council that controls import and export with strategic products including nuclear material, non nuclear material and equipment pertinent for proliferation of nuclear weapons. An Emergency Mobile Unit has been created in 2001 that contains instruments (gamma dose rate instruments portable and personal, contaminometers, mini MCA with CdZnTe detector, a CANBERRA Inspector with Nal, CdZnTe and HPGe detectors and 2 FiedSPEC, a mobile laboratory, 2 cars and individual equipment). CNCAN is cooperating with the Police through a National Plan to verify the authorization holders in order to prevent and combat illicit trafficking, and to find the orphan sources. CNCAN is the beneficiary of the PECO Project initiated by the European Commission in cooperation with the IAEA and

  6. ENTREPRENEURIAL CAPABILITIES

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard; Nielsen, Thorkild

    2003-01-01

    The aim of this article is to analyse entrepreneurship from an action research perspective. What is entrepreneurship about? Which are the fundamental capabilities and processes of entrepreneurship? To answer these questions the article includes a case study of a Danish entrepreneur and his networ....... Finally, the article discuss, how more long term action research methods could be integrated into the entrepreneurial processes and the possible impacts of such an implementation?...

  7. Evaluation of Combat Service Support Logistics Concepts for Supplying a USMC Regimental Task Force

    National Research Council Canada - National Science Library

    Lenhardt, Thomas

    2001-01-01

    .... This thesis evaluates existing and proposed concepts on how to best use the CSSE resources of a Force Service Support Group to transport supplies to Regimental Combat Teams over constrained networks...

  8. 2008 Combat Vehicles Conference

    Science.gov (United States)

    2008-10-22

    reduction — Reduced logistics burdens — Regenerative braking / energy recovery • Enhance functionality, flexibility, power quality, and management...ground based maneuver tasks. The MPC, as the medium capability category platform, provides a bridge in capability between the EFV and JLTV and a

  9. Combatant Commanders Informational Series, USEUCOM

    National Research Council Canada - National Science Library

    Burton, Steven

    1996-01-01

    ...) and the diverse challenges it faces require it to maintain one of the highest operational and personnel tempos of the combatant command, are limited in the opportunity of personnel new to the command...

  10. Environmental management in the Dutch food and beverage industry : a longitudinal study into the joint impact of business network and firm characteristics on the adoption of environmental management capabilities

    NARCIS (Netherlands)

    Haverkamp, D.J.

    2007-01-01

    The present study aims for a deeper understanding of the internal and external factors, such as firm strategy and pressure from the business network (government, buyers, suppliers, local inhabitants, etc.), that have an impact on the adoption of environmental management capabilities in firms in the

  11. Polymers for Combating Biocorrosion

    Directory of Open Access Journals (Sweden)

    Jing Guo

    2018-03-01

    Full Text Available Biocorrosion has been considered as big trouble in many industries and marine environments due to causing of great economic loss. The main disadvantages of present approaches to prevent corrosion include being limited by environmental factors, being expensive, inapplicable to field, and sometimes inefficient. Studies show that polymer coatings with anticorrosion and antimicrobial properties have been widely accepted as a novel and effective approach to prevent biocorrosion. The main purpose of this review is to summarize up the progressive status of polymer coatings used for combating microbial corrosion. Polymers used to synthesize protective coatings are generally divided into three categories: (i traditional polymers incorporated with biocides, (ii antibacterial polymers containing quaternary ammonium compounds, and (iii conductive polymers. The strategies to synthesize polymer coatings resort mainly to grafting antibacterial polymers from the metal substrate surface using novel surface-functionalization approaches, such as free radical polymerization, chemically oxidative polymerization, and surface-initiated atom transfer radical polymerization, as opposed to the traditional approaches of dip coating or spin coating.

  12. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  13. Transforming organizational capabilities in strategizing

    DEFF Research Database (Denmark)

    Jørgensen, Claus; Friis, Ole Uhrskov; Koch, Christian

    2014-01-01

    Offshored and networked enterprises are becoming an important if not leading organizational form and this development seriously challenges their organizational capabilities. More specifically, over the last years, SMEs have commenced entering these kinds of arrangements. As the organizational...... capabilities of SMEs are limited at the outset, even more emphasis is needed regarding the issues of developing relevant organizational capabilities. This paper aims at investigating how capabilities evolve during an offshoring process of more than 5 years in two Danish SMEs, i.e. not only short- but long......-term evolvements within the companies. We develop our framework of understanding organizational capabilities drawing on dynamic capability, relational capability and strategy as practice concepts, appreciating the performative aspects of developing new routines. Our two cases are taken from one author’s Ph...

  14. Combating Teacher Burnout

    Science.gov (United States)

    Williams, Cheryl Scott

    2012-01-01

    Generation Y teachers--those under 30 years of age--have higher expectations for technology than their colleagues from earlier generations--for good reason. Improved instructional and networking technology is one important aspect of a modern high-performing workplace. This generational difference is important, since a majority of seasoned…

  15. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  16. A Methodology for Measuring the Physiological Strain of Enhanced Soldiers: The 1998 Soldier Combat System Enhancement Study

    National Research Council Canada - National Science Library

    Amos, Denys

    1998-01-01

    ... or enhanced capabilities conducting routine operations in the tropics. Core temperature, mean skin temperature and heart rate are appropriate measures for evaluating the physiological burden of soldier combat system enhancements...

  17. Battlemind Training: Transitioning Home from Combat

    National Research Council Canada - National Science Library

    Castro, Carl A; Hoge, Charles W; Milliken, Charles W; McGurk, Dennis; Adler, Amy B; Cox, Anthony; Bliese, Paul D

    2006-01-01

    .... Destruction, injury, and death were ever present in the combat zone. Transitioning from combat to home can be difficult, and many Soldiers encounter readjustment problems ranging from elevated post-traumatic stress disorder (PTSD...

  18. Method for determining dynamic short circuit withstand capability of installations in meshed cable MV-networks, during switch on to a fault

    NARCIS (Netherlands)

    Parabirsing, E.N.; Coster, E.J.; Goerdin, S.A.V.

    2013-01-01

    tedin is the Distribution Grid Operator in the western part of the Netherlands and is known to be a "slim network operator" which means that it is only responsible for managing the gas and electricity networks. In this paper a method will be described with which Stedin proved that the dynamic short

  19. Building Server Capabilities

    DEFF Research Database (Denmark)

    Adeyemi, Oluseyi

    2013-01-01

    Many western companies have moved part of their operations to China in order to take advantage of cheap resources and/or to gain access to a high potential market. Depending on motive, offshore facilities usually start either as “sales-only” of products exported by headquarters or “production......-only”, exporting parts and components back to headquarter for sales in the home country. In the course of time, the role of offshore subsidiaries in a company’s operations network tends to change and, with that, the capabilities, of the subsidiaries. Focusing on Danish subsidiaries in China, the objective...

  20. Building server capabilities

    DEFF Research Database (Denmark)

    Adeyemi, Oluseyi

    Many western companies have moved part of their operations to China in order to take advantage of cheap resources and/or to gain access to a high potential market. Depending on motive, offshore facilities usually start either as “sales-only” of products exported by headquarters or “production......-only”, exporting parts and components back to headquarter for sales in the home country. In the course of time, the role of offshore subsidiaries in a company’s operations network tends to change and, with that, the capabilities, of the subsidiaries. Focusing on Danish subsidiaries in China, the objective...

  1. Target distribution in cooperative combat based on Bayesian optimization algorithm

    Institute of Scientific and Technical Information of China (English)

    Shi Zhifu; Zhang An; Wang Anli

    2006-01-01

    Target distribution in cooperative combat is a difficult and emphases. We build up the optimization model according to the rule of fire distribution. We have researched on the optimization model with BOA. The BOA can estimate the joint probability distribution of the variables with Bayesian network, and the new candidate solutions also can be generated by the joint distribution. The simulation example verified that the method could be used to solve the complex question, the operation was quickly and the solution was best.

  2. Bilateral Cooperation Between Indonesia and Malaysia in Combating Transnational Crime

    OpenAIRE

    Mustofa, Prof. Muhammad

    2008-01-01

    This paper us discuss that bilateral cooperation between Indonesia and Malaysia in combating transnational crime or trans-border crime. First of all, it should be based on understanding the root of the problem in trans-border crime problems. Furthermore, the effective bilateral cooperation can occur when notice the same aspects in the definition of the crime, the existence of law, the recognition of the evidence, extradition agreement, and the network information between the states.

  3. Combat Wound Initiative Program

    Science.gov (United States)

    2010-07-01

    Government as part of that person’s official duties. Deliver~~ by Publishing Technology to: Waiter Reed Army Institute of R~l!il>~~vTP:11~1~:S6;!4!B1...develop a predictive model, which could serve as a clinical decision support tool in the management of complex war wounds. Bayesian belief networks...decisions regarding the surgical management of wounds and estimate overall out- come of patients on the basis of casualty-specific factors in wounded

  4. Regulating and Combating Underground Banking

    NARCIS (Netherlands)

    Borgers, M.J.

    2009-01-01

    In combating and regulating underground banking, a choice can be made of roughly two models, the risk model and the assimilation model. The risk model comes down to a complete prohibition of underground banking combined with an active investigation and prosecution policy. In the assimilation model,

  5. Combating corruption in global health.

    Science.gov (United States)

    Mackey, Tim K; Kohler, Jillian; Lewis, Maureen; Vian, Taryn

    2017-08-09

    Corruption is a critical challenge to global health efforts, and combating it requires international action, advocacy, and research. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  6. Enhancing Brigade Combat Team Adaptability

    Science.gov (United States)

    2010-06-11

    Developing Learning Infrastructures (Training, Education , Practice, Research, Doctrine) -Create a shared vision -Build the business case (assess/Buy...To effectively respond to the characteristics of the operational environment, Brigade Combat Teams must be able to learn constantly from experience...behavior. Organizational adaptive behavior consists of three supporting emergent behaviors which are: self-organization, learning , and organizational

  7. Effective Protection or Effective Combat

    DEFF Research Database (Denmark)

    Lemberg-Pedersen, Martin

    2016-01-01

    alternative routes. On the other hand, European border control and its ‘combat against smugglers’ has emerged as a massively lucrative market for the European arms industry, both in terms of contracts to guard the EU’s external borders and in terms of the export of weapons and control systems to North African...

  8. Combating Training-Stress Syndromes.

    Science.gov (United States)

    Voight, Mike

    2002-01-01

    Addresses the nature and ramifications of various training stress syndromes (overtraining, under-recovery, distress, staleness, and burnout) that can accompany inappropriate training practices, examining the interventions that players and coaches can use to combat these syndromes (including physical, psychological, and performance interventions),…

  9. New Russian Combat Small Boats

    Directory of Open Access Journals (Sweden)

    Aleksandr F. Mitrofanov

    2016-12-01

    Full Text Available The article presents an overview of small combat boats. The author provides a description and gives an analysis of the characteristics of the boat "Raptor", boat "BK-16", boat "Strizh-4-1 DSh", and assault boat "BK-10".

  10. Evidence of combat in triceratops.

    Directory of Open Access Journals (Sweden)

    Andrew A Farke

    Full Text Available The horns and frill of Triceratops and other ceratopsids (horned dinosaurs are interpreted variously as display structures or as weapons against conspecifics and predators. Lesions (in the form of periosteal reactive bone, healing fractures, and alleged punctures on Triceratops skulls have been used as anecdotal support of intraspecific combat similar to that in modern horned and antlered animals. If ceratopsids with different cranial morphologies used their horns in such combat, this should be reflected in the rates of lesion occurrence across the skull.We used a G-test of independence to compare incidence rates of lesions in Triceratops (which possesses two large brow horns and a smaller nasal horn and the related ceratopsid Centrosaurus (with a large nasal horn and small brow horns, for the nasal, jugal, squamosal, and parietal bones of the skull. The two taxa differ significantly in the occurrence of lesions on the squamosal bone of the frill (P = 0.002, but not in other cranial bones (P > 0.20.This pattern is consistent with Triceratops using its horns in combat and the frill being adapted as a protective structure for this taxon. Lower pathology rates in Centrosaurus may indicate visual rather than physical use of cranial ornamentation in this genus, or a form of combat focused on the body rather than the head.

  11. Teaching Combative Sports through Tactics

    Science.gov (United States)

    Kozub, Francis M.; Kozub, Mary L.

    2004-01-01

    Martial arts have become popular in the United States and have transitioned from being spectator sports to avenues for active participation by people of all ages. The purpose of this article is to highlight tactical similarities in selected combative sport activities and to provide martial arts and wrestling instructors with an alternative…

  12. Implementing ARFORGEN: Installation Capability and Feasibility Study of Meeting ARFORGEN Guidelines

    National Research Council Canada - National Science Library

    Anderson, Dorian; Blackmon, Pamela; Coviello, Paul; Curvey, Brendan; Hogan, Hal; Rogers, Doug; Wilcox, Steven

    2007-01-01

    ...., nature of threat, climate, terrain, etc.), and capable of rapid assembly. The ARFORGEN model allows the Army to build predictability in a cyclic way of producing forces for the Combat Commander...

  13. Simulating barrier penetration during combat. Technical report

    International Nuclear Information System (INIS)

    De Laquil, P. III.

    1980-04-01

    A computer program, BARS, simulates combat between an adversary group attempting to hijack special nuclear material and escort personnel attempting to protect it. BARS is designed to investigate how various combat strategies and levels of performance affect the time required to penetrate barriers (armor, deterrent systems, etc.) against forcible entry. A Monte Carlo code, BARS uses a game theoretic approach to allocate the attacking and defending forces. Combat suppression is simulated using a stochastic state-transition model for the behavior of individuals under combat stress. The BARS program was developed as part of the overall combat modelling effort of the transportation safeguards program

  14. Space Communications Capability Roadmap Interim Review

    Science.gov (United States)

    Spearing, Robert; Regan, Michael

    2005-01-01

    Contents include the following: Identify the need for a robust communications and navigation architecture for the success of exploration and science missions. Describe an approach for specifying architecture alternatives and analyzing them. Establish a top level architecture based on a network of networks. Identify key enabling technologies. Synthesize capability, architecture and technology into an initial capability roadmap.

  15. Combating transnational environmental crime

    Directory of Open Access Journals (Sweden)

    Pisarić Milana

    2011-01-01

    Full Text Available Environmental crime is a serious and growing international problem, and one which takes many different forms. It is not limited to criminals polluting the air, water and land and pushing commercially valuable wildlife species closer to extinction; it can also include crimes which speed up climate change, destroy fish stocks, annihilate forests and exhaust essential natural resources. These crimes can have a harmful impact on the economies and security of multiple nations, in some cases they may even threaten the very existence of a country or people. Furthermore, a significant proportion of both wildlife crime and pollution crime cases point to the involvement of organized crime networks. This is evidenced by the detailed planning of operations, substantial financial support, the careful management of international shipments and massive profits. Still, to date, transnational environmental crime has been poorly attended to by the transnational organised crime and transnational policing discourse. National and international institutions have prioritised other forms of organised crime, giving little thought to the nuances of environmental crime and how they should be reflected in policing. Intention of this paper is to point out the importance of international cooperation and to point out the its good examples.

  16. Leveraging Campus Network Capabilities at the Desktop: Helping Users Get Real Work Done or How Windows Sockets & MacTCP Changed My Life.

    Science.gov (United States)

    Ezekiel, Aaron B.

    At the University of New Mexico, stakeholders from the Computer and Information Resources and Technology (CIRT) department, Financial Systems, the Health Sciences Center, and the General Libraries, were involved in deciding on the goals of a project to replace Telnet with a suite of network middleware and productivity software on campus computer…

  17. On the Delay Characteristics for Point-to-Point links using Random Linear Network Coding with On-the-fly Coding Capabilities

    DEFF Research Database (Denmark)

    Tömösközi, Máté; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2014-01-01

    Video surveillance and similar real-time applications on wireless networks require increased reliability and high performance of the underlying transmission layer. Classical solutions, such as Reed-Solomon codes, increase the reliability, but typically have the negative side-effect of additional ...

  18. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  19. A Simple Probabilistic Combat Model

    Science.gov (United States)

    2016-06-13

    Government may violate any copyrights that exist in this work. This page intentionally left blank. ABSTRACT The Lanchester ...page intentionally left blank. TABLE OF CONTENTS Page No.Abstract iii List of Illustrations vii 1. INTRODUCTION 1 2. DETERMINISTIC LANCHESTER MODEL...This page intentionally left blank. 1. INTRODUCTION The Lanchester combat model1 is a simple way to assess the effects of quantity and quality

  20. A Theory of Combative Advertising

    OpenAIRE

    Yuxin Chen; Yogesh V. Joshi; Jagmohan S. Raju; Z. John Zhang

    2009-01-01

    In mature markets with competing firms, a common role for advertising is to shift consumer preferences towards the advertiser in a tug-of-war, with no effect on category demand. In this paper, we analyze the effect of such “combative” advertising on market power. We show that, depending on the nature of consumer response, combative advertising can reduce price competition to benefit competing firms. However, it can also lead to a procompetitive outcome where individual firms advertise to incr...

  1. Combats escènics

    Directory of Open Access Journals (Sweden)

    Pawel Rouba Billowicz

    2016-04-01

    Full Text Available “Combats Escènics” és un treball que tracta sobre la interpretació artística de la violència d’artistes de l’espectacle per tal de divertir el públic i emetre un missatge humanista mitjançant una coreografia ritual. En aquest estudi es presenta una classificació del combat escènic des del doble vessant agonista/antagonista, es realitza un passeig històric de la representació artística del combat a través de les diferents etapes i de les diverses cultures, s’aborda la preparació escènica de l’actor i del coreògraf, i s’entreveuen les perspectives de futur d’aquesta modalitat artística. Estudi realitzat per Pawel Rouba Billewicz (Inowroclaw, Polònia, 1939 - Barcelona, 2007, director, coreògraf, actor, mestre d’armes, mestre del gest i de la pantomima i professor de l’INEF de Catalunya. Aquest article, editorialment inèdit, es publica postmortem per Apunts. Educació Física i Esports com a homenatge i reconeixement de l’autor per la seva extraordinària i polivalent aportació al camp de l’art i l’Activitat Física i l’Esport.

  2. The Next EFV: Aligning Marine Corps Capabilities With National Security

    Science.gov (United States)

    2011-05-09

    However, the technological bugaboo is that propelling a 34 ton rectangular, high drag armored vehicle at 25kt through water is simply not feasible...never reach the point of replacing the warfighter on the scene. Adding a true littoral combatant capability to the U.S. military 11 portfolio

  3. A Research Plan for Assessing the Power and Energy Capability of a River Network Under an Integrated Wind/Hydro-Electric Dispatchable Regime

    Science.gov (United States)

    Banka, John Czeslaw

    The world strives for more clean and renewable energy, but the amount of dispatchable energy in river networks is not accurately known and difficult to assess. When wind is integrated with water, the dispatchable yield can be greatly increased, but the uncertainty of the wind further degrades predictability. This thesis demonstrates how simulating the flows is a river network integrated with wind over a long time domain yields a solution. Time-shifting the freshet and pumped storage will ameliorate the seasonal summer drought; the risk of ice jams and uncontrolled flooding is reduced. An artificial market eliminates the issue of surplus energy from wind at night. Furthermore, this thesis shows how the necessary infrastructure can be built to accomplish the goals of the intended research. While specific to Northern Ontario and sensitive to the lives of the Native peoples living there, it indicates where the research might be applicable elsewhere in the world.

  4. Introduction of Counter-Proliferation Capabilities in Development States

    International Nuclear Information System (INIS)

    Caulfield, P.; Edwards, T.; Witkin, A.; Elgebaly, A.

    2010-01-01

    In recent history we have seen a number of States develop their indigenous industrial skills to a point suitable for the manufacture of nuclear components. Private individuals unbeknown to the State have then utilized this capability to supply directly into proliferation networks - potentially reducing international confidence in such a State. To combat this possibility, a developing State must recognize the challenges that are raised by its emerging skills and take action to introduce measures that not only help the State identify proliferation activities but also ensure the national security of the State. One of those measures might be to develop a capability within the State to recognize and counter the activities of would-be-proliferators. In many States this capability is managed and applied through a dedicated counter-proliferation unit that has strong links with border controls and customs organizations. A counter-proliferation unit, once established could show dramatic returns for a modest investment. The activities of such a Unit could save the State political embarrassment by hindering and narrowing the chances of unintentional proliferation activities. The Unit should not be introduced as part of a Safeguards agreement or as part of a non proliferation treaty. It should rather be established as an act by the State to protect and control its emerging technologies from being involved, willingly or unwittingly, in proliferation activities. This is a sovereign act of the State - solely for its benefit and should not be imposed by any external power. Today's would-be-proliferators around the world cooperate and act together; similarly emerging counter-proliferation units should act and work together in order to be a step ahead of the proliferators. Improved world-wide cooperation should increase the detection rate of proliferation incidents which will in turn curtail the spread of nuclear weapons - for the benefit of all. (author)

  5. The Predictive Capability of Conditioned Simulation of Discrete Fracture Networks using Structural and Hydraulic Data from the ONKALO Underground Research Facility, Finland

    Science.gov (United States)

    Williams, T. R. N.; Baxter, S.; Hartley, L.; Appleyard, P.; Koskinen, L.; Vanhanarkaus, O.; Selroos, J. O.; Munier, R.

    2017-12-01

    Discrete fracture network (DFN) models provide a natural analysis framework for rock conditions where flow is predominately through a series of connected discrete features. Mechanistic models to predict the structural patterns of networks are generally intractable due to inherent uncertainties (e.g. deformation history) and as such fracture characterisation typically involves empirical descriptions of fracture statistics for location, intensity, orientation, size, aperture etc. from analyses of field data. These DFN models are used to make probabilistic predictions of likely flow or solute transport conditions for a range of applications in underground resource and construction projects. However, there are many instances when the volumes in which predictions are most valuable are close to data sources. For example, in the disposal of hazardous materials such as radioactive waste, accurate predictions of flow-rates and network connectivity around disposal areas are required for long-term safety evaluation. The problem at hand is thus: how can probabilistic predictions be conditioned on local-scale measurements? This presentation demonstrates conditioning of a DFN model based on the current structural and hydraulic characterisation of the Demonstration Area at the ONKALO underground research facility. The conditioned realisations honour (to a required level of similarity) the locations, orientations and trace lengths of fractures mapped on the surfaces of the nearby ONKALO tunnels and pilot drillholes. Other data used as constraints include measurements from hydraulic injection tests performed in pilot drillholes and inflows to the subsequently reamed experimental deposition holes. Numerical simulations using this suite of conditioned DFN models provides a series of prediction-outcome exercises detailing the reliability of the DFN model to make local-scale predictions of measured geometric and hydraulic properties of the fracture system; and provides an understanding

  6. Rights, goals, and capabilities

    NARCIS (Netherlands)

    van Hees, M.V.B.P.M

    This article analyses the relationship between rights and capabilities in order to get a better grasp of the kind of consequentialism that the capability theory represents. Capability rights have been defined as rights that have a capability as their object (rights to capabilities). Such a

  7. Combating cyberspace fraud in Africa

    CSIR Research Space (South Africa)

    Grobler, M

    2009-12-01

    Full Text Available in Africa Marthie Grobler, Joey Jansen van Vuuren Council for Scientific and Industrial Research Defence, Peace, Safety & Security © CSIR 2007 www.csir.co.za Combating cyber crime in Africa is a reality • Computer crime... www.csir.co.za Reduction of Cyber Crime was given as one of the major objectives during the State of the Nation address by President Zuma on 3 June 2009. “Amongst other key initiatives, we will start the process of setting up a Border Management...

  8. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  9. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    National Research Council Canada - National Science Library

    Cogan, Kevin J; De Lucio, Ray

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  10. The future of resuscitative endovascular balloon occlusion in combat operations.

    Science.gov (United States)

    Smith, Shane A; Hilsden, R; Beckett, A; McAlister, V C

    2017-08-09

    Damage control resuscitation and early thoracotomy have been used to increase survival after severe injury in combat. There has been a renewed interest in resuscitative endovascular balloon occlusion of the aorta (REBOA) in both civilian and military medical practices. REBOA may result in visceral and limb ischaemia that could be harmful if use of REBOA is premature or prolonged. The purpose of this paper is to align our experience of combat injuries with the known capability of REBOA to suggest an implementation strategy for the use of REBOA in combat care. It may replace the resuscitative effect of thoracotomy; can provide haemostasis of non-compressible torso injuries such as the junctional and pelvic haemorrhage caused by improvised explosive devices. However, prehospital use of REBOA must be in the context of an overall surgical plan and should be restricted to deployment in the distal aorta. Although REBOA is technically easier than a thoracotomy, it requires operator training and skill to add to the beneficial effect of damage control resuscitation and surgery. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  11. Evaluation and Management of Combat-Related Spinal injuries: A Review Based on Recent Experiences

    Science.gov (United States)

    2012-01-01

    and also possess the capability of performing emergent surgical and orthopedic procedures [11]. On occa- sion, a neurosurgeon may be assigned to a...typically there is at least one fellowship-trained orthopedic spine surgeon and one neurosurgeon in each combat theater at any one time. That being said

  12. Basic Combat Unit of the Slovenian Armed Forces

    Science.gov (United States)

    2017-06-09

    public sector .6 There are three main reasons why: 1. After Slovenia joined NATO, political support for the armed forces began to decline. Image...can put three $20 bills together, but if we have an $18 or $20 fight, we have a unit that’s capable of a better integration (with other forces) and... three different $20 bills . It has to be noted, that the U.S. Army did significantly reduce the number of types of combat brigades from seventeen to

  13. Combating illegal nuclear traffic - Poland's experience

    International Nuclear Information System (INIS)

    Smagala, G.

    1998-01-01

    International non-proliferation efforts have been taken to reduce the risk related to nuclear materials and radioactive sources. The physical security of nuclear facilities to prevent acts of sabotage or terrorism and to protect nuclear materials against loss or seizure is an essential element of the nuclear non-proliferation regime. Iraq case and the end of the Cold War have influenced the development of co-operation and openness in many countries. Poland due to: - its geolocation, - a growing number of post Chernobyl contamination transports and - high risk to become a transit country in illicit trafficking of nuclear materials and radioactive sources, initiated deployment of the fixed installation instruments at the border check-points. Since the end of 1990 to now 103 such devices have been installed. Broader involvement in combating illicit nuclear trafficking of Border Guards, Customs Services, Police and Intelligence Security has been noticed. Paper presents Poland's experience in implementing national prevention measures to reduce nuclear proliferation risk and in detecting capabilities against illicit nuclear traffic. (author)

  14. Enhanced Rate Capability of Polymer-Derived SiCN Anode Material for Electrochemical Storage of Lithium with 3-D Carbon Nanotube Network Dispersed in Nanoscale.

    Science.gov (United States)

    Zhang, Junwei; Xu, Caihong; Liu, Zhaoping; Wang, Wei; Xin, Xing; Shen, Lu; Zhou, Xiaobing; Zhou, Jie; Huang, Qing

    2015-04-01

    Electrochemical performances of multi-walled carbon nanotubes (CNT)-SiCN composite have been investigated. The sample was synthesized by a simple ultrasonication assisted method combined with high-temperature pyrolysis and characterized by Fourier transform infrared spectra, Raman spectra, X-ray diffraction, field emission scanning electron microscopy and transmission electronic microscopy. In this composite, CNT were uniformly distributed in the SiCN ceramic matrix, it retained the structural integrity during the polymer-ceramic conversion and had a relatively strong bonding with the SiCN ceramic matrix. When tested as anode in the half cell, the obtained composite exhibited enhanced rate capability and cyclic capacity than that of pristine SiCN powder, CNT and graphite, it could supply a capacity of 222.7 mA h/g when charged at 2000 mA/g, while the SiCN anode showed nearly no capacity even at the low current density of 200 mA/g. It is expected that the CNT-SiCN composite, perhaps the series of CNT-PDC composites, may be prospective candidate for high power applications.

  15. Worldwide actions to combat abuse.

    Science.gov (United States)

    1998-01-01

    This paper reports several developments on the global efforts to combat abuse and violence against women and children. It is noted that in South Africa, Belem, Brazil, and Lesotho, protest actions were conducted against women and child abuse. Although the protests were made separately, the protests generally called for implementation of initiatives from the government to address the issue of child and women abuse. In the context of preventing abusive behaviors, a study by the University of Cape Town in South Africa on the appropriateness and feasibility of short-term community-based group therapy concluded that such an approach might be effective in treating delinquent behavior. In Indonesia, the Rifka Annisa Women's Crisis Centre is working to combat violence against women by providing services to victims; while in Israel, a media campaign is aiming to increase awareness and support for women's help centers. In addition, the government of Bangladesh has established a Cell Against Violence Against Women that provides legal counseling and assistance for civil and criminal cases related to violence against women. Furthermore, the WHO and the International Federation of Obstetricians and Gynecologists have collaborated to conduct a joint workshop to explore how violence against women can be eliminated.

  16. Combat Leadership Styles: Empowerment versus Authoritarianism

    Science.gov (United States)

    1990-12-01

    Combat Leadership Styles : Empowerment versus Authoritarianism FARIS R. KIRKLAND Recent research in Israel and the United States suggests that...Combat Leadership Styles : Empowerment versus Authoritarianism 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  17. Mobile Test Capabilities

    Data.gov (United States)

    Federal Laboratory Consortium — The Electrical Power Mobile Test capabilities are utilized to conduct electrical power quality testing on aircraft and helicopters. This capability allows that the...

  18. Combating the counterfeits with web portal technology

    Science.gov (United States)

    Ting, S. L.; Ip, W. H.

    2015-10-01

    Due to the globalisation of counterfeiting activities, the penetration of fake products in open market is growing. So far, the technologies to combat counterfeiting are mostly applied to high-value products (e.g. premium wine and branded handbags); however, in the medium- and low-value products' perspective, there is no secure way for consumers to identify whether the purchased items are genuine or not. To address the counterfeiting problems effectively, a platform for identifying authenticated products and promoting anti-counterfeit activities is very important. The aim of this paper is to design and develop an anti-counterfeit platform which includes two functions: providing customers a secure network to ascertain the genuineness of their purchased product and increasing public awareness of the current counterfeit problems and updated anti-counterfeit solutions. By combining these two functions, it enables public to fight against fake and beware of counterfeit. Results of adopting portal technology in anti-counterfeiting show high accuracy in product checking and improved creditability. This reveals that the applicability and advantage of the proposed methodology are satisfactory.

  19. Status and tendencies in combating computer crime at European level

    Directory of Open Access Journals (Sweden)

    Pisarić Milana

    2011-01-01

    Full Text Available Without certain adjustments to specifics of computer crime, as to a phenomenon of global proportions, detection, investigation and prosecution of this type of crime is almost impossible. Therefore, the need for setting up a legal framework for combating cyber crime has been identified, in order to define which activities related to information systems are considered computer crime; to determine the specific procedural rules, which would enable the access to data, computer and networks during investigating and prosecuting computer crime and to provide continuous training of members of the institutions responsible for countering this form of crime. This legal framework should consist of substantive and procedural rules adapted to this type of crime due its aim is the improvement of international cooperation in the framework of global and regional approach to combating cyber crime. In this this paper the current situation of strategic and legal framework of countering cyber crime is presented (at the level of the Council of Europe and of the European Union as well as trends in the development of systematic approach towards countering the mentioned abuses within these regional organizations. At the European level, the legal framework to combat cyber crime is set in the Council of Europe Convention on cyber crime and the Council of EU Framework Decision on attacks against information systems. In a series of documents organs of EU confirmed the strategic support of COE Convention and the encouragement of Member States to ratify the Convention. In addition, the Convention represent the base of the said Framework Decision. These two legal instruments have the same goal - removing the differences between national legislation, the introduction of new powers in the discovery and evidence of computer crime and improvement of the international cooperation in combating cyber crime. Although their legal nature and scope vary, its objectives will be achieved

  20. Capabilities for Strategic Adaptation

    DEFF Research Database (Denmark)

    Distel, Andreas Philipp

    This dissertation explores capabilities that enable firms to strategically adapt to environmental changes and preserve competitiveness over time – often referred to as dynamic capabilities. While dynamic capabilities being a popular research domain, too little is known about what these capabiliti...

  1. Blended Training for Combat Medics

    Science.gov (United States)

    Fowlkes, Jennifer; Dickinson, Sandra; Lazarus, Todd

    2010-01-01

    Bleeding from extremity wounds is the number one cause of preventable death on the battlefield and current research stresses the importance of training in preparing every Soldier to use tourniquets. HapMed is designed to provide tourniquet application training to combat medics and Soldiers using a blended training solution encompassing information, demonstration, practice, and feedback. The system combines an instrumented manikin arm, PDA, and computer. The manikin arm provides several training options including stand-alone, hands-on skills training in which soldiers can experience the actual torque required to staunch bleeding from an extremity wound and be timed on tourniquet application. This is more realistic than using a block of wood to act as a limb, which is often how training is conducted today. Combining the manikin arm with the PDA allows instructors to provide scenario based training. In a classroom or field setting, an instructor can specify wound variables such as location, casualty size, and whether the wound is a tough bleed. The PDA also allows more detailed feedback to be provided. Finally, combining the manikin arm with game-based technologies, the third component, provides opportunities to build knowledge and to practice battlefield decision making. Not only do soldiers learn how to apply a tourniquet, but when to apply a tourniquet in combat. The purpose of the paper is to describe the learning science underlying the design of HapMed, illustrate the training system and ways it is being expanded to encompass other critical life-saving tasks, and report on feedback received from instructors and trainees at military training and simulation centers.

  2. Dynamic capabilities, Marketing Capability and Organizational Performance

    Directory of Open Access Journals (Sweden)

    Adriana Roseli Wünsch Takahashi

    2017-01-01

    Full Text Available The goal of the study is to investigate the influence of dynamic capabilities on organizational performance and the role of marketing capabilities as a mediator in this relationship in the context of private HEIs in Brazil. As a research method we carried out a survey with 316 IES and data analysis was operationalized with the technique of structural equation modeling. The results indicate that the dynamic capabilities have influence on organizational performance only when mediated by marketing ability. The marketing capability has an important role in the survival, growth and renewal on educational services offerings for HEIs in private sector, and consequently in organizational performance. It is also demonstrated that mediated relationship is more intense for HEI with up to 3,000 students and other organizational profile variables such as amount of courses, the constitution, the type of institution and type of education do not significantly alter the results.

  3. Suitability of Agent Technology for Military Command and Control in the Future Combat System Environment

    Energy Technology Data Exchange (ETDEWEB)

    Potok, TE

    2003-02-13

    The U.S. Army is faced with the challenge of dramatically improving its war fighting capability through advanced technologies. Any new technology must provide significant improvement over existing technologies, yet be reliable enough to provide a fielded system. The focus of this paper is to assess the novelty and maturity of agent technology for use in the Future Combat System (FCS). The FCS concept represents the U.S. Army's ''mounted'' form of the Objective Force. This concept of vehicles, communications, and weaponry is viewed as a ''system of systems'' which includes net-centric command and control (C{sup 2}) capabilities. This networked C{sup 2} is an important transformation from the historically centralized, or platform-based, C{sup 2} function since a centralized command architecture may become a decision-making and execution bottleneck, particularly as the pace of war accelerates. A mechanism to ensure an effective network-centric C{sup 2} capacity (combining intelligence gathering and analysis available at lower levels in the military hierarchy) is needed. Achieving a networked C{sup 2} capability will require breakthroughs in current software technology. Many have proposed the use of agent technology as a potential solution. Agents are an emerging technology, and it is not yet clear whether it is suitable for addressing the networked C{sup 2} challenge, particularly in satisfying battlespace scalability, mobility, and security expectations. We have developed a set of software requirements for FCS based on military requirements for this system. We have then evaluated these software requirements against current computer science technology. This analysis provides a set of limitations in the current technology when applied to the FCS challenge. Agent technology is compared against this set of limitations to provide a means of assessing the novelty of agent technology in an FCS environment. From this analysis we

  4. Why Does Military Combat Experience Adversely Affect Marital Relations?

    Science.gov (United States)

    Gimbel, Cynthia; Booth, Alan

    1994-01-01

    Describes investigation of ways in which combat decreases marital quality and stability. Results support three models: (1) factors propelling men into combat also make them poor marriage material; (2) combat causes problems that increase marital adversity; and (3) combat intensifies premilitary stress and antisocial behavior which then negatively…

  5. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  6. The Impact of Combat Status on Veterans' Attitudes Toward Help Seeking: The Hierarchy of Combat Elitism.

    Science.gov (United States)

    Ashley, Wendy; Brown, Jodi Constantine

    2015-01-01

    Many veterans do not seek assistance for mental health concerns despite the staggering prevalence of trauma-related symptomatology. Barriers to service provision include personal and professional stigma and inter-veteran attitudes that dictate who is more or less deserving of services. Veteran attitudes are shaped by military culture, which promotes a hyper-masculine paradigm upholding combat experience as the defining feature of the "ideal soldier." The stratification of soldiers into combat or non-combat status creates a hierarchy of combat elitism that extends far beyond active duty. This pilot study surveyed veterans (n = 24) to explore how combat experience may affect attitudes toward help seeking. Findings indicate combat and non-combat veterans are less accepting of non-combat veterans' help-seeking behavior, supporting the notion that veterans' attitudes toward help seeking are influenced by combat status. Despite limitations, the results of this study reflect a need for increased attention to the attitudes veterans have about each other and themselves.

  7. Applications of RFID technology in dismounted soldier solution systems – study of mCOP system capabilities

    Directory of Open Access Journals (Sweden)

    Chmielewski Mariusz

    2016-01-01

    Full Text Available This paper discusses application of RFID technology in Dismounted Soldier Solutions gathered from the development and demonstration of mCOP platform. The software has been developed to elaborate Network Enabled Capabilities in tactical environments. Presented research was a part of demonstration prepared for the European Defence Agency. The main aim of the tool is the delivery of command support capabilities utilizing data fusion and integration mechanisms implemented in heterogeneous military mobile networks. Application of military integration standards such as JC3IEDM, NFFI and TSO supports interoperability with BMS class systems. Utilisation of RFID technology in mCOP software has several purposes, mainly used for process automation of authorisation and personal identification. Indirectly such functionalities can be used for implementation of UAV supported - Blue Force Tracking and IFF services. This research elaborates a set of implemented ideas for such solutions. Developed system serves as a multi-level and multi-platform command and control system supporting military and crisis operations. A crucial part of the system - mCOP, the handheld application for tactical level commanders, serves as personal toolkit for location monitoring and combat situation distribution and management. The tool delivers a set of tailored functionalities supporting commander’s situation awareness and decision making process. The mCOP hosting device equipped with RFID delivers also means of tactical , emergency, micro network communication.

  8. Transfusion-Associated Microchimerism in Combat Casualties

    National Research Council Canada - National Science Library

    Dunne, James R; Lee, Tzong-Hae; Burns, Christopher; Cardo, Lisa J; Curry, Kathleen; Busch, Michael P

    2007-01-01

    ...) in civilian trauma patients receiving allogenic red blood cell (RBC) transfusions. We explored the incidence of TA-MC in combat casualties receiving FrWB compared with patients receiving standard stored RBC transfusions. Methods...

  9. Innovative contracting strategies for combating climate change.

    Science.gov (United States)

    2011-11-01

    The state of Maryland has made a strong commitment to combating climate change and reducing : greenhouse gas emissions. This research investigated the state of practice of innovative contracting : solutions to reduce emissions from highway constructi...

  10. 2001 Industry Studies: Land Combat Systems

    National Research Council Canada - National Science Library

    Alyaqout, Faisal

    2001-01-01

    .... The days when production lines and factories hummed at peak capacity are gone. Orders for land combat systems have been reduced by nearly two-thirds since 1990, and competition for what few procurement dollars remain is stiff...

  11. Combat Neurosis in the Battered Teacher.

    Science.gov (United States)

    Science News, 1978

    1978-01-01

    Investigates the effect of school violence on classroom teachers. The study of 253 Los Angeles inner city classroom teachers reveals that many of them have developed conditions similar to the combat neurosis found in soldiers at war. (HM)

  12. University Research Initiative Program for Combat Readiness

    Science.gov (United States)

    1999-05-01

    microscope image of one of the lenses. This array was selected for testing because it is fabricated in a relatively inexpensive polyacrylic material, the...potent analogues of the potassium -sparing diuretic, amiloride. However, our results 179 University Reasearch Initiative for Combat Readiness Annual Report...for Combat Readiness Annual Report for the period June 1, 1998 - June 30, 1999 Roger H. Sawyer University of South Carolina Columbia, SC 29208 May

  13. Crowd Behavior Algorithm Development for COMBAT XXI

    Science.gov (United States)

    2017-05-30

    non-combatants to military operations in an urban area. We show how to link this model with COMBATXXI at the application programming interface (API...level so that the model can be run in tight conjunction with COMBATXXI. TRAC and other anaytic organizations can use this type of crowd model to... organizations , and materiel. crowd, agent-based modeling , combat models , COMBATXXI, NetLogo, mega-cities, civilians on the battlefield Unclassified U U U U 39

  14. Guide to Modelling & Simulation (M&S) for NATO Network-Enabled Capability (M&S for NNEC) (Guide de la modelisation et de la simulation (M&S) pour las NATO network-enabled capability (M&S de la NNEC))

    Science.gov (United States)

    2010-02-01

    and debriefing, data logging and analysis, and facilitating video/ audio conferences. Successful distributed training in a networked environment...generated forces; • Weather and terrain interaction; • Video/ audio conferencing; and • Distributed data logging and analysis. 5.5.2 Exploit Live...and dialogue with non-deployed command can be achieved. The benefits of relatively simple 3D visualisation of current geographic information

  15. Born to fight? Genetics and combat sports

    Directory of Open Access Journals (Sweden)

    Emerson Franchini

    2014-02-01

    Full Text Available Recently, the influence of genetics on sports performance has received increased attention from many researchers. In combat sports, some investigations have also been conducted. This article’s main objective was to review the representation of specific gene polymorphisms in combat sports athletes compared to controls. The following databases were searched: PubMed, Web of Science and SportDiscus. The terms used in this search involved combat sports (boxing, karate, judo, mixed martial arts, taekwondo and wrestling, genes, genetics and candidate genes. Articles published until November 2013 were included if combat sports athletes were considered as a single group (i.e., not mixed with athletes of other sports. Seven studies were found, with two presenting no difference between combat sports athletes and controls, two presenting higher frequencies of candidate genes related to a more endurance-related profile compared to controls, and three where a more power-related gene overrepresentation was found in comparison to controls. Taken together, the initial studies about the genetic characteristics of combat sports athletes are controversial, which is probably due to the mixed (aerobic and anaerobic characteristic and to the multifactorial performance determinants of these sports.

  16. Polymeric Coatings for Combating Biocorrosion

    Science.gov (United States)

    Guo, Jing; Yuan, Shaojun; Jiang, Wei; Lv, Li; Liang, Bin; Pehkonen, Simo O.

    2018-03-01

    Biocorrosion has been considered as big trouble in many industries and marine environments due to causing great economic loss. The main disadvantages of present approaches to prevent corrosion include being limited by environmental factors, being expensive, inapplicable to field, and sometimes inefficient. Studies show that polymer coatings with anti-corrosion and anti-microbial properties have been widely accepted as a novel and effective approach to preventbiocorrosion. The main purpose of this review is to summarize up the progressive status of polymer coatings used for combating microbially-induced corrosion. Polymers used to synthesize protective coatings are generally divided into three categories: i) traditional polymers incorporated with biocides, ii) antibacterial polymers containing quaternary ammonium compounds, and iii) conductive polymers. The strategies to synthesize polymer coatings resort mainly to grafting anti-bacterial polymers from the metal substrate surface using novel surface-functionalization approaches, such as free radical polymerization, chemically oxidative polymerization and surface-initiated atom transfer radical polymerization, as opposed to the traditional approaches of dip coating or spin coating.

  17. Foam for combating mine fires

    Energy Technology Data Exchange (ETDEWEB)

    1989-09-01

    The application of foam in dealing with underground fire is well known due to its smothering action by cutting off air feed to burning fuel as well as acting as coolant. Besides plugging air feed to fire, water could be virtually reached to the fire affected areas much beyond the jet range as underground galleries with low roof restrict jet range of water. This method also enables a closer approach of a fire fighting team by isolating the toxic gases and smoke with a foam plug. The paper describes the development of high expansion foam composition and its application technology in order that foam plug method can be suitably utilized for combating mine fires in India. Three compositions were recommended for generation of high expansion foam: (a) 0.5% sodium/ammonium lauryl sulphate, 0.15 to 0.2% sodium carboxy methyl cellulose, 0.1% booster; (b) 0.5% sodium/ammonium lauryl sulfate, 0.12 to 0.15% alkaline solution of gum arabic, 0.1 to 0.2% ferrous gluconate; and (c) 0.35% sodium/ammonium lauryl sulfate, 0.20% booster, 0.2% xylene sulfonate.

  18. Building Service Provider Capabilities

    DEFF Research Database (Denmark)

    Brandl, Kristin; Jaura, Manya; Ørberg Jensen, Peter D.

    2015-01-01

    In this paper we study whether and how the interaction between clients and the service providers contributes to the development of capabilities in service provider firms. In situations where such a contribution occurs, we analyze how different types of activities in the production process...... process. We find that clients influence the development of human capital capabilities and management capabilities in reciprocally produced services. While in sequential produced services clients influence the development of organizational capital capabilities and management capital capabilities....... of the services, such as sequential or reciprocal task activities, influence the development of different types of capabilities. We study five cases of offshore-outsourced knowledge-intensive business services that are distinguished according to their reciprocal or sequential task activities in their production...

  19. Transient analysis capabilities at ABB-CE

    International Nuclear Information System (INIS)

    Kling, C.L.

    1992-01-01

    The transient capabilities at ABB-Combustion Engineering (ABB-CE) Nuclear Power are a function of the computer hardware and related network used, the computer software that has evolved over the years, and the commercial technical exchange agreements with other related organizations and customers. ABB-CEA is changing from a mainframe/personal computer network to a distributed workstation/personal computer local area network. The paper discusses computer hardware, mainframe computing, personal computers, mainframe/personal computer networks, workstations, transient analysis computer software, design/operation transient analysis codes, safety (licensed) analysis codes, cooperation with ABB-Atom, and customer support

  20. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide......-Configurable Intelligent Distributed Antenna System (SCIDAS)’ that overlays intelligence over the conventional DAS architecture and latter is in the form of a swarm of intelligent hovering base stations working in a team to cooperatively resolve the PTC congestion at the Area of Event (AoE). A suitable network...

  1. Combat ocular trauma and systemic injury.

    Science.gov (United States)

    Weichel, Eric D; Colyer, Marcus H

    2008-11-01

    To review the recent literature regarding combat ocular trauma during hostilities in Operations Iraqi Freedom and Enduring Freedom, describe the classification of combat ocular trauma, and offer strategies that may assist in the management of eye injuries. Several recent publications have highlighted features of combat ocular trauma from Operation Iraqi Freedom. The most common cause of today's combat ocular injuries is unconventional fragmentary munitions causing significant blast injuries. These explosive munitions cause high rates of concomitant nonocular injuries such as traumatic brain injury, amputation, and other organ injuries. The most frequent ocular injuries include open-globe and adnexal lacerations. The extreme severity of combat-related open-globe injuries leads to high rates of primary enucleation and retained intraocular foreign bodies. Visual outcomes of intraocular foreign body injuries are similar to other series despite delayed removal, and no cases of endophthalmitis have occurred. Despite these advances, however, significant vision loss persists in cases of perforating globe injuries as well as open and closed-globe trauma involving the posterior segment. This review summarizes the recent literature describing ocular and systemic injuries sustained during Operations Iraqi and Enduring Freedom. An emphasis on classification of ocular injuries as well as a discussion of main outcome measures and complications is discussed.

  2. Capability Handbook- offline metrology

    DEFF Research Database (Denmark)

    Islam, Aminul; Marhöfer, David Maximilian; Tosello, Guido

    This offline metrological capability handbook has been made in relation to HiMicro Task 3.3. The purpose of this document is to assess the metrological capability of the HiMicro partners and to gather the information of all available metrological instruments in the one single document. It provides...

  3. Dynamic Capabilities and Performance

    DEFF Research Database (Denmark)

    Wilden, Ralf; Gudergan, Siegfried P.; Nielsen, Bo Bernhard

    2013-01-01

    are contingent on the competitive intensity faced by firms. Our findings demonstrate the performance effects of internal alignment between organizational structure and dynamic capabilities, as well as the external fit of dynamic capabilities with competitive intensity. We outline the advantages of PLS...

  4. Developing Alliance Capabilities

    DEFF Research Database (Denmark)

    Heimeriks, Koen H.; Duysters, Geert; Vanhaverbeke, Wim

    This paper assesses the differential performance effects of learning mechanisms on the development of alliance capabilities. Prior research has suggested that different capability levels could be identified in which specific intra-firm learning mechanisms are used to enhance a firm's alliance...

  5. Telematics Options and Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Hodge, Cabell [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-09-05

    This presentation describes the data tracking and analytical capabilities of telematics devices. Federal fleet managers can use the systems to keep their drivers safe, maintain a fuel efficient fleet, ease their reporting burden, and save money. The presentation includes an example of how much these capabilities can save fleets.

  6. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  7. Combating student plagiarism an academic librarian's guide

    CERN Document Server

    Lampert, Lynn D

    2014-01-01

    This practical book introduces readers to the current issues facing todays academic reference and instruction librarians grappling with the growing problem of student plagiarism. The book provides up-to-date overviews of student plagiarism, examples of ways in which librarians can educate students through proven instructional techniques, collaboration approaches and outreach methods, and discusses common problems and questions librarians may encounter when incorporating current anti-plagiarism instruction into their instructional services. Topics include: role of the academic librarian in combating student plagiarism, discipline-based approaches to combating student plagiarism, information literacy techniques and faculty/librarian collaboration. Investigates the issues surrounding the growth of instances of student plagiarism Discusses the academic librarian's role in combating student plagiarism Recommends effective outreach techniques and instructional methods for preventing plagiarism.

  8. Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1)

    Science.gov (United States)

    2016-03-01

    Global Combat Support System – Marine Corps (GCSS-MC) is a portfolio of systems that supports logistics elements of command and control, joint...future Marine Corps logistics systems modernization . GCSS-MC/LCM Increment 1 Capability Release 1 (hereinafter Release 1.1) is the baseline

  9. High Reliability Organization and Applicability to the Battlefield to Reduce Errors Associated with Combat Casualty Care

    Science.gov (United States)

    2016-06-10

    use different terminology depending on which sister service they are from. Every service has various medical capabilities for each role of medical ... Medical Errors, Combat Casualty Care, Culture of Safety 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a...Army) AE Adverse event AHRQ Agency for Healthcare Research and Quality AHS Army Health System AMEDD Army Medical Department CPQ Clinical Practice

  10. Marine Corps Amphibious Combat Vehicle (ACV) and Marine Personnel Carrier (MPC): Background and Issues for Congress

    Science.gov (United States)

    2016-09-09

    providing critical capabilities to execute the nation’s military strategy . On January 6, 2011, after spending approximately $3 billion in...the Landing Craft , Air Cushioned (LCAC). The LAV-25 has been in service since 1983. According to the Marine Program Executive Office (PEO) Land...the Marines’ new MPC/ACV acquisition strategy and its associated challenges and risks. Marine Corps Amphibious Combat Vehicle (ACV) and Marine

  11. The balance and harmony of control power for a combat aircraft in tactical maneuvering

    Science.gov (United States)

    Bocvarov, Spiro; Cliff, Eugene M.; Lutze, Frederick H.

    1992-01-01

    An analysis is presented for a family of regular extremal attitude-maneuvers for the High Angle-of-Attack Research Vehicle that has thrust-vectoring capability. Different levels of dynamic coupling are identified in the combat aircraft attitude model, and the characteristic extremal-family motion is explained. It is shown why the extremal-family trajectories develop small sideslip-angles, a highly desirable feature from a practical viewpoint.

  12. Littoral Combat Ship and Frigate: Congress Faced with Critical Acquisition Decisions

    Science.gov (United States)

    2016-12-01

    Authorizing the block buy strategy for the frigate appears premature . The decisions Congress makes could have implications for what aspiring...LCS and small surface combatant programs. This statement is largely based on GAO’s prior reports and larger work on shipbuilding and acquisition...ships capable of performing surface, anti-submarine, and anti-air warfare. Letter Page 2 GAO-17-262T This testimony largely

  13. An automated methodology development. [software design for combat simulation

    Science.gov (United States)

    Hawley, L. R.

    1985-01-01

    The design methodology employed in testing the applicability of Ada in large-scale combat simulations is described. Ada was considered as a substitute for FORTRAN to lower life cycle costs and ease the program development efforts. An object-oriented approach was taken, which featured definitions of military targets, the capability of manipulating their condition in real-time, and one-to-one correlation between the object states and real world states. The simulation design process was automated by the problem statement language (PSL)/problem statement analyzer (PSA). The PSL/PSA system accessed the problem data base directly to enhance the code efficiency by, e.g., eliminating non-used subroutines, and provided for automated report generation, besides allowing for functional and interface descriptions. The ways in which the methodology satisfied the responsiveness, reliability, transportability, modifiability, timeliness and efficiency goals are discussed.

  14. Determination of the capabilities of a detachment for neutralizing chemical attack effects in the brigade defense zone

    Directory of Open Access Journals (Sweden)

    Dejan R. Inđić

    2012-04-01

    Full Text Available This paper presents one possible way of deploying detachments for neutralizing the effects of chemical attacks in a brigade defense zone. The detachment composition is provisional and depends on the assessment of whether the enemy in the incoming combat will use weapons of mass destruction. A detachment consists of several organizational units: medical care forces, chemical reconnaissance forces, forces for the establishment of combat efficiency and chemical decontamination forces. The capabilities of the mentioned forces depend on their size, equipment, training level, extent of effects and combat conditions. The paper indicates a potential to overcome the gap in the provisions after disbanding the Army Corps.

  15. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  16. THE POSSIBLY PREVENTION AND COMBATING TAX EVASION

    Directory of Open Access Journals (Sweden)

    Daniela P. POPA

    2014-11-01

    - A faulty legislation that allows them to circumvent the failure to pay taxes. Measures to combat tax evasion must act in the areas of legislative, administrative and educational. The legislative drafting tax legislation seeks appropriate, clear, concise, stable and consistent. It is also necessary to eliminate or withdrawal of exemptions, reductions and deductions that give rise to multiple interpretations. In terms of administrative measures aimed at creating a comprehensive and operational information system, ensuring adequate administrative structures and instruments effectively combating tax evasion and training specialists with morality and professionalism required of shapes and sizes evasion.

  17. FMEF/experimental capabilities

    International Nuclear Information System (INIS)

    Burgess, C.A.; Dronen, V.R.

    1981-01-01

    The Fuels and Materials Examination Facility (FMEF), under construction at the Hanford site north of Richland, Washington, will be one of the most modern facilities offering irradiated fuels and materials examination capabilities and fuel fabrication development technologies. Scheduled for completion in 1984, the FMEF will provide examination capability for fuel assemblies, fuel pins and test pins irradiated in the FFTF. Various functions of the FMEF are described, with emphasis on experimental data-gathering capabilities in the facility's Nondestructive and Destructive examination cell complex

  18. KSC Technical Capabilities Website

    Science.gov (United States)

    Nufer, Brian; Bursian, Henry; Brown, Laurette L.

    2010-01-01

    This document is the website pages that review the technical capabilities that the Kennedy Space Center (KSC) has for partnership opportunities. The purpose of this information is to make prospective customers aware of the capabilities and provide an opportunity to form relationships with the experts at KSC. The technical capabilities fall into these areas: (1) Ground Operations and Processing Services, (2) Design and Analysis Solutions, (3) Command and Control Systems / Services, (4) Materials and Processes, (5) Research and Technology Development and (6) Laboratories, Shops and Test Facilities.

  19. Building Software Tools for Combat Modeling and Analysis

    National Research Council Canada - National Science Library

    Yuanxin, Chen

    2004-01-01

    ... (Meta-Language for Combat Simulations) and its associated parser and C++ code generator were designed to reduce the amount of time and developmental efforts needed to build sophisticated real world combat simulations. A C++...

  20. Personality Factors Affecting Pilot Combat Performance: A Preliminary Investigation

    National Research Council Canada - National Science Library

    Siem, Frederick M; Murray, Michael W

    1997-01-01

    .... The present research was designed to examine the relationship between personality and combat performance using the "Big Five" model of personality and a multicomponent model of pilot combat performance...

  1. Resources, constraints and capabilities

    NARCIS (Netherlands)

    Dhondt, S.; Oeij, P.R.A.; Schröder, A.

    2018-01-01

    Human and financial resources as well as organisational capabilities are needed to overcome the manifold constraints social innovators are facing. To unlock the potential of social innovation for the whole society new (social) innovation friendly environments and new governance structures

  2. a Capability approach

    African Journals Online (AJOL)

    efforts towards gender equality in education as a means of achieving social justice. ... should mean that a lot of capability approach-oriented commentators are ... processes, their forms of exercising power, and their rules, unwritten cultures, ...

  3. Engineering Capabilities and Partnerships

    Science.gov (United States)

    Poulos, Steve

    2010-01-01

    This slide presentation reviews the engineering capabilities at Johnson Space Center, The presentation also reviews the partnerships that have resulted in successfully designed and developed projects that involved commercial and educational institutions.

  4. Brandishing Cyberattack Capabilities

    Science.gov (United States)

    2013-01-01

    Advertising cyberwar capabilities may be helpful. It may back up a deterrence strategy. It might dissuade other states from conventional mischief or...to enable the attack.5 Many of the instruments of the attack remain with the target system, nestled in its log files, or even in the malware itself...debat- able. Even if demonstrated, what worked yesterday may not work today. But difficult does not mean impossible. Advertising cyberwar capabilities

  5. CASL Dakota Capabilities Summary

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Brian M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Simmons, Chris [Univ. of Texas, Austin, TX (United States); Williams, Brian J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-10

    The Dakota software project serves the mission of Sandia National Laboratories and supports a worldwide user community by delivering state-of-the-art research and robust, usable software for optimization and uncertainty quantification. These capabilities enable advanced exploration and riskinformed prediction with a wide range of computational science and engineering models. Dakota is the verification and validation (V&V) / uncertainty quantification (UQ) software delivery vehicle for CASL, allowing analysts across focus areas to apply these capabilities to myriad nuclear engineering analyses.

  6. Reconfigurable network processing platforms

    NARCIS (Netherlands)

    Kachris, C.

    2007-01-01

    This dissertation presents our investigation on how to efficiently exploit reconfigurable hardware to design flexible, high performance, and power efficient network devices capable to adapt to varying processing requirements of network applications and traffic. The proposed reconfigurable network

  7. Barriers to Implementing a Single Joint Combat Camouflage Uniform

    Science.gov (United States)

    2017-12-01

    opportunities, threats (SWOT), and political, economic, social, and technological (PEST) analyses; examines the requirements and role of each of the...SUBJECT TERMS ground combat uniform, combat camouflage uniform history , combat camouflage uniform pattern, camouflage pattern testing 15. NUMBER...methodology applies strengths, weaknesses, opportunities, threats (SWOT), and political, economic, social, and technological (PEST) analyses

  8. Unit Reconstitutions: Combat Stress as an Indicator of Unit Effectiveness

    Science.gov (United States)

    2014-06-13

    doctrinally “Combat and Operational Stress Reactions:” A. Shell shock B. War neurosis C. Battle fatigue D. Combat exhaustion E. Combat stress F...... neurosis . The approach that evolved–proximity, immediacy, and expectancy–was a formula that incorporated some of the best practices to increase the

  9. Childhood maltreatment and combat posttraumatic stress differentially predict fear-related fronto-subcortical connectivity.

    Science.gov (United States)

    Birn, Rasmus M; Patriat, Rémi; Phillips, Mary L; Germain, Anne; Herringa, Ryan J

    2014-10-01

    Adult posttraumatic stress disorder (PTSD) has been characterized by altered fear-network connectivity. Childhood trauma is a major risk factor for adult PTSD, yet its contribution to fear-network connectivity in PTSD remains unexplored. We examined, within a single model, the contribution of childhood maltreatment, combat exposure, and combat-related posttraumatic stress symptoms (PTSS) to resting-state connectivity (rs-FC) of the amygdala and hippocampus in military veterans. Medication-free male veterans (n = 27, average 26.6 years) with a range of PTSS completed resting-state fMRI. Measures including the Clinician-Administered PTSD Scale (CAPS), Childhood Trauma Questionnaire (CTQ), and Combat Exposure Scale (CES) were used to predict rs-FC using multilinear regression. Fear-network seeds included the amygdala and hippocampus. Amygdala: CTQ predicted lower connectivity to ventromedial prefrontal cortex (vmPFC), but greater anticorrelation with dorsal/lateral PFC. CAPS positively predicted connectivity to insula, and loss of anticorrelation with dorsomedial/dorsolateral (dm/dl)PFC. Hippocampus: CTQ predicted lower connectivity to vmPFC, but greater anticorrelation with dm/dlPFC. CES predicted greater anticorrelation, whereas CAPS predicted less anticorrelation with dmPFC. Childhood trauma, combat exposure, and PTSS differentially predict fear-network rs-FC. Childhood maltreatment may weaken ventral prefrontal-subcortical circuitry important in automatic fear regulation, but, in a compensatory manner, may also strengthen dorsal prefrontal-subcortical pathways involved in more effortful emotion regulation. PTSD symptoms, in turn, appear to emerge with the loss of connectivity in the latter pathway. These findings suggest potential mechanisms by which developmental trauma exposure leads to adult PTSD, and which brain mechanisms are associated with the emergence of PTSD symptoms. © 2014 Wiley Periodicals, Inc.

  10. Human performance modeling for system of systems analytics: combat performance-shaping factors.

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R.; Miller, Dwight Peter

    2006-01-01

    The US military has identified Human Performance Modeling (HPM) as a significant requirement and challenge of future systems modeling and analysis initiatives. To support this goal, Sandia National Laboratories (SNL) has undertaken a program of HPM as an integral augmentation to its system-of-system (SoS) analytics capabilities. The previous effort, reported in SAND2005-6569, evaluated the effects of soldier cognitive fatigue on SoS performance. The current effort began with a very broad survey of any performance-shaping factors (PSFs) that also might affect soldiers performance in combat situations. The work included consideration of three different approaches to cognition modeling and how appropriate they would be for application to SoS analytics. This bulk of this report categorizes 47 PSFs into three groups (internal, external, and task-related) and provides brief descriptions of how each affects combat performance, according to the literature. The PSFs were then assembled into a matrix with 22 representative military tasks and assigned one of four levels of estimated negative impact on task performance, based on the literature. Blank versions of the matrix were then sent to two ex-military subject-matter experts to be filled out based on their personal experiences. Data analysis was performed to identify the consensus most influential PSFs. Results indicate that combat-related injury, cognitive fatigue, inadequate training, physical fatigue, thirst, stress, poor perceptual processing, and presence of chemical agents are among the PSFs with the most negative impact on combat performance.

  11. New Equipping Strategies for Combat Support Hospitals

    Science.gov (United States)

    2010-01-01

    Combat and Doctrine Development and COL Timothy Lamb , supported by MAJ Gary Cooper, included members of our team in visits to Sierra Army Depot and...aspect of improving materiel stew - ardship is improving the quality of data related to the procurement, maintenance, and upgrading of equipment

  12. Africanity: A Combative Ontology | Mafeje | CODESRIA Bulletin

    African Journals Online (AJOL)

    Africanity: A Combative Ontology. Archie Mafeje. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact AJOL · News. OTHER RESOURCES... for Researchers · for Journals · for Authors · for Policy ...

  13. On shelterbelt design for combating sand invasion.

    NARCIS (Netherlands)

    Mohammed, A.E.; Stigter, C.J.; Adam, H.S.

    1996-01-01

    After a review of the scarce literature on using trees against sand encroachment, a quantitative experiment with a wide shelterbelt to combat sand invasion is reported on. Experimental work was carried out at the northwestern border of the Gezira Scheme (Sudan), an area of severe land degradation

  14. Combatives for Alienated Youth: Problems and Prospects.

    Science.gov (United States)

    Hellison, Don

    Combative activities (boxing, wrestling, kung fu, etc.) are seen as having a positive influence on alienated inner city youth. Potential contributions of such activities in a school curriculum or recreation program include involvement, security, self-concept, and self-realization. Participants may be able to free themselves from such stereotype…

  15. Space Logistics: Launch Capabilities

    Science.gov (United States)

    Furnas, Randall B.

    1989-01-01

    The current maximum launch capability for the United States are shown. The predicted Earth-to-orbit requirements for the United States are presented. Contrasting the two indicates the strong National need for a major increase in Earth-to-orbit lift capability. Approximate weights for planned payloads are shown. NASA is studying the following options to meet the need for a new heavy-lift capability by mid to late 1990's: (1) Shuttle-C for near term (include growth versions); and (2) the Advanced Lauching System (ALS) for the long term. The current baseline two-engine Shuttle-C has a 15 x 82 ft payload bay and an expected lift capability of 82,000 lb to Low Earth Orbit. Several options are being considered which have expanded diameter payload bays. A three-engine Shuttle-C with an expected lift of 145,000 lb to LEO is being evaluated as well. The Advanced Launch System (ALS) is a potential joint development between the Air Force and NASA. This program is focused toward long-term launch requirements, specifically beyond the year 2000. The basic approach is to develop a family of vehicles with the same high reliability as the Shuttle system, yet offering a much greater lift capability at a greatly reduced cost (per pound of payload). The ALS unmanned family of vehicles will provide a low end lift capability equivalent to Titan IV, and a high end lift capability greater than the Soviet Energia if requirements for such a high-end vehicle are defined.In conclusion, the planning of the next generation space telescope should not be constrained to the current launch vehicles. New vehicle designs will be driven by the needs of anticipated heavy users.

  16. International network competition

    OpenAIRE

    Tangerås, Thomas P.; Tåg, Joacim

    2014-01-01

    We analyse network competition in a market with international calls. National regulatory agencies (NRAs) have incentives to set regulated termination rates above marginal cost to extract rent from international call termination. International network ownership and deregulation are alternatives to combat the incentives of NRAs to distort termination rates. We provide conditions under which each of these policies increase efficiency and aggregate welfare. Our findings provide theoretical suppor...

  17. Combat sports for persons with disabilities

    Directory of Open Access Journals (Sweden)

    Kasum Goran

    2011-01-01

    Full Text Available In literature, the term adapted sport indicates sports activities, modified and adapted to persons with disabilities. In spite of their highly prominent values, combat sports are underrepresented among persons with disabilities in Serbia. The benefits of combat sports practicing are numerous, and at some international hospitals, martial sports and arts already have an important role in the treatment of traumatized and disabled persons. Currently, the programme of Paralympic Games includes only two sports, these are fencing and judo, in male and female competition. Almost certainly, karate will also be included in the programme of Paralympic Games, and there are similar ambitions in the case of taekwondo as well. In addition to these sports, some martial arts, especially aikido, thai-chi-chuan and qigong, have obtained significant representation and interest among persons with disabilities. The reasons for weaker interest in other martial sports and arts, should be sought in the fact that they are underrepresented among this population, and that these persons are not offered the possibility of organized practice of such sports. Orientation towards a combat sport brings great refreshment and powerful emotional experience to each practitioner, and this fact has special significance to persons with disabilities. In Serbia, combat sports are not widely represented among persons with disabilities, and only the wrestlers with impaired hearing have achieved significant success on the international stage. On the other hand, the popularity of combat sports among persons with disabilities in the world is significantly growing. It is necessary to take concrete steps to make it so in Serbia as well.

  18. Dutch National Plan combat nuclear accidents

    International Nuclear Information System (INIS)

    1988-01-01

    This document presents the Dutch National Plan combat nuclear accidents (NPK). Ch. 2 discusses some important starting points which are determining for the framework and the performance of the NPK, in particular the accident typology which underlies the plan. Also the new accident-classification system for the Dutch nuclear power plants, the standardization for the measures to be taken and the staging around nuclear power plants are pursued. In ch. 3 the legal framework of the combat nuclear accidents is described. In particular the Nuclear-power law, the Accident law and the Municipality law are pursued. Also the role of province and municipality are described. Ch. 4 deals with the role of the owner/licensee of the object where the accident occurs, in the combat of accident. In ch. 5 the structure of the nuclear-accident combat at national level is outlined, subdivided in alarm phase, combat phase and the winding-up phase. In ch.'s 6-12 these phases are elaborated more in detail. In ch.'s 10-13 the measures to be taken in nuclear accidents, are described. These measures are distinguished with regard to: protection of the population and medical aspects, water economy, drinking-water supply, agriculture and food supply. Ch. 14 describes the responsibility of the burgomaster. Ch.'s 15 and 16 present an overview of the personnel, material, procedural and juridical modifications and supplements of existing structures which are necessary with regard to the new and modified parts of the structure. Ch. 17 indicates how by means of the appropriate education and exercise it can be achieved that all personnel, services and institutes concerned possess the knowledge and experience necessary for the activities from the NKP to be executed as has been described. Ch. 18 contains a survey of activities to be performed and a proposal how these can be realized. (H.W.). figs.; tabs

  19. Strategies for Combating Islamic State

    Directory of Open Access Journals (Sweden)

    Timothy Sands

    2016-08-01

    Full Text Available The Islamic State in Iraq and Syria (ISIS announced the formation of the “Islamic Caliphate” as an alternative to modern states, on 29 June 2014 (the first day of Ramadan. The ISIS vision shared by other global jihadist organizations such as al-Qaeda is an apocalyptic post-state. Many authors very quickly evolve from the idea of the potential threat to either the U.S. or its allies to a requisite necessity of strong military action by the U.S. to defeat ISIS. Something frequently absent in analyses of U.S. reactions to ISIS is the capabilities, responsibilities, and opinions and desires of neighboring Gulf countries. This paper will incorporate attitudes and opinions of Gulf countries to imply responsibilities to deal with ISIS prior to considering potential U.S. actions.

  20. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  1. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  2. New development thoughts on the bio-inspired intelligence based control for unmanned combat aerial vehicle

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Bio-inspired intelligence is in the spotlight in the field of international artificial intelligence,and unmanned combat aerial vehicle(UCAV),owing to its potential to perform dangerous,repetitive tasks in remote and hazardous,is very promising for the technological leadership of the nation and essential for improving the security of society.On the basis of introduction of bioinspired intelligence and UCAV,a series of new development thoughts on UCAV control are proposed,including artificial brain based high-level autonomous control for UCAV,swarm intelligence based cooperative control for multiple UCAVs,hy-brid swarm intelligence and Bayesian network based situation assessment under complicated combating environments, bio-inspired hardware based high-level autonomous control for UCAV,and meta-heuristic intelligence based heterogeneous cooperative control for multiple UCAVs and unmanned combat ground vehicles(UCGVs).The exact realization of the proposed new development thoughts can enhance the effectiveness of combat,while provide a series of novel breakthroughs for the intelligence,integration and advancement of future UCAV systems.

  3. Violence associated with combat-related posttraumatic stress disorder: The importance of anger.

    Science.gov (United States)

    Novaco, Raymond W; Chemtob, Claude M

    2015-09-01

    The importance of anger with regard to violence among veterans with combat-related PTSD has received little attention. We previously proposed that in PTSD the activation of threat-related cognitive networks strongly potentiates anger in a positive feedback loop and that inhibitory controls on aggression can be overridden when PTSD and anger activation are conjoined. We predicted that violence would be intensified when combat-related PTSD was conjoined with anger. We used the National Vietnam Veterans Readjustment Study (NVVRS) public use data set, selecting the male combat theater veterans, which entailed 1,200 from the main survey (Study 1) and 259 from the clinical interview component (Study 2). Anger indices were constructed from NVVRS variables. PTSD was assessed by continuous symptom scores and by clinical diagnostic measures. Conjoined anger and PTSD was associated with greatly increased violence. PTSD was not associated with violence in the absence of anger. This result was obtained using alternative measures of PTSD and of anger in both the main survey and the clinical interview component. These findings call for reconceptualizing the association of PTSD and violence. Concerted attention should be given to anger as a risk factor for violence in the assessment and treatment of combat-related PTSD, and as an important portal of entry for treatment. (c) 2015 APA, all rights reserved).

  4. Campus Capability Plan

    Energy Technology Data Exchange (ETDEWEB)

    Adams, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Arsenlis, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bailey, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bergman, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Brase, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Brenner, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Camara, L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Carlton, H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Cheng, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chrzanowski, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Colson, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); East, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Farrell, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ferranti, L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gursahani, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hansen, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Helms, L. L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hernandez, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Jeffries, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Larson, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Lu, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); McNabb, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mercer, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Skeate, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sueksdorf, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zucca, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Le, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Ancria, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Scott, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Leininger, L. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gagliardi, F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gash, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bronson, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Chung, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hobson, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Meeker, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanchez, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Zagar, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Quivey, B. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sommer, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Atherton, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-06

    Lawrence Livermore National Laboratory Campus Capability Plan for 2018-2028. Lawrence Livermore National Laboratory (LLNL) is one of three national laboratories that are part of the National Nuclear Security Administration. LLNL provides critical expertise to strengthen U.S. security through development and application of world-class science and technology that: Ensures the safety, reliability, and performance of the U.S. nuclear weapons stockpile; Promotes international nuclear safety and nonproliferation; Reduces global danger from weapons of mass destruction; Supports U.S. leadership in science and technology. Essential to the execution and continued advancement of these mission areas are responsive infrastructure capabilities. This report showcases each LLNL capability area and describes the mission, science, and technology efforts enabled by LLNL infrastructure, as well as future infrastructure plans.

  5. Technological Capability's Predictor Variables

    Directory of Open Access Journals (Sweden)

    Fernanda Maciel Reichert

    2011-03-01

    Full Text Available The aim of this study was to identify the factors that influence in configuration of the technological capability of companies in sectors with medium-low technological intensity. To achieve the goal proposed in this article a survey was carried out. Based on the framework developed by Lall (1992 which classifies firms in basic, intermediate and advanced level of technological capability; it was found that the predominant technological capability is intermediate, with 83.7% of respondent companies (plastics companies in Brazil. It is believed that the main contribution of this study is the finding that the dependent variable named “Technological Capability” can be explained at a rate of 65% by six variables: development of new processes; selection of the best equipment supplier; sales of internally developed new technology to third parties; design and manufacture of equipment; study of the work methods and perform inventory control; and improvement of product quality.

  6. Linking Combat Systems Capabilities and Ship Design Through Modeling and Computer Simulation

    Science.gov (United States)

    2013-09-01

    consumption (SFC), (4) weight of the power plant , and (5) weight capacity of cargo carrying capacity. The L/D Ratio reflects the amount of...ship. The SFC measures the efficiency of the ship in burning its fuel. The weight of the power reflects the combined weight of fuel and the power plant ... Montenegro Kotor class 1 18000 18000 27 4188800 Taiwan PSO 2 19850 39700 24 4640800 Spain Meteoro class 2 12000 24000 20.5 6261200 Colombia PSO 2

  7. Core Logistics Capability Policy Applied to USAF Combat Aircraft Avionics Software: A Systems Engineering Analysis

    Science.gov (United States)

    2010-06-01

    cannot make a distinction between software maintenance and development” (Sharma, 2004). ISO /IEC 12207 Software Lifecycle Processes offers a guide to...synopsis of ISO /IEC 12207 , Raghu Singh of the Federal Aviation Administration states “Whenever a software product needs modifications, the development...Corporation. Singh, R. (1998). International Standard ISO /IEC 12207 Software Life Cycle Processes. Washington: Federal Aviation Administration. The Joint

  8. Project AIR FORCE Modeling Capabilities for Support of Combat Operations in Denied Environments

    Science.gov (United States)

    2015-01-01

    within the Air Force and OSD.7 First, we thank Generals Herbert Carlisle, PACAF/CC, and Janet Wolfenbarger, AFMC/CC, for sponsoring this work. Gen...A5X, Brig Gen (s) John Cherrey, AF/A5XS, Col Jordan Thomas, AFA5XS, Lt Col Nathan Mead , AF/A5XS, Col Rich Gannon, AF/A9F, Ray Miller, AF/A9FC...linear programming (LP), which was developed in the 1940s by George Danzig to solve problems relevant to military logistics. Setting up MIP is

  9. The PLA and Chinas Rejuvenation: National Security and Military Strategies, Deterrence Concepts, and Combat Capabilities

    Science.gov (United States)

    2016-01-01

    to envi- ronmental rehabilitation. Policies have been directed to clean the country’s water, air, and soil, all of which remain heavily contaminated ...quality and safety of food and products. However, as with many policies, implementation remains problematic.14 Recent Developments Under Xi...Southeast Asian nations’ military bases, includ- ing those of Thailand, the Philippines, Singapore, Malaysia , and Indonesia. Japan is also men- tioned

  10. An Assessment of the Hypothetical Impact of Drug Abuse on Combat Capability. Volume I.

    Science.gov (United States)

    1979-12-01

    25 I .4 Jill 1.6 MICROCOPY RESOLUTION TEST CHART NATIONAt BIURIA OF gMANI£ IWOI) A LEVEL AD SAI-80-113-WA AN ASSESSMENT OF THE HYPOTHETICAL IMPACTo OF...potential loss of unit effectiveness in each of these units. The resulting measure of unit effectiveness provides a powerful analy- tic tool for comparing

  11. Capabilities for innovation

    DEFF Research Database (Denmark)

    Nielsen, Peter; Nielsen, Rene Nesgaard; Bamberger, Simon Grandjean

    2012-01-01

    is a survey that collected information from 601 firms belonging to the private urban sector in Denmark. The survey was carried out in late 2010. Keywords: dynamic capabilities/innovation/globalization/employee/employer cooperation/Nordic model Acknowledgment: The GOPA study was financed by grant 20080053113......Technological developments combined with increasing levels of competition related to the ongoing globalization imply that firms find themselves in dynamic, changing environments that call for dynamic capabilities. This challenges the internal human and organizational resources of firms in general...

  12. Human push capability.

    Science.gov (United States)

    Barnett, Ralph L; Liber, Theodore

    2006-02-22

    Use of unassisted human push capability arises from time to time in the areas of crowd and animal control, the security of locked doors, the integrity of railings, the removal of tree stumps and entrenched vehicles, the manoeuvering of furniture, and athletic pursuits such as US football or wrestling. Depending on the scenario, human push capability involves strength, weight, weight distribution, push angle, footwear/floor friction, and the friction between the upper body and the pushed object. Simple models are used to establish the relationships among these factors.

  13. The Capability Approach

    OpenAIRE

    Robeyns, Ingrid

    2011-01-01

    textabstract In its most general description, the capability approach is a flexible and multi-purpose normative framework, rather than a precise theory of well-being, freedom or justice. At its core are two normative claims: first, the claim that the freedom to achieve well-being is of primary moral importance, and second, that freedom to achieve well-being is to be understood in terms of people’s capabilities, that is, their real opportunities to do and be what they have reason to value. Thi...

  14. Sandia QIS Capabilities.

    Energy Technology Data Exchange (ETDEWEB)

    Muller, Richard P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Sandia National Laboratories has developed a broad set of capabilities in quantum information science (QIS), including elements of quantum computing, quantum communications, and quantum sensing. The Sandia QIS program is built atop unique DOE investments at the laboratories, including the MESA microelectronics fabrication facility, the Center for Integrated Nanotechnologies (CINT) facilities (joint with LANL), the Ion Beam Laboratory, and ASC High Performance Computing (HPC) facilities. Sandia has invested $75 M of LDRD funding over 12 years to develop unique, differentiating capabilities that leverage these DOE infrastructure investments.

  15. ISOPHOT - Capabilities and performance

    DEFF Research Database (Denmark)

    Lemke, D.; Klaas, U.; Abolins, J.

    1996-01-01

    ISOPHOT covers the largest wavelength range on ISO from 2.5 to 240 mu m. Its scientific capabilities include multi filter and multi-aperture photometry, polarimetry, imaging and spectrophotometry. All modes can optionally include a focal plane chopper. The backbone of the photometric calibration...

  16. Capabilities for Intercultural Dialogue

    Science.gov (United States)

    Crosbie, Veronica

    2014-01-01

    The capabilities approach offers a valuable analytical lens for exploring the challenge and complexity of intercultural dialogue in contemporary settings. The central tenets of the approach, developed by Amartya Sen and Martha Nussbaum, involve a set of humanistic goals including the recognition that development is a process whereby people's…

  17. Capabilities and Special Needs

    DEFF Research Database (Denmark)

    Kjeldsen, Christian Christrup

    into international consideration in relation to the implementation of the UN convention on the rights of persons with disabilities. As for the theoretical basis, the research makes use of the sociological open-ended and relational concepts of Pierre Bourdieu and the normative yardstick of the Capability Approach...

  18. Metrology Measurement Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Glen E. Gronniger

    2007-10-02

    This document contains descriptions of Federal Manufacturing & Technologies (FM&T) Metrology capabilities, traceability flow charts, and the measurement uncertainty of each measurement capability. Metrology provides NIST traceable precision measurements or equipment calibration for a wide variety of parameters, ranges, and state-of-the-art uncertainties. Metrology laboratories conform to the requirements of the Department of Energy Development and Production Manual Chapter 13.2, ANSI/ISO/IEC ANSI/ISO/IEC 17025:2005, and ANSI/NCSL Z540-1. FM&T Metrology laboratories are accredited by NVLAP for the parameters, ranges, and uncertainties listed in the specific scope of accreditation under NVLAP Lab code 200108-0. See the Internet at http://ts.nist.gov/Standards/scopes/2001080.pdf. These parameters are summarized. The Honeywell Federal Manufacturing & Technologies (FM&T) Metrology Department has developed measurement technology and calibration capability in four major fields of measurement: (1) Mechanical; (2) Environmental, Gas, Liquid; (3) Electrical (DC, AC, RF/Microwave); and (4) Optical and Radiation. Metrology Engineering provides the expertise to develop measurement capabilities for virtually any type of measurement in the fields listed above. A strong audit function has been developed to provide a means to evaluate the calibration programs of our suppliers and internal calibration organizations. Evaluation includes measurement audits and technical surveys.

  19. The Capability Approach

    NARCIS (Netherlands)

    I.A.M. Robeyns (Ingrid)

    2011-01-01

    textabstract In its most general description, the capability approach is a flexible and multi-purpose normative framework, rather than a precise theory of well-being, freedom or justice. At its core are two normative claims: first, the claim that the freedom to achieve well-being is of primary

  20. Sensor Alerting Capability

    Science.gov (United States)

    Henriksson, Jakob; Bermudez, Luis; Satapathy, Goutam

    2013-04-01

    There is a large amount of sensor data generated today by various sensors, from in-situ buoys to mobile underwater gliders. Providing sensor data to the users through standardized services, language and data model is the promise of OGC's Sensor Web Enablement (SWE) initiative. As the amount of data grows it is becoming difficult for data providers, planners and managers to ensure reliability of data and services and to monitor critical data changes. Intelligent Automation Inc. (IAI) is developing a net-centric alerting capability to address these issues. The capability is built on Sensor Observation Services (SOSs), which is used to collect and monitor sensor data. The alerts can be configured at the service level and at the sensor data level. For example it can alert for irregular data delivery events or a geo-temporal statistic of sensor data crossing a preset threshold. The capability provides multiple delivery mechanisms and protocols, including traditional techniques such as email and RSS. With this capability decision makers can monitor their assets and data streams, correct failures or be alerted about a coming phenomena.

  1. Capitalizing on capabilities.

    Science.gov (United States)

    Ulrich, Dave; Smallwood, Norm

    2004-06-01

    By making the most of organizational capabilities--employees' collective skills and fields of expertise--you can dramatically improve your company's market value. Although there is no magic list of proficiencies that every organization needs in order to succeed, the authors identify 11 intangible assets that well-managed companies tend to have: talent, speed, shared mind-set and coherent brand identity, accountability, collaboration, learning, leadership, customer connectivity, strategic unity, innovation, and efficiency. Such companies typically excel in only three of these capabilities while maintaining industry parity in the other areas. Organizations that fall below the norm in any of the 11 are likely candidates for dysfunction and competitive disadvantage. So you can determine how your company fares in these categories (or others, if the generic list doesn't suit your needs), the authors explain how to conduct a "capabilities audit," describing in particular the experiences and findings of two companies that recently performed such audits. In addition to highlighting which intangible assets are most important given the organization's history and strategy, this exercise will gauge how well your company delivers on its capabilities and will guide you in developing an action plan for improvement. A capabilities audit can work for an entire organization, a business unit, or a region--indeed, for any part of a company that has a strategy to generate financial or customer-related results. It enables executives to assess overall company strengths and weaknesses, senior leaders to define strategy, midlevel managers to execute strategy, and frontline leaders to achieve tactical results. In short, it helps turn intangible assets into concrete strengths.

  2. Performance differences between male and female marines on standardized physical fitness tests and combat proxy tasks: identifying the gap.

    Science.gov (United States)

    Jameson, Jason; Pappa, Leon; McGuire, Brian; Kelly, Karen R

    2015-01-01

    For decades women have been restricted from direct assignment to certain military occupational specialties such as infantry. These restrictions can limit the advancement of women through the ranks of military leadership. Thus, the purpose of this effort was to identify those physical requirements most likely to serve as barriers for women wanting to enter closed combat arms positions, and to evaluate the quality of existing physical fitness tests as potential measures of assessment of combat readiness. Data were collected from 3 different sites within the US Marine Corps Training and Education Command. All participants (409 male, 379 femaile) were active-duty Marines who recently completed the Physical Fitness Test (PFT) and Combat Fitness Test (CFT). Participants completed 6 physical tasks: 120-mm tank loading drill, 155-mm artillery round carry, negotiating an obstacle course wall while wearing a fighting load (≈30 lb), pull-ups, deadlift, and clean and press. Overall, there was a high rate of successful completion on the combat proxy tasks (men, ≈80% to 100%; women, ≈70% to 100%), with the notable exception being the clean and press (men, 80%; women, 9%) and pull-ups (men, 16±4; women, 4±2). The PFT and CFT components tasks were also related, strongly in some cases, with performance on combat-related proxy tasks (Spearman's ρ typically ranged from 0.60 to 0.80). Estimates of fat-free mass and VO2max were also strongly related to an overall measure of combat readiness (Spearman's ρ=0.77 and ρ=0.56, respectively). The primary physical obstacle for women is upper body strength. However, some women could successfully complete all of the proxy tasks and thus are physically capable of meeting the demands of closed combat occupations. The fact that some female Marines could complete the most challenging upper body strength tasks suggests that these barriers are not inherent but may be due to a lack of training specificity.

  3. New approaches to combat Porphyromonas gingivalis biofilms

    Science.gov (United States)

    Gerits, Evelien; Verstraeten, Natalie; Michiels, Jan

    2017-01-01

    ABSTRACT In nature, bacteria predominantly reside in structured, surface-attached communities embedded in a self-produced, extracellular matrix. These so-called biofilms play an important role in the development and pathogenesis of many infections, as they are difficult to eradicate due to their resistance to antimicrobials and host defense mechanisms. This review focusses on the biofilm-forming periodontal bacterium Porphyromonas gingivalis. Current knowledge on the virulence mechanisms underlying P. gingivalis biofilm formation is presented. In addition, oral infectious diseases in which P. gingivalis plays a key role are described, and an overview of conventional and new therapies for combating P. gingivalis biofilms is given. More insight into this intriguing pathogen might direct the development of better strategies to combat oral infections. PMID:28473880

  4. Regenerative medicine applications in combat casualty care.

    Science.gov (United States)

    Fleming, Mark E; Bharmal, Husain; Valerio, Ian

    2014-03-01

    The purpose of this report is to describe regenerative medicine applications in the management of complex injuries sustained by service members injured in support of the wars in Afghanistan and Iraq. Improvements in body armor, resuscitative techniques and faster transport have translated into increased patient survivability and more complex wounds. Combat-related blast injuries have resulted in multiple extremity injuries, significant tissue loss and amputations. Due to the limited availability and morbidity associated with autologous tissue donor sites, the introduction of regenerative medicine has been critical in managing war extremity injuries with composite massive tissue loss. Through case reports and clinical images, this report reviews the application of regenerative medicine modalities employed to manage combat-related injuries. It illustrates that the novel use of hybrid reconstructions combining traditional and regenerative medicine approaches are an effective tool in managing wounds. Lessons learned can be adapted to civilian care.

  5. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  6. Nuclear or conventional power for surface combatant ships: Department of the Navy. Report to the Congress

    International Nuclear Information System (INIS)

    1977-01-01

    GAO reviewed the controversy over whether the Navy's major surface combatant ships should be all nuclear powered, all conventionally powered, or a mix of both. Nuclear ships are more capable but cost more and their relative cost-effectiveness cannot be measured because Navy analysts cannot quantify many benefits of nuclear power. The Congress, in reviewing Navy shipbuilding plans for surface combatant ships, should be cognizant that buying only conventional ships will maximize naval firepower; buying only nuclear ships will provide mobility and greater freedom from logistics support; and buying a mix is a third option providing, to varying degrees, the advantages and disadvantages of the all-nuclear and all-conventional options

  7. Atmospheric Release Advisory Capability

    International Nuclear Information System (INIS)

    Dickerson, M.H.; Gudiksen, P.H.; Sullivan, T.J.

    1983-02-01

    The Atmospheric Release Advisory Capability (ARAC) project is a Department of Energy (DOE) sponsored real-time emergency response service available for use by both federal and state agencies in case of a potential or actual atmospheric release of nuclear material. The project, initiated in 1972, is currently evolving from the research and development phase to full operation. Plans are underway to expand the existing capability to continuous operation by 1984 and to establish a National ARAC Center (NARAC) by 1988. This report describes the ARAC system, its utilization during the past two years, and plans for its expansion during the next five to six years. An integral part of this expansion is due to a very important and crucial effort sponsored by the Defense Nuclear Agency to extend the ARAC service to approximately 45 Department of Defense (DOD) sites throughout the continental US over the next three years

  8. Joining together to combat poverty.

    Science.gov (United States)

    Heath, I; Haines, A; Malenica, Z; Oulton, J A; Leopando, Z; Kaseje, D; Addington, W W; Giscard D'Estaing, O; Tumwine, J K; Koivusalo, M; Biscoe, G; Nickson, P; Marusić, M; Vuk Pavlović, S

    2000-03-01

    The International Poverty and Health Network (IPHN) was created in December 1997 following a series of conferences organized by the World Health Organization, with the aim of integrating health into plans to eradicate poverty. Around 1.3 billion people live on less than US$1 per day. Of the 4.4 billion people in developing countries nearly 60% lack access to sanitation, 30% do not have clean water, 20% have no health care, and 20% do not have enough dietary energy and protein. Even among rich nations there are gross socioeconomic inequalities. Many children are robbed of their physical and mental potential through poverty. Expressed in constant 1963 US dollars, an average Croatian family needed the annual income of US$894 to meet the poverty line in 1960 and US$9,027 in 1995. Accordingly, 9-25% of Croatian households were below the poverty line between 1960 and 1995. The increase in the poverty rate after 1991 was compounded by the war that destroyed almost a third of industrial capacity and infrastructure. Dissipation of the communist economy and inadequate privatization have contributed to the increase in unemployment rate, corruption, and other social ills. IPHN invited Croatian Medical Journal to publish this editorial to help push the issue of poverty up political and medical agendas on a global level. We argue that a factor contributing to the failure of most large-scale programs against poverty to date is the excessive emphasis on material and infrastructure assistance at the expense of spiritual, moral, and intellectual development.

  9. Group Capability Model

    Science.gov (United States)

    Olejarski, Michael; Appleton, Amy; Deltorchio, Stephen

    2009-01-01

    The Group Capability Model (GCM) is a software tool that allows an organization, from first line management to senior executive, to monitor and track the health (capability) of various groups in performing their contractual obligations. GCM calculates a Group Capability Index (GCI) by comparing actual head counts, certifications, and/or skills within a group. The model can also be used to simulate the effects of employee usage, training, and attrition on the GCI. A universal tool and common method was required due to the high risk of losing skills necessary to complete the Space Shuttle Program and meet the needs of the Constellation Program. During this transition from one space vehicle to another, the uncertainty among the critical skilled workforce is high and attrition has the potential to be unmanageable. GCM allows managers to establish requirements for their group in the form of head counts, certification requirements, or skills requirements. GCM then calculates a Group Capability Index (GCI), where a score of 1 indicates that the group is at the appropriate level; anything less than 1 indicates a potential for improvement. This shows the health of a group, both currently and over time. GCM accepts as input head count, certification needs, critical needs, competency needs, and competency critical needs. In addition, team members are categorized by years of experience, percentage of contribution, ex-members and their skills, availability, function, and in-work requirements. Outputs are several reports, including actual vs. required head count, actual vs. required certificates, CGI change over time (by month), and more. The program stores historical data for summary and historical reporting, which is done via an Excel spreadsheet that is color-coded to show health statistics at a glance. GCM has provided the Shuttle Ground Processing team with a quantifiable, repeatable approach to assessing and managing the skills in their organization. They now have a common

  10. Expeditionary Rubber Removal Capability

    Science.gov (United States)

    2006-12-31

    the modified spray unit or system with equivalent capabilities. 24 25 9.8. A pressure sensor or caster wheels should be incorporated into the...DISCUSSION 18 8.0 CONCLUSIONS 23 9.0 RECOMMENDATIONS 24 APPENDIX A – DETAILED LIST OF EQUIPMENT AND MODIFICATIONS 26 APPENDIX B – LIST OF SOURCES FOR...tall Weight – 4820 lb (No Attachments) Top Speed – 18 mph High Flow Hydraulics (Optional) – 26 gpm Steering – All Wheel Steering Cargo Max Load

  11. Atmospheric release advisory capability

    International Nuclear Information System (INIS)

    Sullivan, T.J.

    1981-01-01

    The ARAC system (Atmospheric Release Advisory Capability) is described. The system is a collection of people, computers, computer models, topographic data and meteorological input data that together permits a calculation of, in a quasi-predictive sense, where effluent from an accident will migrate through the atmosphere, where it will be deposited on the ground, and what instantaneous and integrated dose an exposed individual would receive

  12. Combat Stress and Substance Use Intervention

    Science.gov (United States)

    2017-06-01

    Additionally, excessive alcohol use in the military has been linked to serious consequences and loss of productivity , both of which are detrimental...and absenteeism among Iraq war veterans. The American Journal of Psychiatry, 164(1), 150– 153. Jakupcak, M., Tull, M. T., McDermott, M. J., Kaysen, D...2015, 2016) 106 1 Product Line Review (PLR) Meeting Technology- Facilitated Monitoring and Treatment in Mental Health 21 August 2012 Combat

  13. Combat Conditioning: The Need for Stronger Marines

    Science.gov (United States)

    2008-02-18

    pounds. This leads to overuse injuries that can reduce a unit’s combat effectiveness. Typically the injuries are isolated to the lower...extremities in the form of femoral and hip stress fractures. The way to avoid these types of injuries is to strengthen the muscles around these areas as...shows how the average weight carried by warriors has increased over time. 3 “ CrossFit is a core strength and conditioning program

  14. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  15. Combat Trains Command Post (CTCP) Operations

    Science.gov (United States)

    2016-10-28

    development through the execution of several validation exercises leading up to the NTC rotation. The squadron utilized home station training opportunities at...evolving problem as the troop 1SG had the responsibility to tie in all disabled vehicles awaiting parts into the security plan. The crews of those...Additionally, depth of knowledge in critical equipment would have assisted the CTCP [i.e. only one operator for the Combat-Service- Support Automated

  16. Violation of human rights to combat terrorism.

    OpenAIRE

    2012-01-01

    LL.B. No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Convent...

  17. Barriers to combating human trafficking in Colombia

    OpenAIRE

    Wilcox, Daniel Joseph

    2015-01-01

    Approved for public release; distribution is unlimited Despite international and domestic policies and programs intended to combat human trafficking, Colombia remains one of the countries with the highest instances of human trafficking in the Western Hemisphere. Factors contributing to human trafficking in Colombia, such as internal violence and displacement, drug trafficking, a weak central government, and widespread corruption, have overpowered what energies the government marshaled agai...

  18. Lessons Worth Remembering: Combat In Urban Areas

    Science.gov (United States)

    2016-05-10

    vi Acronyms AQI Al Qaeda of Iraq ARVN Army of Vietnam CF Coalition Forces COP Combat Outpost IED Improvised...Finally, there was an unorganized criminal element that was interested in profiting from the general violence and lawlessness.181 The prime objective of...Ramadi. In June, the 1BCT ordered one of its battalion’s, TF 1/37 Armor, to establish COP Falcon in the southwest section of the city.201 The operation

  19. Combating Corruption in International Business Transactions

    OpenAIRE

    Celentani, Marco; Ganuza, Juan-José; Peydró, José-Luis

    2004-01-01

    International business transactions pose the problem of deterring bribing of public officials by foreign firms. We first analyse a convention styled after the OECD's 'Convention on Combating Bribery of Foreign Public Officials in International Business Transactions', which requires signatory countries to proceed against firms that have bribed public officials of any foreign country. We then study the case in which the convention requires signatory countries to proceed against firms that have ...

  20. A model management system for combat simulation

    OpenAIRE

    Dolk, Daniel R.

    1986-01-01

    The design and implementation of a model management system to support combat modeling is discussed. Structured modeling is introduced as a formalism for representing mathematical models. A relational information resource dictionary system is developed which can accommodate structured models. An implementation is described. Structured modeling is then compared to Jackson System Development (JSD) as a methodology for facilitating discrete event simulation. JSD is currently better at representin...

  1. Groundwork for a Theory of the Combatant

    Science.gov (United States)

    2017-01-03

    moral status of an individual combatant might have to be relativized to particular roles, or particular missions, rather than the justice of his or her...contemporary scholars understand killing in war. However, such arguments can be very complex, which makes them of little practical value in actual moral ...is the collectivist, because it better captures the nature of the various morally relevant relationships involved. Those relationships are between

  2. Canadian national nuclear forensics capability project

    International Nuclear Information System (INIS)

    Ball, J.; Dimayuga, I.; Summerell, I.; Totland, M.; Jonkmans, G.; Whitlock, J.; El-jaby, A.; Inrig, E.

    2015-01-01

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  3. Canadian national nuclear forensics capability project

    Energy Technology Data Exchange (ETDEWEB)

    Ball, J.; Dimayuga, I., E-mail: joanne.ball@cnl.ca [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Summerell, I. [Royal Canadian Mounted Police, Ottawa, Ontario (Canada); Totland, M. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); Jonkmans, G. [Defence Research and Development Canada, Ottawa, Ontario (Canada); Whitlock, J. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada); El-jaby, A. [Canadian Nuclear Safety Commission, Ottawa, Ontario (Canada); Inrig, E. [Defence Research and Development Canada, Ottawa, Ontario (Canada)

    2015-06-15

    Following the 2010 Nuclear Security Summit, Canada expanded its existing capability for nuclear forensics by establishing a national nuclear forensics laboratory network, which would include a capability to perform forensic analysis on nuclear and other radioactive material, as well as on traditional evidence contaminated with radioactive material. At the same time, the need for a national nuclear forensics library of signatures of nuclear and radioactive materials under Canadian regulatory control was recognized. The Canadian Safety and Security Program, administered by Defence Research and Development Canada's Centre for Security Science (DRDC CSS), funds science and technology initiatives to enhance Canada's preparedness for prevention of and response to potential threats. DRDC CSS, with assistance from Canadian Nuclear Laboratories, formerly Atomic Energy of Canada Limited, is leading the Canadian National Nuclear Forensics Capability Project to develop a coordinated, comprehensive, and timely national nuclear forensics capability. (author)

  4. Legislations combating counterfeit drugs in Hong Kong.

    Science.gov (United States)

    Lai, C W; Chan, W K

    2013-08-01

    To understand legislation combating counterfeit drugs in Hong Kong. This study consisted of two parts. In part I, counterfeit drugs–related ordinances and court cases were reviewed. In part II, indepth interviews of the stakeholders were described. Hong Kong. All Hong Kong ordinances were screened manually to identify those combating counterfeit drugs. Court cases were searched for each of the identified cases. Then, the relevant judgement justifications were analysed to identify sentencing issues. Indepth interviews with the stakeholders were conducted to understand their perceptions about such legislation. Trade Marks Ordinance, Patents Ordinance, Trade Descriptions Ordinance, and Pharmacy and Poisons Ordinance were current legislative items combating counterfeit drugs. Sentencing criteria depended on: intention to deceive, quantity of seized drugs, presence of expected therapeutic effect or toxic ingredients, previous criminal records, cooperativeness with Customs officers, honest confessions, pleas of guilty, types of drugs, and precautionary measures to prevent sale of counterfeit drugs. Stakeholders’ perceptions were explored with respect to legislation regarding the scale and significance of the counterfeit drug problem, penalties and deterrents, drug-specific legislation and authority, and inspections and enforcement. To plug the loopholes, a specific law with heavy penalties should be adopted. This could be supplemented by non-legal measures like education of judges, lawyers, and the public; publishing the names of offending pharmacies; and emphasising the role of pharmacists to the public.

  5. Wireless Sensor Network Applications for the Combat Air Forces

    Science.gov (United States)

    2006-06-13

    9 2.2.2 weC Mote...variety of enclosures (sometime weather or impact resistant). Since most applications make it infeasible to routinely change batteries, nodes are... environmental monitors or data loggers as examples since extremely small nodes would not be required for those types of activities [Hol00]. A similar

  6. Aircraft Simulator: Multiple-Cockpit Combat Mission Trainer Network.

    Science.gov (United States)

    1984-01-01

    Force Human Resources Laboratory (AFHRL), the Air Force Office of Scientific Research (AFOSR), and the Southeastern Center for Electrical Engineering...New York: IEEE Press. Rapumno, R. A. , A Shimsaki, N. (1974). Synchronization of earth stations to satellite-switched sequences. Comunications ...Satellite Technology, 33 (Progress in Astronautics and Aeronautics) , 411-429. Tobagi, F. A. (1980). Multiaccess protocols in packet comunication systems. IEEE TMS. C". , 4 (vol. CO-28), 468-488. 27 ORR .0--000

  7. Towards a Determination of the Physiological Characteristics Distinguishing Successful Mixed Martial Arts Athletes: A Systematic Review of Combat Sport Literature.

    Science.gov (United States)

    James, Lachlan P; Haff, G Gregory; Kelly, Vincent G; Beckman, Emma M

    2016-10-01

    Mixed martial arts (MMA) is a combat sport underpinned by techniques from other combat disciplines, in addition to strategies unique to the sport itself. These sports can be divided into two distinct categories (grappling or striking) based on differing technical demands. Uniquely, MMA combines both methods of combat and therefore appears to be physiologically complex requiring a spectrum of mechanical and metabolic qualities to drive performance. However, little is known about the physiological characteristics that distinguish higher- from lower-level MMA athletes. Such information provides guidance for training interventions, performance testing and talent identification. Furthermore, while MMA incorporates techniques from both grappling and striking sports, it is unknown precisely how these disciplines differ physiologically. Understanding the relationship between higher-level competitors in grappling and striking combat sports can provide further insight into the development of the optimal performance profile of a higher-level MMA athlete. This article aims to analyse the scientific literature on MMA and the primary combat sports underpinning it to determine the physiological adaptations that distinguish superior competitors, with a view to defining the optimal physiological profile for higher-level MMA performance. Furthermore, this article will explore the differences in these capabilities between grappling- and striking-based combat sports in the context of MMA. A literature search was undertaken via PubMed, Web of Science, SportDiscus and Google Scholar. The following sports were included for systematic review based on their relevance to MMA: mixed martial arts, boxing, Brazilian jiu-jitsu, judo, karate, kickboxing, Muay Thai and wrestling. The inclusion criteria allowed studies that compared athletes of differing competition levels in the same sport using a physiological performance measure. Only male, adult (aged 17-40 years), able-bodied competitors

  8. Enhancing radiation biodosimetry capability

    International Nuclear Information System (INIS)

    Alok, A.; Kumar, A.; Kulshrestra, S.; Choudhary, S.; Bhagi, S.; Adhikari, J.S.; Chaudhury, N.K.

    2016-01-01

    Biodosimetry laboratories are necessary for quick and accurate assessment of absorbed radiation dose in suspected individuals for their medical management. The method is based on dicentric chromosomal assay (Gold standard). This assay is completely manual and time consuming, require skill and competency of laboratory staff. There is a necessity of more biodosimetry labs within country and networking within and at international level for enhancing medical preparedness for management of radiation emergency

  9. The evolution of alliance capabilities

    NARCIS (Netherlands)

    Heimeriks, K.H.; Duysters, G.M.; Vanhaverbeke, W.P.M.

    2004-01-01

    This paper assesses the effectiveness and differential performance effects of learning mechanisms on the evolution of alliance capabilities. Relying on the concept of capability lifecycles, prior research has suggested that different capability levels could be identified in which different

  10. Laboratory microfusion capability study

    International Nuclear Information System (INIS)

    1993-05-01

    The purpose of this study is to elucidate the issues involved in developing a Laboratory Microfusion Capability (LMC) which is the major objective of the Inertial Confinement Fusion (ICF) program within the purview of the Department of Energy's Defense Programs. The study was initiated to support a number of DOE management needs: to provide insight for the evolution of the ICF program; to afford guidance to the ICF laboratories in planning their research and development programs; to inform Congress and others of the details and implications of the LMC; to identify criteria for selection of a concept for the Laboratory Microfusion Facility and to develop a coordinated plan for the realization of an LMC. As originally proposed, the LMC study was divided into two phases. The first phase identifies the purpose and potential utility of the LMC, the regime of its performance parameters, driver independent design issues and requirements, its development goals and requirements, and associated technical, management, staffing, environmental, and other developmental and operational issues. The second phase addresses driver-dependent issues such as specific design, range of performance capabilities, and cost. The study includes four driver options; the neodymium-glass solid state laser, the krypton fluoride excimer gas laser, the light-ion accelerator, and the heavy-ion induction linear accelerator. The results of the Phase II study are described in the present report

  11. Analysis of Error Propagation Within Hierarchical Air Combat Models

    Science.gov (United States)

    2016-06-01

    values alone are propagated through layers of combat models, the final results will likely be biased, and risk underestimated. An air-to-air...values alone are propagated through layers of combat models, the final results will likely be biased, and risk underestimated. An air-to-air engagement... PROPAGATION WITHIN HIERARCHICAL AIR COMBAT MODELS by Salih Ilaslan June 2016 Thesis Advisor: Thomas W. Lucas Second Reader: Jeffrey

  12. 597 Days: A Division’s Morale During Sustained Combat

    Science.gov (United States)

    2014-05-22

    The army broke combat exhaustion into two groups: new replacements and veterans. For new replacements the symptoms of combat exhaustion appeared...through the initial effects of combat to fall into the veteran group. The manifestation of symptoms for veterans generally occurred around the 120th...concentrated strength” that the German Army was simply overrun. The battle turned into a “ gigantic mopping- up operation,” one that saw the Red Bulls solidify

  13. Medical rescue of naval combat: challenges and future

    OpenAIRE

    Jin, Hai; Hou, Li-Jun; Fu, Xiao-Bing

    2015-01-01

    There has been no large-scale naval combat in the last 30?years. With the rapid development of battleships, weapons manufacturing and electronic technology, naval combat will present some new characteristics. Additionally, naval combat is facing unprecedented challenges. In this paper, we discuss the topic of medical rescue at sea: what challenges we face and what we could do. The contents discussed in this paper contain battlefield self-aid buddy care, clinical skills, organized health servi...

  14. A Commander in Chief's Network-Centric Odyssey

    National Research Council Canada - National Science Library

    Copley, E

    2002-01-01

    .... Each Armed Service has begun training and equipping its force using the tenets of Network-Centric Operations, but those forces come together for the first time under the combatant Commander-in-Chief...

  15. Medical rescue of naval combat: challenges and future.

    Science.gov (United States)

    Jin, Hai; Hou, Li-Jun; Fu, Xiao-Bing

    2015-01-01

    There has been no large-scale naval combat in the last 30 years. With the rapid development of battleships, weapons manufacturing and electronic technology, naval combat will present some new characteristics. Additionally, naval combat is facing unprecedented challenges. In this paper, we discuss the topic of medical rescue at sea: what challenges we face and what we could do. The contents discussed in this paper contain battlefield self-aid buddy care, clinical skills, organized health services, medical training and future medical research programs. We also discuss the characteristics of modern naval combat, medical rescue challenges, medical treatment highlights and future developments of medical rescue at sea.

  16. Mitigating Inter-Network Interference in LoRa Networks

    OpenAIRE

    Voigt, Thiemo; Bor, Martin; Roedig, Utz; Alonso, Juan

    2017-01-01

    Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional a...

  17. Demonstration of Supervisory Control and Data Acquisition (SCADA) Virtualization Capability in the US Army Research Laboratory (ARL)/Sustaining Base Network Assurance Branch (SBNAB) US Army Cyber Analytics Laboratory (ACAL) SCADA Hardware Testbed

    Science.gov (United States)

    2015-05-01

    application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors.  Test the

  18. Casualties of War: Combat Trauma and the Return of the Combat Veteran

    Science.gov (United States)

    Kiely, Denis O.; Swift, Lisa

    2009-01-01

    The experience of the combat soldier and the road back to civilian life are recurrent themes in American literature and cinema. Whether the treatment is tragic (Stephen Crane's "Red Badge of Courage", Tim O'Brien's "The Things They Carried", or Tony Scott's "Blackhawk Down"), satirical (Joseph Heller's "Catch Twenty-Two" and Robert Altman's…

  19. Women in Combat: The Medical and Behavioral Health Effects on Women Who Have Served in Combat

    Science.gov (United States)

    2014-06-13

    urinary tract infections or bacterial vaginosis while deployed, and with limited medical care available, could lead to long-term reproductive issues......experience (Gaylord 2006). Several studies have been conducted on pregnancy outcomes in female Soldiers who have deployed to combat, such as fertility

  20. Sleep quality affects cognitive functioning in returning combat veterans beyond combat exposure, PTSD, and mild TBI history.

    Science.gov (United States)

    Martindale, Sarah L; Morissette, Sandra B; Rowland, Jared A; Dolan, Sara L

    2017-01-01

    The purpose of this study was to determine how sleep quality affects cognitive functioning in returning combat veterans after accounting for effects of combat exposure, posttraumatic stress disorder (PTSD), and mild traumatic brain injury (mTBI) history. This was a cross-sectional assessment study evaluating combat exposure, PTSD, mTBI history, sleep quality, and neuropsychological functioning. One hundred and nine eligible male Iraq/Afghanistan combat veterans completed an assessment consisting of a structured clinical interview, neuropsychological battery, and self-report measures. Using partial least squares structural equation modeling, combat experiences and mTBI history were not directly associated with sleep quality. PTSD was directly associated with sleep quality, which contributed to deficits in neuropsychological functioning independently of and in addition to combat experiences, PTSD, and mTBI history. Combat experiences and PTSD were differentially associated with motor speed. Sleep affected cognitive function independently of combat experiences, PTSD, and mTBI history. Sleep quality also contributed to cognitive deficits beyond effects of PTSD. An evaluation of sleep quality may be a useful point of clinical intervention in combat veterans with cognitive complaints. Improving sleep quality could alleviate cognitive complaints, improving veterans' ability to engage in treatment. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  1. Mitigation approaches to combat the flu pandemic

    Directory of Open Access Journals (Sweden)

    Raman Chawla

    2009-01-01

    The National Disaster Management Authority (NDMA, Government of India, with the active cooperation of UN agencies and other stakeholders/experts has formulated a concept paper on role of nonhealth service providers during pandemics in April 2008 and released national guidelines - management of biological disasters in July 2008. These guidelines enumerate that the success of medical management endeavors like pharmaceutical (anti-viral Oseltamivir and Zanamivir therapies, nonpharmaceutical interventions and vaccination development etc., largely depends on level of resistance offered by mutagenic viral strain and rationale use of pharmaco therapeutic interventions. This article describes the mitigation approach to combat flu pandemic with its effective implementation at national, state and local levels.

  2. An improved artificial bee colony algorithm based on balance-evolution strategy for unmanned combat aerial vehicle path planning.

    Science.gov (United States)

    Li, Bai; Gong, Li-gang; Yang, Wen-lun

    2014-01-01

    Unmanned combat aerial vehicles (UCAVs) have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC) algorithm improved by a balance-evolution strategy (BES) is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.

  3. An Improved Artificial Bee Colony Algorithm Based on Balance-Evolution Strategy for Unmanned Combat Aerial Vehicle Path Planning

    Directory of Open Access Journals (Sweden)

    Bai Li

    2014-01-01

    Full Text Available Unmanned combat aerial vehicles (UCAVs have been of great interest to military organizations throughout the world due to their outstanding capabilities to operate in dangerous or hazardous environments. UCAV path planning aims to obtain an optimal flight route with the threats and constraints in the combat field well considered. In this work, a novel artificial bee colony (ABC algorithm improved by a balance-evolution strategy (BES is applied in this optimization scheme. In this new algorithm, convergence information during the iteration is fully utilized to manipulate the exploration/exploitation accuracy and to pursue a balance between local exploitation and global exploration capabilities. Simulation results confirm that BE-ABC algorithm is more competent for the UCAV path planning scheme than the conventional ABC algorithm and two other state-of-the-art modified ABC algorithms.

  4. A High-Fidelity Batch Simulation Environment for Integrated Batch and Piloted Air Combat Simulation Analysis

    Science.gov (United States)

    Goodrich, Kenneth H.; McManus, John W.; Chappell, Alan R.

    1992-01-01

    A batch air combat simulation environment known as the Tactical Maneuvering Simulator (TMS) is presented. The TMS serves as a tool for developing and evaluating tactical maneuvering logics. The environment can also be used to evaluate the tactical implications of perturbations to aircraft performance or supporting systems. The TMS is capable of simulating air combat between any number of engagement participants, with practical limits imposed by computer memory and processing power. Aircraft are modeled using equations of motion, control laws, aerodynamics and propulsive characteristics equivalent to those used in high-fidelity piloted simulation. Databases representative of a modern high-performance aircraft with and without thrust-vectoring capability are included. To simplify the task of developing and implementing maneuvering logics in the TMS, an outer-loop control system known as the Tactical Autopilot (TA) is implemented in the aircraft simulation model. The TA converts guidance commands issued by computerized maneuvering logics in the form of desired angle-of-attack and wind axis-bank angle into inputs to the inner-loop control augmentation system of the aircraft. This report describes the capabilities and operation of the TMS.

  5. Aircraft Capability Management

    Science.gov (United States)

    Mumaw, Randy; Feary, Mike

    2018-01-01

    This presentation presents an overview of work performed at NASA Ames Research Center in 2017. The work concerns the analysis of current aircraft system management displays, and the initial development of an interface for providing information about aircraft system status. The new interface proposes a shift away from current aircraft system alerting interfaces that report the status of physical components, and towards displaying the implications of degradations on mission capability. The proposed interface describes these component failures in terms of operational consequences of aircraft system degradations. The research activity was an effort to examine the utility of different representations of complex systems and operating environments to support real-time decision making of off-nominal situations. A specific focus was to develop representations that provide better integrated information to allow pilots to more easily reason about the operational consequences of the off-nominal situations. The work is also seen as a pathway to autonomy, as information is integrated and understood in a form that automated responses could be developed for the off-nominal situations in the future.

  6. Production capability and supply

    International Nuclear Information System (INIS)

    Klemenic, J.

    1977-01-01

    The strong market for uranium of recent years is about to usher in a new era in domestic uranium production. The spot market price of uranium has remained relatively stable at a little over $40/lb for more than 18 months. Many of the recent contracts for delivery in the early 1980s are calling for prices in the range of $40 to $65 per lb in year-of-delivery dollars. Low-grade, high-cost projects, such as uranium recovery from mill tailings and the reopening of ''mined-out'' ore bodies, have already been initiated. New underground mines to produce at greater depths, and new surface mines to recover lower grade ores, are being developed or seriously planned. In keeping with this movement to recover uranium from low-grade ore and other high cost materials, the Grand Junction Office has examined, for the first time, the production capability of the domestic industry assuming a $30/lb (or less) ''forward cost'' resource base. As in the past, keep in mind that the market price needed to stimulate full production of a given resource base may be significantly higher than the estimated forward cost of producing that resource. Results of the $30/lb study are presented

  7. LHC Capabilities for Quarkonia

    CERN Document Server

    Petrushanko, Sergey

    2008-01-01

    The measurement of the charmonium and bottomonium resonances in nucleus-nucleus collisions provides crucial information on high-density QCD matter. First, the suppression of quarkonia production is generally agreed to be one of the most direct probes of quark-gluon plasma formation. The observation of anomalous J/$\\psi$ suppression at the CERN-SPS and at RHIC is well established but the clarification of some important remaining questions requires equivalent studies of the $\\Upsilon$ family, only possible at the LHC energies. Second, the production of heavy-quarks proceeds mainly via gluon-gluon fusion processes and, as such, is sensitive to saturation of the gluon density at low-x in the nucleus. Measured departures from the expected vacuum quarkonia cross-sections in Pb+Pb collisions at the LHC will thus provide valuable information not only on the thermodynamical state of the produced partonic medium, but also on the initial-state modifications of the nuclear parton distribution functions. The capabilities ...

  8. Mobile systems capability plan

    International Nuclear Information System (INIS)

    1996-09-01

    This plan was prepared to initiate contracting for and deployment of these mobile system services. 102,000 cubic meters of retrievable, contact-handled TRU waste are stored at many sites around the country. Also, an estimated 38,000 cubic meters of TRU waste will be generated in the course of waste inventory workoff and continuing DOE operations. All the defense TRU waste is destined for disposal in WIPP near Carlsbad NM. To ship TRU waste there, sites must first certify that the waste meets WIPP waste acceptance criteria. The waste must be characterized, and if not acceptable, subjected to additional processing, including repackaging. Most sites plan to use existing fixed facilities or open new ones between FY1997-2006 to perform these functions; small-quantity sites lack this capability. An alternative to fixed facilities is the use of mobile systems mounted in trailers or skids, and transported to sites. Mobile systems will be used for all characterization and certification at small sites; large sites can also use them. The Carlsbad Area Office plans to pursue a strategy of privatization of mobile system services, since this offers a number of advantages. To indicate the possible magnitude of the costs of deploying mobile systems, preliminary estimates of equipment, maintenance, and operating costs over a 10-year period were prepared and options for purchase, lease, and privatization through fixed-price contracts considered

  9. Strength capability while kneeling.

    Science.gov (United States)

    Haslegrave, C M; Tracy, M F; Corlett, E N

    1997-12-01

    Work sometimes has to be carried out kneeling, particularly where jobs are performed in confined spaces as is common for miners, aircraft baggage handlers and maintenance workers. In order to assess the risks in performing forceful tasks under such conditions, data is needed on strength capabilities of kneeling subjects. A study was undertaken to measure isometric strength in single-handed exertions for male subjects and to investigate the effects on this of task layout factors (direction of force exertion, reach distance, height of the workpiece and orientation relative to the subject's sagittal plane). The data has been tabulated to show the degree to which strength may be reduced in different situations and analysis of the task factors showed their influence to be complex with direction of exertion and reach distance having the greatest effect. The results also suggest that exertions are weaker when subjects are kneeling on two knees than when kneeling on one knee, although this needs to be confirmed by direct experimental comparison.

  10. Energy Harvesting Combat Boot for Satellite Positioning

    Directory of Open Access Journals (Sweden)

    Haluk Akay

    2018-05-01

    Full Text Available Most portable electronic devices are power-limited by battery capacity, and recharging these batteries often interrupts the user’s experience with the device. The product presented in this paper provides an alternative to powering portables by converting regular human walking motion to electricity. The device harvests electric power using air bulbs, distributed in the sole of a shoe to drive a series of micro-turbines connected to small DC motors. The number and position of air bulbs is optimized to harvest the maximum airflow from each foot-strike. The system is designed to continuously drive the micro-turbines by utilizing both outflow and inflow from the air bulbs. A prototype combat boot was fitted on the right foot of a 75 kg test subject, and produced an average continuous power on the order of 10 s of mW over a 22 Ω load during walking at 3.0 mph. This combat boot provides enough electric power to a passive GPS tracker that periodically relays geographical coordinates to a smartphone via satellite without battery replacement.

  11. Promotion of good governance and combating corruption and ...

    African Journals Online (AJOL)

    Melvin Mbao and G.G Komboni criticise the legal regime and institutional arrangements designed to promote good government and to combat corruption and maladministration in Botswana, a country widely acclaimed as Africa's success story. Using internationally accepted benchmarks on good governance and combating ...

  12. Appetitive Aggression in Women: Comparing Male and Female War Combatants

    Directory of Open Access Journals (Sweden)

    Danie eMeyer-Parlapanis

    2016-01-01

    Full Text Available Appetitive aggression refers to positive feelings being associated with the perpetration of violent behavior and has been shown to provide resilience against the development of PTSD in combatants returning from the battlefield. Until this point, appetitive aggression has been primarily researched in males. This study investigates appetitive aggression in females. Female and male combatants and civilians from Burundi were assessed for levels of appetitive aggression. In contrast to non-combatants, no sex difference in appetitive aggression could be detected for combatants. Furthermore, each of the female and male combatant groups displayed substantially higher levels of appetitive aggression than each of the male and female civilian control groups. This study demonstrates that in violent contexts, such as armed conflict, in which individuals perpetrate numerous aggressive acts against others, the likelihood for an experience of appetitive aggression increases- regardless of whether the individuals are male or female.

  13. A naturalistic decision making model for simulated human combatants

    International Nuclear Information System (INIS)

    HUNTER, KEITH O.; HART, WILLIAM E.; FORSYTHE, JAMES C.

    2000-01-01

    The authors describe a naturalistic behavioral model for the simulation of small unit combat. This model, Klein's recognition-primed decision making (RPD) model, is driven by situational awareness rather than a rational process of selecting from a set of action options. They argue that simulated combatants modeled with RPD will have more flexible and realistic responses to a broad range of small-scale combat scenarios. Furthermore, they note that the predictability of a simulation using an RPD framework can be easily controlled to provide multiple evaluations of a given combat scenario. Finally, they discuss computational issues for building an RPD-based behavior engine for fully automated combatants in small conflict scenarios, which are being investigated within Sandia's Next Generation Site Security project

  14. Psycho-physiological response of soldiers in urban combat

    Directory of Open Access Journals (Sweden)

    Vicente J. Clemente-Suárez

    2013-05-01

    Full Text Available Current armed conflicts are asymmetrical and are developed m urban areas. These new requirements have not been studied for current literature. The aim of this study was to analyse changes in cortical arousal, blood lactate, muscle strength, autonomic modulation and rate of perceived exertion in a simulated urban combat. We analyzed 20 soldiers before and after an urban combat simulation. The results showed how urban combat produced high sympathetic nervous system activation, increasing the muscle strength, heart rate and blood lactate concentration of the soldiers. Despite this effort, rate of perceived exertion were not consistent with the physiological response that soldiers presented, the rate of perceived exertion was lower than the physiological response evaluated. Furthermore, the information processing and cortical arousal decreased after the urban combat simulation. These results have showed the psycho-physiological response of soldiers in combat, helping to better understanding and enabling an improvement of current training methods of soldiers.

  15. Are there atheists in foxholes? Combat intensity and religious behavior.

    Science.gov (United States)

    Wansink, Brian; Wansink, Craig S

    2013-09-01

    After battle, the moral and mortality stresses influence different soldiers in different ways. Using two large-scale surveys of World War II veterans, this research investigates the impact of combat on religiosity. Study 1 shows that as combat became more frightening, the percentage of soldiers who reported praying rose from 42 to 72%. Study 2 shows that 50 years later, many soldiers still exhibited religious behavior, but it varied by their war experience. Soldiers who faced heavy combat (vs. no combat) attended church 21% more often if they claimed their war experience was negative, but those who claimed their experience was positive attended 26% less often. The more a combat veteran disliked the war, the more religious they were 50 years later. While implications for counselors, clergy, support groups, and health practitioners are outlined, saying there are no atheists in foxholes may be less of an argument against atheism than it is against foxholes.

  16. Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Burnette, John R.; Thibodeau, Christopher C.; Greitzer, Frank L.

    2002-02-28

    As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data between the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.

  17. Sandia Laboratories technical capabilities. Auxiliary capabilities: environmental health information science

    International Nuclear Information System (INIS)

    1975-09-01

    Sandia Laboratories is an engineering laboratory in which research, development, testing, and evaluation capabilities are integrated by program management for the generation of advanced designs. In fulfilling its primary responsibility to ERDA, Sandia Laboratories has acquired extensive research and development capabilities. The purpose of this series of documents is to catalog the many technical capabilities of the Laboratories. After the listing of capabilities, supporting information is provided in the form of highlights, which show applications. This document deals with auxiliary capabilities, in particular, environmental health and information science. (11 figures, 1 table) (RWR)

  18. Sandia Laboratories technical capabilities: testing

    International Nuclear Information System (INIS)

    Lundergan, C.D.

    1975-12-01

    The testing capabilities at Sandia Laboratories are characterized. Selected applications of these capabilities are presented to illustrate the extent to which they can be applied in research and development programs

  19. Sandia Laboratories technical capabilities: electronics

    International Nuclear Information System (INIS)

    Lundergan, C.D.

    1975-12-01

    This report characterizes the electronics capabilities at Sandia Laboratories. Selected applications of these capabilities are presented to illustrate the extent to which they can be applied in research and development programs

  20. Structural Capability of an Organization toward Innovation Capability

    DEFF Research Database (Denmark)

    Nielsen, Susanne Balslev; Momeni, Mostafa

    2016-01-01

    The scholars in the field of strategic management have developed two major approaches for attainment of competitive advantage: an approach based on environmental opportunities, and another one based on internal capabilities of an organization. Some investigations in the last two decades have...... indicated that the advantages relying on the internal capabilities of organizations may determine the competitive position of organizations better than environmental opportunities do. Characteristics of firms shows that one of the most internal capabilities that lead the organizations to the strongest...... competitive advantage in the organizations is the innovation capability. The innovation capability is associated with other organizational capabilities, and many organizations have focused on the need to identify innovation capabilities.This research focuses on recognition of the structural aspect...

  1. The Capability to Hold Property

    NARCIS (Netherlands)

    Claassen, Rutger

    2015-01-01

    This paper discusses the question of whether a capability theory of justice (such as that of Martha Nussbaum) should accept a basic “capability to hold property.” Answering this question is vital for bridging the gap between abstract capability theories of justice and their institutional

  2. Combat Internist: The Internal Medicine Experience in a Combat Hospital in Afghanistan

    Science.gov (United States)

    2015-01-01

    massive trans- fusion protocol.6 As such, critical care included frequent monitoring of hemoglobin and coagulation parameters with administration of...ongoing resuscitation. With the rise in nutritional supplement use, it was no sur- prise that they were frequently used in the combat zone. Numerous...recommendations on standard precautions and further care of his vaccine site. Education and Administration There were many opportunities to train and

  3. Capability-based computer systems

    CERN Document Server

    Levy, Henry M

    2014-01-01

    Capability-Based Computer Systems focuses on computer programs and their capabilities. The text first elaborates capability- and object-based system concepts, including capability-based systems, object-based approach, and summary. The book then describes early descriptor architectures and explains the Burroughs B5000, Rice University Computer, and Basic Language Machine. The text also focuses on early capability architectures. Dennis and Van Horn's Supervisor; CAL-TSS System; MIT PDP-1 Timesharing System; and Chicago Magic Number Machine are discussed. The book then describes Plessey System 25

  4. Control coordination abilities in shock combat sports

    Directory of Open Access Journals (Sweden)

    Natalya Boychenko

    2014-12-01

    Full Text Available Purpose: optimize the process control level of coordination abilities in martial arts. Material and Methods: analysis and compilation of scientific and methodological literature, interviews with coaches of drum martial arts, video analysis techniques, teacher observations. Results: identified specific types of coordination abilities in shock combat sports. Pod branny and offered specific and nonspecific tests to monitor the level of species athletes coordination abilities. Conclusion: it is determined that in order to achieve victory in the fight martial artists to navigate the space to be able to assess and manage dynamic and spatio-temporal parameters of movements, maintain balance, have a high coordination of movements. The proposed tests to monitor species coordination abilities athletes allow an objective assessment of not only the overall level of coordination, and the level of specific types of manifestations of this ability.

  5. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  6. Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft

    Science.gov (United States)

    2009-06-12

    or Foe IFR Instrument Flight Rules ISR Intelligence Surveillance and Reconnaissance JP Joint Publication JTAC Joint Terminal Attack...capable, combat range, loiter time, weapons payloads, ejection seats, NVG compatible cockpits, IFR avionics, etc.8 One of the primary enablers for cost...to-air threats. In cases where radar guided air defense systems are present, the lack of an RWR puts the aircraft at a definite disadvantage and is

  7. Mitigation approaches to combat the flu pandemic.

    Science.gov (United States)

    Chawla, Raman; Sharma, Rakesh Kumar; Madaan, Deepali; Dubey, Neha; Arora, Rajesh; Goel, Rajeev; Singh, Shefali; Kaushik, Vinod; Singh, Pankaj Kumar; Chabbra, Vivek; Bhardwaj, Janak Raj

    2009-07-01

    Management of flu pandemic is a perpetual challenge for the medical fraternity since time immemorial. Animal to human transmission has been observed thrice in the last century within an average range of 11-39 years of antigenic recycling. The recent outbreak of influenza A (H1N1, also termed as swine flu), first reported in Mexico on April 26, 2009, occurred in the forty first year since last reported flu pandemic (July 1968). Within less than 50 days, it has assumed pandemic proportions (phase VI) affecting over 76 countries with 163 deaths/35,928 cases (as on 15(th) June 2009). It indicated the re-emergence of genetically reassorted virus having strains endemic to humans, swine and avian (H5N1). The World Health Organisation (WHO) member states have already pulled up their socks and geared up to combat such criticalities. Earlier outbreaks of avian flu (H5N1) in different countries led WHO to develop pandemic preparedness strategies with national/regional plans on pandemic preparedness. Numerous factors related to climatic conditions, socio-economic strata, governance and sharing of information/logistics at all levels have been considered critical indicators in monitoring the dynamics of escalation towards a pandemic situation.The National Disaster Management Authority (NDMA), Government of India, with the active cooperation of UN agencies and other stakeholders/experts has formulated a concept paper on role of nonhealth service providers during pandemics in April 2008 and released national guidelines - management of biological disasters in July 2008. These guidelines enumerate that the success of medical management endeavors like pharmaceutical (anti-viral Oseltamivir and Zanamivir therapies), nonpharmaceutical interventions and vaccination development etc., largely depends on level of resistance offered by mutagenic viral strain and rationale use of pharmaco therapeutic interventions. This article describes the mitigation approach to combat flu pandemic with

  8. Mitigation Approaches to Combat the Flu Pandemic

    Science.gov (United States)

    Chawla, Raman; Sharma, Rakesh Kumar; Madaan, Deepali; Dubey, Neha; Arora, Rajesh; Goel, Rajeev; Singh, Shefali; Kaushik, Vinod; Singh, Pankaj Kumar; Chabbra, Vivek; Bhardwaj, Janak Raj

    2009-01-01

    Management of flu pandemic is a perpetual challenge for the medical fraternity since time immemorial. Animal to human transmission has been observed thrice in the last century within an average range of 11-39 years of antigenic recycling. The recent outbreak of influenza A (H1N1, also termed as swine flu), first reported in Mexico on April 26, 2009, occurred in the forty first year since last reported flu pandemic (July 1968). Within less than 50 days, it has assumed pandemic proportions (phase VI) affecting over 76 countries with 163 deaths/35,928 cases (as on 15th June 2009). It indicated the re-emergence of genetically reassorted virus having strains endemic to humans, swine and avian (H5N1). The World Health Organisation (WHO) member states have already pulled up their socks and geared up to combat such criticalities. Earlier outbreaks of avian flu (H5N1) in different countries led WHO to develop pandemic preparedness strategies with national/regional plans on pandemic preparedness. Numerous factors related to climatic conditions, socio-economic strata, governance and sharing of information/logistics at all levels have been considered critical indicators in monitoring the dynamics of escalation towards a pandemic situation. The National Disaster Management Authority (NDMA), Government of India, with the active cooperation of UN agencies and other stakeholders/experts has formulated a concept paper on role of nonhealth service providers during pandemics in April 2008 and released national guidelines - management of biological disasters in July 2008. These guidelines enumerate that the success of medical management endeavors like pharmaceutical (anti-viral Oseltamivir and Zanamivir therapies), nonpharmaceutical interventions and vaccination development etc., largely depends on level of resistance offered by mutagenic viral strain and rationale use of pharmaco therapeutic interventions. This article describes the mitigation approach to combat flu pandemic with its

  9. Combating (Child Human Trafficking: Building Capacity

    Directory of Open Access Journals (Sweden)

    John Winterdyk

    2018-03-01

    Full Text Available The presentation/paper focuses on the challenges and necessity of building capacity at local, national, and international levels with a focus of how to more effectively combat trafficking in human beings (THB. Insight from several of initiatives are shared with the aim of illustrating how to capitalize on the vast number of opportunities that already exist at these levels and how they might be coordinated to enable collaborative work in an informed and dynamic manner to combat human trafficking. Information from several recent research projects that focus on some of these same issues is also incorporated into this paper. El artículo se centra en los desafíos de la lucha contra el tráfico de personas y en la necesidad de aumentar la capacidad para ser más eficaces en ese sentido, local, nacional e internacionalmente. Nos hacemos eco de la visión de varias iniciativas, con el fin de ilustrar cómo capitalizar el gran número de oportunidades que ya existen en los ámbitos citados, y la forma en que se podrían coordinar para posibilitar la colaboración de una manera informada y dinámica para combatir la trata de personas. También se incluye en el artículo información emanada de diversos proyectos recientes de investigación sobre el tema que nos ocupa. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=3086067

  10. The role of Europol in the field of combating the illicit trafficking of nuclear materials and radioactive substances

    International Nuclear Information System (INIS)

    Gridling, P.

    2002-01-01

    Full text: The paper contains a short general presentation of Europol and of its links to the various agencies dealing with combating the illicit trafficking of radioactive substances, inside and outside the European Union. The main difficulties we have to face in this mission are from various origins. The collection of intelligence, from both law-enforcement and scientific sides, seems to be the most efficient way to detect smuggling networks. The necessary co-operation between these two communities is a challenge for both parties, but its beginnings are encouraging. However, multiple constraints still remain that hamper the process. Europol commits itself to bridging the gap between police or intelligence agencies and the nuclear scientific community, and plans to increase its involvement in the near future, by organizing training sessions for law-enforcement personnel in co-operation with our partners. Europol is also busy with producing threat assessments and possible scenarios of terrorist attacks, which also show that, in a general manner, the collection of intelligence on the criminal groups or individuals, modus operandi, or smuggling routes is a much more efficient way of prevention than the on-site physical protection, even if this latter method is indispensable. But, if despite preventive actions, a terrorist attack using mass destruction weapons actually occurs, its effects would be lessened by an appropriate reaction of the concerned authorities. That is why our organization is also involved in a process of awareness of our member states, as only a few of them have set up a response capability in this domain. (author)

  11. The role of Europol in the field of combating the illicit trafficking of nuclear material and radioactive substances

    International Nuclear Information System (INIS)

    Gridling, P.

    2002-01-01

    Full text: The paper contains a short general presentation of Europol and of its links to the various agencies dealing with combating the illicit trafficking of radioactive substances, inside and outside the European Union. The main difficulties we have to face in this mission are from various origins. The collection of intelligence, from both law-enforcement and scientific sides, seems to be the most efficient way to detect smuggling networks. The necessary co-operation between these two communities is a challenge for both parties, but its beginnings are encouraging. However, multiple constraints still remain that hamper the process. Europol commits itself to bridging the gap between police or intelligence agencies and the nuclear scientific community, and plans to increase its involvement in the near future, by organizing training sessions for law enforcement personnel in co-operation with our partners. Europol is also busy with producing threat assessments and possible scenarios of terrorist attacks, which also show that, in a general manner, the collection of intelligence on the criminal groups or individuals, modus operandi, or smuggling routes is a much more efficient way of prevention than the on-site physical protection, even if this latter method is indispensable. But, if despite preventive actions, a terrorist attack using mass destruction weapons actually occurs, its effects would be lessened by an appropriate reaction of the concerned authorities. That is why our organization is also involved in a process of awareness of our Member States, as only a few of them have set up a response capability in this domain. (author)

  12. [Gastrointestinal diseases and abdominal pain in combat veterans].

    Science.gov (United States)

    Pal'tsev, A I; Torgashov, M N; Popova, O S

    2013-01-01

    To analyze the role of consequences of combat stress in the development of gastrointestinal tract (GIT) diseases. One hundred and sixty-one combat veterans aged 24 to 69 years were examined. All underwent a clinical and neurological examination using the McGill pain questionnaire (MPQ), Beck depression inventory, Kotenev trauma stress questionnaire, and visual analogue scale to determine pain intensity. Anxiety, impairments in memory and sleep, and depression were identified. The SF-36 questionnaire was used to estimate quality of life in the patients. Gastric secretory function was investigated; esophagogastroduodenoscopy, X-ray and ultrasound studies, clinical and biochemical blood tests, coprological examinations, fecal tests for dysbiosis, if indicated, occult blood were made. Combat stress and its consequences as posttraumatic stress disorder have been shown to play an important role in the pathogenesis of GIT diseases and in the development of chronic abdominal pain. GIT diseases in combat veterans are in larger measure a sequel of impaired processes of adjustment to combat stress. Chronic abdominal pains were heterogeneous. On the one hand, chronic GIT disease serves as a source of pain syndrome; on the other hand, the central nervous system is of importance in the development of chronic abdominal pain. In addition to therapy for GIT and hepatobiliary diseases, the treatment of GIT diseases in this category of patients involves psychotherapy and neuroprotection, aimed at reducing the consequences of combat stress in combat veterans.

  13. S.A.C.I.: Incident Combat Support System; S.A.C.I.: Sistema de Apoio ao Combate de Incidentes

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, Antonio R.L. [ARMTEC Tecnologia em Robotica, Fotrtaleza, CE (Brazil); Macedo, Antonio R.M. [Universidade de Fortaleza, CE (Brazil)

    2004-07-01

    The incidents that occur in the petrochemical industry are extremely dangerous, because of the range of temperature that it reaches and the radius of the explosion. For this reason the S.A.C.I. that is an Incident's Combat Support System was developed. The purpose of this paper is to present the complete operational capability of this machine, and also some of the construction design calculations. It is a controlled-by-distance robot that carries one water cannon that generates fog, stream or foam with a limit pressure of 125 psi. It works within 90 m from the operator, has 3 degrees of freedom and a minimum autonomy of 3 hours. Before this prototype was made, only the United Kingdom by Qinetiq and the Japan by the Tokyo Fire Department had this technology. This prototype is around 70% of the investment of the ones in the market. The tests shown in the paper were made in the training bunker of Ceara's Military Fire Corp. Headquarters and in an arena in the Gloria Marine in Rio de Janeiro. The results of this project is a national product that improves the incident's combat response time, saving the most important resource, that is the human been. (author)

  14. S.A.C.I.: Incident Combat Support System; S.A.C.I.: Sistema de Apoio ao Combate de Incidentes

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, Antonio R.L. [ARMTEC Tecnologia em Robotica, Fotrtaleza, CE (Brazil); Macedo, Antonio R.M. [Universidade de Fortaleza, CE (Brazil)

    2004-07-01

    The incidents that occur in the petrochemical industry are extremely dangerous, because of the range of temperature that it reaches and the radius of the explosion. For this reason the S.A.C.I. that is an Incident's Combat Support System was developed. The purpose of this paper is to present the complete operational capability of this machine, and also some of the construction design calculations. It is a controlled-by-distance robot that carries one water cannon that generates fog, stream or foam with a limit pressure of 125 psi. It works within 90 m from the operator, has 3 degrees of freedom and a minimum autonomy of 3 hours. Before this prototype was made, only the United Kingdom by Qinetiq and the Japan by the Tokyo Fire Department had this technology. This prototype is around 70% of the investment of the ones in the market. The tests shown in the paper were made in the training bunker of Ceara's Military Fire Corp. Headquarters and in an arena in the Gloria Marine in Rio de Janeiro. The results of this project is a national product that improves the incident's combat response time, saving the most important resource, that is the human been. (author)

  15. Impact of Personnel Capabilities on Organizational Innovation Capability

    DEFF Research Database (Denmark)

    Nielsen, Susanne Balslev; Momeni, Mostafa

    2016-01-01

    in this rapidly changing world. This research focuses on definition of the personnel aspect of innovation capability, and proposes a conceptual model based on the scientific articles of academic literature on organisations innovation capability. This paper includes an expert based validation in three rounds...... of the Delphi method. And for the purpose of a better appreciation of the relationship dominating the factors of the model, it has distributed the questionnaire to Iranian companies in the Food industry. This research proposed a direct relationship between Innovation Capability and the Personnel Capability...

  16. Combating Desertification and Mitigating the Effects of Drought

    International Nuclear Information System (INIS)

    Awuondo, C.O

    2001-01-01

    The paper discusses the effects of desertification and drought on the well-being of humankind and therefore it important for them to be combated and mitigated. Desertification is the process that turns fertile lands into desert; drought is defined as lack of sufficient precipitation to sustain plant and human life. In an effort to discuss how to combat desertification, the author has subdivided the paper into five sections namely; introduction, ecological crisis, strategies for combating desertification and mitigating the effects of drought and finally the conclusion

  17. Combating gender stereotypes in the education system: success stories

    OpenAIRE

    Alvarez, Teresa

    2015-01-01

    GEC 2015. Conferência realizada em Helsínquia, de 9-10 october 2014. Conferência de Abertura do Painel 2 – Combating gender stereotypes in the education system: success stories, da Conferência promovida pelo Conselho da Europa sobre “Combating gender stereotypes in and through education”. Apresentam-se alguns desafios decorrentes do combate ao sexismo na escola e propõem-se algumas linhas de ação, ao nível individual, coletivo, organizacional e institucional. info:eu-repo/semantics/pub...

  18. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment developed for the renewal of the network of stations automatic monitoring environmental radiation of the Generalitat of Catalunya

    International Nuclear Information System (INIS)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2014-01-01

    The renewal of the automatic environmental radiation surveillance network of the Generalitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. the monitors use scintillation crystals, either Na(TI) or LaBr 3 (Ce) and currently, there are 3 types of equipment water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentration for some isotopes. (Author)

  19. Calibration and study of the measurement capabilities of real-time gamma spectrometry equipment, developed for the renewal of the network of automatic stations for environmental radiological surveillance of the Generalitat de Catalunya

    International Nuclear Information System (INIS)

    Casanovas, R.; Prieto, E.; Salvado, M.

    2013-01-01

    The renewal of the automatic environmental radiation surveillance network of the Gereralitat of Catalunya has been carried out through the development and implementation of gamma-spectrometry-based equipment. The monitors use scintillation cristals, either NaI(Tl) or LaBr 3 (Ce) and currently, there are 3 types of equipment: water radioactivity monitors, aerosols on a particulate filter monitors and direct measurement monitors. In this paper, we expose the basic features of its operation, the details of their calibration and the minimum detectable activity concentrations for some isotopes

  20. Evaluation of speech recognizers for use in advanced combat helicopter crew station research and development

    Science.gov (United States)

    Simpson, Carol A.

    1990-01-01

    The U.S. Army Crew Station Research and Development Facility uses vintage 1984 speech recognizers. An evaluation was performed of newer off-the-shelf speech recognition devices to determine whether newer technology performance and capabilities are substantially better than that of the Army's current speech recognizers. The Phonetic Discrimination (PD-100) Test was used to compare recognizer performance in two ambient noise conditions: quiet office and helicopter noise. Test tokens were spoken by males and females and in isolated-word and connected-work mode. Better overall recognition accuracy was obtained from the newer recognizers. Recognizer capabilities needed to support the development of human factors design requirements for speech command systems in advanced combat helicopters are listed.

  1. ANTECEDENTS OF CUSTOMER RELATIONSHIP MANAGEMENT CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Tuleu Daniela

    2015-07-01

    Full Text Available Customer relationship management, as a process to manage customer relationship initiation, maintenance and termination to maximize the value of the relationship portfolio, is an evolving process. In recent years, the development of interactive technologies (social media have revolutionized the interaction between firms and their customers and between customers. The impact of technology on CRM is improving ways of collecting and processing customer information and transforming communication with customers. In the context of the development of social networks, the introduction of social media applications in customer relationship management activities bring important changes in this area. Thus, managers need to pay attention to the interaction management as an important process of CRM and enhance the customer relationship management capabilities. The study propose a conceptual research model of several antecedents of customer relationship managements capabilities and provide the linkage between this antecedents and CRM capabilities. First, following review of existing research literature related to customer relationship management, there are some conceptual clarification on customer relationship management. Second, are presented the working concepts: the adoption of interactive technologies, customer concept, customer empowerment, customer relationship orientation and customer-centric management system. Then, it is proposed the conceptual model and finally are presented conclusions, managerial implications, limitations and research directions. From a theoretical perspective, this paper highlights the importance of marketing actions at the individual customer level and reveal the impact of adoption by companies of interactive technologies so that organizations have the opportunity to engage in conversations with customers and respond in real time the requirements that they launched the online environment. Nowadays, customers feel empowered and play

  2. People Capability Maturity Model. SM.

    Science.gov (United States)

    1995-09-01

    tailored so it consumes less time and resources than a traditional software process assessment or CMU/SEI-95-MM-02 People Capability Maturity Model...improved reputation or customer loyalty. CMU/SEI-95-MM-02 People Capability Maturity Model ■ L5-17 Coaching Level 5: Optimizing Activity 1...Maturity Model CMU/SEI-95-MM-62 Carnegie-Mellon University Software Engineering Institute DTIC ELECTE OCT 2 7 1995 People Capability Maturity

  3. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    International Nuclear Information System (INIS)

    2000-01-01

    of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be established

  4. Virtual Individual Combatant Trainer for Embedded Rehearsal (VICTER)

    National Research Council Canada - National Science Library

    Barham, Paul

    2002-01-01

    Report developed under SBIR contract. Reality by Design, Inc. (RBD) presents its Phase 2 Plus results of developing a modular, man-in-the-loop, embedded simulation system for Individual Combatant (IC...

  5. Reinforcement Sensitivity and Social Anxiety in Combat Veterans

    Science.gov (United States)

    Kimbrel, Nathan A.; Meyer, Eric C.; DeBeer, Bryann B.; Mitchell, John T.; Kimbrel, Azure D.; Nelson-Gray, Rosemery O.; Morissette, Sandra B.

    2017-01-01

    Objective The present study tested the hypothesis that low behavioral approach system (BAS) sensitivity is associated with social anxiety in combat veterans. Method Self-report measures of reinforcement sensitivity, combat exposure, social interaction anxiety, and social observation anxiety were administered to 197 Iraq/Afghanistan combat veterans. Results As expected, combat exposure, behavioral inhibition system (BIS) sensitivity, and fight-flight-freeze system (FFFS) sensitivity were positively associated with both social interaction anxiety and social observation anxiety. In contrast, BAS sensitivity was negatively associated with social interaction anxiety only. An analysis of the BAS subscales revealed that the Reward Responsiveness subscale was the only BAS subscale associated with social interaction anxiety. BAS-Reward Responsiveness was also associated with social observation anxiety. Conclusion The findings from the present research provide further evidence that low BAS sensitivity may be associated with social anxiety over and above the effects of BIS and FFFS sensitivity. PMID:28966424

  6. Russia's Chechen Wars 1994-2000: Lessons from Urban Combat

    National Research Council Canada - National Science Library

    Oliker, Olga

    2001-01-01

    This report provides an analysis of Russian combat in Chechnya beginning with the first modern Chechen war of 1994-1996 and comparing and contrasting it with the ongoing conflict that began in 1999...

  7. The Big Issue: Command and Combat in the Information Age

    National Research Council Canada - National Science Library

    Potts, David

    2003-01-01

    This Occasional Paper considers command and combat in the information age. A small team in the British Army's conceptual "think tank," the Directorate General Development and Doctrine, worked together on this issue for 18 months...

  8. NUCLEAR NONPROLIFERATION: U.S. Efforts to Combat Nuclear Smuggling

    National Research Council Canada - National Science Library

    2002-01-01

    ...) information about efforts to combat nuclear smuggling at U.S. borders. My statement today is based on the results of our May 16, 2002, report on this subject1 and information we obtained from the U.S...

  9. Future Combat Systems (FCS) Creates Cannon and Mortar Synergy

    National Research Council Canada - National Science Library

    Beard, Kirby; James, Jeff; Tolbert, Vincent J

    2008-01-01

    .... The NLOS-C is one of the eight MGVs. Program Manager FCS (Brigade Combat Team (PM FCS(BCT)) is leveraging previous and current research and development efforts to create synergy between cannons and mortars, without duplication of effort...

  10. Contributions of Women to U.S. Combat Operations

    National Research Council Canada - National Science Library

    Burnes, Thresa

    2008-01-01

    .... combat operations from the Revolutionary War to present-day conflicts. The U.S. military continues to fight a transnational, dispersed enemy that employs irregular tactics and asymmetric warfare...

  11. The Warfighting Capacity of Air Combat Command's Numbered Air Forces

    National Research Council Canada - National Science Library

    Hanser, Lawrence

    2000-01-01

    ...) of the Air Combat Command (ACC), General Richard E. Hawley, the ACC Commander, asked if RAND could offer an analysis of the number of NAFs that were needed by ACC to meet warfighting requirements...

  12. Is Democratization a Sound Strategy for Combating Fundamentalist Islam

    National Research Council Canada - National Science Library

    Johnson, Anthony J

    2008-01-01

    .... This paper examines the premise that "universal human rights", as the basis for democracy, is compatible with Islamic culture and is therefore a sound strategy for combating the spread of "Islamic...

  13. Surface Combatant Planning Since the End of the Cold War

    National Research Council Canada - National Science Library

    Gillen, Daniel

    1998-01-01

    .... This reduction was part of the U.S. military transformation in the post-Cold War period. This thesis examined the major factors that influenced the change in surface combatant planning since 1990, i.e...

  14. Object-Oriented Modular Architecture for Ground Combat Simulation

    National Research Council Canada - National Science Library

    Luqi; Berzins, V; Shing, M; Saluto, M; Williams, J

    2000-01-01

    .... It describes the effective use of computer-aided prototyping techniques for re-engineering the legacy software to develop an object-oriented modular architecture for the Janus combat simulation system. Janus...

  15. Public Affairs Capacity Building: A Soft Tool for Combatant Commanders

    National Research Council Canada - National Science Library

    Salata, Jason P

    2008-01-01

    Public affairs capacity building is a valuable soft component of the Combatant Commander's Theater Campaign Plan that builds habitual relationships, fosters transparency, and enhances the ability to shape the AOR...

  16. Project Guardian: Optimizing Electronic Warfare Systems for Ground Combat Vehicles

    National Research Council Canada - National Science Library

    Parks, Jack G; Jackson, William; Revello, James; Soltesz, James

    1995-01-01

    .... The study, Project Guardian, represents a new process for determining the optimum set of sensors and countermeasures for a specific vehicle class under the constraints of threat projection, combat...

  17. Combined Arms Warfare in the 21st Century: Maximizing the Capability of U.S. Army Future Combat System Equipped Brigade Combat Teams to Conduct Combined Arms Operations

    National Research Council Canada - National Science Library

    Reed, James W

    2008-01-01

    ... employment of a combination of arms, thereby benefiting from their synergistic effects. He also reviews the main historical developments in CAW from World War I to the present Iraq War, including World War II, Korea...

  18. Combined Arms Warfare in the 21st Century: Maximizing the Capability of U.S. Army Future Combat System Equipped Brigade Combat Teams to Conduct Combined Arms Operations

    Science.gov (United States)

    2008-06-13

    defenses, and surf ; a landing from the air but free of the 65 inflexibility, tactical disorder, and disorganization of parachute operations; an...taken place since the Cold War include Aceh province on the island of Sumatra in the country of Indonesia and the Darfur region of western Sudan

  19. Excellence in fleet combat replacement squadrons: predicting carrier qualification success

    OpenAIRE

    Smith, Martin P.

    1988-01-01

    This thesis presents a two-part analysis of excellence criteria for fleet combat replacement squadrons. Part one focuses on the qualitative issues and management techniques identified in outstanding fleet combat replacement squadrons. Part two develops and presents a regression model for predicting a fleet replacement squadron pilot's carrier qualification grade. The model was derived using standard linear regression techniques and the SPSSx software package of the Naval Postgraduate School. ...

  20. Prevalence and patterns of combat sport related maxillofacial injuries

    OpenAIRE

    Shirani, Gholamreza; Kalantar Motamedi, Mohammad Hosein; Ashuri, Alireza; Eshkevari, Pooyan Sadr

    2010-01-01

    Aim: This study was designed to assess the prevalence, distribution, and patterns of injury among athletes engaged in combat sports and compare the prevalence, pattern, and types of oral and maxillofacial trauma in these athletes. Materials and Methods: A total of 120 male athletes engaged in four combat sports (boxing, taekwondo, kickboxing, and Muay Thai) who had sustained bodily trauma were studied; 95 subjects with at least one traumatic injury to the face requiring treatment were referre...

  1. Technical-tactical and physiological demands of wrestling combats

    OpenAIRE

    Bianka Miarka

    2016-01-01

    Technical-tactical and physiological demand analyses of wrestling combats are important because they reveal essential information for the development of contextual training and specific physical preparation of wrestlers. Therefore, the aim of this review is to describe the characteristics of wrestling combats in freestyle, female and Greco-roman styles. The time-motion analysis presented in this article is the main component to carry out inferences on intensity and effort: pause ratio of comb...

  2. Combat Resource Management (11bm) Applied Research Project (ARP)

    Science.gov (United States)

    2009-12-01

    tactiques de combat embarquées, comme partie du processus C2 naval militaire, définit un domaine application qui implique à la fois des décideurs humains ...combat ships defending against incoming threats and where coordination of their respective resources is a complex problem of capital importance...the case of the several frigates defending against incoming threats, multi-agent coordi- nation is a complex problem of capital importance. Better

  3. Improving Relative Combat Power Estimation: The Road to Victory

    Science.gov (United States)

    2014-06-13

    was unthinkable before. Napoleon Bonaparte achieved a superior warfighting system compared to his opponents, which resulted in SOF. Napoleon’s...observations about combat power estimation and force empoloyment, remain valid. Napoleon also offered thoughts about combat power and superiority whe he...force. However, Napoleon did not think one- sidedly about the problem. He also said: “The moral is to the physical as three to one.”11 This dual

  4. Is Persuasive Advertising Always Combative in a Distribution Channel?

    OpenAIRE

    Chi-Cheng Wu; Ying-Ju Chen; Chih-Jen Wang

    2009-01-01

    The existing marketing literature suggests that persuasive advertising elicits counteractions from competing manufacturers and consequently leads to wasteful cancellation of the advertising effects. Thus, persuasive advertising is widely perceived to be combative in nature. A series of previously published papers demonstrates that appropriate targeting may partially mitigate the combative nature of persuasive advertising in that either the rival manufacturer or the retailer may benefit. In th...

  5. Impact of Combat Duty in Iraq and Afghanistan on Family Functioning: Findings from the Walter Reed Army Institute of Research Land Combat Study

    National Research Council Canada - National Science Library

    Huge, Charles W; Castro, Carl A; Eaton, Karen M

    2006-01-01

    .... However, most studies of the impact of combat on military families have not been conducted proximal to the time of deployments, and there are many research gaps in understanding the full impact of combat deployment...

  6. Combat Stress Decreases Memory of Warfighters in Action.

    Science.gov (United States)

    Delgado-Moreno, Rosa; Robles-Pérez, José Juan; Clemente-Suárez, Vicente Javier

    2017-08-01

    The present research aimed to analyze the effect of combat stress in the psychophysiological response and attention and memory of warfighters in a simulated combat situation. Variables of blood oxygen saturation, heart rate, blood glucose, blood lactate, body temperature, lower body muscular strength manifestation, cortical arousal, autonomic modulation, state anxiety and memory and attention through a postmission questionnaire were analyzed before and after a combat simulation in 20 male professional Spanish Army warfighters. The combat simulation produces a significant increase (p body temperature post, HF post/correct sound, body temperature post/glucose post, CFFTpre/lactate post, CFFT post/wrong sound, glucose post/AC pre, AC post/wrong fusil, AS post/SC post and SC post/wrong olfactory; and negative correlations: LF post/correct sound, body temperature post/lactate post and glucose post/lactate post. This data suggest that combat stress actives fight-flight system of soldiers. As conclusion, Combat stress produces an increased psychophysiological response that cause a selective decrease of memory, depending on the nature, dangerous or harmless of the objects.

  7. Technical-tactical and physiological demands of wrestling combats

    Directory of Open Access Journals (Sweden)

    Bianka Miarka

    2016-06-01

    Full Text Available Technical-tactical and physiological demand analyses of wrestling combats are important because they reveal essential information for the development of contextual training and specific physical preparation of wrestlers. Therefore, the aim of this review is to describe the characteristics of wrestling combats in freestyle, female and Greco-roman styles. The time-motion analysis presented in this article is the main component to carry out inferences on intensity and effort: pause ratio of combat actions. After rules modification in 2013, wrestling combats showed quicker and more diversified actions, especially in the lighter categories. For Greco-roman wrestling, most studies showed takedowns as the most effective techniques in World competitions for the period 2009-2011. For the same period, foot/leg techniques were the most effective in female and freestyle wrestling, followed by takedown attacks. Recent analyses, developed after 2013 rules modification, showed that the decisive offensive actions were applied on foot and in par terre situations – especially gutwrenches techniques and derivatives of suplex movements. The knowledge on the determinant and predominant actions of wrestling combats can be applied in future research, as well as can be used practically for training, physical preparation and assessments of similar combat actions. It also allows interventions to prevent injuries resulting from technical and tactical wrestling actions.

  8. Technological Dynamics and Social Capability

    DEFF Research Database (Denmark)

    Fagerberg, Jan; Feldman, Maryann; Srholec, Martin

    2014-01-01

    for the sample as a whole between 1998 and 2008. The results indicate that social capabilities, such as well-developed public knowledge infrastructure, an egalitarian distribution of income, a participatory democracy and prevalence of public safety condition the growth of technological capabilities. Possible...

  9. A business analytics capability framework

    Directory of Open Access Journals (Sweden)

    Ranko Cosic

    2015-09-01

    Full Text Available Business analytics (BA capabilities can potentially provide value and lead to better organisational performance. This paper develops a holistic, theoretically-grounded and practically relevant business analytics capability framework (BACF that specifies, defines and ranks the capabilities that constitute an organisational BA initiative. The BACF was developed in two phases. First, an a priori conceptual framework was developed based on the Resource-Based View theory of the firm and a thematic content analysis of the BA literature. Second, the conceptual framework was further developed and refined using a three round Delphi study involving 16 BA experts. Changes from the Delphi study resulted in a refined and confirmed framework including detailed capability definitions, together with a ranking of the capabilities based on importance. The BACF will help academic researchers and industry practitioners to better understand the capabilities that constitute an organisational BA initiative and their relative importance. In future work, the capabilities in the BACF will be operationalised to measure their as-is status, thus enabling organisations to identify key areas of strength and weakness and prioritise future capability improvement efforts.

  10. Identifying 21st Century Capabilities

    Science.gov (United States)

    Stevens, Robert

    2012-01-01

    What are the capabilities necessary to meet 21st century challenges? Much of the literature on 21st century skills focuses on skills necessary to meet those challenges associated with future work in a globalised world. The result is a limited characterisation of those capabilities necessary to address 21st century social, health and particularly…

  11. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  12. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-01

    of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be established

  13. Report on combating of illicit trafficking. The Illicit Trafficking Combat Project Group. January 2000

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-01-01

    . By means of spot-checks, the authority can then convince itself that the operator is fulfilling the requirements. The legislation should also impose heavy sanctions and penalties for all criminal activities related to illicit trafficking. As a direct measure to combat illicit trafficking on the national level, the State supervisory and law enforcement authorities should establish co-operation between themselves and with authorities in other countries and international organisations. Special national committees for combating illicit trafficking should be set up and should use intelligence and open sources information. Regions of States should investigate and implement joint task forces for combating illicit trafficking. Improvements on the International level by the IAEA: The IAEA should assist States in the practical implementation of measures and means for combating illicit trafficking and for the evaluation of threat scenarios. To improve that process in an efficient way, the IAEA should apply the principle of public access to information on its operations to a greater extent. Among other measures for promoting the development of more efficient tools and systems for combating illicit trafficking, the IAEA should: in assisting States, establish rules about duties and responsibilities for operators, authorities and individuals in the NPT area, through appropriate documentation; promote assistance programmes to States in consultation with NPT States, as need may be, of technical equipment and competent staff for the combating of illicit trafficking; provide experts and establish standards and procedures, across borders, for the investigation of serious cases of illicit trafficking, in consultation with national and international nuclear and law enforcement authorities and organisations; incorporate a more modern safeguards inspection technique of the national systems for accountancy and control, in accordance with standards and procedures that were intended to be

  14. Developing Collaborative Product Development Capabilities

    DEFF Research Database (Denmark)

    Mahnke, Volker; Tran, Yen

    2012-01-01

    innovation strategies’. Our analyses suggest that developing such collaboration capabilities benefits from the search for complementary practices, the combination of learning styles, and the development of weak and strong ties. Results also underscore the crucial importance of co-evolution of multi......Collaborative product development capabilities support a company’s product innovation activities. In the context of the fast fashion sector, this paper examines the development of the product development capabilities (PDC) that align product development capabilities in a dual innovation context......, one, slow paced, where the firm is well established and the other, fast paced, which represents a new competitive arena in which the company competes. To understand the process associated with collaborative capability development, we studied three Scandinavian fashion companies pursuing ‘dual...

  15. Marketing Capability in Strategy Research

    DEFF Research Database (Denmark)

    Ritter, Thomas; Distel, Andreas Philipp

    Following the call for a demand-side perspective of strategic management (e.g., Priem et al., 2012), a firm’s marketing capability, i.e. its ability to interact with down-stream stakeholders, becomes a pivotal element in explaining a firm’s competitiveness. While marketing capability is recognized...... in the strategic management literature as an important driver of firm performance, our review of 86 articles reveals a lack of a generally accepted definition of marketing capability, a lack of a common conceptualization as well as differences in the measurement of marketing capability. In order to build a common...... ground for advancing marketing capability research and thus supporting the demand-side perspective in strategic management, we develop an integrative framework to explain the differences and propose a research agenda for developing the field....

  16. Trained and Ready Combat Forces: The Role of Training Devices in Sustaining Combat Force Proficiency During Deployments

    National Research Council Canada - National Science Library

    Taylor, James

    1997-01-01

    ... (MOOTW). The Army's ground combat forces, even while engaged in MOOTW activities, must maintain proficiency to wage war in the event that peacetime engagement, deterrence and conflict prevention fail...

  17. Cultural and Religious Awareness: The Key to Analyzing and Combating the Relative Combat Power for Islamic-Based Terrorism

    National Research Council Canada - National Science Library

    Khan, Muhammad M

    2005-01-01

    ... terrorists. Second, the United States must conduct cultural awareness/cultural intelligence training for all military personnel who are deploying to combat the GWOT, and for all staff in the regional standing...

  18. Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities.

    Science.gov (United States)

    Roybal, Kole T; Lim, Wendell A

    2017-04-26

    The ability of immune cells to survey tissues and sense pathologic insults and deviations makes them a unique platform for interfacing with the body and disease. With the rapid advancement of synthetic biology, we can now engineer and equip immune cells with new sensors and controllable therapeutic response programs to sense and treat diseases that our natural immune system cannot normally handle. Here we review the current state of engineered immune cell therapeutics and their unique capabilities compared to small molecules and biologics. We then discuss how engineered immune cells are being designed to combat cancer, focusing on how new synthetic biology tools are providing potential ways to overcome the major roadblocks for treatment. Finally, we give a long-term vision for the use of synthetic biology to engineer immune cells as a general sensor-response platform to precisely detect disease, to remodel disease microenvironments, and to treat a potentially wide range of challenging diseases.

  19. FATF in Combating the Financing of Terrorism

    Directory of Open Access Journals (Sweden)

    Kristina Slavikovna Melkumyan

    2014-01-01

    Full Text Available The article examines the FATF specific approach to the problem of terrorism financing. The FATF essence, content of the activity and influence levers are also analyzed within the article. It is shown that the FATF has reviewed the problem of terrorism financing in the broadest perspective, having engaged simultaneously and consistently mechanisms for combating money laundering and terrorism financing. The Task Force has greatly contributed to building of the world counter-terrorism financing system through forming the legal and institutional basis as well as through interaction with all the possible participants and actors of world politics in this area. Moreover, the FATF has succeeded in geographical expansion of the FATF influence from the original 16 to187 jurisdictions by promotion of FATF-style regional bodies establishment. Particular attention is drawn to the unique features of the FATF Recommendations in comparison with the earlier issued sources of international law, which define the international counter-terrorism financing regime. The author believes that one of the advantages of the FATF as an institute within the counter-terrorism financing system among others is the informal status of the FATF, which provides its flexibility and high ability to respond quickly and in a timely manner to evolving nature of money laundering and terrorism financing as well as emerging threats.

  20. Combating gender based violence in Rwanda

    Directory of Open Access Journals (Sweden)

    Liberata Gahongayire

    2012-09-01

    Full Text Available Gender Based Violence (GBV exists in Rwanda as in many other African societies. Efforts are being made by Governments and NGOs to curb the menace and help its victims. This study examines these efforts with particular reference to the city of Kigali in Rwanda. The study reveals the prevalence and various strategies used by government and other organisations in combating the practice of GBV. According to the study effective response to the plight of GBV victims depends on the competence and expertise of various individuals and organisations involved in giving assistance to victims. The establishment of a one-stop assistance centre for GBV services in Kigali has successfully given much needed aid to victims. The study recommends that in order to eradicate GBV all the stakeholders should utilize available resources. Logistical, economic and socio-cultural constraints should be dealt with accordingly. Above all, the judiciary has a crucial role to play. An effective judicial system is needed to curb the practice.

  1. Development of botanicals to combat antibiotic resistance

    Directory of Open Access Journals (Sweden)

    Pooja D. Gupta

    2017-10-01

    Full Text Available The discovery of antibiotics in the previous century lead to reduction in mortality and morbidity due to infectious diseases but their inappropriate and irrational use has resulted in emergence of resistant microbial populations. Alteration of target sites, active efflux of drugs and enzymatic degradations are the strategies employed by the pathogenic bacteria to develop intrinsic resistance to antibiotics. This has led to an increased interest in medicinal plants since 25–50% of current pharmaceuticals are plant derived. Crude extracts of medicinal plants could serve as an alternate source of resistance modifying agents owing to the wide variety of secondary metabolites. These metabolites (alkaloids, tannins, polyphenols etc. could act as potentials for antimicrobials and resistance modifiers. Plant extracts have the ability to bind to protein domains leading to modification or inhibition protein–protein interactions. This enables the herbals to also present themselves as effective modulators of host related cellular processes viz immune response, mitosis, apoptosis and signal transduction. Thus they may exert their activity not only by killing the microorganism but by affecting key events in the pathogenic process, thereby, the bacteria, fungi and viruses may have a reduced ability to develop resistance to botanicals. The article is meant to stimulate research wherein the cidal activity of the extract is not the only parameter considered but other mechanism of action by which plants can combat drug resistant microbes are investigated. The present article emphasizes on mechanisms involved in countering multi drug resistance.

  2. Combating oil spill problem using plastic waste

    Energy Technology Data Exchange (ETDEWEB)

    Saleem, Junaid, E-mail: junaidupm@gmail.com [Department of Chemical Engineering, University of Karachi (Pakistan); Ning, Chao; Barford, John [Department of Chemical and Biomolecular Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon (Hong Kong); McKay, Gordon [Department of Chemical and Biomolecular Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon (Hong Kong); Division of Sustainable Development, College of Science, Engineering and Technology, Hamad Bin Khalifa University, Qatar Foundation, Doha (Qatar)

    2015-10-15

    Highlights: • Up-cycling one type of pollution i.e. plastic waste and successfully using it to combat the other type of pollution i.e. oil spill. • Synthesized oil sorbent that has extremely high oil uptake of 90 g/g after prolonged dripping of 1 h. • Synthesized porous oil sorbent film which not only facilitates in oil sorption but also increases the affinity between sorbent and oil by means of adhesion. - Abstract: Thermoplastic polymers (such as polypropylene, polyethylene, polyethylene terephthalate (PET) and high density polyethylene (HDPE)) constitute 5–15% of municipal solid waste produced across the world. A huge quantity of plastic waste is disposed of each year and is mostly either discarded in landfills or incinerated. On the other hand, the usage of synthetic polymers as oil sorbents, in particular, polyolefins, including polypropylene (PP), and polyethylene (PE) are the most commonly used oil sorbent materials mainly due to their low cost. However, they possess relatively low oil absorption capacities. In this work, we provide an innovative way to produce a value-added product such as oil-sorbent film with high practical oil uptake values in terms of g/g from waste HDPE bottles for rapid oil spill remedy.

  3. Combating oil spill problem using plastic waste

    International Nuclear Information System (INIS)

    Saleem, Junaid; Ning, Chao; Barford, John; McKay, Gordon

    2015-01-01

    Highlights: • Up-cycling one type of pollution i.e. plastic waste and successfully using it to combat the other type of pollution i.e. oil spill. • Synthesized oil sorbent that has extremely high oil uptake of 90 g/g after prolonged dripping of 1 h. • Synthesized porous oil sorbent film which not only facilitates in oil sorption but also increases the affinity between sorbent and oil by means of adhesion. - Abstract: Thermoplastic polymers (such as polypropylene, polyethylene, polyethylene terephthalate (PET) and high density polyethylene (HDPE)) constitute 5–15% of municipal solid waste produced across the world. A huge quantity of plastic waste is disposed of each year and is mostly either discarded in landfills or incinerated. On the other hand, the usage of synthetic polymers as oil sorbents, in particular, polyolefins, including polypropylene (PP), and polyethylene (PE) are the most commonly used oil sorbent materials mainly due to their low cost. However, they possess relatively low oil absorption capacities. In this work, we provide an innovative way to produce a value-added product such as oil-sorbent film with high practical oil uptake values in terms of g/g from waste HDPE bottles for rapid oil spill remedy

  4. Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancee pour l’entrainement au combat urbain)

    Science.gov (United States)

    2018-01-01

    NORTH ATLANTIC TREATY ORGANIZATION SCIENCE AND TECHNOLOGY ORGANIZATION AC/323(MSG-098)TP/740 www.sto.nato.int STO TECHNICAL...REPORT TR-MSG-098 Urban Combat Advanced Training Technology Architecture (Architecture de technologie avancée pour l’entraînement au combat urbain...NORTH ATLANTIC TREATY ORGANIZATION SCIENCE AND TECHNOLOGY ORGANIZATION AC/323(MSG-098)TP/740 www.sto.nato.int STO TECHNICAL

  5. Selected Foreign Counterparts of U.S. Army Ground Combat Systems and Implications for Combat Operations and Modernization

    Science.gov (United States)

    2017-01-18

    responsibility is to defeat other nations’ combat formations on the battlefield. In order to accomplish this, nations indigenously develop, maintain, and improve...defeat other nations’ combat formations on the battlefield. In order to accomplish this, nations indigenously develop, maintain, and improve a variety...catastrophic kill. A number of foreign tracked IFVs mount either hard kill 13 or soft kill 14 APS and the Army is presently examining both non

  6. Capabilities and Incapabilities of the Capabilities Approach to Health Justice.

    Science.gov (United States)

    Selgelid, Michael J

    2016-01-01

    This first part of this article critiques Sridhar Venkatapuram's conception of health as a capability. It argues that Venkatapuram relies on the problematic concept of dignity, implies that those who are unhealthy lack lives worthy of dignity (which seems politically incorrect), sets a low bar for health, appeals to metaphysically problematic thresholds, fails to draw clear connections between appealed-to capabilities and health, and downplays the importance/relevance of health functioning. It concludes by questioning whether justice entitlements should pertain to the capability for health versus health achievements, challenging Venkatapuram's claims about the strength of health entitlements, and demonstrating that the capabilities approach is unnecessary to address social determinants of health. © 2016 John Wiley & Sons Ltd.

  7. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  8. The food and weight combat. A problematic fight for the elite combat sports athlete.

    Science.gov (United States)

    Pettersson, Stefan; Pipping Ekström, Marianne; Berg, Christina M

    2012-10-01

    Weight reduction in athletes is motivated by optimisation of performance, aesthetic reasons or to achieve a pre-designated weight. Previous research has shown that dietary restraint and short term weight regulation frequently takes place among combat sports athletes such as wrestlers and judokas. The aim of this study was to explore negative experiences related to dietary strategies and weight-making practises used by elite combat sports athletes. Using semi-structured interviews, 14 Swedish national team athletes in wrestling, judo and taekwondo were asked about their dietary intake and their engagement in both long- and short-term weight regulation practises. Content analysis of the transcribed interviews, display a constant struggle regarding nutritional standpoints. Sport demands such as achieving an optimal weight and nutritional intake were considered as central in order for excellent performance. Adhering to these demands was found to be problematic however, primarily because of; (1) negative physiological responses and (2) opposing ideals of a non-sport related nature, such as the importance of the athletes to be healthy and social in their everyday lives. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. Indigenous Technological Innovation : Capability and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Indigenous Technological Innovation : Capability and Competitiveness in China's ... IDRC and key partners will showcase critical work on adaptation and ... Call for new OWSD Fellowships for Early Career Women Scientists now open.

  10. Evaluation of artillery equipment maintenance support capability based on grey clustering

    Science.gov (United States)

    Zhai, Mei-jie; Gao, Peng

    2017-12-01

    This paper, the theory and method of evaluating the capability of equipment maintenance support in China and abroad are studied, from the point of view of the combat task of artillery troops and the strategic attachment in the future military struggle. This paper establishes the framework of the evaluation Index system of the equipment maintenance support capability of the artillery units, and applies the grey clustering method to the evaluation of the equipment maintenance support capability of the artillery units, and finally evaluates the equipment maintenance and support capability of the artillery brigade as an example, and analyzes the evaluation results. This paper finds out the outstanding problems existing in the maintenance and support of military equipment, and puts forward some constructive suggestions, in order to improve the status of military equipment maintenance and support and improve the level of future equipment maintenance.

  11. Validation of measured poleward TEC gradient using multi-station GPS with Artificial Neural Network based TEC model in low latitude region for developing predictive capability of ionospheric scintillation

    Science.gov (United States)

    Sur, D.; Paul, A.

    2017-12-01

    The equatorial ionosphere shows sharp diurnal and latitudinal Total Electron Content (TEC) variations over a major part of the day. Equatorial ionosphere also exhibits intense post-sunset ionospheric irregularities. Accurate prediction of TEC in these low latitudes is not possible from standard ionospheric models. An Artificial Neural Network (ANN) based Vertical TEC (VTEC) model has been designed using TEC data in low latitude Indian longitude sector for accurate prediction of VTEC. GPS TEC data from the stations Calcutta (22.58°N, 88.38°E geographic, magnetic dip 32°), Baharampore (24.09°N, 88.25°E geographic, magnetic dip 35°) and Siliguri (26.72°N, 88.39°E geographic; magnetic dip 40°) are used as training dataset for the duration of January 2007-September 2011. Poleward VTEC gradients from northern EIA crest to region beyond EIA crest have been calculated from measured VTEC and compared with that obtained from ANN based VTEC model. TEC data from Calcutta and Siliguri are used to compute VTEC gradients during April 2013 and August-September 2013. It has been observed that poleward VTEC gradient computed from ANN based TEC model has shown good correlation with measured values during vernal and autumnal equinoxes of high solar activity periods of 2013. Possible correlation between measured poleward TEC gradients and post-sunset scintillations (S4 ≥ 0.4) from northern crest of EIA has been observed in this paper. From the observation, a suitable threshold poleward VTEC gradient has been proposed for possible occurrence of post-sunset scintillations at northern crest of EIA along 88°E longitude. Poleward VTEC gradients obtained from ANN based VTEC model are used to forecast possible ionospheric scintillation after post-sunset period using the threshold value. It has been observed that these predicted VTEC gradients obtained from ANN based VTEC model can forecast post-sunset L-band scintillation with an accuracy of 67% to 82% in this dynamic low latitude

  12. Earth Science Capability Demonstration Project

    Science.gov (United States)

    Cobleigh, Brent

    2006-01-01

    A viewgraph presentation reviewing the Earth Science Capability Demonstration Project is shown. The contents include: 1) ESCD Project; 2) Available Flight Assets; 3) Ikhana Procurement; 4) GCS Layout; 5) Baseline Predator B Architecture; 6) Ikhana Architecture; 7) UAV Capability Assessment; 8) The Big Picture; 9) NASA/NOAA UAV Demo (5/05 to 9/05); 10) NASA/USFS Western States Fire Mission (8/06); and 11) Suborbital Telepresence.

  13. DEVELOPING A WIRELESS SENSOR NETWORD WITH RFID CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Dan LICA

    2016-05-01

    Full Text Available The concept underlying the pervasive communications systems is Internet of Objects, defined as a global network of smart objects, resulting in "attachment" of communication functions, data acquisition, data processing objects we interact with daily. Internet of Objects will be based on 4th generation of Internet systems. In such systems, each intelligent networked device must offer its users a number of services, which constitute a development of the current model of Web services. Such services will result from aggregation of micro services offered by each pervasive device connected to the Internet. Aggregating these micro services requires that each node in the network has the opportunity to present / expose its capabilities (so-called "advertising" in a standard way for client applications to be integrated into complex services. Therefore there appears the need to introduce a coding scheme to identity the nodes in the network, enabling the identification of their capabilities. An alternative to implementing such a system of encoding / identifying characteristics of network nodes is active RFID technology. The aim of this chapter is to develop a method to ensure the convergence of wireless sensor networks with active RFID systems within a pervasive hybrid network based on the IEEE 802.15.4 standard, which satisfies the Internet of Objects network.

  14. The Combat-System/Ship-System Interface,

    Science.gov (United States)

    1982-02-01

    sequence initiated by removal of the load shed signal. Re-eneAgize capabitiLty. Provide remotely controlled reclosable power control devices to...signal from the electrical plant control equipment. The power controllers would replace existing circuit breakers and incorporate reclose capability

  15. International cooperation in combating illicit trafficking of nuclear materials by technical means

    International Nuclear Information System (INIS)

    Herbillon, J; Koch, L; Mason, G; Niemeyer, S; Nikiforov, N

    1999-01-01

    A consensus has been emerging during the past several years that illicit trafficking of nuclear materials is a problem that needs a more focused international response. One possible component of a program to combat illicit trafficking is nuclear forensics whereby intercepted nuclear materials are analyzed to provide clues for answering attribution questions. In this report we focus on international cooperation that is specifically addressing the development of nuclear forensics. First we will describe the role of the Nuclear Smuggling International Technical Working Group (ITWG) in developing nuclear forensics, and then we will present some specific examples of cooperative work by the Institute for Transuranium Elements of the European Commission with various European states. Recognizing the potential importance of a nuclear forensics capability, the P-8 countries in 1995 encouraged technical experts to evaluate the role of nuclear forensics in combating nuclear smuggling and possibly developing mechanisms for international cooperation. As a result, an International Conference on Nuclear Smuggling Forensic Analysis was held in November, 1995, at Lawrence Livermore National Laboratory to investigate technical cooperation on nuclear forensics. The International Conference provided a unique mix of scientists, law enforcement, and intelligence experts from 14 countries and organizations. All participants were invited to make presentations, and the format of the Conference was designed to encourage open discussion and broad participation

  16. Stigma associated with PTSD: perceptions of treatment seeking combat veterans.

    Science.gov (United States)

    Mittal, Dinesh; Drummond, Karen L; Blevins, Dean; Curran, Geoffrey; Corrigan, Patrick; Sullivan, Greer

    2013-06-01

    Although stigma associated with serious mental illness, substance abuse disorders, and depression has been studied very little is known about stigma associated with Posttraumatic Stress Disorder (PTSD). This study explored stigma related to PTSD among treatment-seeking Operation Enduring Freedom and Operation Iraqi Freedom (OEF/OIF) combat veterans. Sixteen treatment-seeking OEF/OIF veterans with combat-related PTSD participated in focus groups. We used qualitative methods to explore PTSD-related stigma. Common perceived stereotypes of treatment-seeking veterans with PTSD included labels such as "dangerous/violent," or "crazy," and a belief that combat veterans are responsible for having PTSD. Most participants reported avoiding treatment early on to circumvent a label of mental illness. Participants initially reported experiencing some degree of self-stigma; however, following engagement in treatment they predominantly resisted these stereotypes. Although most participants considered combat-related PTSD as less stigmatizing than other mental illnesses, they reported difficulties with reintegration. Such challenges likely stem from both PTSD symptoms and veterans' perceptions of how the public views them. Most reported that fellow combat veterans best understood them. Awareness of public stereotypes impacts help seeking at least early in the course of illness. Peer-based outreach and therapy groups may help veterans engage in treatment early and resist stigma. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  17. Accelerator and Electrodynamics Capability Review

    International Nuclear Information System (INIS)

    Jones, Kevin W.

    2010-01-01

    Los Alamos National Laboratory (LANL) uses capability reviews to assess the science, technology and engineering (STE) quality and institutional integration and to advise Laboratory Management on the current and future health of the STE. Capability reviews address the STE integration that LANL uses to meet mission requirements. The Capability Review Committees serve a dual role of providing assessment of the Laboratory's technical contributions and integration towards its missions and providing advice to Laboratory Management. The assessments and advice are documented in reports prepared by the Capability Review Committees that are delivered to the Director and to the Principal Associate Director for Science, Technology and Engineering (PADSTE). Laboratory Management will use this report for STE assessment and planning. LANL has defined fifteen STE capabilities. Electrodynamics and Accelerators is one of the seven STE capabilities that LANL Management (Director, PADSTE, technical Associate Directors) has identified for review in Fiscal Year (FY) 2010. Accelerators and electrodynamics at LANL comprise a blend of large-scale facilities and innovative small-scale research with a growing focus on national security applications. This review is organized into five topical areas: (1) Free Electron Lasers; (2) Linear Accelerator Science and Technology; (3) Advanced Electromagnetics; (4) Next Generation Accelerator Concepts; and (5) National Security Accelerator Applications. The focus is on innovative technology with an emphasis on applications relevant to Laboratory mission. The role of Laboratory Directed Research and Development (LDRD) in support of accelerators/electrodynamics will be discussed. The review provides an opportunity for interaction with early career staff. Program sponsors and customers will provide their input on the value of the accelerator and electrodynamics capability to the Laboratory mission.

  18. Accelerator and electrodynamics capability review

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Kevin W [Los Alamos National Laboratory

    2010-01-01

    Los Alamos National Laboratory (LANL) uses capability reviews to assess the science, technology and engineering (STE) quality and institutional integration and to advise Laboratory Management on the current and future health of the STE. Capability reviews address the STE integration that LANL uses to meet mission requirements. The Capability Review Committees serve a dual role of providing assessment of the Laboratory's technical contributions and integration towards its missions and providing advice to Laboratory Management. The assessments and advice are documented in reports prepared by the Capability Review Committees that are delivered to the Director and to the Principal Associate Director for Science, Technology and Engineering (PADSTE). Laboratory Management will use this report for STE assessment and planning. LANL has defined fifteen STE capabilities. Electrodynamics and Accelerators is one of the seven STE capabilities that LANL Management (Director, PADSTE, technical Associate Directors) has identified for review in Fiscal Year (FY) 2010. Accelerators and electrodynamics at LANL comprise a blend of large-scale facilities and innovative small-scale research with a growing focus on national security applications. This review is organized into five topical areas: (1) Free Electron Lasers; (2) Linear Accelerator Science and Technology; (3) Advanced Electromagnetics; (4) Next Generation Accelerator Concepts; and (5) National Security Accelerator Applications. The focus is on innovative technology with an emphasis on applications relevant to Laboratory mission. The role of Laboratory Directed Research and Development (LDRD) in support of accelerators/electrodynamics will be discussed. The review provides an opportunity for interaction with early career staff. Program sponsors and customers will provide their input on the value of the accelerator and electrodynamics capability to the Laboratory mission.

  19. Business and IT Capabilities for Cloud Platform Success

    DEFF Research Database (Denmark)

    Hahn, Christopher; Huntgeburth, Jan; Winkler, Till J.

    2016-01-01

    The growing proliferation of cloud platform ecosystems demands a deeper understanding of the capabilities that help existing and emerging platform providers to be successful by creating and appropriating value. This multiple case study of four cloud platform providers (three large, one SME......) instantiates Rai and Tang’s (2014) framework of dyadic IT and network IT capabilities for a cloud platform context and extends it by exploring previously undertheorized cloud platform business capabilities. We further build on this extended framework by employing a configurational perspective to elucidate...... the complementary role of the three proposed business capabilities (incentives and rules, ecosystem marketing and sales, partner development and support) for relevant value creation and appropriation mechanisms. In addition to providing a capability framework catered to the cloud platform context, our findings...

  20. Cooperative and supportive neural networks

    International Nuclear Information System (INIS)

    Sree Hari Rao, V.; Raja Sekhara Rao, P.

    2007-01-01

    This Letter deals with the concepts of co-operation and support among neurons existing in a network which contribute to their collective capabilities and distributed operations. Activational dynamical properties of these networks are discussed

  1. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  2. Armored Combat Vehicles Science and Technology Plan

    Science.gov (United States)

    1982-11-01

    APPLICATION OF SENSORS Investigate the seismic, acoustic, and electromagnetic signatures of military and intruder -type targets and the theoretical aspects...a prototype sampling system which has the capability to monitor ambieut air both outside and inside vehicles and provide an early warning to the crew...and through various processing modules provide automated functions for simultaneous tracking of targets and automitic recognition, 74 f’," SENSING

  3. [International cooperation in combatting illicit drugs in Mozambique].

    Science.gov (United States)

    Buvana, Flávia; Ventura, Carla Aparecida Arena

    2011-06-01

    Countries from Southern Africa have formed a Development Community (SADC) to stimulate common actions in several areas, among them illicit drugs combat. In this context, the goal of this qualitative study was to identify information and perception about the cooperation set up between Mozambique and other SADC members in combatting illicit drugs. Data were collected through semi-structured interviews with public employees developing actions directed at the implementation of the Protocol to Combat Drugs in SADC. After transcriptions, the interviews were analyzed by content analysis and resulted in the categories: "Mozambique as a drugs corridor", "Cooperation Initiatives on Drugs among African countries", "Cooperation Difficulties in Africa", "Problems in Protocol Implementation" and "Difficulties to implement a control policy". As a consequence, there is a need to review and update the policies and strategies in the drugs area, as they are not contextualized in the country's current reality.

  4. Technological Capability and Firm Performance

    Directory of Open Access Journals (Sweden)

    Fernanda Maciel Reichert

    2014-08-01

    Full Text Available This research aims to investigate the relationship between investments in technological capability and economic performance in Brazilian firms. Based on economic development theory and on developed countries history, it is assumed that this relationship is positive. Through key indicators, 133 Brazilian firms have been analyzed. Given the economic circumstances of an emerging economy, which the majority of businesses are primarily based on low and medium-low-technology industries, it is not possible to affirm the existence of a positive relation between technological capability and firm performance. There are other elements that allow firms to achieve such results. Firms of lower technological intensity industries performed above average in the economic performance indicators, adversely, they invested below average in technological capability. These findings do not diminish the merit of firms’ and country’s success. They in fact confirm a historical tradition of a country that concentrates its efforts on basic industries.

  5. Functional capability of piping systems

    International Nuclear Information System (INIS)

    Terao, D.; Rodabaugh, E.C.

    1992-11-01

    General Design Criterion I of Appendix A to Part 50 of Title 10 of the Code of Federal Regulations requires, in part, that structures, systems, and components important to safety be designed to withstand the effects of earthquakes without a loss of capability to perform their safety function. ne function of a piping system is to convey fluids from one location to another. The functional capability of a piping system might be lost if, for example, the cross-sectional flow area of the pipe were deformed to such an extent that the required flow through the pipe would be restricted. The objective of this report is to examine the present rules in the American Society of Mechanical Engineers Boiler and Pressure Vessel Code, Section III, and potential changes to these rules, to determine if they are adequate for ensuring the functional capability of safety-related piping systems in nuclear power plants

  6. Upgrading of TREAT experimental capabilities

    International Nuclear Information System (INIS)

    Dickerman, C.E.; Rose, D.; Bhattacharyya, S.K.

    1982-01-01

    The TREAT facility at the Argonne National Laboratory site in the Idaho National Engineering Laboratory is being upgraded to provide capabilities for fast-reactor-safety transient experiments not possible at any other experimental facility. Principal TREAT Upgrade (TU) goal is provision for 37-pin size experiments on energetics of core-disruptive accidents (CDA) in fast breeder reactor cores with moderate sodium void coefficients. this goal requires a significant enhancement of the capabilities of the TREAT facility, specifically including reactor control, hardened neutron spectrum incident on the test sample, and enlarged building. The upgraded facility will retain the capability for small-size experiments of the types currently being performed in TREAT. Reactor building and crane upgrading have been completed. TU schedules call for the components of the upgraded reactor system to be finished in 1984, including upgraded TREAT fuel and control system, and expanded coverage by the hodoscope fuel-motion diagnostics system

  7. Development of an oil skimming and separating system to combat oil spills at sea

    Energy Technology Data Exchange (ETDEWEB)

    Klimek, R.; Clauss, G.

    1983-02-01

    For efficiently combatting oil pollution at sea, it is intended to combine a hopper dredger with two oil skimmers. This system consists of two oil skimmers, which are permanently stowed on deck of the ship. In case of operation, the oil skimmers work connected beside the ship, but decoupled from the ship concerning motions of sea. Hopper dredgers have already sufficient pump and tank capacity and are well-suited for operation in offshore areas and river deltas. They are characterized by low draught and are capable of lightening their cargo very quickly so that they are ready for oil skimming operation within 2 hours. Model tests with regard to the behaviour and function of the oil skimmer system were carried out at scales of 1:15, 1:10, and 1:5. Tests with the system ship/oil skimmer were performed at a scale of 1:15.

  8. Combating Political Police: An Overview of National Action’s Counterintelligence Program, 1982–1990

    Directory of Open Access Journals (Sweden)

    Troy Whitford

    2013-06-01

    Full Text Available During the mid to late 1980s the radical nationalist group National Action was targeted by domestic intelligence agencies. Known as “Operation Odessa” it was part of Australian Security Intelligence Organisation’s (ASIO program to combat what it saw as a rise in politically motivated violence. ASIO and state police Special Branch officers placed the group under surveillance and sent agents to disrupt meetings and recruit informants. Concurrently, National Action had developed its own counterintelligence program structuring the group in an effort to preserve secrecy, educating its membership in situational awareness and designating a senior member as an intelligence officer. Ultimately National Action counterintelligence program was unable to match the highly resourced government agencies and internal discipline issues meant the group was eventually disbanded. However, National Action’s effort to develop a counterintelligence program provides some examples of what low resourced Issue Motivated Groups are capable of achieving.

  9. Nanofabrication principles, capabilities and limits

    CERN Document Server

    Cui, Zheng

    2017-01-01

    This second edition of Nanofabrication is one of the most comprehensive introductions on nanofabrication technologies and processes. A practical guide and reference, this book introduces readers to all of the developed technologies that are capable of making structures below 100nm. The principle of each technology is introduced and illustrated with minimum mathematics involved. Also analyzed are the capabilities of each technology in making sub-100nm structures, and the limits of preventing a technology from going further down the dimensional scale. This book provides readers with a toolkit that will help with any of their nanofabrication challenges.

  10. Judgmental Forecasting of Operational Capabilities

    DEFF Research Database (Denmark)

    Hallin, Carina Antonia; Tveterås, Sigbjørn; Andersen, Torben Juul

    This paper explores a new judgmental forecasting indicator, the Employee Sensed Operational Capabilities (ESOC). The purpose of the ESOC is to establish a practical prediction tool that can provide early signals about changes in financial performance by gauging frontline employees’ sensing...... of changes in the firm’s operational capabilities. We present the first stage of the development of ESOC by applying a formative measurement approach to test the index in relation to financial performance and against an organizational commitment scale. We use distributed lag models to test whether the ESOC...

  11. Combat Risk and Pay: Theory and Some Evidence

    Science.gov (United States)

    2011-10-01

    1776) theory of compensating differences, and Rosen (1986) devised what has become the standard neoclassical economic theory relating wages to the...I N S T I T U T E F O R D E F E N S E A N A L Y S E S IDA Paper P-4774 October 2011 Combat Risk and Pay: Theory and Some Evidence Curtis J. Simon...OCT 2011 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Combat Risk and Pay: Theory and Some Evidence 5a. CONTRACT NUMBER 5b

  12. Stakeholder Analysis of Integrating Women Into Ground Combat Units

    Science.gov (United States)

    2014-06-01

    number 21 was titled, “ Nike Store, Men’s Clearance Shoes, Clothing and Gear.” If a link to an article or media site did not work, then that data...Brown, K. (2007). Co-ed combat: The new evidence that women shouldn’t fight the nation’s wars. New York: Penguin Group (USA), Inc . Burrelli, David...L. (2013). Deadly consequences: How cowards are pushing women into combat. Washington, DC: Regnery Publishing, Inc . 110 Maginnis, R. L. (n.d

  13. Maturity In The Petrochemical Industry Features, Motives And Combating

    International Nuclear Information System (INIS)

    Farag, H.; El Messirie, A.

    2004-01-01

    Petrochemicals give the highest value from crude oil and natural gas but suffers from maturity like any other business. Petrochemicals companies are promoting their business in the direction from oil and gas commodities. Specialities and life science. Reasons of maturity are expired patents, low demand, over capacity, intense competition. Actions to combat maturity are to restructure capacity achieving mega sizes, do downstream, and restructuring business practices. Strategies followed by some companies to combat maturity include exit, focus on core business and exploit a competitive advantage

  14. Characterizing Center of Mass and Moment of Inertia of Soldiers' Loads Packed for Combat

    National Research Council Canada - National Science Library

    Hasselquist, Leif; Bensel, Carolyn K; Norton, Karen; Piscitelle, Louis; Schiffman, Jeffrey M

    2004-01-01

    ...) location and moment of inertia (MOI) may be influenced in combat load packing. In addition, the physical properties of the combat loads were compared to the properties of a laboratory fabricated backpack...

  15. Recommendations for strengthening the national systems and the international regime for combating of illicit trafficking. Keynote address/session 10

    International Nuclear Information System (INIS)

    Ek, P.; Wredberg, L.

    2001-01-01

    internal control, quality assurance, security culture and individual responsibilities; Shortage of suitable and modern equipment for monitoring and detection of radioactive material; Shortage of staff and training capabilities and insufficient financial resources concerning supervision and law enforcement authorities; Insufficient access to relevant information and data bases. A first step to improve national systems would be to assist states, by educating key-persons and authority staff, how to establish good, state-of-the-art national systems for combating of illicit trafficking, which would meet the requirements of international legal instruments, recommendations and guidelines. State Governments need to be made more aware of the seriousness of the proliferation threat and be convinced that supervision and law enforcement resources must be reinforced for bringing their national systems up to international standard. On the international level, combating of illicit trafficking would be ameliorated by improving the communication links between national authorities bi-laterally and with the international organisations. Also increased information exchange between national and international databases would improve prevention and detection capabilities. For the effective and consequent combating of illicit trafficking of nuclear material and equipment, it is, however, necessary that the international non-proliferation regime be strengthened through new initiatives and approaches. These should focus on, inter alia, a set of minimum requirements to be implemented, and to pursue, impose, follow-up and audit the implementation of those requirements into the national systems for combating of illicit trafficking. The IAEA is the recognised international organisation, both for nuclear energy promoting activities, and for the implementation of the international non-proliferation regime. The IAEA has, within its area of competence, relevant know-how and capability, including qualified

  16. Building server capabilities in China

    DEFF Research Database (Denmark)

    Adeyemi, Oluseyi; Slepniov, Dmitrij; Wæhrens, Brian Vejrum

    2012-01-01

    The purpose of this paper is to further our understanding of multinational companies building server capabilities in China. The paper is based on the cases of two western companies with operations in China. The findings highlight a number of common patterns in the 1) managerial challenges related...

  17. Microfoundations of Routines and Capabilities

    DEFF Research Database (Denmark)

    Felin, Teppo; Foss, Nicolai Juul; Heimriks, Koen H.

    We discuss the microfoundations of routines and capabilities, including why a microfoundations view is needed and how it may inform work on organizational and competitive heterogeneity. Building on extant research, we identify three primary categories of micro-level components underlying routines...

  18. Microfoundations of Routines and Capabilities

    DEFF Research Database (Denmark)

    Felin, Tippo; Foss, Nicolai Juul; Heimericks, Koen H.

    2012-01-01

    This article introduces the Special Issue and discusses the microfoundations of routines and capabilities, including why a microfoundations view is needed and how it may inform work on organizational and competitive heterogeneity. Building on extant research, we identify three primary categories ...

  19. Capability and Learning to Choose

    Science.gov (United States)

    LeBmann, Ortrud

    2009-01-01

    The Capability Approach (henceforth CA) is in the first place an approach to the evaluation of individual well-being and social welfare. Many disciplines refer to the CA, first and foremost welfare economics, development studies and political philosophy. Educational theory was not among the first disciplines that took notice of the CA, but has a…

  20. Research for new UAV capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.; Leadabrand, R.

    1996-07-01

    This paper discusses research for new Unmanned Aerial Vehicles (UAV) capabilities. Findings indicate that UAV performance could be greatly enhanced by modest research. Improved sensors and communications enhance near term cost effectiveness. Improved engines, platforms, and stealth improve long term effectiveness.

  1. Development of students learning capabilities and professional capabilities

    DEFF Research Database (Denmark)

    Ringtved, Ulla Lunde; Wahl, Christian; Belle, Gianna

    This paper describes the work-in-progress on a project that aims todevelop a tool that via learning analytic methods enable studentsto enhance, document and assess the development of their learningcapabilities and professional capabilities in consequence of theirself-initiated study activities...... during their bachelor educations. Thetool aims at enhancing the development of students’ capabilities toself-initiate, self-regulate and self-assess their study activities.The tool uses the concept of collective intelligence as source formotivation and inspiration in self-initiating study activities...... as wellas self-assessing them. The tool is based on a heutagogical approachto support reflection on learning potential in these activities. Thisenhances the educational use of students self-initiated learningactivities by bringing visibility and evidence to them, and therebybringing value to the assessment...

  2. CONCEPTUALISATION ONTOLOGIQUE DE LA REPRÉSENTATION DU COMBAT CONCEPTUALISATION ONTOLOGIQUE DE LA REPRÉSENTATION DU COMBAT

    Directory of Open Access Journals (Sweden)

    Sylvain Rheault

    2012-10-01

    Full Text Available En adoptant une perspective existentielle, on peut tenter d'expliquer la représentation du combat au moyen de concepts comme les positions de SOI et de L'AUTRE ainsi que les statuts de l'ÊTRE et de la CHOSE, qui, une fois combinés, définissent des domaines ontologiques. Le combat devient alors, conceptuellement, l'action de forcer une conscience à passer d'un domaine à un autre. On observe qu'en modifiant l'intensité des positions (polarisation, des statuts (hiérarchisation et des actions (dosage, on peut expliquer les variations possibles des représentations du combat. Il restera à valider la pertinence de ces concepts en multipliant les analyses.En adoptant une perspective existentielle, on peut tenter d'expliquer la représentation du combat au moyen de concepts comme les positions de SOI et de L'AUTRE ainsi que les statuts de l'ÊTRE et de la CHOSE, qui, une fois combinés, définissent des domaines ontologiques. Le combat devient alors, conceptuellement, l'action de forcer une conscience à passer d'un domaine à un autre. On observe qu'en modifiant l'intensité des positions (polarisation, des statuts (hiérarchisation et des actions (dosage, on peut expliquer les variations possibles des représentations du combat. Il restera à valider la pertinence de ces concepts en multipliant les analyses.

  3. Combat amputees' health-related quality of life and psychological outcomes: A brief report from the wounded warrior recovery project.

    Science.gov (United States)

    Woodruff, Susan I; Galarneau, Michael R; Sack, Daniel I; McCabe, Cameron T; Dye, Judy L

    2017-03-01

    This study extends what is known about long-term health-related quality of life (HrQoL) and other psychosocial outcomes (i.e., depression, posttraumatic stress disorder [PTSD]) among US military combat amputees serving in Operation Enduring Freedom, Operation Iraqi Freedom, and Operation New Dawn. A total of 63 combat amputees were identified from the Wounded Warrior Recovery Project, a study assessing long-term self-reported HrQoL and psychological outcomes among those wounded during military service. Another 477 service members from the Wounded Warrior Recovery Project were identified as a comparison group (i.e., nonamputees with moderate to severe extremity injuries). After adjusting for age, time since injury, overall injury severity, and traumatic brain injury, amputees had poorer functional HrQoL than those in the nonamputee comparison group overall and in the specific area related to performance of usual activities, and, to some degree, chronic and acute symptoms, and mobility/self-care. On the other hand, depression and PTSD symptoms were not different for the two groups. Results suggest that when assessed over 5 years postinjury, on average, amputees have unique physical and functional limitations, yet do not report greater depression or PTSD symptoms than others seriously injured in combat. It may be that state-of-the-art integrated amputee care that includes support networks and emphasis on adjustment and psychological health may increase successful coping and adjustment, at least to a level that is on par with other types of serious combat injury. Epidemiologic/prognostic study, level III.

  4. Le combat avec l'ange

    Directory of Open Access Journals (Sweden)

    Christian Lalive d’Épinay

    2007-06-01

    Full Text Available L'auteur « revisite » le parcours qui l'a conduit à réaliser dans les années 1960 une des premières études du mouvement évangélique pentecôtiste en Amérique latine. Il rappelle d'abord les termes par lesquels il avait prétendu cadrer sa relation avec son objet de recherche, pour décrire ensuite l'étrange dialectique sujet/objet qui s'était développée au fur et à mesure de son immersion dans une double altérité, l'Amérique latine et le mouvement charismatique. Pendant ce voyage au long cours, l'« objet » avait pris vie ; il était devenu un sujet qui imposait au chercheur qui s'était cru « sujet » des interrogations nouvelles en même temps qu'une mise en question de ses certitudes du départ.The combat with the angel. Concerning a study on the Pentecostal movement in ChileThe author retraces the path that led him in the 1960s to carry out one of the first studies on the Pentecostal evangelical movement in Latin America. After recalling the terms on which he sought to situate his relationship with the research topic, he goes on to describe the strange subject/object dialectic that developed as he gradually became more and more immersed in a dual otherness, Latin America and the charismatic movement. During this lengthy voyage, the “object” of his research took on a life of its own, mutating into a subject that confronted the researcher (who had assumed that he was the “subject” with new questions and a need to reconsider his initial certitudes.La pelea con el ángel. Acerca de un estudio del movimiento pentecostal en ChileEl autor “revisita” el camino que lo había llevado a desarrollar uno de los primeros estudios sobre el movimiento evangélico pentecostal en América latina en los años’60. Recuerda primero los términos con los que había pretendido encuadrar la relación con su objeto de investigación, para describir luego el extraño vínculo sujeto/objeto que se había ido generando mientras

  5. Running on Empty: The Development of Helicopter Aerial Refueling and Implications for Future USAF Combat Rescue Capabilities

    National Research Council Canada - National Science Library

    Colburn, Tracy

    1997-01-01

    .... The declining defense budget means painful force structure decisions lie ahead. Even as funds are drying up, the armed forces are being called upon to execute contingencies in places such as Haiti, Somalia, Liberia, and Bosnia...

  6. Combat Medical Modernization: Posturing Low Supply And High Demand Assets To Meet Emerging And Future Capability Requirements

    Science.gov (United States)

    2015-07-01

    Guidance Portal , “Attending An Event Guidance”, 1 January 2013, accessed 1 March 2015 https://www.cape.osd.mil/CostGuidance/docs...established standards of care and federal and state laws. Assesses, plans, implements , and evaluates perioperative nursing care. Plans, directs, and...consists of full spectrum (wartime, peacetime and hostage) captivity training in academic classes and academic role-play laboratory (ARL) training

  7. Letter Report on Relative Aerial Combat of the F-84E Versus the F-86A capability

    Science.gov (United States)

    1951-01-30

    o_ 600 ssoo > 4 o _ _ _ 6dLi 00 CL L-L 40000 0 S0 1 iso gure 2- 6 - z oo .. 600 s_.O ••• J oo:0 O:S 0:0 0:qs O:0 0:I 1 Ld.ELFRTO "WME 4• s. . 5P.84...LEGEND F-86A ------ F-84E. 0 ALTIrlUDE , 5• 5I--- I ,OH ATT DE. 0J𔃾 A I ISO zoo ?50 300 350 400 4S0 IAS - MPI- SECRET inclosure Figu.re 4...242, AFMC 01-275, & AFMC 02-005). 2. Please direct further questions to Lezora U. Nobles, AFMC CSO/SCOC, DSN 787- 8583 . L E RA LU. N OB LE S AFMC STINFO

  8. Combating Paramilitary Terrorism on the Homefront: An Examination of Capabilities and Limitations of U.S. Response Forces

    Science.gov (United States)

    2015-12-01

    lead to rampant miscommunications and ultimately cost lives.”120 The security measures enacted after the events of September 11 back up Governor...paramilitary attack. Many roadblocks have been set up to making these improvements to reach an end state for a purely LE solution to the paramilitary...They would likely be able to come up with these additional requirements without too much effort. This solution may work for New York City, but it is

  9. Self Reported Behavioral Health Habits and Other Health Issues Influencing Capabilities and Mission Readiness of Combat Search and Rescue Personnel

    Science.gov (United States)

    2017-02-23

    the removal of individuals who met the threshold based solely on item 1. For example, an individual who drinks one glass of wine four nights a week...intensity aerobic physical activity, or a combination of the two, weekly for maximum health benefits ; the guidelines also recommend strength training at...use may provide the secondary benefit of serving as a perceived stress reliever, in lieu of other healthier options (such as exercise). The results of

  10. Environmental Assessment: Recapitalization of the 49th WG Combat Capabilities and Capacities, Holloman Air Force Base, New Mexico

    Science.gov (United States)

    2011-07-01

    anti-aircraft artillery, or another aircraft. A bundle of chaff consists of approximately 5 to 5.6 million fibers (each thinner than a human hair...is governed by detailed operating procedures to ensure safety. Chaff, which is ejected from an aircraft to reflect radar signals, is small fibers of...calcium carbonate rich soils; and erosional debris surrounding bedrock outcrops of limestone, sandstone, shale, gypsum, and basalt (Air Force 1998

  11. Combating unethical publications with plagiarism detection services.

    Science.gov (United States)

    Garner, H R

    2011-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers; however, there is at least 1 fee-based service (CrossRef) and 1 free service (etblast.org), which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors, and reviewers before selecting and using these services is provided. Copyright © 2011 Elsevier Inc. All rights reserved.

  12. Combating unethical publications with plagiarism detection services

    Science.gov (United States)

    Garner, H.R.

    2010-01-01

    About 3,000 new citations that are highly similar to citations in previously published manuscripts that appear each year in the biomedical literature (Medline) alone. This underscores the importance for the opportunity for editors and reviewers to have detection system to identify highly similar text in submitted manuscripts so that they can then review them for novelty. New software-based services, both commercial and free, provide this capability. The availability of such tools provides both a way to intercept suspect manuscripts and serve as a deterrent. Unfortunately, the capabilities of these services vary considerably, mainly as a consequence of the availability and completeness of the literature bases to which new queries are compared. Most of the commercial software has been designed for detection of plagiarism in high school and college papers, however, there is at least one fee-based service (CrossRef) and one free service (etblast.org) which are designed to target the needs of the biomedical publication industry. Information on these various services, examples of the type of operability and output, and things that need to be considered by publishers, editors and reviewers before selecting and using these services is provided. PMID:21194644

  13. Production, innovation and service capabilities

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Wu, Dong

    2012-01-01

    crossing both national and organisational borders emerge. The challenge of coordination in these configurations is an imperative which has not been adequately addressed so far. Therefore, by using explorative cases of Chinese and Danish companies, this paper seeks to develop a conceptual framework relating...... functional nodes of global production networks and devising appropriate coordination mechanisms between them....

  14. Collaborating on Combating Anti-Discrimination?

    DEFF Research Database (Denmark)

    Pristed Nielsen, Helene

    2013-01-01

    This chapter is about transeuropean collaboration among civil society actors who may or may not be construed as having diverging goals. Specifically, it looks at the discourses and collaborative practices within and between two European umbrella organisations: the European Women´s Lobby [EWL......] and the European Network Against Racism [ENAR]. The chapter builds from the starting point that previous research frequently has highlighted the inability of EWL to include considerations of women´s diversity (Hoskyns, 1991; Williams, 2003; Pudrovska and Ferree, 2004; Rolandsen Agustín, 2011). But there is little...... previous research on the reverse side, looking into whether diversity organizations, like ENAR, focus on gender....

  15. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available activities on systems. Another perspective of auditing relates to the checking of conformance to policies that govern the applicable information and systems. Vroom and Von Solomons discuss information security auditing as checking the use of security... states that an audit will consist of reviewing all aspects of the stated criteria of systems and reviewing threats and practices to ensure compliance with written guidelines (Kizza 2006). These descriptions of auditing depict a testing and checking...

  16. Human Development and Capability Network - Phase III | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Foreign Direct Investment Behaviour in Low and Middle Income Countries ... Right to Land : Implications for Access to Natural Resources (Anglophone Cameroon) ... Research into changes to China's minimum wage policies will evaluate their ...

  17. Improving the Distortional Deformation Capabilities of Aerospace Composite Networks

    Science.gov (United States)

    2011-02-28

    and 44DDS/DGEBA will be simulated and compared to experimental analysis. Additionally, matrices of hexamethylene diamine ( HDA ) and bis(hexamethylene...simulation in terms of defining secondary forces, such as hydrogen bonding, and make matrices even more rigid. Our hypothesis was that the HDA /DGEBA and...DGEBA (a) and 33DDS/DGEBA (b). HDA /DGEBA and B-HTA/DGEBA Experimental vs. Simulation Comparison Tensile Modulus, Tg, and density of HDA /DGEBA and B

  18. Rating of Perceived Exertion for Quantification of Training and Combat Loads During Combat Sport-Specific Activities: A Short Review.

    Science.gov (United States)

    Slimani, Maamer; Davis, Philip; Franchini, Emerson; Moalla, Wassim

    2017-10-01

    The aim of this short review was to summarize data pertaining to the rating of perceived exertion (RPE) methods (RPE value and session-RPE) during combat sport-specific activities (i.e., competition and training) based on many factors, including contest type (i.e., official vs. simulated vs. training), combat rounds, age of participants and muscle groups, and their correlation with physiological variables (i.e., blood lactate concentration [La] and heart rate [HR]). The current review shows higher RPE in a match of mixed martial arts (MMAs) than Brazilian jiu-jitsu and kickboxing matches and during the competitive period compared with the precompetitive period. This could be explained by the longer duration of bouts, the higher percentage contribution of aerobic metabolism in MMA than other combat sports and contest type differences (simulated vs. official matches). Thus, this review found significant correlations between RPE or session-RPE, [La] and HR. Particularly, there was a stronger correlation between RPE and [La] during official striking (r = 0.81) than grappling combat sports matches (r = 0.53). In addition, a variation of correlation (moderate to large) between session-RPE and HR-based methods has been reported (i.e., Edwards' training load [r ranged between 0.58 and 0.95] and Banister training impulse [r ranged between 0.52 and 0.86]). Specifically, stronger correlation was apparent in combat sport competition that required a much higher percentage contribution of aerobic metabolism (e.g., karate) and in adult athletes than anaerobic-based combat sports (e.g., taekwondo) and young athletes, respectively. Indeed, the current review highlights that the correlations between session-RPE and HR-based methods were higher during official competition than training sessions. Session-RPE was affected by participants' competitive level, the intensity of session (high vs. low), the training modalities (tactical-technical vs. technical-development vs. simulated

  19. Optimization of Lyophilized Plasma for Use in Combat Casualties

    Science.gov (United States)

    2016-03-01

    ratio of NS infused at a rate of 165 ml/min, minus any given during the controlled hemorrhage to induce acidosis and coagulopathy. This reflects...antioxidant effect suggesting the potential to reduce acute respiratory distress syndrome and multiple organ failure in combat casualties. This model

  20. Enemy Combatant Detainees: Habeas Corpus Challenges in Federal Court

    Science.gov (United States)

    2006-09-26

    Separation of Powers Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Eliminating Federal Court Jurisdiction Where There Is No State Court Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 1 542 U.S. 466 (2004). Enemy Combatant Detainees: Habeas Corpus Challenges in Federal Court In Rasul v. Bush,1 a divided Supreme Court declared that “a state

  1. Combating Ukraine’s Health Crisis : Lessons from Europe

    OpenAIRE

    Rekha Menon

    2010-01-01

    This knowledge brief synthesizes the important findings of a recent study. It spotlights key issues and challenges facing Ukraine's health sector and suggests strategies for improvement. To combat the current health crisis, Ukraine could look at the lessons learned by other European countries that have faced similar health crises.

  2. The Relevance of Hyperbaric Oxygen to Combat Medicine

    Science.gov (United States)

    2001-06-01

    and Hyperbaric Conditions [les Questions medicales a caractere oprationel liees aux conditions hypobares ou hyperbares ] To order the complete...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADPO 11081 TITLE: The Relevance of Hyperbaric Oxygen to Combat Medicine...following component part numbers comprise the compilation report: ADPO11059 thru ADP011100 UNCLASSIFIED 25-1 The Relevance of Hyperbaric Oxygen to

  3. E-Cheating: Combating a 21st Century Challenge.

    Science.gov (United States)

    McMurtry, Kim

    2001-01-01

    Discusses electronic cheating in higher education made possible by new technologies. Highlights include statistics on plagiarism; using Web search engines and paper mills; and ways to combat cheating, including academic honesty policies, designing writing assignments with specific goals and instructions, being aware of what is available on the…

  4. LOS tercios en España: el combate

    Directory of Open Access Journals (Sweden)

    Lorraine WHITE

    2009-12-01

    Full Text Available RESUMEN: Durante el siglo ??? hubo un importante incremento de la actividad militar en la Península Ibérica. Las tropas hubieron de luchar en su propio territorio y contra otros subditos del rey de España. Este artículo se centra en el combate de los ejércitos españoles en la Península. Examina el componente humano de estas fuerzas, los motivos para servir o para desertar, el conflicto de lealtades, los riesgos y las realidades del combate, así como la asistencia médica y espiritual que recibían.ABSTRACT: There was a significant rise in military activity in the Iberian Peninsula during the seventeenth century. Troops fought on 'home' territory and against fellow subjects of the Spanish king. This article looks at combat in Spain's home-based armies. It explores the human component of these forces, the motives and disincentives for serving, the conflict of loyalties, the risks and realities of combat, and medical and spiritual care.

  5. School Administrators Strategies for Combating Corruption in Universities in Nigeria

    Science.gov (United States)

    Asiyai, Romina Ifeoma

    2015-01-01

    The purpose of this study was to examine corruption in universities with the aim of finding out the types/forms, causes, effects and measures for combating the menace. Four research questions guided the investigation. The study is a survey research, ex-post facto in nature. A sample of 780 comprising of students, academic staff and administrative…

  6. Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    ... phenomenon through the analysis of its various definitions, its nature and consequences. Based on the analysis, the paper proffers a ten-point policy recommendation for enhancing the existing instruments and frameworks in the security services that would foster interagency cooperation in combating terrorism in Nigeria.

  7. 48 CFR 52.222-50 - Combating Trafficking in Persons.

    Science.gov (United States)

    2010-10-01

    ....222-50 Combating Trafficking in Persons. As prescribed in 22.1705(a), insert the following clause...: ________ ________ ________ ________ ________ ________ [Contracting Officer shall insert title of directive/notice; indicate the document is attached or provide source (such as website link) for obtaining document; and, indicate the contract performance location...

  8. Is effective mass in combat sports punching above its weight?

    Science.gov (United States)

    Lenetsky, Seth; Nates, Roy J; Brughelli, Matt; Harris, Nigel K

    2015-04-01

    The segmental and muscular complexity of the human body can result in challenges when examining the kinetics of impacts. To better understand this complexity, combat sports literature has selected effective mass as a measure of an athlete's inertial contribution to the momentum transfer during the impact of strikes. This measure helps to clarify the analysis of striking kinetics in combat sports. This paper will review: (1) effective mass as a concept and its usage as a measure of impact intensity in combat sports, (2) the neuromuscular pattern known as "double peak muscle activation" which has been theorized to help enhance initial hand velocity upon impact and joint stiffening during impact, (3) the methods and equations used to calculate effective mass, and (4) practitioner recommendations based on the literature. We will argue in this manuscript that the act of punching presents unique challenges to the current understanding of effective mass due to additional force application during impact. This review will improve the understanding of effective mass and its roles in effective striking serving to underpin future research into performance enhancement in striking based combat sports. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Systems medicine and integrated care to combat chronic noncommunicable diseases

    NARCIS (Netherlands)

    Bousquet, Jean; Anto, Josep M.; Sterk, Peter J.; Adcock, Ian M.; Chung, Kian Fan; Roca, Josep; Agusti, Alvar; Brightling, Chris; Cambon-Thomsen, Anne; Cesario, Alfredo; Abdelhak, Sonia; Antonarakis, Stylianos E.; Avignon, Antoine; Ballabio, Andrea; Baraldi, Eugenio; Baranov, Alexander; Bieber, Thomas; Bockaert, Joël; Brahmachari, Samir; Brambilla, Christian; Bringer, Jacques; Dauzat, Michel; Ernberg, Ingemar; Fabbri, Leonardo; Froguel, Philippe; Galas, David; Gojobori, Takashi; Hunter, Peter; Jorgensen, Christian; Kauffmann, Francine; Kourilsky, Philippe; Kowalski, Marek L.; Lancet, Doron; Pen, Claude Le; Mallet, Jacques; Mayosi, Bongani; Mercier, Jacques; Metspalu, Andres; Nadeau, Joseph H.; Ninot, Grégory; Noble, Denis; Oztürk, Mehmet; Palkonen, Susanna; Préfaut, Christian; Rabe, Klaus; Renard, Eric; Roberts, Richard G.; Samolinski, Boleslav; Schünemann, Holger J.; Simon, Hans-Uwe; Soares, Marcelo Bento; Superti-Furga, Giulio; Tegner, Jesper; Verjovski-Almeida, Sergio; Wellstead, Peter; Wolkenhauer, Olaf; Wouters, Emiel; Balling, Rudi; Brookes, Anthony J.; Charron, Dominique; Pison, Christophe; Chen, Zhu; Hood, Leroy; Auffray, Charles

    2011-01-01

    ABSTRACT: We propose an innovative, integrated, cost-effective health system to combat major non-communicable diseases (NCDs), including cardiovascular, chronic respiratory, metabolic, rheumatologic and neurologic disorders and cancers, which together are the predominant health problem of the 21st

  10. 239 Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    User

    In recent times, terrorism has become one of the most dangerous threats to .... groups or clandestine agents, usually intended to influence an audience”. (ITSR ... terrorist attacks on the World Trade Center in New York and the Pentagon ..... Books. Imobighe, T.A. (2006b). “Combating Terrorism in Africa: An Integrated.

  11. Role of infection control in combating antibiotic resistance

    African Journals Online (AJOL)

    ] that impacts on human health and may potentially have a major effect on the global economy.[2] The United States Centers for Disease Control and Prevention (CDC) has identified four core actions to combat this challenge, i.e. surveillance, ...

  12. Women Warriors: Why the Robotics Revolution Changes the Combat Equation

    Science.gov (United States)

    2016-03-01

    Secretary Leon Panetta and General Martin Dempsey, U.S. Department of Defense, “Elimination of the 1994 Direct Ground Combat Definition and Assignment... Feminism and International Relations, eds. J. Ann Tickner and Laura Sjoberg, (London: Routledge, 2011): 146 and 162. Photos Page 100. Photo by IDF

  13. Combat Trauma Lessons Learned from Military Operations of 2001 - 2013

    Science.gov (United States)

    2015-03-09

    suspected tension pneumothorax  Longer needle for needle decompression  Lateral approach for needle decompression  Vented chest seals for open...Defense Health Board Combat Trauma Lessons Learned from Military Operations of 2001-2013 March 9, 2015 OFFICE OF THE ASSISTANT SECRETARY OF...

  14. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  15. Human-Centered Design Capability

    Science.gov (United States)

    Fitts, David J.; Howard, Robert

    2009-01-01

    For NASA, human-centered design (HCD) seeks opportunities to mitigate the challenges of living and working in space in order to enhance human productivity and well-being. Direct design participation during the development stage is difficult, however, during project formulation, a HCD approach can lead to better more cost-effective products. HCD can also help a program enter the development stage with a clear vision for product acquisition. HCD tools for clarifying design intent are listed. To infuse HCD into the spaceflight lifecycle the Space and Life Sciences Directorate developed the Habitability Design Center. The Center has collaborated successfully with program and project design teams and with JSC's Engineering Directorate. This presentation discusses HCD capabilities and depicts the Center's design examples and capabilities.

  16. Developing Acquisition IS Integration Capabilities

    DEFF Research Database (Denmark)

    Wynne, Peter J.

    2016-01-01

    An under researched, yet critical challenge of Mergers and Acquisitions (M&A), is what to do with the two organisations’ information systems (IS) post-acquisition. Commonly referred to as acquisition IS integration, existing theory suggests that to integrate the information systems successfully......, an acquiring company must leverage two high level capabilities: diagnosis and integration execution. Through a case study, this paper identifies how a novice acquirer develops these capabilities in anticipation of an acquisition by examining its use of learning processes. The study finds the novice acquirer...... applies trial and error, experimental, and vicarious learning processes, while actively avoiding improvisational learning. The results of the study contribute to the acquisition IS integration literature specifically by exploring it from a new perspective: the learning processes used by novice acquirers...

  17. LOFT Augmented Operator Capability Program

    International Nuclear Information System (INIS)

    Hollenbeck, D.A.; Krantz, E.A.; Hunt, G.L.; Meyer, O.R.

    1980-01-01

    The outline of the LOFT Augmented Operator Capability Program is presented. This program utilizes the LOFT (Loss-of-Fluid Test) reactor facility which is located at the Idaho National Engineering Laboratory and the LOFT operational transient experiment series as a test bed for methods of enhancing the reactor operator's capability for safer operation. The design of an Operational Diagnotics and Display System is presented which was backfit to the existing data acquisition computers. Basic color-graphic displays of the process schematic and trend type are presented. In addition, displays were developed and are presented which represent safety state vector information. A task analysis method was applied to LOFT reactor operating procedures to test its usefulness in defining the operator's information needs and workload

  18. Adaptive Planning: Understanding Organizational Workload to Capability/ Capacity through Modeling and Simulation

    Science.gov (United States)

    Hase, Chris

    2010-01-01

    In August 2003, the Secretary of Defense (SECDEF) established the Adaptive Planning (AP) initiative [1] with an objective of reducing the time necessary to develop and revise Combatant Commander (COCOM) contingency plans and increase SECDEF plan visibility. In addition to reducing the traditional plan development timeline from twenty-four months to less than twelve months (with a goal of six months)[2], AP increased plan visibility to Department of Defense (DoD) leadership through In-Progress Reviews (IPRs). The IPR process, as well as the increased number of campaign and contingency plans COCOMs had to develop, increased the workload while the number of planners remained fixed. Several efforts from collaborative planning tools to streamlined processes were initiated to compensate for the increased workload enabling COCOMS to better meet shorter planning timelines. This paper examines the Joint Strategic Capabilities Plan (JSCP) directed contingency planning and staffing requirements assigned to a combatant commander staff through the lens of modeling and simulation. The dynamics of developing a COCOM plan are captured with an ExtendSim [3] simulation. The resulting analysis provides a quantifiable means by which to measure a combatant commander staffs workload associated with development and staffing JSCP [4] directed contingency plans with COCOM capability/capacity. Modeling and simulation bring significant opportunities in measuring the sensitivity of key variables in the assessment of workload to capability/capacity analysis. Gaining an understanding of the relationship between plan complexity, number of plans, planning processes, and number of planners with time required for plan development provides valuable information to DoD leadership. Through modeling and simulation AP leadership can gain greater insight in making key decisions on knowing where to best allocate scarce resources in an effort to meet DoD planning objectives.

  19. Exploration Medical Capability - Technology Watch

    Science.gov (United States)

    Krihak, Michael; Watkins, Sharmila; Barr, Yael; Barsten, Kristina; Fung, Paul; Baumann, David

    2011-01-01

    The objectives of the Technology Watch process are to identify emerging, high-impact technologies that augment current ExMC development efforts, and to work with academia, industry, and other government agencies to accelerate the development of medical care and research capabilities for the mitigation of potential health issues that could occur during space exploration missions. The establishment of collaborations with these entities is beneficial to technology development, assessment and/or insertion. Such collaborations also further NASA s goal to provide a safe and healthy environment for human exploration. The Tech Watch project addresses requirements and capabilities identified by knowledge and technology gaps that are derived from a discrete set of medical conditions that are most likely to occur on exploration missions. These gaps are addressed through technology readiness level assessments, market surveys, collaborations and distributed innovation opportunities. Ultimately, these gaps need to be closed with respect to exploration missions, and may be achieved through technology development projects. Information management is a key aspect to this process where Tech Watch related meetings, research articles, collaborations and partnerships are tracked by the HRP s Exploration Medical Capabilities (ExMC) Element. In 2011, ExMC will be introducing the Tech Watch external website and evidence wiki that will provide access to ExMC technology and knowledge gaps, technology needs and requirements documents.

  20. Evolving Capabilities for Virtual Globes

    Science.gov (United States)

    Glennon, A.

    2006-12-01

    Though thin-client spatial visualization software like Google Earth and NASA World Wind enjoy widespread popularity, a common criticism is their general lack of analytical functionality. This concern, however, is rapidly being addressed; standard and advanced geographic information system (GIS) capabilities are being developed for virtual globes--though not centralized into a single implementation or software package. The innovation is mostly originating from the user community. Three such capabilities relevant to the earth science, education, and emergency management communities are modeling dynamic spatial phenomena, real-time data collection and visualization, and multi-input collaborative databases. Modeling dynamic spatial phenomena has been facilitated through joining virtual globe geometry definitions--like KML--to relational databases. Real-time data collection uses short scripts to transform user-contributed data into a format usable by virtual globe software. Similarly, collaborative data collection for virtual globes has become possible by dynamically referencing online, multi-person spreadsheets. Examples of these functions include mapping flows within a karst watershed, real-time disaster assessment and visualization, and a collaborative geyser eruption spatial decision support system. Virtual globe applications will continue to evolve further analytical capabilities, more temporal data handling, and from nano to intergalactic scales. This progression opens education and research avenues in all scientific disciplines.