WorldWideScience

Sample records for science operational warfare

  1. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  2. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  3. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  4. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  5. Special Operations And Cyber Warfare

    Science.gov (United States)

    2016-12-01

    Cyber weapons have multiple functions and can be used for espionage or OPE. It is important to highlight the similarities between the intelligence...James Clapper, Director of National Intelligence, emphasized the importance of cyber operations as he identified cyber as the third major hazard facing...support the development of the capacity and capability of foreign security forces and their supporting institutions.”52 The DOD’s Cyber Strategy states

  6. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  7. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  8. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  9. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  10. Globalization and Asymmetrical Warfare: Operation Athena

    Directory of Open Access Journals (Sweden)

    Paul Clep

    2011-02-01

    Full Text Available Since 2003, Operation Athena represents Canada’s contribution to the International Security Assistance Force (ISAF in Afghanistan. This article explains the Canadian role as an international security provider in general and a closer look on the background, the rationale and the structure of Operation Athena - how it supports the Canadian priorities and objectives in Afghanistan toward 2011.

  11. Operational Design that Synthesizes Art and Science

    Science.gov (United States)

    2011-05-04

    FINAL 3. DATES COVERED (From - To) Feb - May 2011 4. TITLE AND SUBTITLE OPERATIONAL DESIGN THAT SYNTHESIZES ART AND SCIENCE 5a...TITLE AND SUBTITLE Operational Design That Synthesizes Art And Science 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...proponents of EBO view warfare as only a science and not a combination of art and science . 9 Another main point of contention centered on the term

  12. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  13. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  14. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  15. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  16. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  17. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  18. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  19. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  20. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  1. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  2. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  3. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  4. Multi-platform operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    More than a decade ago, the long-term NATO scientific study “Maritime Operations in 2015” (MO 2015) identified the so-called multi-platform and co-operative multi-static Low Frequency Active Sonar (LFAS) concept, involving co-operative sonar data exchange between surface ships and submarines.

  5. Hybrid Warfare: How to Shape Special Operations Forces

    Science.gov (United States)

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  6. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  7. Science Operations Management

    Science.gov (United States)

    Squibb, Gael F.

    1984-10-01

    The operation teams for the Infrared Astronomical Satellite (IRAS) included scientists from the IRAS International Science Team. The scientific decisions on an hour-to-hour basis, as well as the long-term strategic decisions, were made by science team members. The IRAS scientists were involved in the analysis of the instrument performance, the analysis of the quality of the data, the decision to reacquire data that was contaminated by radiation effects, the strategy for acquiring the survey data, and the process for using the telescope for additional observations, as well as the processing decisions required to ensure the publication of the final scientific products by end of flight operations plus one year. Early in the project, two science team members were selected to be responsible for the scientific operational decisions. One, located at the operations control center in England, was responsible for the scientific aspects of the satellite operations; the other, located at the scientific processing center in Pasadena, was responsible for the scientific aspects of the processing. These science team members were then responsible for approving the design and test of the tools to support their responsibilities and then, after launch, for using these tools in making their decisions. The ability of the project to generate the final science data products one year after the end of flight operations is due in a large measure to the active participation of the science team members in the operations. This paper presents a summary of the operational experiences gained from this scientific involvement.

  8. Service Through Cyberspace Science: 262nd Network Warfare Squadron

    Science.gov (United States)

    an attack on the States, and units like the Cyber Operations Group provide the necessary support to Home About Disclaimer Privacy Policy Search... Search Featured Technology Space Matters Cyber Activity Cyber security is one of the top priorities of the U.S. armed forces today. It takes a special

  9. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  10. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  11. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  12. KEPLER SCIENCE OPERATIONS

    International Nuclear Information System (INIS)

    Haas, Michael R.; Bryson, Steve T.; Dotson, Jessie L.; Koch, David G.; Smith, Marcie; Sobeck, Charles K.; Batalha, Natalie M.; Caldwell, Douglas A.; Jenkins, Jon M.; Van Cleve, Jeffrey E.; Hall, Jennifer; Klaus, Todd C.; Middour, Chris; Thompson, Richard S.; Kolodziejczak, Jeffrey; Stober, Jeremy

    2010-01-01

    Kepler's mission design includes a comprehensive plan for commissioning and science operations. The commissioning phase completed all critical tasks and accomplished all mission objectives within a week of the pre-launch plan. Since the start of science data collection, the nominal timeline has been interrupted by two safe-mode events, several losses of fine point, and some small pointing adjustments. The most important anomalies are understood and mitigated, so Kepler's technical performance has improved significantly over this period, and the prognosis for mission success is excellent. The Kepler data archive is established and hosting data for the science team, guest observers, and the public. The first data to become publicly available include the monthly full-frame images and the light curves for targets that are dropped from the exoplanet program or released after publication. Data are placed in the archive on a quarterly basis; the Kepler Results Catalog will be released annually starting in 2011.

  13. A science of operations

    CERN Document Server

    Priestley, Mark

    2011-01-01

    Today, computers fulfil a dazzling array of roles, a flexibility resulting from the great range of programs that can be run on them. A Science of Operations examines the history of what we now call programming, defined not simply as computer programming, but more broadly as the definition of the steps involved in computations and other information-processing activities. This unique perspective highlights how the history of programming is distinct from the history of the computer, despite the close relationship between the two in the 20th century. The book also discusses how the development of

  14. Are Large Scale (Brigade Combat Team or Regimental Level and Above) United States Army Airborne Operations Effective in the Context of 21st Century Warfare

    National Research Council Canada - National Science Library

    Childress, Mark S

    2008-01-01

    Several recommendations, in regards to the use of large scale airborne operations in the context of 21st century warfare and identified shortfalls in airborne organization, are presented in this monograph...

  15. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  16. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  17. Chemical Warfare Agent Operational Exposure Hazard Assessment Research: FY07 Report and Analysis

    Science.gov (United States)

    2010-07-01

    agent migration rates. As stated by Armour and Sturgeon (1992), the extent of the contact hazard depends on the initial degree of contamination, the...with a contaminated surface. 2.1.5 Literature Cited 1. Armour , S.J; Sturgeon, W.R. Liquid Hazard from Chemical Warfare Agents for Pilots of High...the neck area was clipped and prepped with betadine, and the animal covered with a sterile surgical drape . The planned incision areas in the

  18. USN/USMC Antiair Warfare and Command, Control and Communications for Amphibious Operations

    Science.gov (United States)

    1992-03-01

    NUMBERS W’Vf~ * ic0"W O plows k; to., W..ia 0;41 40A.YWfI 11 TITLE (Inclucle Securily CiaSsifkcaticin) U8N/U8SUC Antiuar Warflire and4 CommaskC~Ual...the CWC to be a manager of all the warfare areas and frees him from becoming entangled in one tactical problem while another grows undetected elsewhere...hostile enemy actions (i.e., jamming) the potential begins to decrease rapidly . [Ref. 19:pp. 185-194] F. MARINE CORPS PRINCIPLES OF AAW There are three

  19. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  20. PSYCHOLOGICAL PROBLEMS AND STRESS FACED BY SOLDIERS WHO OPERATE IN ASYMMETRIC WARFARE ENVIRONMENTS: EXPERIENCES IN THE FIELD

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2014-10-01

    Full Text Available This article deals with the problems of anxiety, stress and psychological discomfort that can affect soldiers sent on asymmetric warfare operations. It is based on secondary analysis of the data of two important field researches whose results have recently (2013 been published. Although the two researches adopted different methodologies, the testimonies are fully comparable and show that soldiers from different countries and cultures display common or similar reactions when they are placed in the stress conditions that the asymmetric environment involves. The approach of the paper is drawn up in such a way as to make the reader a participating observer of the reality of such missions. It is therefore centered on the personal testimonies of the soldiers interviewed in the two researches, testimonies reported just as they are, in their simplicity and, often, drama, with comments by the author kept to a minimum in order to give readers ample opportunity to evaluate and interpret the reported texts on their own. The research data, drawn from the declarations of those directly concerned, reveal the existence of a problem of psychological distress resulting from deployment in asymmetric warfare situations that is in part different in the causes of the problems resulting from deployment in traditional combat and affects percentages of participating soldiers that are not high but definitely significant. The highest incidence appears to be constituted by problems relating to reintegration into normal social and working life upon returning from the mission. This is followed in percentage terms by anxiety situations relating to life far from the family, due in large part to a sense of powerlessness for the scant possibility of managing family situations that may have cropped up or already existed beforehand.

  1. Computer science and operations research

    CERN Document Server

    Balci, Osman

    1992-01-01

    The interface of Operation Research and Computer Science - although elusive to a precise definition - has been a fertile area of both methodological and applied research. The papers in this book, written by experts in their respective fields, convey the current state-of-the-art in this interface across a broad spectrum of research domains which include optimization techniques, linear programming, interior point algorithms, networks, computer graphics in operations research, parallel algorithms and implementations, planning and scheduling, genetic algorithms, heuristic search techniques and dat

  2. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  3. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  4. BRITE-Constellation Science Operations

    Science.gov (United States)

    Kuschnig, R.

    2017-09-01

    BRITE-Constellation is a nanosatellite mission designed for stellar astrophysical research in collaboration between Austria, Canada and Poland. A fleet of six spacecrafts was funded, built and launched, two from each country, all designed to perform precise time-series photometry of the brightest stars in the sky. While the spacecrafts have the same basic design, three satellites host an instrument sensitive in a red bandpass, the others, for a blue wavelength range. From the six satellites launched, five are operational. The sixth one did not separate from the upper stage of the rocket and remains idle. The first pair, the Austrian satellites, started to collect science measurements with their wide field (˜24°) cameras in early December 2013. Since then, more than 340 stars were observed during 16 campaigns, the majority for more than 100 days (up to 168 days) continuously. In total, more than 2.1 million measurements have been collected so far. Originally, the limiting magnitude for target stars was set to \\mag(V)=4. However, even stars as faint as \\mag(V)=6.5 have been observed with sufficient precision. This is a review of science operations conducted during the past 3.5 years.

  5. Biodegradation of chloroethene compounds in groundwater at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, 1999-2010

    Science.gov (United States)

    Dinicola, R.S.; Huffman, R.L.

    2012-01-01

    The U.S. Geological Survey evaluated the biodegradation of chloroethene compounds in groundwater beneath the former landfill at Operable Unit 1 (OU 1) of the U.S. Naval Undersea Warfare Center (NUWC), Division Keyport. The predominant contaminants in groundwater are the chloroethene compounds trichloroethene, cis-1,2-dichloroethene, and vinyl chloride. The remedy selected for groundwater contamination at OU 1 includes phytoremediation and natural attenuation. In 1999, the U.S. Navy planted two hybrid poplar plantations, referred to as the northern and southern plantations, over the most contaminated parts of the landfill. The U.S. Navy monitors tree health, groundwater levels, and contaminant concentrations to assess the effectiveness of phytoremediation. The U.S. Geological Survey began a cooperative effort with the U.S. Navy in 1995 to monitor the effectiveness of natural attenuation processes for removing and controlling the migration of chloroethenes and chloroethanes. Field and laboratory studies from 1996 through 2000 demonstrated that biodegradation of chloroethenes and chloroethanes in shallow groundwater at OU 1 was substantial. The U.S. Geological Survey monitored geochemical and contaminant concentrations in groundwater annually from 2001 through 2010. This report presents groundwater geochemical and contaminant data collected by the U.S. Geological Survey during June 2010 and evaluates evidence for continued biodegradation of chloroethenes in groundwater.

  6. Electronic Warfare: Army Special Operations Acquisition Strategy for Improved Equipment Is Sound

    National Research Council Canada - National Science Library

    1999-01-01

    ... to you. The Army Special Operations Command employs modified Chinook and Blackhawk helicopters, the MH-47D/E and MH-60K/L, respectively, in support of special operations missions worldwide These aircraft...

  7. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  8. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  9. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    Detachment 101’s early UW operations also illustrate how enemy actions, conventional partner force capabilities and limitations, and indigenous populations...Publication ARSOF Army Special Operations Forces ATC Air Transport Command CBI China -Burma-India CMO Civil Military Operations CNAC China National Aviation...a smaller force size as well as budget, the US Army will place increased emphasis on “ innovative , low-cost and small-footprint engagements across the

  10. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  11. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    Science.gov (United States)

    2010-12-01

    usually filling the executive positions, is equivalent to different roles of the players of a sports team and their coaches. The operators are the...them on what SOF resources can be provided to a country team’s counterterrorism campaign plan. 1. The Operator With Al Qaeda developing franchise

  12. Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare

    National Research Council Canada - National Science Library

    Blatt, Nicole

    2004-01-01

    ...) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century...

  13. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  14. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

    National Research Council Canada - National Science Library

    Wilson, Clay

    2007-01-01

    .... It also suggests related policy issues of potential interest to Congress. For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance...

  15. Strategic Usefulness of Conventional Force/Special Operations Force Interdependence in Irregular Warfare

    Science.gov (United States)

    2017-06-01

    surgical strike missions, often deep in denied territory like the Osama bin Laden raid in Pakistan or counterterrorism raids in Yemen . “Surgical strike...70 Rothstein, “Less is More,” 283. 71 Alexander George and Andrew Bennett, Case Studies and Theory Development in the Social Sciences... Media Network, September 16, 2011. 75 Ibid. 76 Max Boot, War Made New: Weapons, Warriors, and the Making of the Modern World (New York: Penguin

  16. Irregular Warfare (IW) Joint Operating Concept (JOC), Version 1.0

    Science.gov (United States)

    2007-09-11

    environment). Country C is a state sponsor of terrorism that promotes fundamentalist ideology and conducts a campaign of genocide in portions of the... Cambodians , these forces were led by US and/or South Vietnamese Special Forces personnel. Operating largely in sparsely populated areas, the Mobile

  17. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  18. The Art of Limited Warfare: Operational Art in the 1970 Cambodian Campaign

    Science.gov (United States)

    2017-03-16

    Publication (JP) 1-02, Department of Defense Dictionary of Military and Associated Terms (Washington, DC: Government Printing Office, 2016), 227. 5 Ibid...All three of III Corps’ task forces made heavy contact with the enemy, but were able to overwhelm pockets of heavy enemy resistance by integrating... Dictionary of Military and Associated Terms. Washington, DC: Government Printing Office, 2016. Joint Publication (JP) 3-0, Joint Operations

  19. War in the Information Age: A Primer for Cyberspace Operations in 21st Century Warfare

    Science.gov (United States)

    2010-01-01

    funds transfers ( EFT ). 30 Paralleling the rapid expansion of civilian cyberspace use is the increasing use of cyberspace by modern militaries...company files by using a thumb drive to tap the corporate system. Boeing estimated that the stolen documents would have cost it between $5 billion...tactics and intelligence operations such as collecting data, recruiting members of state security services, and setting up phone taps .‖ 69

  20. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    victims would fall prey to the attack vector. Both state and non-state actors alike, driven by a combination of intrinsic and extrinsic motivations ...different roles, motivations , and intentions. Associated complexities of safeguarding cyberspace contribute to the lack of a United States (US... psychological operations. The infosphere is also the entity that DOD doctrine refers to as the information environment in which humans and automated

  1. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    Science.gov (United States)

    2015-06-12

    Agency by Edward Snowden exposed only intelligence collection activities, and not means and methods of cyberspace operations under Title 10 and Joint...Kopstein, Joshua. 2014. “How the NSA Recruits in a Post- Snowden World.” The Daily Beast. Accessed May 6, 2015. http://www.thedailybeast.com...articles/ 2014/01/17/how-the-nsa-recruits-in-a-post- snowden -world.html. Koyfman, Tanya. 2014. “Ukraine versus Russia in a Cyber-Duel.” SenseCy. Accessed

  2. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  3. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  4. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    intelligence-related portion of the EW running estimate. Provides input to the restricted frequency list by recommending guarded frequencies. Provides...preparation of the restricted frequency list and issuance of emissions control guidance. Coordinates frequency allotment, assignment, and use... frequency list . Validating and approving or denying cease-jamming requests. Maintaining situational awareness of all jamming-capable systems in the area

  5. Selected Natural Attenuation Monitoring Data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, 2007 and 2008

    Science.gov (United States)

    Dinicola, R.S.; Huffman, R.L.

    2009-01-01

    Previous investigations indicate that natural attenuation and biodegradation of chlorinated volatile organic compounds (VOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1 (OU 1), Naval Undersea Warfare Center, Division Keyport, Washington. Phytoremediation combined with on-going natural attenuation processes was the preferred remedy selected by the Navy, as specified in the Record of Decision for the site. The Navy planted two hybrid poplar plantations on the landfill in spring 1999 to remove and to control the migration of chlorinated VOCs in shallow groundwater. The U.S. Geological Survey (USGS) has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision. In this report are groundwater geochemical and selected VOC data collected at OU 1 by the USGS during June 18-21, 2007, and June 16-18, 2008, in support of long-term monitoring for natural attenuation. For 2007 and 2008, strongly reducing conditions (sulfate reduction and methanogenesis) most favorable for reductive dechlorination of VOCs were inferred for 9 of 16 upper-aquifer wells and piezometers in the northern and southern phytoremediation plantations. Predominant redox conditions in groundwater from the intermediate aquifer just downgradient from the landfill remained mildly reducing and somewhat favorable for reductive dechlorination of VOCs. Dissolved hydrogen (H2) concentrations measured in the upper aquifer during 2007 and 2008 generally have been lower than H2 concentrations measured before 2002. However, widespread and relatively high methane and sulfide concentrations indicate that the lower H2 concentrations measured do not support a trend from strongly to mildly reducing redox conditions because no widespread changes in groundwater redox conditions were identified that should result in less favorable conditions for the reductive dechlorination of the

  6. The Art and Science of Operational Maneuver,

    Science.gov (United States)

    1988-05-04

    Classification) The Art and Science of Operational Maneuver (U) 12. PERSONAL AUTHOR(S) MAJ Joseph Schroedel 13a. TYPE OF REPORT 13b. TIME COVERED 14...CLASSIFICATION OF THIS PAGE VA) CL LA S F1 EP {fJE ART ANQ SCIENCE OlF OPERAIl NAL MANUVER By6 Mal or Josepi~ Schroeci, L U. S. Arm~y H Aciv -darILC Ced M ili t...Studies ,nIgz’raph ApprovwA. Name of Student: Major Jonevh Schroedel. U.S. Army Title ot Monograph: The Art and Science of Operational Maneuver Approved By

  7. The GLAST LAT Instrument Science Operations Center

    International Nuclear Information System (INIS)

    Cameron, Robert A.; SLAC

    2007-01-01

    The Gamma-ray Large Area Space Telescope (GLAST) is scheduled for launch in late 2007. Operations support and science data processing for the Large Area Telescope (LAT) instrument on GLAST will be provided by the LAT Instrument Science Operations Center (ISOC) at the Stanford Linear Accelerator Center (SLAC). The ISOC supports GLAST mission operations in conjunction with other GLAST mission ground system elements and supports the research activities of the LAT scientific collaboration. The ISOC will be responsible for monitoring the health and safety of the LAT, preparing command loads for the LAT, maintaining embedded flight software which controls the LAT detector and data acquisition flight hardware, maintaining the operating configuration of the LAT and its calibration, and applying event reconstruction processing to down-linked LAT data to recover information about detected gamma-ray photons. The SLAC computer farm will be used to process LAT event data and generate science products, to be made available to the LAT collaboration through the ISOC and to the broader scientific community through the GLAST Science Support Center at NASA/GSFC. ISOC science operations will optimize the performance of the LAT and oversee automated science processing of LAT data to detect and monitor transient gamma-ray sources

  8. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  9. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  10. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  11. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  12. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  13. How operational issues impact science peer review

    Science.gov (United States)

    Blacker, Brett S.; Golombek, Daniel; Macchetto, Duccio

    2006-06-01

    In some eyes, the Phase I proposal selection process is the most important activity handled by the Space Telescope Science Institute (STScI). Proposing for HST and other missions consists of requesting observing time and/or archival research funding. This step is called Phase I, where the scientific merit of a proposal is considered by a community based peer-review process. Accepted proposals then proceed thru Phase II, where the observations are specified in sufficient detail to enable scheduling on the telescope. Each cycle the Hubble Space Telescope (HST) Telescope Allocation Committee (TAC) reviews proposals and awards observing time that is valued at $0.5B, when the total expenditures for HST over its lifetime are figured on an annual basis. This is in fact a very important endeavor that we continue to fine-tune and tweak. This process is open to the science community and we constantly receive comments and praise for this process. In this last year we have had to deal with the loss of the Space Telescope Imaging Spectrograph (STIS) and move from 3-gyro operations to 2-gyro operations. This paper will outline how operational issues impact the HST science peer review process. We will discuss the process that was used to recover from the loss of the STIS instrument and how we dealt with the loss of 1/3 of the current science observations. We will also discuss the issues relating to 3-gyro vs. 2-gyro operations and how that changes impacted Proposers, our in-house processing and the TAC.

  14. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  15. Operational Issues: What Science in Available?

    Science.gov (United States)

    Rosekind, Mark R.; Neri, David F.

    1997-01-01

    Flight/duty/rest considerations involve two highly complex factors: the diverse demands of aviation operations and human physiology (especially sleep and circadian rhythms). Several core operational issues related to fatigue have been identified, such as minimum rest requirements, duty length, flight time considerations, crossing multiple time zones, and night flying. Operations also can involve on-call reserve status and callout, delays due to unforeseen circumstances (e.g., weather, mechanical), and on-demand flights. Over 40 years of scientific research is now available to apply to these complex issues of flight/duty/rest requirements. This research involves controlled 'laboratory studies, simulations, and data collected during regular flight operations. When flight/duty/rest requirements are determined they are typically based on a variety of considerations, such as operational demand, safety, economic, etc. Rarely has the available, state-of-the-art science been a consideration along with these other factors when determining flight/duty/rest requirements. While the complexity of the operational demand and human physiology precludes an absolute solution, there is an opportunity to take full advantage of the current scientific data. Incorporating these data in a rational operational manner into flight/duty/rest requirements can improve flight crew performance, alertness, and ultimately, aviation safety.

  16. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  17. Double Star project - master science operations plan

    Science.gov (United States)

    Shen, C.; Liu, Z.

    2005-11-01

    For Double Star Project (DSP) exploration, the scientific operations are very important and essential for achieving its scientific objectives. Two years before the launch of the DSP satellites (TC-1 and TC-2) and during the mission operating phase, the long-term and short-term master science operations plans (MSOP) were produced. MSOP is composed of the operation schedules of all the scientific instruments, the modes and timelines of the Payload Service System on TC-1 and TC-2, and the data receiving schedules of the three ground stations. The MSOP of TC-1 and TC-2 have been generated according to the scientific objectives of DSP, the orbits of DSP, the near-Earth space environments and the coordination with Cluster, etc., so as to make full use of the exploration resources provided by DSP and to acquire as much quality scientific data as possible for the scientific communities. This paper has summarized the observation resources of DSP, the states of DSP and its evolution since the launch, the strategies and rules followed for operating the payload and utilizing the ground stations, and the production of MSOP. Until now, the generation and execution of MSOP is smooth and successful, the operating of DSP is satisfactory, and most of the scientific objectives of DSP have been fulfilled.

  18. Double Star project - master science operations plan

    Directory of Open Access Journals (Sweden)

    C. Shen

    2005-11-01

    Full Text Available For Double Star Project (DSP exploration, the scientific operations are very important and essential for achieving its scientific objectives. Two years before the launch of the DSP satellites (TC-1 and TC-2 and during the mission operating phase, the long-term and short-term master science operations plans (MSOP were produced. MSOP is composed of the operation schedules of all the scientific instruments, the modes and timelines of the Payload Service System on TC-1 and TC-2, and the data receiving schedules of the three ground stations. The MSOP of TC-1 and TC-2 have been generated according to the scientific objectives of DSP, the orbits of DSP, the near-Earth space environments and the coordination with Cluster, etc., so as to make full use of the exploration resources provided by DSP and to acquire as much quality scientific data as possible for the scientific communities. This paper has summarized the observation resources of DSP, the states of DSP and its evolution since the launch, the strategies and rules followed for operating the payload and utilizing the ground stations, and the production of MSOP. Until now, the generation and execution of MSOP is smooth and successful, the operating of DSP is satisfactory, and most of the scientific objectives of DSP have been fulfilled.

  19. Ion mobility spectrometric analysis of vaporous chemical warfare agents by the instrument with corona discharge ionization ammonia dopant ambient temperature operation.

    Science.gov (United States)

    Satoh, Takafumi; Kishi, Shintaro; Nagashima, Hisayuki; Tachikawa, Masumi; Kanamori-Kataoka, Mieko; Nakagawa, Takao; Kitagawa, Nobuyoshi; Tokita, Kenichi; Yamamoto, Soichiro; Seto, Yasuo

    2015-03-20

    The ion mobility behavior of nineteen chemical warfare agents (7 nerve gases, 5 blister agents, 2 lachrymators, 2 blood agents, 3 choking agents) and related compounds including simulants (8 agents) and organic solvents (39) was comparably investigated by the ion mobility spectrometry instrument utilizing weak electric field linear drift tube with corona discharge ionization, ammonia doping, purified inner air drift flow circulation operated at ambient temperature and pressure. Three alkyl methylphosphonofluoridates, tabun, and four organophosphorus simulants gave the intense characteristic positive monomer-derived ion peaks and small dimer-derived ion peaks, and the later ion peaks were increased with the vapor concentrations. VX, RVX and tabun gave both characteristic positive monomer-derived ions and degradation product ions. Nitrogen mustards gave the intense characteristic positive ion peaks, and in addition distinctive negative ion peak appeared from HN3. Mustard gas, lewisite 1, o-chlorobenzylidenemalononitrile and 2-mercaptoethanol gave the characteristic negative ion peaks. Methylphosphonyl difluoride, 2-chloroacetophenone and 1,4-thioxane gave the characteristic ion peaks both in the positive and negative ion mode. 2-Chloroethylethylsulfide and allylisothiocyanate gave weak ion peaks. The marker ion peaks derived from two blood agents and three choking agents were very close to the reactant ion peak in negative ion mode and the respective reduced ion mobility was fluctuated. The reduced ion mobility of the CWA monomer-derived peaks were positively correlated with molecular masses among structurally similar agents such as G-type nerve gases and organophosphorus simulants; V-type nerve gases and nitrogen mustards. The slope values of the calibration plots of the peak heights of the characteristic marker ions versus the vapor concentrations are related to the detection sensitivity, and within chemical warfare agents examined the slope values for sarin, soman

  20. The TESS Science Processing Operations Center

    Science.gov (United States)

    Jenkins, Jon M.; Twicken, Joseph D.; McCauliff, Sean; Campbell, Jennifer; Sanderfer, Dwight; Lung, David; Mansouri-Samani, Masoud; Girouard, Forrest; Tenenbaum, Peter; Klaus, Todd; hide

    2016-01-01

    The Transiting Exoplanet Survey Satellite (TESS) will conduct a search for Earth's closest cousins starting in early 2018 and is expected to discover approximately 1,000 small planets with R(sub p) less than 4 (solar radius) and measure the masses of at least 50 of these small worlds. The Science Processing Operations Center (SPOC) is being developed at NASA Ames Research Center based on the Kepler science pipeline and will generate calibrated pixels and light curves on the NASA Advanced Supercomputing Division's Pleiades supercomputer. The SPOC will also search for periodic transit events and generate validation products for the transit-like features in the light curves. All TESS SPOC data products will be archived to the Mikulski Archive for Space Telescopes (MAST).

  1. WFIRST Science Operations at STScI

    Science.gov (United States)

    Gilbert, Karoline; STScI WFIRST Team

    2018-06-01

    With sensitivity and resolution comparable the Hubble Space Telescope, and a field of view 100 times larger, the Wide Field Instrument (WFI) on WFIRST will be a powerful survey instrument. STScI will be the Science Operations Center (SOC) for the WFIRST Mission, with additional science support provided by the Infrared Processing and Analysis Center (IPAC) and foreign partners. STScI will schedule and archive all WFIRST observations, calibrate and produce pipeline-reduced data products for imaging with the Wide Field Instrument, support the High Latitude Imaging and Supernova Survey Teams, and support the astronomical community in planning WFI imaging observations and analyzing the data. STScI has developed detailed concepts for WFIRST operations, including a data management system integrating data processing and the archive which will include a novel, cloud-based framework for high-level data processing, providing a common environment accessible to all users (STScI operations, Survey Teams, General Observers, and archival investigators). To aid the astronomical community in examining the capabilities of WFIRST, STScI has built several simulation tools. We describe the functionality of each tool and give examples of its use.

  2. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  3. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  4. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  5. Space Telescope Control System science user operations

    Science.gov (United States)

    Dougherty, H. J.; Rossini, R.; Simcox, D.; Bennett, N.

    1984-01-01

    The Space Telescope science users will have a flexible and efficient means of accessing the capabilities provided by the ST Pointing Control System, particularly with respect to managing the overal acquisition and pointing functions. To permit user control of these system functions - such as vehicle scanning, tracking, offset pointing, high gain antenna pointing, solar array pointing and momentum management - a set of special instructions called 'constructs' is used in conjuction with command data packets. This paper discusses the user-vehicle interface and introduces typical operational scenarios.

  6. Life Sciences Implications of Lunar Surface Operations

    Science.gov (United States)

    Chappell, Steven P.; Norcross, Jason R.; Abercromby, Andrew F.; Gernhardt, Michael L.

    2010-01-01

    The purpose of this report is to document preliminary, predicted, life sciences implications of expected operational concepts for lunar surface extravehicular activity (EVA). Algorithms developed through simulation and testing in lunar analog environments were used to predict crew metabolic rates and ground reaction forces experienced during lunar EVA. Subsequently, the total metabolic energy consumption, the daily bone load stimulus, total oxygen needed, and other variables were calculated and provided to Human Research Program and Exploration Systems Mission Directorate stakeholders. To provide context to the modeling, the report includes an overview of some scenarios that have been considered. Concise descriptions of the analog testing and development of the algorithms are also provided. This document may be updated to remain current with evolving lunar or other planetary surface operations, assumptions and concepts, and to provide additional data and analyses collected during the ongoing analog research program.

  7. Improving Integrated Operation in the Joint Integrated Mission Model (JIMM) and the Simulated Warfare Environment Data Transfer (SWEDAT) Protocol

    National Research Council Canada - National Science Library

    Mutschler, David W

    2005-01-01

    ...). It allows integrated operation of resources whereby the JIMM threat environment, stimulators virtual cockpits, systems under test, and other agents are combined within the same simulation exercise...

  8. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  9. Increasing Airpower’s Effectiveness: Applying the U.S. Army’s Operational Design Methodology to Airpower in Warfare

    Science.gov (United States)

    2010-04-01

    understanding choice.”24 Another way of demonstrating the kind of systems thinking that is used to power operational design is found in Checkland and...interactive design (redesigning the future and inventing ways to bring it about).” 25 Peter Checkland and John Poulter, Learning for Action: A Short...26 Checkland and Poulter, Learning for Action, 22. 9 ideas.”27 The next foundation of operational design is the concept of reflection or reflective

  10. Art or Science: Operational Logistics as Applied to Op Art

    Science.gov (United States)

    2006-02-13

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Art or Science : Operational Logistics as Applied to Op Art 5a. CONTRACT... Art or Science ? Operational Logistics as applied to Operational Art By Milo L. Shank Major, USMC A paper submitted to the...than just a science . Keeping Thorpe’s work in context, it was written circa World War One, before Operational Art was an established and accepted

  11. Harsh Climates, Poor Transportation, And Irregular Warfare: Logistical Difficulties From Napoleon To The Soviet - Afghan War That Affect Operational Campaigns

    Science.gov (United States)

    2014-04-01

    confident about having two operational campaigns in the Iberian Peninsula and Russia where the climate , transportation infrastructure, and threats...campaigns in the Iberian Peninsula and Russia exhibited effects of the harsh climates on logistical effectiveness. The climates in the Iberian Peninsula ...decreasing). The Iberian Peninsula climate consists of vast infertile areas with mountains, hills, and dry regions ill-suited for logistically

  12. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  13. Operational Health Physics-Science or Philosophy?

    International Nuclear Information System (INIS)

    Carter, M. W.

    2004-01-01

    Operational health physics is concerned with protecting workers and the public from harm due to ionizing radiation. This requires the application of philosophy (ethics) as well as science. Operational health physics philosophy has been dominated by the ICRP. A particular aspect of ICRP's philosophy that is often misunderstood is (As low as reasonably achievable, economic and social factors being taken into account). (ALARA) Although the ALARA philosophy has been interpreted as a cost-benefit approach it is in fact a risk-benefit approach including social considerations as the ICRP has emphasised from time to time. A recent report has accused the ICRP of using a discarded philosophical approach, namely Utilitarianism, as a result of which its recommendations are unethical. The report suggests that a (rights) based philosophy such as Rawls' Theory of Justice would be a more appropriate basis. This paper discusses this accusation, considers some relevant philosophies and concludes that the accusation is not valid and that ICRP's recommendations are ethical but are frequently misinterpreted. (Author)

  14. Operational Health Physics-Science or Philosophy?

    Energy Technology Data Exchange (ETDEWEB)

    Carter, M. W.

    2004-07-01

    Operational health physics is concerned with protecting workers and the public from harm due to ionizing radiation. This requires the application of philosophy (ethics) as well as science. Operational health physics philosophy has been dominated by the ICRP. A particular aspect of ICRP's philosophy that is often misunderstood is (As low as reasonably achievable, economic and social factors being taken into account). (ALARA) Although the ALARA philosophy has been interpreted as a cost-benefit approach it is in fact a risk-benefit approach including social considerations as the ICRP has emphasised from time to time. A recent report has accused the ICRP of using a discarded philosophical approach, namely Utilitarianism, as a result of which its recommendations are unethical. The report suggests that a (rights) based philosophy such as Rawls' Theory of Justice would be a more appropriate basis. This paper discusses this accusation, considers some relevant philosophies and concludes that the accusation is not valid and that ICRP's recommendations are ethical but are frequently misinterpreted. (Author)

  15. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    Science.gov (United States)

    2011-06-10

    water. They do not get tired after being engaged in combat operations for hours or days. They simply need fuel and a resupply of weapons. If an area...modern conflicts. Kaplan captures this concept first hand in a quote from another remotely piloted aircraft pilot that said, “we‟re in the thick of...in an attempt to capture high level Al Qaeda leaders but “wanted to tread cautiously in Pakistan for fear of undermining” senior leadership within

  16. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  17. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  18. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  19. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  20. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  1. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  2. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  3. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  4. Kepler Science Operations Center Pipeline Framework

    Science.gov (United States)

    Klaus, Todd C.; McCauliff, Sean; Cote, Miles T.; Girouard, Forrest R.; Wohler, Bill; Allen, Christopher; Middour, Christopher; Caldwell, Douglas A.; Jenkins, Jon M.

    2010-01-01

    The Kepler mission is designed to continuously monitor up to 170,000 stars at a 30 minute cadence for 3.5 years searching for Earth-size planets. The data are processed at the Science Operations Center (SOC) at NASA Ames Research Center. Because of the large volume of data and the memory and CPU-intensive nature of the analysis, significant computing hardware is required. We have developed generic pipeline framework software that is used to distribute and synchronize the processing across a cluster of CPUs and to manage the resulting products. The framework is written in Java and is therefore platform-independent, and scales from a single, standalone workstation (for development and research on small data sets) to a full cluster of homogeneous or heterogeneous hardware with minimal configuration changes. A plug-in architecture provides customized control of the unit of work without the need to modify the framework itself. Distributed transaction services provide for atomic storage of pipeline products for a unit of work across a relational database and the custom Kepler DB. Generic parameter management and data accountability services are provided to record the parameter values, software versions, and other meta-data used for each pipeline execution. A graphical console allows for the configuration, execution, and monitoring of pipelines. An alert and metrics subsystem is used to monitor the health and performance of the pipeline. The framework was developed for the Kepler project based on Kepler requirements, but the framework itself is generic and could be used for a variety of applications where these features are needed.

  5. The science of shrinking human heads: tribal warfare and revenge among the South American Jivaro-Shuar.

    Science.gov (United States)

    Jandial, Rahul; Hughes, Samuel A; Aryan, Henry E; Marshall, Lawrence F; Levy, Michael L

    2004-11-01

    THE PRACTICE OF "head-shrinking" has been the proper domain not of Africa but rather of the denizens of South America. Specifically, in the post-Columbian period, it has been most famously the practice of a tribe of indigenous people commonly called the Jivaro or Jivaro-Shuar. The evidence suggests that the Jivaro-Shuar are merely the last group to retain a custom widespread in northwestern South America. In both ceramic and textile art of the pre-Columbian residents of Peru, the motif of trophy heads smaller than normal life-size heads commonly recurs; the motif is seen even in surviving carvings in stone and shell. Moreover, although not true shrunken heads, trophy heads found in late pre-Columbian and even post-Columbian graves of the region demonstrate techniques of display very similar to those used by the Jivaro-Shuar, at least some of which are best understood in the context of head-shrinking. Regardless, the Jivaro-Shuar and their practices provide an illustrative counterexample to popular myth regarding the culture and science of the shrinking of human heads.

  6. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  7. Moral Warfare in Counterinsurgency Operations

    National Research Council Canada - National Science Library

    Chiarenza, David C

    2007-01-01

    .... This monograph argues that resistance to U.S. endeavors in Iraq is due to losses in the moral realm for the compliance and support of the Iraqi people, which is critical in defeating any insurgency...

  8. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  9. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  10. Meeting global health challenges through operational research and management science.

    Science.gov (United States)

    Royston, Geoff

    2011-09-01

    This paper considers how operational research and management science can improve the design of health systems and the delivery of health care, particularly in low-resource settings. It identifies some gaps in the way operational research is typically used in global health and proposes steps to bridge them. It then outlines some analytical tools of operational research and management science and illustrates how their use can inform some typical design and delivery challenges in global health. The paper concludes by considering factors that will increase and improve the contribution of operational research and management science to global health.

  11. Astrophysics science operations - Near-term plans and vision

    Science.gov (United States)

    Riegler, Guenter R.

    1991-01-01

    Astrophysics science operations planned by the Science Operations branch of NASA Astrophysics Division for the 1990s for the purpose of gathering spaceborne astronomical data are described. The paper describes the near-future plans of the Science Operations in the areas of the preparation of the proposal; the planning and execution of spaceborne observations; the collection, processing, and analysis data; and the dissemination of results. Also presented are concepts planned for introduction at the beginning of the 20th century, including the concepts of open communications, transparent instrument and observatory operations, a spiral requirements development method, and an automated research assistant.

  12. Lessons Learned from Developing and Operating the Kepler Science Pipeline and Building the TESS Science Pipeline

    Science.gov (United States)

    Jenkins, Jon M.

    2017-01-01

    The experience acquired through development, implementation and operation of the KeplerK2 science pipelines can provide lessons learned for the development of science pipelines for other missions such as NASA's Transiting Exoplanet Survey Satellite, and ESA's PLATO mission.

  13. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  14. Natural attenuation of chlorinated volatile organic compounds in ground water at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington

    Science.gov (United States)

    Dinicola, Richard S.; Cox, S.E.; Landmeyer, J.E.; Bradley, P.M.

    2002-01-01

    The U.S. Geological Survey (USGS) evaluated the natural attenuation of chlorinated volatile organic compounds (CVOCs) in ground water beneath the former landfill at Operable Unit 1 (OU 1), Naval Undersea Warfare Center, Division Keyport, Washington. The predominant contaminants in ground water are trichloroethene (TCE) and its degradation byproducts cis-1,2-dichloroethene (cisDCE) and vinyl chloride (VC). The Navy planted two hybrid poplar plantations on the landfill in spring of 1999 to remove and control the migration of CVOCs in shallow ground water. Previous studies provided evidence that microbial degradation processes also reduce CVOC concentrations in ground water at OU 1, so monitored natural attenuation is a potential alternative remedy if phytoremediation is ineffective. This report describes the current (2000) understanding of natural attenuation of CVOCs in ground water at OU 1 and the impacts that phytoremediation activities to date have had on attenuation processes. The evaluation is based on ground-water and surface-water chemistry data and hydrogeologic data collected at the site by the USGS and Navy contractors between 1991 and 2000. Previously unpublished data collected by the USGS during 1996-2000 are presented. Natural attenuation of CVOCs in shallow ground water at OU 1 is substantial. For 1999-2000 conditions, approximately 70 percent of the mass of dissolved chlorinated ethenes that was available to migrate from the landfill was completely degraded in shallow ground water before it could migrate to the intermediate aquifer or discharge to surface water. Attenuation of CVOC concentrations appears also to be substantial in the intermediate aquifer, but biodegradation appears to be less significant; those conclusions are less certain because of the paucity of data downgradient of the landfill beneath the tide flats. Attenuation of CVOC concentrations is also substantial in surface water as it flows through the adjacent marsh and out to the tide

  15. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  16. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  17. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  18. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  19. Science operations management. [with Infrared Astronomy Satellite project

    Science.gov (United States)

    Squibb, G. F.

    1984-01-01

    The operation teams engaged in the IR Astronomical Satellite (IRAS) project included scientists from the IRAS International Science Team. The detailed involvement of these scientists in the design, testing, validation, and operations phases of the IRAS mission contributed to the success of this project. The Project Management Group spent a substantial amount of time discussing science-related issues, because science team coleaders were members from the outset. A single scientific point-of-contact for the Management Group enhanced the depth and continuity of agreement reached in decision-making.

  20. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  1. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  2. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  3. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  4. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  5. Magellan Project: Evolving enhanced operations efficiency to maximize science value

    Science.gov (United States)

    Cheuvront, Allan R.; Neuman, James C.; Mckinney, J. Franklin

    1994-01-01

    Magellan has been one of NASA's most successful spacecraft, returning more science data than all planetary spacecraft combined. The Magellan Spacecraft Team (SCT) has maximized the science return with innovative operational techniques to overcome anomalies and to perform activities for which the spacecraft was not designed. Commanding the spacecraft was originally time consuming because the standard development process was envisioned as manual tasks. The Program understood that reducing mission operations costs were essential for an extended mission. Management created an environment which encouraged automation of routine tasks, allowing staff reduction while maximizing the science data returned. Data analysis and trending, command preparation, and command reviews are some of the tasks that were automated. The SCT has accommodated personnel reductions by improving operations efficiency while returning the maximum science data possible.

  6. Enhancing Cassini Operations & Science Planning Tools

    Science.gov (United States)

    Castello, Jonathan

    2012-01-01

    The Cassini team uses a variety of software utilities as they manage and coordinate their mission to Saturn. Most of these tools have been unchanged for many years, and although stability is a virtue for long-lived space missions, there are some less-fragile tools that could greatly benefit from modern improvements. This report shall describe three such upgrades, including their architectural differences and their overall impact. Emphasis is placed on the motivation and rationale behind architectural choices rather than the final product, so as to illuminate the lessons learned and discoveries made.These three enhancements included developing a strategy for migrating Science Planning utilities to a new execution model, rewriting the team's internal portal for ease of use and maintenance, and developing a web-based agenda application for tracking the sequence of files being transmitted to the Cassini spacecraft. Of this set, the first two have been fully completed, while the agenda application is currently in the early prototype stage.

  7. Improvements to science operations at Kitt Peak National Observatory

    Science.gov (United States)

    Bohannan, Bruce

    1998-07-01

    In recent years Kitt Peak National Observatory has undertaken a number of innovative projects to optimize science operations with the suite of telescopes we operate on Kitt Peak, Arizona. Changing scientific requirements and expectations of our users, evolving technology and declining budgets have motivated the changes. The operations improvements have included telescope performance enhancements--with the focus on the Mayall 4-m--modes of observing and scheduling, telescope control and observing systems, planning and communication, and data archiving.

  8. NEEMO 20: Science Training, Operations, and Tool Development

    Science.gov (United States)

    Graff, T.; Miller, M.; Rodriguez-Lanetty, M.; Chappell, S.; Naids, A.; Hood, A.; Coan, D.; Abell, P.; Reagan, M.; Janoiko, B.

    2016-01-01

    The 20th mission of the National Aeronautics and Space Administration (NASA) Extreme Environment Mission Operations (NEEMO) was a highly integrated evaluation of operational protocols and tools designed to enable future exploration beyond low-Earth orbit. NEEMO 20 was conducted from the Aquarius habitat off the coast of Key Largo, FL in July 2015. The habitat and its surroundings provide a convincing analog for space exploration. A crew of six (comprised of astronauts, engineers, and habitat technicians) lived and worked in and around the unique underwater laboratory over a mission duration of 14-days. Incorporated into NEEMO 20 was a diverse Science Team (ST) comprised of geoscientists from the Astromaterials Research and Exploration Science (ARES/XI) Division from the Johnson Space Center (JSC), as well as marine scientists from the Department of Biological Sciences at Florida International University (FIU). This team trained the crew on the science to be conducted, defined sampling techniques and operational procedures, and planned and coordinated the science focused Extra Vehicular Activities (EVAs). The primary science objectives of NEEMO 20 was to study planetary sampling techniques and tools in partial gravity environments under realistic mission communication time delays and operational pressures. To facilitate these objectives two types of science sites were employed 1) geoscience sites with available rocks and regolith for testing sampling procedures and tools and, 2) marine science sites dedicated to specific research focused on assessing the photosynthetic capability of corals and their genetic connectivity between deep and shallow reefs. These marine sites and associated research objectives included deployment of handheld instrumentation, context descriptions, imaging, and sampling; thus acted as a suitable proxy for planetary surface exploration activities. This abstract briefly summarizes the scientific training, scientific operations, and tool

  9. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  10. The MMS Science Data Center: Operations, Capabilities, and Resource.

    Science.gov (United States)

    Larsen, K. W.; Pankratz, C. K.; Giles, B. L.; Kokkonen, K.; Putnam, B.; Schafer, C.; Baker, D. N.

    2015-12-01

    The Magnetospheric MultiScale (MMS) constellation of satellites completed their six month commissioning period in August, 2015 and began science operations. Science operations for the Solving Magnetospheric Acceleration, Reconnection, and Turbulence (SMART) instrument package occur at the Laboratory for Atmospheric and Space Physics (LASP). The Science Data Center (SDC) at LASP is responsible for the data production, management, distribution, and archiving of the data received. The mission will collect several gigabytes per day of particles and field data. Management of these data requires effective selection, transmission, analysis, and storage of data in the ground segment of the mission, including efficient distribution paths to enable the science community to answer the key questions regarding magnetic reconnection. Due to the constraints on download volume, this includes the Scientist-in-the-Loop program that identifies high-value science data needed to answer the outstanding questions of magnetic reconnection. Of particular interest to the community is the tools and associated website we have developed to provide convenient access to the data, first by the mission science team and, beginning March 1, 2016, by the entire community. This presentation will demonstrate the data and tools available to the community via the SDC and discuss the technologies we chose and lessons learned.

  11. The Kepler Science Operations Center Pipeline Framework Extensions

    Science.gov (United States)

    Klaus, Todd C.; Cote, Miles T.; McCauliff, Sean; Girouard, Forrest R.; Wohler, Bill; Allen, Christopher; Chandrasekaran, Hema; Bryson, Stephen T.; Middour, Christopher; Caldwell, Douglas A.; hide

    2010-01-01

    The Kepler Science Operations Center (SOC) is responsible for several aspects of the Kepler Mission, including managing targets, generating on-board data compression tables, monitoring photometer health and status, processing the science data, and exporting the pipeline products to the mission archive. We describe how the generic pipeline framework software developed for Kepler is extended to achieve these goals, including pipeline configurations for processing science data and other support roles, and custom unit of work generators that control how the Kepler data are partitioned and distributed across the computing cluster. We describe the interface between the Java software that manages the retrieval and storage of the data for a given unit of work and the MATLAB algorithms that process these data. The data for each unit of work are packaged into a single file that contains everything needed by the science algorithms, allowing these files to be used to debug and evolve the algorithms offline.

  12. Photometric Analysis in the Kepler Science Operations Center Pipeline

    Science.gov (United States)

    Twicken, Joseph D.; Clarke, Bruce D.; Bryson, Stephen T.; Tenenbaum, Peter; Wu, Hayley; Jenkins, Jon M.; Girouard, Forrest; Klaus, Todd C.

    2010-01-01

    We describe the Photometric Analysis (PA) software component and its context in the Kepler Science Operations Center (SOC) pipeline. The primary tasks of this module are to compute the photometric flux and photocenters (centroids) for over 160,000 long cadence (thirty minute) and 512 short cadence (one minute) stellar targets from the calibrated pixels in their respective apertures. We discuss the science algorithms for long and short cadence PA: cosmic ray cleaning; background estimation and removal; aperture photometry; and flux-weighted centroiding. We discuss the end-to-end propagation of uncertainties for the science algorithms. Finally, we present examples of photometric apertures, raw flux light curves, and centroid time series from Kepler flight data. PA light curves, centroid time series, and barycentric timestamp corrections are exported to the Multi-mission Archive at Space Telescope [Science Institute] (MAST) and are made available to the general public in accordance with the NASA/Kepler data release policy.

  13. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  14. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  15. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  16. Operational considerations for the Space Station Life Science Glovebox

    Science.gov (United States)

    Rasmussen, Daryl N.; Bosley, John J.; Vogelsong, Kristofer; Schnepp, Tery A.; Phillips, Robert W.

    1988-01-01

    The U.S. Laboratory (USL) module on Space Station will house a biological research facility for multidisciplinary research using living plant and animal specimens. Environmentally closed chambers isolate the specimen habitats, but specimens must be removed from these chambers during research procedures as well as while the chambers are being cleaned. An enclosed, sealed Life Science Glovebox (LSG) is the only locale in the USL where specimens can be accessed by crew members. This paper discusses the key science, engineering and operational considerations and constraints involving the LSG, such as bioisolation, accessibility, and functional versatility.

  17. AMS data production facilities at science operations center at CERN

    Science.gov (United States)

    Choutko, V.; Egorov, A.; Eline, A.; Shan, B.

    2017-10-01

    The Alpha Magnetic Spectrometer (AMS) is a high energy physics experiment on the board of the International Space Station (ISS). This paper presents the hardware and software facilities of Science Operation Center (SOC) at CERN. Data Production is built around production server - a scalable distributed service which links together a set of different programming modules for science data transformation and reconstruction. The server has the capacity to manage 1000 paralleled job producers, i.e. up to 32K logical processors. Monitoring and management tool with Production GUI is also described.

  18. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  19. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  20. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  1. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  2. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  3. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  4. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  5. Status of the TESS Science Processing Operations Center

    Science.gov (United States)

    Jenkins, Jon M.; Twicken, Joseph D.; Campbell, Jennifer; Tenebaum, Peter; Sanderfer, Dwight; Davies, Misty D.; Smith, Jeffrey C.; Morris, Rob; Mansouri-Samani, Masoud; Girouardi, Forrest; hide

    2017-01-01

    The Transiting Exoplanet Survey Satellite (TESS) science pipeline is being developed by the Science Processing Operations Center (SPOC) at NASA Ames Research Center based on the highly successful Kepler Mission science pipeline. Like the Kepler pipeline, the TESS science pipeline will provide calibrated pixels, simple and systematic error-corrected aperture photometry, and centroid locations for all 200,000+ target stars, observed over the 2-year mission, along with associated uncertainties. The pixel and light curve products are modeled on the Kepler archive products and will be archived to the Mikulski Archive for Space Telescopes (MAST). In addition to the nominal science data, the 30-minute Full Frame Images (FFIs) simultaneously collected by TESS will also be calibrated by the SPOC and archived at MAST. The TESS pipeline will search through all light curves for evidence of transits that occur when a planet crosses the disk of its host star. The Data Validation pipeline will generate a suite of diagnostic metrics for each transit-like signature discovered, and extract planetary parameters by fitting a limb-darkened transit model to each potential planetary signature. The results of the transit search will be modeled on the Kepler transit search products (tabulated numerical results, time series products, and pdf reports) all of which will be archived to MAST.

  6. Operational research as implementation science: definitions, challenges and research priorities.

    Science.gov (United States)

    Monks, Thomas

    2016-06-06

    Operational research (OR) is the discipline of using models, either quantitative or qualitative, to aid decision-making in complex implementation problems. The methods of OR have been used in healthcare since the 1950s in diverse areas such as emergency medicine and the interface between acute and community care; hospital performance; scheduling and management of patient home visits; scheduling of patient appointments; and many other complex implementation problems of an operational or logistical nature. To date, there has been limited debate about the role that operational research should take within implementation science. I detail three such roles for OR all grounded in upfront system thinking: structuring implementation problems, prospective evaluation of improvement interventions, and strategic reconfiguration. Case studies from mental health, emergency medicine, and stroke care are used to illustrate each role. I then describe the challenges for applied OR within implementation science at the organisational, interventional, and disciplinary levels. Two key challenges include the difficulty faced in achieving a position of mutual understanding between implementation scientists and research users and a stark lack of evaluation of OR interventions. To address these challenges, I propose a research agenda to evaluate applied OR through the lens of implementation science, the liberation of OR from the specialist research and consultancy environment, and co-design of models with service users. Operational research is a mature discipline that has developed a significant volume of methodology to improve health services. OR offers implementation scientists the opportunity to do more upfront system thinking before committing resources or taking risks. OR has three roles within implementation science: structuring an implementation problem, prospective evaluation of implementation problems, and a tool for strategic reconfiguration of health services. Challenges facing OR

  7. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  8. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  9. One-Click Data Analysis Software for Science Operations

    Science.gov (United States)

    Navarro, Vicente

    2015-12-01

    One of the important activities of ESA Science Operations Centre is to provide Data Analysis Software (DAS) to enable users and scientists to process data further to higher levels. During operations and post-operations, Data Analysis Software (DAS) is fully maintained and updated for new OS and library releases. Nonetheless, once a Mission goes into the "legacy" phase, there are very limited funds and long-term preservation becomes more and more difficult. Building on Virtual Machine (VM), Cloud computing and Software as a Service (SaaS) technologies, this project has aimed at providing long-term preservation of Data Analysis Software for the following missions: - PIA for ISO (1995) - SAS for XMM-Newton (1999) - Hipe for Herschel (2009) - EXIA for EXOSAT (1983) Following goals have guided the architecture: - Support for all operations, post-operations and archive/legacy phases. - Support for local (user's computer) and cloud environments (ESAC-Cloud, Amazon - AWS). - Support for expert users, requiring full capabilities. - Provision of a simple web-based interface. This talk describes the architecture, challenges, results and lessons learnt gathered in this project.

  10. Status of the TESS Science Processing Operations Center

    Science.gov (United States)

    Jenkins, Jon Michael; Caldwell, Douglas A.; Davies, Misty; Li, Jie; Morris, Robert L.; Rose, Mark; Smith, Jeffrey C.; Tenenbaum, Peter; Ting, Eric; Twicken, Joseph D.; Wohler, Bill

    2018-06-01

    The Transiting Exoplanet Survey Satellite (TESS) was selected by NASA’s Explorer Program to conduct a search for Earth’s closest cousins starting in 2018. TESS will conduct an all-sky transit survey of F, G and K dwarf stars between 4 and 12 magnitudes and M dwarf stars within 200 light years. TESS is expected to discover 1,000 small planets less than twice the size of Earth, and to measure the masses of at least 50 of these small worlds. The TESS science pipeline is being developed by the Science Processing Operations Center (SPOC) at NASA Ames Research Center based on the highly successful Kepler science pipeline. Like the Kepler pipeline, the TESS pipeline provides calibrated pixels, simple and systematic error-corrected aperture photometry, and centroid locations for all 200,000+ target stars observed over the 2-year mission, along with associated uncertainties. The pixel and light curve products are modeled on the Kepler archive products and will be archived to the Mikulski Archive for Space Telescopes (MAST). In addition to the nominal science data, the 30-minute Full Frame Images (FFIs) simultaneously collected by TESS will also be calibrated by the SPOC and archived at MAST. The TESS pipeline searches through all light curves for evidence of transits that occur when a planet crosses the disk of its host star. The Data Validation pipeline generates a suite of diagnostic metrics for each transit-like signature, and then extracts planetary parameters by fitting a limb-darkened transit model to each potential planetary signature. The results of the transit search are modeled on the Kepler transit search products (tabulated numerical results, time series products, and pdf reports) all of which will be archived to MAST. Synthetic sample data products are available at https://archive.stsci.edu/tess/ete-6.html.Funding for the TESS Mission has been provided by the NASA Science Mission Directorate.

  11. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  12. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  13. Operational Art of Maritime Straits

    National Research Council Canada - National Science Library

    Lowell, James P

    2008-01-01

    .... Given the expanding role of asymmetric warfare in littoral sea control and the growing importance of strait integrity in the global economy, understanding the intricacies of operational factors...

  14. Combined Arms Warfare in the 21st Century: Maximizing the Capability of U.S. Army Future Combat System Equipped Brigade Combat Teams to Conduct Combined Arms Operations

    Science.gov (United States)

    2008-06-13

    defenses, and surf ; a landing from the air but free of the 65 inflexibility, tactical disorder, and disorganization of parachute operations; an...taken place since the Cold War include Aceh province on the island of Sumatra in the country of Indonesia and the Darfur region of western Sudan

  15. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  16. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  17. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  18. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  19. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  20. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  1. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    methods to deliver the message. MISO uses everything from digital media and social networks, to billboards and airdropped fliers, to word -of- mouth and...overt and covert diplomacy is also beginning. As the digital, social media age continues, the USG is unable to compete with non-state actors...were CIA assassination squads. There may be some truth to that as “in the words of Douglas Valentine, a CIA operations chief in the Northern

  2. Organizing for Information Operations Within The Joint Task Force

    National Research Council Canada - National Science Library

    McLaughlin, Lawrence

    2003-01-01

    .... Joint doctrine defines information operations as a broad range of capabilities and related activities that include operations security, psychological operations, electronic warfare, physical attack...

  3. Desert Research and Technology Studies (DRATS) 2010 Science Operations: Operational Approaches and Lessons Learned for Managing Science during Human Planetary Surface Missions

    Science.gov (United States)

    Eppler, Dean; Adams, Byron; Archer, Doug; Baiden, Greg; Brown, Adrian; Carey, William; Cohen, Barbara; Condit, Chris; Evans, Cindy; Fortezzo, Corey; hide

    2012-01-01

    Desert Research and Technology Studies (Desert RATS) is a multi-year series of hardware and operations tests carried out annually in the high desert of Arizona on the San Francisco Volcanic Field. These activities are designed to exercise planetary surface hardware and operations in conditions where long-distance, multi-day roving is achievable, and they allow NASA to evaluate different mission concepts and approaches in an environment less costly and more forgiving than space.The results from the RATS tests allows election of potential operational approaches to planetary surface exploration prior to making commitments to specific flight and mission hardware development. In previous RATS operations, the Science Support Room has operated largely in an advisory role, an approach that was driven by the need to provide a loose science mission framework that would underpin the engineering tests. However, the extensive nature of the traverse operations for 2010 expanded the role of the science operations and tested specific operational approaches. Science mission operations approaches from the Apollo and Mars-Phoenix missions were merged to become the baseline for this test. Six days of traverse operations were conducted during each week of the 2-week test, with three traverse days each week conducted with voice and data communications continuously available, and three traverse days conducted with only two 1-hour communications periods per day. Within this framework, the team evaluated integrated science operations management using real-time, tactical science operations to oversee daily crew activities, and strategic level evaluations of science data and daily traverse results during a post-traverse planning shift. During continuous communications, both tactical and strategic teams were employed. On days when communications were reduced to only two communications periods per day, only a strategic team was employed. The Science Operations Team found that, if

  4. Operational status of the Los Alamos neutron science center (LANSCE)

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Kevin W [Los Alamos National Laboratory; Erickson, John L [Los Alamos National Laboratory; Schoenberg, Kurt F [Los Alamos National Laboratory

    2010-01-01

    The Los Alamos Neutron Science Center (LANSCE) accelerator and beam delivery complex generates the proton beams that serve three neutron production sources; the thermal and cold source for the Manuel Lujan Jr. Neutron Scattering Center, the Weapons Neutron Research (WNR) high-energy neutron source, and a pulsed Ultra-Cold Neutron Source. These three sources are the foundation of strong and productive multi-disciplinary research programs that serve a diverse and robust user community. The facility also provides multiplexed beams for the production of medical radioisotopes and proton radiography of dynamic events. The recent operating history of these sources will be reviewed and plans for performance improvement will be discussed, together with the underlying drivers for the proposed LANSCE Refurbishment project. The details of this latter project are presented in a separate contribution.

  5. Fuzzy expert systems models for operations research and management science

    Science.gov (United States)

    Turksen, I. B.

    1993-12-01

    Fuzzy expert systems can be developed for the effective use of management within the domains of concern associated with Operations Research and Management Science. These models are designed with: (1) expressive powers of representation embedded in linguistic variables and their linguistic values in natural language expressions, and (2) improved methods of interference based on fuzzy logic which is a generalization of multi-valued logic with fuzzy quantifiers. The results of these fuzzy expert system models are either (1) approximately good in comparison with their classical counterparts, or (2) much better than their counterparts. Moreover, for fuzzy expert systems models, it is only necessary to obtain ordinal scale data. Whereas for their classical counterparts, it is generally required that data be at least on ratio and absolute scale in order to guarantee the additivity and multiplicativity assumptions.

  6. Conducting and publishing design science research : Inaugural essay of the design science department of the Journal of Operations Management

    NARCIS (Netherlands)

    van Aken, Joan; Chandrasekaran, Aravind; Halman, Joop

    2016-01-01

    The new Design Science department at the Journal of Operations Management invites submissions using a design science research strategy for operations management (OM) issues. The objective of this strategy is to develop knowledge that can be used in a direct and specific way to design and implement

  7. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  8. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  9. NASA Extreme Environment Mission Operations: Science Operations Development for Human Exploration

    Science.gov (United States)

    Bell, Mary S.

    2014-01-01

    The purpose of NASA Extreme Environment Mission Operations (NEEMO) mission 16 in 2012 was to evaluate and compare the performance of a defined series of representative near-Earth asteroid (NEA) extravehicular activity (EVA) tasks under different conditions and combinations of work systems, constraints, and assumptions considered for future human NEA exploration missions. NEEMO 16 followed NASA's 2011 Desert Research and Technology Studies (D-RATS), the primary focus of which was understanding the implications of communication latency, crew size, and work system combinations with respect to scientific data quality, data management, crew workload, and crew/mission control interactions. The 1-g environment precluded meaningful evaluation of NEA EVA translation, worksite stabilization, sampling, or instrument deployment techniques. Thus, NEEMO missions were designed to provide an opportunity to perform a preliminary evaluation of these important factors for each of the conditions being considered. NEEMO 15 also took place in 2011 and provided a first look at many of the factors, but the mission was cut short due to a hurricane threat before all objectives were completed. ARES Directorate (KX) personnel consulted with JSC engineers to ensure that high-fidelity planetary science protocols were incorporated into NEEMO mission architectures. ARES has been collaborating with NEEMO mission planners since NEEMO 9 in 2006, successively building upon previous developments to refine science operations concepts within engineering constraints; it is expected to continue the collaboration as NASA's human exploration mission plans evolve.

  10. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  11. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  12. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  13. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  14. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  15. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  16. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  17. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  18. Environmental Sciences Division Toxicology Laboratory standard operating procedures

    International Nuclear Information System (INIS)

    Kszos, L.A.; Stewart, A.J.; Wicker, L.F.; Logsdon, G.M.

    1989-09-01

    This document was developed to provide the personnel working in the Environmental Sciences Division's Toxicology Laboratory with documented methods for conducting toxicity tests. The document consists of two parts. The first part includes the standard operating procedures (SOPs) that are used by the laboratory in conducting toxicity tests. The second part includes reference procedures from the US Environmental Protection Agency document entitled Short-Term Methods for Estimating the Chronic Toxicity of Effluents and Receiving Waters to Freshwater Organisms, upon which the Toxicology Laboratory's SOPs are based. Five of the SOPs include procedures for preparing Ceriodaphnia survival and reproduction test. These SOPs include procedures for preparing Ceriodaphnia food (SOP-3), maintaining Ceriodaphnia cultures (SOP-4), conducting the toxicity test (SOP-13), analyzing the test data (SOP-13), and conducting a Ceriodaphnia reference test (SOP-15). Five additional SOPs relate specifically to the fathead minnow (Pimephales promelas) larval survival and growth test: methods for preparing fathead minnow larvae food (SOP-5), maintaining fathead minnow cultures (SOP-6), conducting the toxicity test (SOP-9), analyzing the test data (SOP-12), and conducting a fathead minnow reference test (DOP-14). The six remaining SOPs describe methods that are used with either or both tests: preparation of control/dilution water (SOP-1), washing of glassware (SOP-2), collection and handling of samples (SOP-7), preparation of samples (SOP-8), performance of chemical analyses (SOP-11), and data logging and care of technical notebooks (SOP-16)

  19. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  20. Deconflicting Electronic Warfare in Joint Operations

    National Research Council Canada - National Science Library

    Huber, Arthur F; Carlberg, Gary; Gilliard, Prince; Marquet, L. D

    2007-01-01

    ... in velocity and lethality, it is becoming a growing issue for those who conduct EW. More and more systems both weapons and purely commercial devices are vying for their place in an increasingly crowded frequency spectrum...

  1. Mountain Warfare and Cold Weather Operations

    Science.gov (United States)

    2016-04-29

    is important to determine whether the bottom is composed of sand, gravel, silt, clay , or rock and in what proportions. For more information see ATP...these planning factors by about two quarts per individual. 6-22. Water increases in viscosity in extreme cold weather, and therefore moves slower...In arctic conditions, fuel spilled on flesh can cause instant frostbite if the proper gloves are not worn. 6-32. Multi- viscosity oil (15W-40) is

  2. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  3. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  4. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  7. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  8. Cyber warfare: critical perspectives

    NARCIS (Netherlands)

    Ducheine, P.; Osinga, F.; Soeters, J.

    2012-01-01

    Next to sea, land, air and space, ‘cyber space’ appears to be the fifth operational domain for the military. This manmade and virtual sphere brings along opportunities and threats. In this book, academics of the Netherlands Defence Academy as well as specialists and military professionals from other

  9. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  10. Characteristics of the Navy Laboratory Warfare Center Technical Workforce

    Science.gov (United States)

    2013-09-29

    Mathematics and Information Science (M&IS) Actuarial Science 1510 Computer Science 1550 Gen. Math & Statistics 1501 Mathematics 1520 Operations...Admin. Network Systems & Data Communication Analysts Actuaries Mathematicians Operations Research Analyst Statisticians Social Science (SS...workforce was sub-divided into six broad occupational groups: Life Science , Physical Science , Engineering, Mathematics, Computer Science and Information

  11. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  12. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  13. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  14. Proposing an Operational Definition of Science Teacher Beliefs

    Science.gov (United States)

    Hutner, Todd L.; Markman, Arthur B.

    2016-01-01

    Much research has shown that a science teacher's beliefs are related to their teaching practice. This line of research has often defined "belief" epistemologically. That is, beliefs are often defined relative to other mental constructs, such as knowledge, dispositions, or attitudes. Left unspecified is the role beliefs play in cognition…

  15. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  16. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  17. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  18. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  19. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  20. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  1. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  2. MINING OPERATIONS'' SAFETY PROVISION - FUNDAMENTAL AND APPLIED SCIENCE TASK

    Directory of Open Access Journals (Sweden)

    Zakharov V.N.

    2017-12-01

    Full Text Available The stages of the modern Russian scientiic school of comprehensive exploitation of mineral resourcesformation, the main directions of which were concentrated in the Institute of Comprehensive Exploitation of Mineral Resources are considered. The main directions of ICEMR scientiic activity and the most important results of fundamental and applied research are presented, which are the scientiic Ьasis of modern research related to the safety of mineral reserves use provision. The importance of studying the coal and methane interaction, gas dynamic phenomena in coal mines, coal seam degassing technologies and mine methane utilization, mathematical modeling and solving proЬlems in the ield of stressed-deformed state, strength, fracturing mechanics, thermal conductivity, hydromechanics, forced viЬration, etc. are outlined.The effectiveness analysis of the state, academic and industrial Ьranch scientiic centers, university science, design organizations and mining companies joint efforts to reduce industrial injuries in the mining sector of the Russian economy is conducted. The need for targeted measures to move to new technical-technological and regulatory levels of mining, allowing to prevent the accidents with massive fatal injuries, was determined. The solution of these tasks is possiЬle only Ьy comЬining the efforts of the specialized institutes of the Russian Academy of Sciences, of the Ьranch science, of universities and mining companies through the implementation of the "Mining Safety" Scientiic Research Comprehensive Plan, coordinated Ьy ICEMR RAS.

  3. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  4. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  5. A novel model for extending international co-operation in science and education

    NARCIS (Netherlands)

    de Boer, S.J.; Ji-zehn, Q.

    2004-01-01

    Journal of Zhejiang University SCIENCE (ISSN 1009-3095, Monthly) 2004 Vol. 5 No. 3 p.358-364 --------------------------------------------------------------------------------A novel model for extending international co-operation in science and educationDE BOER Sirp J.1, QIU Ji-zhen 2(1International

  6. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  7. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    Science.gov (United States)

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  8. Innovative Telemonitoring System for Cardiology: From Science to Routine Operation

    Science.gov (United States)

    Kastner, P.; Morak, J.; Modre, R.; Kollmann, A.; Ebner, C.; Fruhwald, FM.; Schreier, G.

    2010-01-01

    Objective Results of the Austrian MOBITEL (MOBIle phone based TELemonitoring for heart failure patients) trial indicate that home-based telemonitoring improves outcome of chronic heart failure (CHF) patients and reduces both frequency and duration of hospitalizations. Based on lessons learned, we assessed the weak points to clear the way for routine operations. Methods We analyzed the system with respect to recommendations of the ESC Guidelines and experiences gained throughout the trial to identify potential improvements. The following components have been identified: a patient terminal with highest usability, integrated way to document drug-intake and well-being, and automated event detection for worsening of CHF. As a consequence the system was extended by Near Field Communication (NFC) technology and by an event management tool. Results Usability evaluation with 30 adults (14f, median 51y. IQR[45-65]) showed that 21 (8f) were able to immediately operate the system after reading a step-by-step manual. Eight (6f) needed one time demonstration and one man (80y) failed to operate the blood pressure meter. Routine operation of the revised system started in March 2009. Within 9 months, 15 patients (4f, median 74y. IQR[71-83], all NYHA-III) transmitted 17,149 items. 43 events were detected because of body weight gain of more then 2kg within 2 days. 49 therapy adjustments were documented. Three patients stopped using the system, two (1f) because of non-compliance and one (m, 82y) because of death. Overall, the rate of adherence to daily data transfer was 78%. Conclusion First results confirm the applicability of the revised telemonitoring system in routine operation. PMID:23616835

  9. Some Trends and Applications of Operational Research/Management Science to Operations Management

    Directory of Open Access Journals (Sweden)

    Ramón Companys Pascual

    2015-01-01

    Full Text Available The editor suggested us to write about our point of view on the current use of Operations Research techniques applied to the Operations Management and about its future evolution. With some of unconsciousness we accept it, but it is obvious that our vision, even though we try to do our best, will be partial and biased. Hence the title chosen shows signs of prudence. More caution have been applied to the development where, after a glance at the past and reflection on the abundance of new denominations without content, we consider five aspects that, nowadays, acquire increasing importance and that will strongly influence in future developments. Among the five aspects two correspond to trends in the field of operations research techniques, one is a philosophy in the field of operations management, another to an area of the company and the last one to an industrial sector in which operations management, supported by operations research methods, is taking a predominant role.

  10. The Science Operations Concept for the ExoMars 2016 Trace Gas Orbiter

    Science.gov (United States)

    Frew, D.

    2014-04-01

    The ExoMars 2016 Science Operations Centre (SOC) based at the European Space Astronomy Centre is responsible for coordinating the science planning activities for the Trace Gas Orbiter. Science planning will involve all members of the ExoMars 2016 science ground segment (SGS), namely the SOC at ESAC, the Russian SOC at IKI, the orbiter instrument teams and the science management of the 2016 mission represented by the science working team (SWT) that is chaired by the project scientist. The science operations concept for the mission builds on the legacy inherited from previous ESA planetary missions, in particular from Mars Express for the core plan validation aspects and from the Smart-1 lunar mission for the opportunity analysis and longterm planning approach. Further concept drivers have been derived from the ExoMars 2016 mission profile in the areas of orbit predictability, instrument design and the usage of TGO as a relay for surface assets including the ExoMars 2018 rover. This paper will give an over view of the entire uplink planning process as it is conducted over 3 distinct planning cycles. The Long Term Plan (LTP) establishes the baseline science plan and demonstrates the operational feasibility of meeting the mission science goals formulated by the science working team (SWT) at science management level. The LTP has a planning horizon of 6 months. Each month of the baseline science plan is refined with the instrument teams within the Medium Term Plan (MTP) to converge on a frozen attitude request and resource envelopes for all of the observations in the plan. During the Short Term Planning cycle the SOC will iterate with the teams to finalise the commanding for all of the observations in the plan for the coming week. The description of the uplink planning process will focus on two key areas that are common to all of the planning cycles mentioned above: • Science Plan Abstraction: Interacting with the science plan at the appropriate level of abstraction to

  11. Local climate activities in co-operation between municipality, civil society and science shop

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard

    The Science Shop at DTU co-operates with the local municipal administration and the local branch of an environmental NGO about climate change. The co-operation was initiated by a proposal to the Science Shop from the municipal administration. Since the Science Shop requests civil society...... involvement in projects it was proposed to involve the local branch of the environmental NGO. The starting point was topics developed by the administration and the NGO together and announced to students as part of the Science Shop project supply. The focus is climate impact of local activities and strategies...... are initiated and co-ordinated by a group with members from municipal administration, the local NGO and the Science Shop. All projects have involved student projects, but most projects have also contributed to ongoing research activities. The projects up till now have focused on the municipal food supply...

  12. Future Directions of Management Science and Operations Management in Business School Curricula

    Science.gov (United States)

    Fuller, Jack A.; Denton, James W.

    2006-01-01

    The fields of Management Science (MS) and Operations Management (OM) have co-existed in business school curricula for over a half century. This paper examines five trends that point toward a bright future for Operations Management in the business curriculum. These trends include an increasing emphasis on global competition, the growth of the…

  13. Reactor science and technology: operation and control of reactors

    International Nuclear Information System (INIS)

    Qiu Junlong

    1994-01-01

    This article is a collection of short reports on reactor operation and research in China in 1991. The operation of and research activities linked with the Heavy Water Research Reactor, Swimming Pool Reactor and Miniature Neutron Source Reactor are briefly surveyed. A number of papers then follow on the developing strategies in Chinese fast breeder reactor technology including the conceptual design of an experimental fast reactor (FFR), theoretical studies of FFR thermo-hydraulics and a design for an immersed sodium flowmeter. Reactor physics studies cover a range of topics including several related to work on zero power reactors. The section on reactor safety analysis is concerned largely with the assessment of established, and the presentation of new, computer codes for use in PWR safety calculations. Experimental and theoretical studies of fuels and reactor materials for FBRs, PWRs, BWRs and fusion reactors are described. A final miscellaneous section covers Mo-Tc isotope production in the swimming pool reactor, convective heat transfer in tubes and diffusion of tritium through plastic/aluminium composite films and Li 2 SiO 3 . (UK)

  14. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  15. Terry Turbopump Expanded Operating Band Full-Scale Component and Basic Science Detailed Test Plan - Final.

    Energy Technology Data Exchange (ETDEWEB)

    Osborn, Douglas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Solom, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    This document details the milestone approach to define the true operating limitations (margins) of the Terry turbopump systems used in the nuclear industry for Milestone 3 (full-scale component experiments) and Milestone 4 (Terry turbopump basic science experiments) efforts. The overall multinational-sponsored program creates the technical basis to: (1) reduce and defer additional utility costs, (2) simplify plant operations, and (3) provide a better understanding of the true margin which could reduce overall risk of operations.

  16. A Space Operations Network Alternative: Using Globally Connected Research and Education Networks for Space-Based Science Operations

    Science.gov (United States)

    Bradford, Robert N.

    2006-01-01

    Earth based networking in support of various space agency projects has been based on leased service/circuits which has a high associated cost. This cost is almost always taken from the science side resulting in less science. This is a proposal to use Research and Education Networks (RENs) worldwide to support space flight operations in general and space-based science operations in particular. The RENs were developed to support scientific and educational endeavors. They do not provide support for general Internet traffic. The connectivity and performance of the research and education networks is superb. The connectivity at Layer 3 (IP) virtually encompasses the globe. Most third world countries and all developed countries have their own research and education networks, which are connected globally. Performance of the RENs especially in the developed countries is exceptional. Bandwidth capacity currently exists and future expansion promises that this capacity will continue. REN performance statistics has always exceeded minimum requirements for spaceflight support. Research and Education networks are more loosely managed than a corporate network but are highly managed when compared to the commodity Internet. Management of RENs on an international level is accomplished by the International Network Operations Center at Indiana University at Indianapolis. With few exceptions, each regional and national REN has its own network ops center. The acceptable use policies (AUP), although differing by country, allows any scientific program or project the use of their networks. Once in compliance with the first RENs AUP, all others will accept that specific traffic including regional and transoceanic networks. RENs can support spaceflight related scientific programs and projects. Getting the science to the researcher is obviously key to any scientific project. RENs provide a pathway to virtually any college or university in the world, as well as many governmental institutes and

  17. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  18. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  19. The Art and Science of Psychological Operations: Case Studies of Military Application. Volume One

    Science.gov (United States)

    1976-01-01

    and of the Royal Ballet against the background of the Pyramids of Giza during the city of Cairo’s millenary celebrations in 1969, accounted for only 8...Research Associate, Department of Psy- Mary chology, Swarthmore College. GESSNER, Free-lance film editor and camera as- Peter sistant. GIZA ...Army, by Richard H. Giza --------- 1100 East Asia ---------------------------------------------- 1105 Political Warfare-Qualified Application, by

  20. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  1. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  2. Real-Time Science Operations to Support a Lunar Polar Volatiles Rover Mission

    Science.gov (United States)

    Heldmann, Jennifer L.; Colaprete, Anthony; Elphic, Richard C.; Mattes, Greg; Ennico, Kimberly; Fritzler, Erin; Marinova, Margarita M.; McMurray, Robert; Morse, Stephanie; Roush, Ted L.; hide

    2014-01-01

    Future human exploration of the Moon will likely rely on in situ resource utilization (ISRU) to enable long duration lunar missions. Prior to utilizing ISRU on the Moon, the natural resources (in this case lunar volatiles) must be identified and characterized, and ISRU demonstrated on the lunar surface. To enable future uses of ISRU, NASA and the CSA are developing a lunar rover payload that can (1) locate near subsurface volatiles, (2) excavate and analyze samples of the volatile-bearing regolith, and (3) demonstrate the form, extractability and usefulness of the materials. Such investigations are important both for ISRU purposes and for understanding the scientific nature of these intriguing lunar volatile deposits. Temperature models and orbital data suggest near surface volatile concentrations may exist at briefly lit lunar polar locations outside persistently shadowed regions. A lunar rover could be remotely operated at some of these locations for the approx. 2-14 days of expected sunlight at relatively low cost. Due to the limited operational time available, both science and rover operations decisions must be made in real time, requiring immediate situational awareness, data analysis, and decision support tools. Given these constraints, such a mission requires a new concept of operations. In this paper we outline the results and lessons learned from an analog field campaign in July 2012 which tested operations for a lunar polar rover concept. A rover was operated in the analog environment of Hawaii by an off-site Flight Control Center, a rover navigation center in Canada, a Science Backroom at NASA Ames Research Center in California, and support teams at NASA Johnson Space Center in Texas and NASA Kennedy Space Center in Florida. We find that this type of mission requires highly efficient, real time, remotely operated rover operations to enable low cost, scientifically relevant exploration of the distribution and nature of lunar polar volatiles. The field

  3. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  4. WFIRST: STScI Science Operations Center (SSOC) Activities and Plans

    Science.gov (United States)

    Gilbert, Karoline M.; STScI WFIRST Team

    2018-01-01

    The science operations for the WFIRST Mission will be distributed between Goddard Space Flight Center, the Space Telescope Science Institute (STScI), and the Infrared Processing and Analysis Center (IPAC). The STScI Science Operations Center (SSOC) will schedule and archive all WFIRST observations, will calibrate and produce pipeline-reduced data products for the Wide Field Instrument, and will support the astronomical community in planning WFI observations and analyzing WFI data. During the formulation phase, WFIRST team members at STScI have developed operations concepts for scheduling, data management, and the archive; have performed technical studies investigating the impact of WFIRST design choices on data quality and analysis; and have built simulation tools to aid the community in exploring WFIRST’s capabilities. We will highlight examples of each of these efforts.

  5. Ganges Valley Aerosol Experiment: Science and Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, VR

    2010-06-21

    emissions; and dust. The extended AMF deployment will enable measurements under different regimes of the climate and aerosol abundance—in the wet monsoon period with low aerosol loading; in the dry, hot summer with aerosols dispersed throughout the atmospheric column; and in the cool, dry winter with aerosols confined mostly to the boundary later and mid-troposphere. Each regime, in addition, has its own distinct radiative and atmospheric dynamic drivers. The aircraft operational phase will assist in characterizing the aerosols at times when they have been observed to be at the highest concentrations. A number of agencies in India will collaborate with the proposed field study and provide support in terms of planning, aircraft measurements, and surface sites. The high concentration of aerosols in the upper Ganges Valley, together with hypotheses involving several possible mechanisms with direct impacts on the hydrologic cycle of the region, gives us a unique opportunity to generate data sets that will be useful both in understanding the processes at work and in providing answers regarding the effects of aerosols on climate in a region where the perturbation is the highest.

  6. GIS applications for military operations in coastal zones

    Science.gov (United States)

    Fleming, S.; Jordan, T.; Madden, M.; Usery, E. L.; Welch, R.

    In order to successfully support current and future US military operations in coastal zones, geospatial information must be rapidly integrated and analyzed to meet ongoing force structure evolution and new mission directives. Coastal zones in a military-operational environment are complex regions that include sea, land and air features that demand high-volume databases of extreme detail within relatively narrow geographic corridors. Static products in the form of analog maps at varying scales traditionally have been used by military commanders and their operational planners. The rapidly changing battlefield of 21st Century warfare, however, demands dynamic mapping solutions. Commercial geographic information system (GIS) software for military-specific applications is now being developed and employed with digital databases to provide customized digital maps of variable scale, content and symbolization tailored to unique demands of military units. Research conducted by the Center for Remote Sensing and Mapping Science at the University of Georgia demonstrated the utility of GIS-based analysis and digital map creation when developing large-scale (1:10,000) products from littoral warfare databases. The methodology employed-selection of data sources (including high resolution commercial images and Lidar), establishment of analysis/modeling parameters, conduct of vehicle mobility analysis, development of models and generation of products (such as a continuous sea-land DEM and geo-visualization of changing shorelines with tidal levels)-is discussed. Based on observations and identified needs from the National Geospatial-Intelligence Agency, formerly the National Imagery and Mapping Agency, and the Department of Defense, prototype GIS models for military operations in sea, land and air environments were created from multiple data sets of a study area at US Marine Corps Base Camp Lejeune, North Carolina. Results of these models, along with methodologies for developing large

  7. Operational status and future plans for the Los Alamos Neutron Science Center

    International Nuclear Information System (INIS)

    Jones, Kevin W.; Schoenberg, Kurt F.

    2008-01-01

    The Los Alamos Neutron Science Center (LANSCE) continues to be a signature experimental science facility at Los Alamos National Laboratory (LANL). The 800 MeV linear proton accelerator provides multiplexed beams to five unique target stations to produce medical radioisotopes, ultra-cold neutrons, thermal and high energy neutrons for material and nuclear science, and to conduct proton radiography of dynamic events. Recent operating experience will be reviewed and the role of an enhanced LANSCE facility in LANL's new signature facility initiative, Matter and Radiation in Extremes (MaRIE) will be discussed.

  8. WFIRST: User and mission support at ISOC - IPAC Science Operations Center

    Science.gov (United States)

    Akeson, Rachel; Armus, Lee; Bennett, Lee; Colbert, James; Helou, George; Kirkpatrick, J. Davy; Laine, Seppo; Meshkat, Tiffany; Paladini, Roberta; Ramirez, Solange; Wang, Yun; Xie, Joan; Yan, Lin

    2018-01-01

    The science center for WFIRST is distributed between the Goddard Space Flight Center, the Infrared Processing and Analysis Center (IPAC) and the Space Telescope Science Institute (STScI). The main functions of the IPAC Science Operations Center (ISOC) are:* Conduct the GO, archival and theory proposal submission and evaluation process* Support the coronagraph instrument, including observation planning, calibration and data processing pipeline, generation of data products, and user support* Microlensing survey data processing pipeline, generation of data products, and user support* Community engagement including conferences, workshops and general support of the WFIRST exoplanet communityWe will describe the components planned to support these functions and the community of WFIRST users.

  9. Capstone Concept for Special Operations

    National Research Council Canada - National Science Library

    2006-01-01

    The United States and its allies will remain at war for the foreseeable future. They will continue to battle a networked, technologically modern adversary that utilizes nonconventional methods of warfare as its primary means of operation...

  10. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  11. Automated Scheduling of Personnel to Staff Operations for the Mars Science Laboratory

    Science.gov (United States)

    Knight, Russell; Mishkin, Andrew; Allbaugh, Alicia

    2014-01-01

    Leveraging previous work on scheduling personnel for space mission operations, we have adapted ASPEN (Activity Scheduling and Planning Environment) [1] to the domain of scheduling personnel for operations of the Mars Science Laboratory. Automated scheduling of personnel is not new. We compare our representations to a sampling of employee scheduling systems available with respect to desired features. We described the constraints required by MSL personnel schedulers and how each is handled by the scheduling algorithm.

  12. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  13. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  14. PLRP-3: Operational Perspectives of Conducting Science-Driven Extravehicular Activity with Communications Latency

    Science.gov (United States)

    Miller, Matthew J.; Lim, Darlene S. S.; Brady, Allyson; Cardman, Zena; Bell, Ernest; Garry, Brent; Reid, Donnie; Chappell, Steve; Abercromby, Andrew F. J.

    2016-01-01

    The Pavilion Lake Research Project (PLRP) is a unique platform where the combination of scientific research and human space exploration concepts can be tested in an underwater spaceflight analog environment. The 2015 PLRP field season was performed at Pavilion Lake, Canada, where science-driven exploration techniques focusing on microbialite characterization and acquisition were evaluated within the context of crew and robotic extravehicular activity (EVA) operations. The primary objectives of this analog study were to detail the capabilities, decision-making process, and operational concepts required to meet non-simulated scientific objectives during 5-minute one-way communication latency utilizing crew and robotic assets. Furthermore, this field study served as an opportunity build upon previous tests at PLRP, NASA Desert Research and Technology Studies (DRATS), and NASA Extreme Environment Mission Operations (NEEMO) to characterize the functional roles and responsibilities of the personnel involved in the distributed flight control team and identify operational constraints imposed by science-driven EVA operations. The relationship and interaction between ground and flight crew was found to be dependent on the specific scientific activities being addressed. Furthermore, the addition of a second intravehicular operator was found to be highly enabling when conducting science-driven EVAs. Future human spaceflight activities will need to cope with the added complexity of dynamic and rapid execution of scientific priorities both during and between EVA execution to ensure scientific objectives are achieved.

  15. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  16. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  17. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  18. Research and development portfolio of the sustainability science team national sustainable operations USDA Forest Service

    Science.gov (United States)

    Trista Patterson; David Nicholls; Jonathan Long

    2015-01-01

    The Sustainability Science Team (SST) of the U.S. Department of Agriculture (USDA) Forest Service Sustainable Operations Initiative is a 18-member virtual research and development team, located across five regions and four research stations of the USDA Forest Service. The team provides research, publication, systems analysis, and decision support to the Sustainable...

  19. Operational plans for life science payloads - From experiment selection through postflight reporting

    Science.gov (United States)

    Mccollum, G. W.; Nelson, W. G.; Wells, G. W.

    1976-01-01

    Key features of operational plans developed in a study of the Space Shuttle era life science payloads program are presented. The data describes the overall acquisition, staging, and integration of payload elements, as well as program implementation methods and mission support requirements. Five configurations were selected as representative payloads: (a) carry-on laboratories - medical emphasis experiments, (b) mini-laboratories - medical/biology experiments, (c) seven-day dedicated laboratories - medical/biology experiments, (d) 30-day dedicated laboratories - Regenerative Life Support Evaluation (RLSE) with selected life science experiments, and (e) Biomedical Experiments Scientific Satellite (BESS) - extended duration primate (Type I) and small vertebrate (Type II) missions. The recommended operational methods described in the paper are compared to the fundamental data which has been developed in the life science Spacelab Mission Simulation (SMS) test series. Areas assessed include crew training, experiment development and integration, testing, data-dissemination, organization interfaces, and principal investigator working relationships.

  20. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  1. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  2. Human Error and the International Space Station: Challenges and Triumphs in Science Operations

    Science.gov (United States)

    Harris, Samantha S.; Simpson, Beau C.

    2016-01-01

    Any system with a human component is inherently risky. Studies in human factors and psychology have repeatedly shown that human operators will inevitably make errors, regardless of how well they are trained. Onboard the International Space Station (ISS) where crew time is arguably the most valuable resource, errors by the crew or ground operators can be costly to critical science objectives. Operations experts at the ISS Payload Operations Integration Center (POIC), located at NASA's Marshall Space Flight Center in Huntsville, Alabama, have learned that from payload concept development through execution, there are countless opportunities to introduce errors that can potentially result in costly losses of crew time and science. To effectively address this challenge, we must approach the design, testing, and operation processes with two specific goals in mind. First, a systematic approach to error and human centered design methodology should be implemented to minimize opportunities for user error. Second, we must assume that human errors will be made and enable rapid identification and recoverability when they occur. While a systematic approach and human centered development process can go a long way toward eliminating error, the complete exclusion of operator error is not a reasonable expectation. The ISS environment in particular poses challenging conditions, especially for flight controllers and astronauts. Operating a scientific laboratory 250 miles above the Earth is a complicated and dangerous task with high stakes and a steep learning curve. While human error is a reality that may never be fully eliminated, smart implementation of carefully chosen tools and techniques can go a long way toward minimizing risk and increasing the efficiency of NASA's space science operations.

  3. Science and Technology Metrics

    Science.gov (United States)

    2005-01-01

    CONTENTS,1992, Vol 35, Iss AUG, pp 3 12 Garfield E, "Parascience, Pseudoscience , and Political Power Holton,Gerald on the Antiscience Phenomenon And Why...1993, Vol 25, Iss JUN, pp 3 9 Garfield E, "The Science Religion Connection an Introduction to Science and Religion From Warfare over Sociobiology to a

  4. ExoMars Trace Gas Orbiter Instrument Modelling Approach to Streamline Science Operations

    Science.gov (United States)

    Munoz Fernandez, Michela; Frew, David; Ashman, Michael; Cardesin Moinelo, Alejandro; Garcia Beteta, Juan Jose; Geiger, Bernhard; Metcalfe, Leo; Nespoli, Federico; Muniz Solaz, Carlos

    2018-05-01

    ExoMars Trace Gas Orbiter (TGO) science operations activities are centralised at ESAC's Science Operations Centre (SOC). The SOC receives the inputs from the principal investigators (PIs) in order to implement and deliver the spacecraft pointing requests and instrument timelines to the Mission Operations Centre (MOC). The high number of orbits per planning cycle has made it necessary to abstract the planning interactions between the SOC and the PI teams at the observation level. This paper describes the modelling approach we have conducted for TGOís instruments to streamline science operations. We have created dynamic observation types that scale to adapt to the conditions specified by the PI teams including observation timing, and pointing block parameters calculated from observation geometry. This approach is considered and improvement with respect to previous missions where the generation of the observation pointing and commanding requests was performed manually by the instrument teams. Automation software assists us to effectively handle the high density of planned orbits with increasing volume of scientific data and to successfully meet opportunistic scientific goals and objectives. Our planning tool combines the instrument observation definition files provided by the PIs together with the flight dynamics products to generate the Pointing Requests and the instrument timeline (ITL). The ITL contains all the validated commands at the TC sequence level and computes the resource envelopes (data rate, power, data volume) within the constraints. At the SOC, our main goal is to maximise the science output while minimising the number of iterations among the teams, ensuring that the timeline does not violate the state transitions allowed in the Mission Operations Rules and Constraints Document.

  5. Environmental Molecular Sciences Laboratory Operations System: Version 4.0 - system requirements specification

    Energy Technology Data Exchange (ETDEWEB)

    Kashporenko, D.

    1996-07-01

    This document is intended to provide an operations standard for the Environmental Molecular Sciences Laboratory OPerations System (EMSL OPS). It is directed toward three primary audiences: (1) Environmental Molecular Sciences Laboratory (EMSL) facility and operations personnel; (2) laboratory line managers and staff; and (3) researchers, equipment operators, and laboratory users. It is also a statement of system requirements for software developers of EMSL OPS. The need for a finely tuned, superior research environment as provided by the US Department of Energy`s (DOE) Environmental Molecular Sciences Laboratory has never been greater. The abrupt end of the Cold War and the realignment of national priorities caused major US and competing overseas laboratories to reposition themselves in a highly competitive research marketplace. For a new laboratory such as the EMSL, this means coming into existence in a rapidly changing external environment. For any major laboratory, these changes create funding uncertainties and increasing global competition along with concomitant demands for higher standards of research product quality and innovation. While more laboratories are chasing fewer funding dollars, research ideas and proposals, especially for molecular-level research in the materials and biological sciences, are burgeoning. In such an economically constrained atmosphere, reduced costs, improved productivity, and strategic research project portfolio building become essential to establish and maintain any distinct competitive advantage. For EMSL, this environment and these demands require clear operational objectives, specific goals, and a well-crafted strategy. Specific goals will evolve and change with the evolution of the nature and definition of DOE`s environmental research needs. Hence, EMSL OPS is designed to facilitate migration of these changes with ease into every pertinent job function, creating a facile {open_quotes}learning organization.{close_quotes}

  6. Using Distributed Operations to Enable Science Research on the International Space Station

    Science.gov (United States)

    Bathew, Ann S.; Dudley, Stephanie R. B.; Lochmaier, Geoff D.; Rodriquez, Rick C.; Simpson, Donna

    2011-01-01

    In the early days of the International Space Station (ISS) program, and as the organization structure was being internationally agreed upon and documented, one of the principal tenets of the science program was to allow customer-friendly operations. One important aspect of this was to allow payload developers and principle investigators the flexibility to operate their experiments from either their home sites or distributed telescience centers. This telescience concept was developed such that investigators had several options for ISS utilization support. They could operate from their home site, the closest telescience center, or use the payload operations facilities at the Marshall Space Flight Center in Huntsville, Alabama. The Payload Operations Integration Center (POIC) processes and structures were put into place to allow these different options to its customers, while at the same time maintain its centralized authority over NASA payload operations and integration. For a long duration space program with many scientists, researchers, and universities expected to participate, it was imperative that the program structure be in place to successfully facilitate this concept of telescience support. From a payload control center perspective, payload science operations require two major elements in order to make telescience successful within the scope of the ISS program. The first element is decentralized control which allows the remote participants the freedom and flexibility to operate their payloads within their scope of authority. The second element is a strong ground infrastructure, which includes voice communications, video, telemetry, and commanding between the POIC and the payload remote site. Both of these elements are important to telescience success, and both must be balanced by the ISS program s documented requirements for POIC to maintain its authority as an integration and control center. This paper describes both elements of distributed payload

  7. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  8. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  9. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  10. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  11. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. The event notification and alarm system for the Open Science Grid operations center

    Science.gov (United States)

    Hayashi, S.; Teige and, S.; Quick, R.

    2012-12-01

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  13. The event notification and alarm system for the Open Science Grid operations center

    Energy Technology Data Exchange (ETDEWEB)

    Hayashi, S; Teige and, S; Quick, R [Indiana University, University Information Technology Services (United States)

    2012-12-13

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  14. The event notification and alarm system for the Open Science Grid operations center

    International Nuclear Information System (INIS)

    Hayashi, S; Teige and, S; Quick, R

    2012-01-01

    The Open Science Grid Operations (OSG) Team operates a distributed set of services and tools that enable the utilization of the OSG by several HEP projects. Without these services users of the OSG would not be able to run jobs, locate resources, obtain information about the status of systems or generally use the OSG. For this reason these services must be highly available. This paper describes the automated monitoring and notification systems used to diagnose and report problems. Described here are the means used by OSG Operations to monitor systems such as physical facilities, network operations, server health, service availability and software error events. Once detected, an error condition generates a message sent to, for example, Email, SMS, Twitter, an Instant Message Server, etc. The mechanism being developed to integrate these monitoring systems into a prioritized and configurable alarming system is emphasized.

  15. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  16. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    Science.gov (United States)

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  17. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...

  18. Forgeting Lessons Learned: The United States Army’s Inability To Embrace Irregular Warfare

    Science.gov (United States)

    2014-04-01

    Revolutionary Development Support, commonly referred to as “CORDS”, was established in 1967 under Robert “Blowtorch” Komer. As the director of CORDS, Robert ...combat operations spanning the complete spectrum of warfare. As Robert Citino, the author of Blitzkrieg to Desert Storm wrote about the development of...US forces in Somalia. Haiti In 1915, Smedley Butler and 3,000 Marines invaded Haiti and quickly pacified the entire island. Eighty years

  19. Groundwater science in water-utility operations: global reflections on current status and future needs

    Science.gov (United States)

    Foster, Stephen; Sage, Rob

    2017-08-01

    The relevance of groundwater science to water-utility operations is analysed from a broad international perspective, identifying key concerns and specific opportunities for the future. The strategic importance worldwide of water utilities assuming the role of lead stakeholders for integrated groundwater resource management, recognizing their often considerable technical know-how and highly significant data holdings, is emphasized. Concurrently, the utilities themselves will need an ever-closer appreciation of groundwater-system behaviour if they are to manage efficiently their water-supply and wastewater operations.

  20. Cassini Information Management System in Distributed Operations Collaboration and Cassini Science Planning

    Science.gov (United States)

    Equils, Douglas J.

    2008-01-01

    Launched on October 15, 1997, the Cassini-Huygens spacecraft began its ambitious journey to the Saturnian system with a complex suite of 12 scientific instruments, and another 6 instruments aboard the European Space Agencies Huygens Probe. Over the next 6 1/2 years, Cassini would continue its relatively simplistic cruise phase operations, flying past Venus, Earth, and Jupiter. However, following Saturn Orbit Insertion (SOI), Cassini would become involved in a complex series of tasks that required detailed resource management, distributed operations collaboration, and a data base for capturing science objectives. Collectively, these needs were met through a web-based software tool designed to help with the Cassini uplink process and ultimately used to generate more robust sequences for spacecraft operations. In 2001, in conjunction with the Southwest Research Institute (SwRI) and later Venustar Software and Engineering Inc., the Cassini Information Management System (CIMS) was released which enabled the Cassini spacecraft and science planning teams to perform complex information management and team collaboration between scientists and engineers in 17 countries. Originally tailored to help manage the science planning uplink process, CIMS has been actively evolving since its inception to meet the changing and growing needs of the Cassini uplink team and effectively reduce mission risk through a series of resource management validation algorithms. These algorithms have been implemented in the web-based software tool to identify potential sequence conflicts early in the science planning process. CIMS mitigates these sequence conflicts through identification of timing incongruities, pointing inconsistencies, flight rule violations, data volume issues, and by assisting in Deep Space Network (DSN) coverage analysis. In preparation for extended mission operations, CIMS has also evolved further to assist in the planning and coordination of the dual playback redundancy of

  1. A new systems engineering approach to streamlined science and mission operations for the Far Ultraviolet Spectroscopic Explorer (FUSE)

    Science.gov (United States)

    Butler, Madeline J.; Sonneborn, George; Perkins, Dorothy C.

    1994-01-01

    The Mission Operations and Data Systems Directorate (MO&DSD, Code 500), the Space Sciences Directorate (Code 600), and the Flight Projects Directorate (Code 400) have developed a new approach to combine the science and mission operations for the FUSE mission. FUSE, the last of the Delta-class Explorer missions, will obtain high resolution far ultraviolet spectra (910 - 1220 A) of stellar and extragalactic sources to study the evolution of galaxies and conditions in the early universe. FUSE will be launched in 2000 into a 24-hour highly eccentric orbit. Science operations will be conducted in real time for 16-18 hours per day, in a manner similar to the operations performed today for the International Ultraviolet Explorer. In a radical departure from previous missions, the operations concept combines spacecraft and science operations and data processing functions in a single facility to be housed in the Laboratory for Astronomy and Solar Physics (Code 680). A small missions operations team will provide the spacecraft control, telescope operations and data handling functions in a facility designated as the Science and Mission Operations Center (SMOC). This approach will utilize the Transportable Payload Operations Control Center (TPOCC) architecture for both spacecraft and instrument commanding. Other concepts of integrated operations being developed by the Code 500 Renaissance Project will also be employed for the FUSE SMOC. The primary objective of this approach is to reduce development and mission operations costs. The operations concept, integration of mission and science operations, and extensive use of existing hardware and software tools will decrease both development and operations costs extensively. This paper describes the FUSE operations concept, discusses the systems engineering approach used for its development, and the software, hardware and management tools that will make its implementation feasible.

  2. In-Flight Operation of the Dawn Ion Propulsion System Through Survey Science Orbit at Ceres

    Science.gov (United States)

    Garner, Charles E.; Rayman, Marc D.

    2015-01-01

    The Dawn mission, part of NASA's Discovery Program, has as its goal the scientific exploration of the two most massive main-belt objects, Vesta and Ceres. The Dawn spacecraft was launched from the Cape Canaveral Air Force Station on September 27, 2007 on a Delta-II 7925H- 9.5 (Delta-II Heavy) rocket that placed the 1218-kg spacecraft onto an Earth-escape trajectory. On-board the spacecraft is an ion propulsion system (IPS) developed at the Jet Propulsion Laboratory which will provide a total delta V of 11 km/s for the heliocentric transfer to Vesta, orbit capture at Vesta, transfer between Vesta science orbits, departure and escape from Vesta, heliocentric transfer to Ceres, orbit capture at Ceres, and transfer between Ceres science orbits. Full-power thrusting from December 2007 through October 2008 was used to successfully target a Mars gravity assist flyby in February 2009 that provided an additional delta V of 2.6 km/s. Deterministic thrusting for the heliocentric transfer to Vesta resumed in June 2009 and concluded with orbit capture at Vesta on July 16, 2011. From July 2011 through September 2012 the IPS was used to transfer to all the different science orbits at Vesta and to escape from Vesta orbit. Cruise for a rendezvous with Ceres began in September 2012 and concluded with the start of the approach to Ceres phase on December 26, 2015, leading to orbit capture on March 6, 2015. Deterministic thrusting continued during approach to place the spacecraft in its first science orbit, called RC3, which was achieved on April 23, 2015. Following science operations at RC3 ion thrusting was resumed for twenty-five days leading to arrival to the next science orbit, called survey orbit, on June 3, 2015. The IPS will be used for all subsequent orbit transfers and trajectory correction maneuvers until completion of the primary mission in approximately June 2016. To date the IPS has been operated for over 46,774 hours, consumed approximately 393 kg of xenon, and provided

  3. The Strategy of Drone Warfare

    Directory of Open Access Journals (Sweden)

    Mike Fowler

    2014-12-01

    Full Text Available There is a budding controversy with the combat use of Remotely Piloted Aircraft (RPA. Also known as Unmanned Aerial Vehicles (UAV, there is a growing literature critiquing the use of RPAs, often using the pejorative term “drone.” RPAs seem to get the blame for a variety of complaints about policy and employment that have little to do with the airframe or its processes. While all of the military functions of an RPA can and are done by manned aircraft, the RPAs must endure additional scrutiny. The decision to employ RPAs requires additional considerations at both the strategic and operational levels of war. This article explores the strategic issues that govern the decisions to employ RPAs in combat. The decision to employ RPAs involves a variety of strategic and operational concerns involving legal issues, technological constraints, operational efficiency, and an interdependency upon information operations.

  4. Assessment of environments for Mars Science Laboratory entry, descent, and surface operations

    Science.gov (United States)

    Vasavada, Ashwin R.; Chen, Allen; Barnes, Jeffrey R.; Burkhart, P. Daniel; Cantor, Bruce A.; Dwyer-Cianciolo, Alicia M.; Fergason, Robini L.; Hinson, David P.; Justh, Hilary L.; Kass, David M.; Lewis, Stephen R.; Mischna, Michael A.; Murphy, James R.; Rafkin, Scot C.R.; Tyler, Daniel; Withers, Paul G.

    2012-01-01

    The Mars Science Laboratory mission aims to land a car-sized rover on Mars' surface and operate it for at least one Mars year in order to assess whether its field area was ever capable of supporting microbial life. Here we describe the approach used to identify, characterize, and assess environmental risks to the landing and rover surface operations. Novel entry, descent, and landing approaches will be used to accurately deliver the 900-kg rover, including the ability to sense and "fly out" deviations from a best-estimate atmospheric state. A joint engineering and science team developed methods to estimate the range of potential atmospheric states at the time of arrival and to quantitatively assess the spacecraft's performance and risk given its particular sensitivities to atmospheric conditions. Numerical models are used to calculate the atmospheric parameters, with observations used to define model cases, tune model parameters, and validate results. This joint program has resulted in a spacecraft capable of accessing, with minimal risk, the four finalist sites chosen for their scientific merit. The capability to operate the landed rover over the latitude range of candidate landing sites, and for all seasons, was verified against an analysis of surface environmental conditions described here. These results, from orbital and model data sets, also drive engineering simulations of the rover's thermal state that are used to plan surface operations.

  5. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  6. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  7. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  8. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  9. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  10. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  11. Complexity Theory and Network Centric Warfare

    Science.gov (United States)

    2003-09-01

    in Surface Growth. Cambridge University Press. Cambridge, UK. 10 MANDELBROT B (1997). Fractals and Scaling in Finance . Springer-Verlag. 11 TURNER A...to Econophysics; Correlations and Complexity in Finance . Cambridge University Press. Cambridge, UK. ADDITIONAL REFERENCE 14 PEITGEN H-O, JURGENS H...realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP

  12. STORMVEX: The Storm Peak Lab Cloud Property Validation Experiment Science and Operations Plan

    Energy Technology Data Exchange (ETDEWEB)

    Mace, J; Matrosov, S; Shupe, M; Lawson, P; Hallar, G; McCubbin, I; Marchand, R; Orr, B; Coulter, R; Sedlacek, A; Avallone, L; Long, C

    2010-09-29

    During the Storm Peak Lab Cloud Property Validation Experiment (STORMVEX), a substantial correlative data set of remote sensing observations and direct in situ measurements from fixed and airborne platforms will be created in a winter season, mountainous environment. This will be accomplished by combining mountaintop observations at Storm Peak Laboratory and the airborne National Science Foundation-supported Colorado Airborne Multi-Phase Cloud Study campaign with collocated measurements from the second ARM Mobile Facility (AMF2). We describe in this document the operational plans and motivating science for this experiment, which includes deployment of AMF2 to Steamboat Springs, Colorado. The intensive STORMVEX field phase will begin nominally on 1 November 2010 and extend to approximately early April 2011.

  13. Status report on the land processes aircraft science management operations working group

    Science.gov (United States)

    Lawless, James G.; Mann, Lisa J.

    1991-01-01

    Since its inception three years ago, the Land Processes Aircraft Science Management Operations Working Group (MOWG) provided recommendations on the optimal use of the Agency's aircraft in support of the Land Processes Science Program. Recommendations covered topics such as aircraft and sensor usage, development of long-range plans, Multisensor Airborne Campaigns (MAC), program balance, aircraft sensor databases, new technology and sensor development, and increased University scientist participation in the program. Impacts of these recommendations improved the efficiency of various procedures including the flight request process, tracking of flight hours, and aircraft usage. The group also created a bibliography focused on publications produced by Land Processes scientists from the use of the aircraft program, surveyed NASA funded PI's on their participation in the aircraft program, and developed a planning template for multi-sensor airborne campaigns. Benefits from these activities are summarized.

  14. A shared-world conceptual model for integrating space station life sciences telescience operations

    Science.gov (United States)

    Johnson, Vicki; Bosley, John

    1988-01-01

    Mental models of the Space Station and its ancillary facilities will be employed by users of the Space Station as they draw upon past experiences, perform tasks, and collectively plan for future activities. The operational environment of the Space Station will incorporate telescience, a new set of operational modes. To investigate properties of the operational environment, distributed users, and the mental models they employ to manipulate resources while conducting telescience, an integrating shared-world conceptual model of Space Station telescience is proposed. The model comprises distributed users and resources (active elements); agents who mediate interactions among these elements on the basis of intelligent processing of shared information; and telescience protocols which structure the interactions of agents as they engage in cooperative, responsive interactions on behalf of users and resources distributed in space and time. Examples from the life sciences are used to instantiate and refine the model's principles. Implications for transaction management and autonomy are discussed. Experiments employing the model are described which the authors intend to conduct using the Space Station Life Sciences Telescience Testbed currently under development at Ames Research Center.

  15. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  16. Materials Science Research Rack Onboard the International Space Station Hardware and Operations

    Science.gov (United States)

    Lehman, John R.; Frazier, Natalie C.; Johnson, Jimmie

    2012-01-01

    The Materials Science Research Rack (MSRR) is a research facility developed under a cooperative research agreement between NASA and ESA for materials science investigations on the International Space Station (ISS). MSRR was launched on STS-128 in August 2009, and is currently installed in the U.S. Destiny Laboratory Module. Since that time, MSRR has performed virtually flawlessly, logging more than 620 hours of operating time. The MSRR accommodates advanced investigations in the microgravity environment on the ISS for basic materials science research in areas such as solidification of metals and alloys. The purpose is to advance the scientific understanding of materials processing as affected by microgravity and to gain insight into the physical behavior of materials processing. MSRR allows for the study of a variety of materials including metals, ceramics, semiconductor crystals, and glasses. Materials science research benefits from the microgravity environment of space, where the researcher can better isolate chemical and thermal properties of materials from the effects of gravity. With this knowledge, reliable predictions can be made about the conditions required on Earth to achieve improved materials. MSRR is a highly automated facility with a modular design capable of supporting multiple types of investigations. Currently the NASA-provided Rack Support Subsystem provides services (power, thermal control, vacuum access, and command and data handling) to the ESA developed Materials Science Laboratory (MSL) which accommodates interchangeable Furnace Inserts (FI). Two ESA-developed FIs are presently available on the ISS: the Low Gradient Furnace (LGF) and the Solidification and Quenching Furnace (SQF). Sample-Cartridge Assemblies (SCAs), each containing one or more material samples, are installed in the FI by the crew and can be processed at temperatures up to 1400 C. Once an SCA is installed, the experiment can be run by automatic command or science conducted via

  17. Report of the Defense Science Board Summer Study Task Force on Information Architecture for the Battlefield

    Science.gov (United States)

    1994-10-01

    information warfare has many elements, some new, some old, which interrelate in complex ways. Some are: "• Psychological operations and perception...and information systems." Some aspects of Information Warfare are very old - for example, what we now call Psychological Operations. Some are...Communications, and Intelligence) ASOC Air Support Operations Center ASTEC Advanced Satellite Technology and EHF Communications ATARS Advanced Tactical

  18. German Views of Irregular Warfare

    Science.gov (United States)

    2015-06-01

    retreated westward following the invasion of Russia. Karl Marx , in an 1849 speech, emphasized, A nation, fighting for its liberty, ought not to adhere...characterized these forces. “Irregular” forces, on the other hand, fell outside of such characterizations and state subordination. 82 Karl von Clausewitz, On...operations. Of note, this edition of On War uses “ Karl ” instead of “Carl.” 28 Tyrolean uprising (1809), and the Spanish insurrection and Peninsula

  19. SkyProbeBV: dual-color absolute sky transparency monitor to optimize science operations

    Science.gov (United States)

    Cuillandre, Jean-Charles; Magnier, Eugene; Sabin, Dan; Mahoney, Billy

    2008-07-01

    Mauna Kea (4200 m elevation, Hawaii) is known for its pristine seeing conditions, but sky transparency can be an issue for science operations: 25% of the nights are not photometric, a cloud coverage mostly due to high-altitude thin cirrus. The Canada-France-Hawaii Telescope (CFHT) is upgrading its real-time sky transparency monitor in the optical domain (V-band) into a dual-color system by adding a B-band channel and redesigning the entire optical and mechanical assembly. Since 2000, the original single-channel SkyProbe has gathered one exposure every minute during each observing night using a small CCD camera with a very wide field of view (35 sq. deg.) encompassing the region pointed by the telescope for science operations, and exposures long enough (30 seconds) to capture at least 100 stars of Hipparcos' Tychos catalog at high galactic latitudes (and up to 600 stars at low galactic latitudes). A key advantage of SkyProbe over direct thermal infrared imaging detection of clouds, is that it allows an accurate absolute measurement, within 5%, of the true atmospheric absorption by clouds affecting the data being gathered by the telescope's main science instrument. This system has proven crucial for decision making in the CFHT queued service observing (QSO), representing today 95% of the telescope time: science exposures taken in non-photometric conditions are automatically registered for being re-observed later on (at 1/10th of the original exposure time per pointing in the observed filters) to ensure a proper final absolute photometric calibration. If the absorption is too high, exposures can be repeated, or the observing can be done for a lower ranked science program. The new dual color system (simultaneous B & V bands) will allow a better characterization of the sky properties above Mauna Kea and should enable a better detection of the thinner cirrus (absorption down to 0.02 mag., i.e. 2%). SkyProbe is operated within the Elixir pipeline, a collection of tools

  20. Operation of micro and molecular machines: a new concept with its origins in interface science.

    Science.gov (United States)

    Ariga, Katsuhiko; Ishihara, Shinsuke; Izawa, Hironori; Xia, Hong; Hill, Jonathan P

    2011-03-21

    A landmark accomplishment of nanotechnology would be successful fabrication of ultrasmall machines that can work like tweezers, motors, or even computing devices. Now we must consider how operation of micro- and molecular machines might be implemented for a wide range of applications. If these machines function only under limited conditions and/or require specialized apparatus then they are useless for practical applications. Therefore, it is important to carefully consider the access of functionality of the molecular or nanoscale systems by conventional stimuli at the macroscopic level. In this perspective, we will outline the position of micro- and molecular machines in current science and technology. Most of these machines are operated by light irradiation, application of electrical or magnetic fields, chemical reactions, and thermal fluctuations, which cannot always be applied in remote machine operation. We also propose strategies for molecular machine operation using the most conventional of stimuli, that of macroscopic mechanical force, achieved through mechanical operation of molecular machines located at an air-water interface. The crucial roles of the characteristics of an interfacial environment, i.e. connection between macroscopic dimension and nanoscopic function, and contact of media with different dielectric natures, are also described.

  1. 4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy Collaboration in Intelligence, Surveillance, and Reconnaissance (ISR), Electronic Warfare (EW)/Cyber and Combat Identification (CID)

    Science.gov (United States)

    2016-10-27

    across disciplines that might yield significant benefits if their relationships were better understood. 9 Approved for public release; distribution is... benefit from reading a common narrative with detailed operational situations that might offer a tangible and memorable set of references that would...north to the ocean. This cold black knuckle of ancient rock was the tip of some submerged coastal mountain, and he liked to hike out to it and

  2. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  3. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  4. Challenges for Transitioning Science Knowledge to an Operational Environment for Space Weather

    Science.gov (United States)

    Spann, James

    2012-01-01

    Effectively transitioning science knowledge to an operational environment relevant to space weather is critical to meet the civilian and defense needs, especially considering how technologies are advancing and present evolving susceptibilities to space weather impacts. The effort to transition scientific knowledge to a useful application is not a research task nor is an operational activity, but an effort that bridges the two. Successful transitioning must be an intentional effort that has a clear goal for all parties and measureable outcome and deliverable. This talk will present proven methodologies that have been demonstrated to be effective for terrestrial weather and disaster relief efforts, and how those methodologies can be applied to space weather transition efforts.

  5. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  6. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  7. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  8. Generic procedure for designing and implementing plan management systems for space science missions operations

    Science.gov (United States)

    Chaizy, P. A.; Dimbylow, T. G.; Allan, P. M.; Hapgood, M. A.

    2011-09-01

    This paper is one of the components of a larger framework of activities whose purpose is to improve the performance and productivity of space mission systems, i.e. to increase both what can be achieved and the cost effectiveness of this achievement. Some of these activities introduced the concept of Functional Architecture Module (FAM); FAMs are basic blocks used to build the functional architecture of Plan Management Systems (PMS). They also highlighted the need to involve Science Operations Planning Expertise (SOPE) during the Mission Design Phase (MDP) in order to design and implement efficiently operation planning systems. We define SOPE as the expertise held by people who have both theoretical and practical experience in operations planning, in general, and in space science operations planning in particular. Using ESA's methodology for studying and selecting science missions we also define the MDP as the combination of the Mission Assessment and Mission Definition Phases. However, there is no generic procedure on how to use FAMs efficiently and systematically, for each new mission, in order to analyse the cost and feasibility of new missions as well as to optimise the functional design of new PMS; the purpose of such a procedure is to build more rapidly and cheaply such PMS as well as to make the latter more reliable and cheaper to run. This is why the purpose of this paper is to provide an embryo of such a generic procedure and to show that the latter needs to be applied by people with SOPE during the MDP. The procedure described here proposes some initial guidelines to identify both the various possible high level functional scenarii, for a given set of possible requirements, and the information that needs to be associated with each scenario. It also introduces the concept of catalogue of generic functional scenarii of PMS for space science missions. The information associated with each catalogued scenarii will have been identified by the above procedure and

  9. Pairing Essential Climate Science with Sustainable Energy Information: the "EARTH-The Operators' Manual" experiment

    Science.gov (United States)

    Akuginow, E.; Alley, R. B.; Haines-Stiles, G.

    2010-12-01

    Social science research on the effective communication of climate science suggests that today's audiences may be effectively engaged by presenting information about Earth's climate in the context of individual and community actions that can be taken to increase energy efficiency and to reduce carbon emissions. "EARTH-The Operators' Manual" (ETOM) is an informal science education and outreach project supported by NSF, comprising three related components: a 3-part broadcast television mini-series; on-site outreach at 5 major science centers and natural history museums strategically located across the USA; and a website with innovative social networking tools. A companion tradebook, written by series presenter and Penn State glaciologist Richard Alley, is to be published by W. W. Norton in spring 2011. Program 1, THE BURNING QUESTION, shows how throughout human history our need for energy has been met by burning wood, whale oil and fossil fuels, but notes that fossil fuels produce carbon dioxide which inevitably change the composition of Earth's atmosphere. The program uses little known stories (such as US Air Force atmospheric research immediately after WW2, looking at the effect of CO2 levels on heat-seeking missiles, and Abraham Lincoln's role in the founding of the National Academy of Sciences and the Academy's role in solving navigation problems during the Civil War) to offer fresh perspectives on essential but sometimes disputed aspects of climate science: that today's levels of CO2 are unprecedented in the last 400,000 and more years; that human burning of fossil fuel is the scientifically-proven source, and that multiple lines of evidence show Earth is warming. Program 2, TEN WAYS TO KEEP TEN BILLION SMILING, offers a list of appealing strategies (such as "Get Rich and Save the World": Texas & wind energy, and "Do More with Less": how glow worms make cool light without waste heat, suggesting a role for organic LEDs) to motivate positive responses to the

  10. Web Monitoring of EOS Front-End Ground Operations, Science Downlinks and Level 0 Processing

    Science.gov (United States)

    Cordier, Guy R.; Wilkinson, Chris; McLemore, Bruce

    2008-01-01

    This paper addresses the efforts undertaken and the technology deployed to aggregate and distribute the metadata characterizing the real-time operations associated with NASA Earth Observing Systems (EOS) high-rate front-end systems and the science data collected at multiple ground stations and forwarded to the Goddard Space Flight Center for level 0 processing. Station operators, mission project management personnel, spacecraft flight operations personnel and data end-users for various EOS missions can retrieve the information at any time from any location having access to the internet. The users are distributed and the EOS systems are distributed but the centralized metadata accessed via an external web server provide an effective global and detailed view of the enterprise-wide events as they are happening. The data-driven architecture and the implementation of applied middleware technology, open source database, open source monitoring tools, and external web server converge nicely to fulfill the various needs of the enterprise. The timeliness and content of the information provided are key to making timely and correct decisions which reduce project risk and enhance overall customer satisfaction. The authors discuss security measures employed to limit access of data to authorized users only.

  11. Defense Science Board 1998 Summer Study. Joint Operations Superiority in the 21st Century: Integrating Capabilities Underwriting Joint Vision 2010 and Beyond. Volume 2: Supporting Reports

    National Research Council Canada - National Science Library

    1998-01-01

    .... These supporting challenges include assured knowledge superiority, responsive global targeting, exploitation of the littoral battlespace, inter- and intra-theater mobility, coalition warfare, force...

  12. Terry Turbopump Expanded Operating Band Full-Scale Component and Basic Science Detailed Test Plan-Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Solom, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Severe Accident Analysis Dept.; Ross, Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Severe Accident Analysis Dept.; Cardoni, Jeffrey N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Severe Accident Analysis Dept.; Osborn, Douglas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Severe Accident Analysis Dept.

    2017-08-01

    This document details the milestone approach to define the true operating limitations (margins) of the Terry turbopump systems used in the nuclear industry for Milestone 3 (full-scale component experiments) and Milestone 4 (Terry turbopump basic science experiments) efforts. The overall multinational-sponsored program creates the technical basis to: (1) reduce and defer additional utility costs, (2) simplify plant operations, and (3) provide a better understanding of the true margin which could reduce overall risk of operations.

  13. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  14. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  15. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  16. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  17. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  18. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  19. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  20. Processing of Mars Exploration Rover Imagery for Science and Operations Planning

    Science.gov (United States)

    Alexander, Douglass A.; Deen, Robert G.; Andres, Paul M.; Zamani, Payam; Mortensen, Helen B.; Chen, Amy C.; Cayanan, Michael K.; Hall, Jeffrey R.; Klochko, Vadim S.; Pariser, Oleg; hide

    2006-01-01

    The twin Mars Exploration Rovers (MER) delivered an unprecedented array of image sensors to the Mars surface. These cameras were essential for operations, science, and public engagement. The Multimission Image Processing Laboratory (MIPL) at the Jet Propulsion Laboratory was responsible for the first-order processing of all of the images returned by these cameras. This processing included reconstruction of the original images, systematic and ad hoc generation of a wide variety of products derived from those images, and delivery of the data to a variety of customers, within tight time constraints. A combination of automated and manual processes was developed to meet these requirements, with significant inheritance from prior missions. This paper describes the image products generated by MIPL for MER and the processes used to produce and deliver them.

  1. EO-1/Hyperion: Nearing Twelve Years of Successful Mission Science Operation and Future Plans

    Science.gov (United States)

    Middleton, Elizabeth M.; Campbell, Petya K.; Huemmrich, K. Fred; Zhang, Qingyuan; Landis, David R.; Ungar, Stephen G.; Ong, Lawrence; Pollack, Nathan H.; Cheng, Yen-Ben

    2012-01-01

    The Earth Observing One (EO-1) satellite is a technology demonstration mission that was launched in November 2000, and by July 2012 will have successfully completed almost 12 years of high spatial resolution (30 m) imaging operations from a low Earth orbit. EO-1 has two unique instruments, the Hyperion and the Advanced Land Imager (ALI). Both instruments have served as prototypes for NASA's newer satellite missions, including the forthcoming (in early 2013) Landsat-8 and the future Hyperspectral Infrared Imager (HyspIRI). As well, EO-1 is a heritage platform for the upcoming German satellite, EnMAP (2015). Here, we provide an overview of the mission, and highlight the capabilities of the Hyperion for support of science investigations, and present prototype products developed with Hyperion imagery for the HyspIRI and other space-borne spectrometers.

  2. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  3. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  4. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  5. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  6. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  7. The flyby of Rosetta at asteroid Šteins - mission and science operations

    Science.gov (United States)

    Accomazzo, Andrea; Wirth, Kristin R.; Lodiot, Sylvain; Küppers, Michael; Schwehm, Gerhard

    2010-07-01

    The international Rosetta mission, a cornerstone mission of the european space agency scientific Programme, was launched on 2nd March 2004 on its 10 years journey towards a rendezvous with comet Churyumov-Gerasimenko ( Gardini et al., 1999). During its interplanetary flight towards its target Rosetta crosses the asteroid belt twice with the opportunity to observe at close quarters two asteroids: (2867)-Šteins in 2008 and (21)-Lutetia in 2010. The spacecraft design was such that these opportunities could be fully exploited to deliver valuable data to the scientific community. The mission trajectory was controlled such that Rosetta would fly next to asteroid Šteins on the 5th of September 2008 with a relative speed of 8.6 km/s at a minimum distance of 800 km. Mission operations have been carefully planned to achieve the best possible flyby scenario and scientific outcome. The flyby scenario, the optical navigation campaign, and the planning of the scientific observations had to be adapted by the Mission and the Science Operations Centres to the demanding requirements expressed by the scientific community. The flyby was conducted as planned with a large number of successful observations.

  8. EOS Aqua: Mission Status at the Earth Science Constellation (ESC) Mission Operations Working Group (MOWG) Meeting at the Kennedy Space Center (KSC)

    Science.gov (United States)

    Guit, Bill

    2017-01-01

    This presentation at the Earth Science Constellation Mission Operations Working Group meeting at KSC in December 2017 to discuss EOS (Earth Observing System) Aqua Earth Science Constellation status. Reviewed and approved by Eric Moyer, ESMO (Earth Science Mission Operations) Deputy Project Manager.

  9. Operational Planning for Theater Anti-Submarine Warfare

    Science.gov (United States)

    2017-03-01

    or P-8 as a supplementary platform to a ship or sub and never assigned to search alone . This thesis allows the MPRA to search alone and has 10 a...Marina, I will truly miss sitting in class with you guys wondering what a basis is. Finally, to my dog, Dougie: thank you for not eating my homework...can have trouble searching and tracking one submarine, let alone multiple submarines in different regions or mission areas. B. LITERATURE REVIEW

  10. Zarqawi’s Sfumato: Operational Art in Irregular Warfare

    Science.gov (United States)

    2013-05-23

    in Baghdad and Karbala during the Shia festival of Ashura in March of 2004.80 These attacks were preceded by the bombing of the Jordanian embassy...American contractors Nick Berg and Eugene Armstrong. Zarqawi released edited videos with music and logos detailing multiple suicide bombings against

  11. General Urban Warfare Amphibious Logistics Applications. Volume 4. Operational Plans.

    Science.gov (United States)

    1983-06-23

    coastal community , S ""B-7-A-7 UNCLASSIFIED 2- K Q - - ---. - UNCLASSIFIED north of SYN City, at EIO5-N113.5 on the 200 km supplemental map and tracks...becomes a minor, unimproved road extending from SYN City to the coastal community . Convoy movement will be canalized by the ocean to the east and...HLZ, providing access to the coastal community . j. Adjacent Terrain. The HLZ is opposed to the north by a small community backed by lowland coastal

  12. General Urban Warfare Amphibious Logistics Applications. Volume 2. Operations Plan.

    Science.gov (United States)

    1983-06-23

    accordance with Joint Uniform Military Pay System procedures. (3) Control of Financial Institutions. See Force 0 7200.1. (4) Inspection and Audit . Conducted...1CA -- z; a ex r-- - C.’ on~ oCa a 10. 6 Z OZOOOOO 0 0.CCi- ~~flflfl1 Ce aA~ aC0i0SCCS- do.C. m ca f Cit U - CaS.Li CCL*n 0LLaJ ACCA CU ZC CS. . C CA

  13. Information Operations and Asymmetric Warfare...Are We Ready?

    National Research Council Canada - National Science Library

    Patterson, LaWarren

    2002-01-01

    .... These in turn raise passions and compel people to rethink their own closely held beliefs, prejudices and hatreds, and in some cases morphing into actions such as espionage, sabotage or terrorism...

  14. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    1979; Tilly 1978), civil war termination (Walter 1997; Licklider 1993), the political and social consequences of civil war ( Rich and Stubbs 1997), the...from two challenges in the literature. First, scholarship on religious terrorism tends to focus on one particular motivation— apocalyptic, millennial ...factors that motivate some members of ethnic minorities to become radicalized, to form activist organizations, and to move from conventional means

  15. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  16. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  17. The technology and science of steady-state operation in magnetically confined plasmas

    International Nuclear Information System (INIS)

    Becoulet, A; Hoang, G T

    2008-01-01

    The steady-state operation of magnetically confined fusion plasmas is considered as one of the 'grand challenges' of future decades, if not the ultimate goal of the research and development activities towards a new source of energy. Reaching such a goal requires the high-level integration of both science and technology aspects of magnetic fusion into self-consistent plasma regimes in fusion-grade devices. On the physics side, the first constraint addresses the magnetic confinement itself which must be made persistent. This means to either rely on intrinsically steady-state configurations, like the stellarator one, or turn the inductively driven tokamak configuration into a fully non-inductive one, through a mix of additional current sources. The low efficiency of the external current drive methods and the necessity to minimize the re-circulating power claim for a current mix strongly weighted by the internal 'pressure driven' bootstrap current, itself strongly sensitive to the heat and particle transport properties of the plasma. A virtuous circle may form as the heat and particle transport properties are themselves sensitive to the current profile conditions. Note that several other factors, e.g. plasma rotation profile, magneto-hydro-dynamics activity, also influence the equilibrium state. In the present tokamak devices, several examples of such 'advanced tokamak' physics research demonstrate the feasibility of steady-state regimes, though with a number of open questions still under investigation. The modelling activity also progresses quite fast in this domain and supports understanding and extrapolation. This high level of physics sophistication of the plasma scenario however needs to be combined with steady-state technological constraints. The technology constraints for steady-state operation are basically twofold: the specific technologies required to reach the steady-state plasma conditions and the generic technologies linked to the long pulse operation of a

  18. Modeling Methodologies for Representing Urban Cultural Geographies in Stability Operations

    National Research Council Canada - National Science Library

    Ferris, Todd P

    2008-01-01

    ... 2.0.0, in an effort to provide modeling methodologies for a single simulation tool capable of exploring the complex world of urban cultural geographies undergoing Stability Operations in an irregular warfare (IW) environment...

  19. Combat Training Centers: Training for Full-Spectrum Operations?

    National Research Council Canada - National Science Library

    Diano, Oscar F

    2007-01-01

    The changing strategic environment has necessitated a shift in Army training from traditional maneuver warfare to full-spectrum operations to defeat irregular, catastrophic, and disruptive challenges more effectively...

  20. Contributions of Women to U.S. Combat Operations

    National Research Council Canada - National Science Library

    Burnes, Thresa

    2008-01-01

    .... combat operations from the Revolutionary War to present-day conflicts. The U.S. military continues to fight a transnational, dispersed enemy that employs irregular tactics and asymmetric warfare...

  1. GIS applications for military operations in coastal zones

    Science.gov (United States)

    Fleming, S.; Jordan, T.; Madden, M.; Usery, E.L.; Welch, R.

    2009-01-01

    In order to successfully support current and future US military operations in coastal zones, geospatial information must be rapidly integrated and analyzed to meet ongoing force structure evolution and new mission directives. Coastal zones in a military-operational environment are complex regions that include sea, land and air features that demand high-volume databases of extreme detail within relatively narrow geographic corridors. Static products in the form of analog maps at varying scales traditionally have been used by military commanders and their operational planners. The rapidly changing battlefield of 21st Century warfare, however, demands dynamic mapping solutions. Commercial geographic information system (GIS) software for military-specific applications is now being developed and employed with digital databases to provide customized digital maps of variable scale, content and symbolization tailored to unique demands of military units. Research conducted by the Center for Remote Sensing and Mapping Science at the University of Georgia demonstrated the utility of GIS-based analysis and digital map creation when developing large-scale (1:10,000) products from littoral warfare databases. The methodology employed-selection of data sources (including high resolution commercial images and Lidar), establishment of analysis/modeling parameters, conduct of vehicle mobility analysis, development of models and generation of products (such as a continuous sea-land DEM and geo-visualization of changing shorelines with tidal levels)-is discussed. Based on observations and identified needs from the National Geospatial-Intelligence Agency, formerly the National Imagery and Mapping Agency, and the Department of Defense, prototype GIS models for military operations in sea, land and air environments were created from multiple data sets of a study area at US Marine Corps Base Camp Lejeune, North Carolina. Results of these models, along with methodologies for developing large

  2. Potential of future operational missions sentinel 4 and 5 for atmospheric monitoring and science (CAMELOT).

    Science.gov (United States)

    Levelt, P. F.; Veefkind, J. P.

    2010-05-01

    Dedicated atmospheric chemistry observations from space have been made for over 30 years now, starting with the SBUV and TOMS measurements of the ozone layer. Since then huge progress has been made, improving the accuracy of the measurements, extending the amount of constituents, and by sensing not only the stratosphere, but the last five to ten years also the troposphere. The potential to operational monitor the atmosphere, following the meteorological community, came within reach. At the same time, the importance for society of regular operational environmental measurements, related to the ozone layer, air quality and climate change, became apparent, amongst others resulting in the EU initiative Global Monitoring for Environment and Security (GMES) In order to prepare the operational missions in the context of the GMES, ESA took the initiative to further study the user requirements for the Sentinel 4 and 5 (precursor) missions. The Sentinel 4 and 5 (precursor) missions are dedicated operational missions to monitor the atmospheric composition in the 2013-2020 timeframe and onward. The user requirements for the sentinel missions focus on monitoring the atmosphere from an environmental point of view (ozone layer, air quality and climate). ESA's CAMELOT (Composition of the Atmospheric Mission concEpts and SentineL Observation Techniques) study is the follow-on study to ESA's CAPACITY study finished in 2005. The general objective of the CAMELOT study is to further contribute to the definition of the air quality and climate protocol monitoring parts of the GMES Sentinel 4 and 5 missions. CAMELOT consists of a large European consortium formed by 9 European institutes (KNMI (lead), RAL, U.Leicester, SRON, FMI, BIRA-IASB, CNR-IFAC,NOVELTIS and RIU-U.Koeln). In the presentation an overview will give a short overview of the CAMELOT study, including some specific results for combined retrievals, cloud statistics for different orbit geometries and retrievals for several orbit

  3. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    Science.gov (United States)

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  4. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  6. Grasping and Placing Operation for Labware Transportation in Life Science Laboratories using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Mohammed Myasar Ali

    2017-07-01

    Full Text Available In automated working environments, mobile robots can be used for different purposes such as material handling, domestic services, and objects transportation. This work presents a grasping and placing operation for multiple labware and tube racks in life science laboratories using the H20 mobile robots. The H20 robot has dual arms where each arm consists of 6 revolute joints with 6-DOF and 2-DOF grippers. The labware, which have to be manipulated and transported, contain chemical and biological components. Therefore, an accurate approach for object recognition and position estimation is required. The recognition and pose estimation of the desired objects are very essential to guide the robotic arm in the manipulation tasks. In this work, the problem statement of H20 transportation system with the proposed methodology are presented. Different strategies (visual and non-visual of labware manipulation using mobile robots are described. The H20 robot is equipped with a Kinect V2 sensor to identify and estimate the position of the target. The local features recognition based on SURF algorithm (Speeded-Up Robust Features is used. The recognition process is performed for the required labware and holder to perform the grasping and placing operation. A strategy is proposed to find the required holder and to check its emptiness for the placing tasks. Different styles of grippers and labware containers are used to manipulate different weights of labware and to realize a safe transportation. The parts of mobile robot transportation system are communicated with each other using Asynchronous socket Channels.

  7. Applying design thinking concepts to rejuvenate the discipline of operations research/ management science

    CSIR Research Space (South Africa)

    Viljoen, NM

    2009-10-01

    Full Text Available problems, thereby bridging the gap between Management Science and Management Consulting. Instead of flogging the proponents of the Management Science domain for losing touch with reality through their “mathematical masturbation" (Ackoff [1]), Corbett...

  8. 77 FR 41185 - Notification of Public Teleconferences of the Science Advisory Board Animal Feeding Operations...

    Science.gov (United States)

    2012-07-12

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9699-7] Notification of Public Teleconferences of the Science...). ACTION: Notice. SUMMARY: The Environmental Protection Agency (EPA or Agency) Science Advisory Board (SAB... concerning the EPA Science Advisory Board can be found at the EPA SAB Web site at http://www.epa.gov/sab...

  9. Solar Flare Prediction Science-to-Operations: the ESA/SSA SWE A-EFFort Service

    Science.gov (United States)

    Georgoulis, Manolis K.; Tziotziou, Konstantinos; Themelis, Konstantinos; Magiati, Margarita; Angelopoulou, Georgia

    2016-07-01

    We attempt a synoptical overview of the scientific origins of the Athens Effective Solar Flare Forecasting (A-EFFort) utility and the actions taken toward transitioning it into a pre-operational service of ESA's Space Situational Awareness (SSA) Programme. The preferred method for solar flare prediction, as well as key efforts to make it function in a fully automated environment by coupling calculations with near-realtime data-downloading protocols (from the Solar Dynamics Observatory [SDO] mission), pattern recognition (solar active-region identification) and optimization (magnetic connectivity by simulated annealing) will be highlighted. In addition, the entire validation process of the service will be described, with its results presented. We will conclude by stressing the need for across-the-board efforts and synergistic work in order to bring science of potentially limited/restricted interest into realizing a much broader impact and serving the best public interests. The above presentation was partially supported by the ESA/SSA SWE A-EFFort project, ESA Contract No. 4000111994/14/D/MRP. Special thanks go to the ESA Project Officers R. Keil, A. Glover, and J.-P. Luntama (ESOC), M. Bobra and C. Balmer of the SDO/HMI team at Stanford University, and M. Zoulias at the RCAAM of the Academy of Athens for valuable technical help.

  10. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  11. Research at and Operation of the Materials Science Beamline (X-11) at the National Synchrotron Light Source. Final Report

    International Nuclear Information System (INIS)

    Sayers, Dale E.

    2003-01-01

    This is the final report for DOE DE-FG02-89ER45384. An overview of the operational history and status of beamline X-11A at the end of the contract period, and a brief review of the core science program at NCSU and the scientific results of X-11A since the last progress report is also presented

  12. Is science the driving force in the operation of environmental regimes? : A case study of the Mediterranean Action Plan

    NARCIS (Netherlands)

    Frantzi, Sofia; Lovett, Jonathan Cranidge

    2008-01-01

    This study examines the role of science in the operation of environmental regimes using the Barcelona Convention/Mediterranean Action Plan (MAP) as a case study. The ‘epistemic communities’ theory suggests that emergence of the Mediterranean Action Plan was largely driven by scientific experts. In

  13. Is science the driving force in the operation of environmental regimes? A case study of the Mediterranean Action Plan

    NARCIS (Netherlands)

    Frantzi, Sofia; Lovett, Jonathan Cranidge

    2008-01-01

    This study examines the role of science in the operation of environmental regimes using the Barcelona Convention/Mediterranean Action Plan (MAP) as a case study. The ‘epistemic communities’ theory suggests that emergence of the Mediterranean Action Plan was largely driven by scientific experts. In

  14. Is science the driving force in the operation of environmental regimes? A case study of the Mediterranean Action Plan

    NARCIS (Netherlands)

    Frantzi, S.; Lovett, J.C.

    2008-01-01

    This study examines the role of science in the operation of environmental regimes using the Barcelona Convention/Mediterranean Action Plan (MAP) as a case study. The 'epistemic communities' theory suggests that emergence of the Mediterranean Action Plan was largely driven by scientific experts. In

  15. In-Situ Operations and Planning for the Mars Science Laboratory Robotic Arm: The First 200 Sols

    Science.gov (United States)

    Robinson, M.; Collins, C.; Leger, P.; Carsten, J.; Tompkins, V.; Hartman, F.; Yen, J.

    2013-01-01

    The Robotic Arm (RA) has operated for more than 200 Martian solar days (or sols) since the Mars Science Laboratory rover touched down in Gale Crater on August 5, 2012. During the first seven months on Mars the robotic arm has performed multiple contact science sols including the positioning of the Alpha Particle X-Ray Spectrometer (APXS) and/or Mars Hand Lens Imager (MAHLI) with respect to rocks or loose regolith targets. The RA has supported sample acquisition using both the scoop and drill, sample processing with CHIMRA (Collection and Handling for In- Situ Martian Rock Analysis), and delivery of sample portions to the observation tray, and the SAM (Sample Analysis at Mars) and CHEMIN (Chemistry and Mineralogy) science instruments. This paper describes the planning and execution of robotic arm activities during surface operations, and reviews robotic arm performance results from Mars to date.

  16. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  17. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  18. Technical Challenges and Opportunities of Centralizing Space Science Mission Operations (SSMO) at NASA Goddard Space Flight Center

    Science.gov (United States)

    Ido, Haisam; Burns, Rich

    2015-01-01

    The NASA Goddard Space Science Mission Operations project (SSMO) is performing a technical cost-benefit analysis for centralizing and consolidating operations of a diverse set of missions into a unified and integrated technical infrastructure. The presentation will focus on the notion of normalizing spacecraft operations processes, workflows, and tools. It will also show the processes of creating a standardized open architecture, creating common security models and implementations, interfaces, services, automations, notifications, alerts, logging, publish, subscribe and middleware capabilities. The presentation will also discuss how to leverage traditional capabilities, along with virtualization, cloud computing services, control groups and containers, and possibly Big Data concepts.

  19. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  20. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    International Nuclear Information System (INIS)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A.; Davis, Erin Durke

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications

  1. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  2. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  3. The translational science training program at NIH: Introducing early career researchers to the science and operation of translation of basic research to medical interventions.

    Science.gov (United States)

    Gilliland, C Taylor; Sittampalam, G Sitta; Wang, Philip Y; Ryan, Philip E

    2017-01-02

    Translational science is an emerging field that holds great promise to accelerate the development of novel medical interventions. As the field grows, so does the demand for highly trained biomedical scientists to fill the positions that are being created. Many graduate and postdoctorate training programs do not provide their trainees with sufficient education to take advantage of this growing employment sector. To help better prepare the trainees at the National Institutes of Health for possible careers in translation, we have created the Translational Science Training Program (TSTP). The TSTP is an intensive 2- to 3-day training program that introduces NIH postdoctoral trainees and graduate students to the science and operation of turning basic research discoveries into a medical therapeutic, device or diagnostic, and also exposes them to the variety of career options in translational science. Through a combination of classroom teaching from practicing experts in the various disciplines of translation and small group interactions with pre-clinical development teams, participants in the TSTP gain knowledge that will aid them in obtaining a career in translational science and building a network to make the transition to the field. © 2016 by The International Union of Biochemistry and Molecular Biology, 45(1):13-24, 2017. © 2016 The International Union of Biochemistry and Molecular Biology.

  4. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  5. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  6. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  7. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  8. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    is mostly but not wholly a land phenomenon. Naval forces have combatted maritime irregulars such as pirates for millennia, for example see: Plutarch ...SW2502SocialMediaAndUW.html (accessed June 15, 2013). Plaster, John L. SOG: Secret Wars of America’s Commandos in Vietnam. New York: Simon & Schuster, 1997. Plutarch

  9. A man who would shake up science; physicist says he's explained the way nature operates

    CERN Multimedia

    Rothstein, E

    2002-01-01

    Stephen Wolfram is finally publishing his long-awaited book "A New Kind of Science". In it he claims he has discovered underlying principles that affect the development of everything from the human brain to the workings of the universe, requiring a revolutionary rethinking of physics, mathematics, biology and other sciences (1 page).

  10. Operational Analysis on Torpedo Defence

    NARCIS (Netherlands)

    Grootendorst, H.J.; Benders, F.P.A.; Fitski, H.J.; Veldhoven, E.R. van

    2007-01-01

    Since 1998, TNO Defence, Security and Safety has performed operational analysis with the Underwater Warfare Testbed, which provides an environment for evaluation and validation of systems, concepts, and tactics. On top of this testbed the Torpedo Defence System TestBed has been built to simulate

  11. Mission Operations Working Group (MOWG) Report to the OMI Science Team

    Science.gov (United States)

    Fisher, Dominic M.

    2017-01-01

    This PowerPoint presentation will discuss Aura's current spacecraft and OMI insturment status, highlight any performance trends and impacts to OMI operations, identify any operational changes and express concerns or potential process improvements.

  12. Environmental Empowerment - the role of Co-operation between Civil Society, Universities and Science Shops

    DEFF Research Database (Denmark)

    Brodersen, Søsser; Jørgensen, Michael Søgaard; Hansen, Anne Grethe

    2006-01-01

    The University based Science Shops were established in the 1970s in the Netherlands, and in Denmark and other countries in the 1980s and 1990s. The aim was to give civil society organisations access to scientific knowledge and to empower citizen participation regarding environmental and social...... improvements. It has recently been suggested that the role of Science Shops should change as a consequence of the stated increasing professionalisation of the Non Governmental Organisations and Civil Society Organisations, and of industry’s increasing interest in introducing environmental management measures....... Increasing internationalisation of the environmental agenda has contributed to this as well as a general acceptance of environmental considerations in industry policy and strategy. However, with departure point in three different Science Shop projects, the article proposes that Science Shops are still...

  13. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  14. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  15. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  16. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  17. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  18. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  19. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  20. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  1. Gulf war syndrome: could it be triggered by biological warfare-vaccines using pertussis as an adjuvant?

    Science.gov (United States)

    Tournier, J-N; Jouan, A; Mathieu, J; Drouet, E

    2002-04-01

    Several recent epidemiological studies have shown that vaccinations against biological warfare using pertussis as an adjuvant were associated with the Gulf war syndrome. If such epidemiological findings are confirmed, we propose that the use of pertussis as an adjuvant could trigger neurodegeneration through induction of interleukin-1beta secretion in the brain. In turn, neuronal lesions may be sustained by stress or neurotoxic chemical combinations. Particular susceptibility for IL-1beta secretion and potential distant neuronal damage could provide an explanation for the diversity of the symptoms observed on veterans. Copyright 2002 Elsevier Science Ltd. All rights reserved.

  2. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  3. High-Rate Communications Outage Recorder Operations for Optimal Payload and Science Telemetry Management Onboard the International Space Station

    Science.gov (United States)

    Shell, Michael T.; McElyea, Richard M. (Technical Monitor)

    2002-01-01

    All International Space Station (ISS) Ku-band telemetry transmits through the High-Rate Communications Outage Recorder (HCOR). The HCOR provides the recording and playback capability for all payload, science, and International Partner data streams transmitting through NASA's Ku-band antenna system. The HCOR is a solid-state memory recorder that provides recording capability to record all eight ISS high-rate data during ISS Loss-of-Signal periods. NASA payloads in the Destiny module are prime users of the HCOR; however, NASDA and ESA will also utilize the HCOR for data capture and playback of their high data rate links from the Kibo and Columbus modules. Marshall Space Flight Center's Payload Operations Integration Center manages the HCOR for nominal functions, including system configurations and playback operations. The purpose of this paper is to present the nominal operations plan for the HCOR and the plans for handling contingency operations affecting payload operations. In addition, the paper will address HCOR operation limitations and the expected effects on payload operations. The HCOR is manifested for ISS delivery on flight 9A with the HCOR backup manifested on flight 11A. The HCOR replaces the Medium-Rate Communications Outage Recorder (MCOR), which has supported payloads since flight 5A.1.

  4. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  5. A mathematical framework for multiscale science and engineering: the variational multiscale method and interscale transfer operators

    International Nuclear Information System (INIS)

    Shadid, John Nicolas; Lehoucq, Richard B.; Christon, Mark Allen; Slepoy, Alexander; Bochev, Pavel Blagoveston; Collis, Samuel Scott; Wagner, Gregory John

    2004-01-01

    Existing approaches in multiscale science and engineering have evolved from a range of ideas and solutions that are reflective of their original problem domains. As a result, research in multiscale science has followed widely diverse and disjoint paths, which presents a barrier to cross pollination of ideas and application of methods outside their application domains. The status of the research environment calls for an abstract mathematical framework that can provide a common language to formulate and analyze multiscale problems across a range of scientific and engineering disciplines. In such a framework, critical common issues arising in multiscale problems can be identified, explored and characterized in an abstract setting. This type of overarching approach would allow categorization and clarification of existing models and approximations in a landscape of seemingly disjoint, mutually exclusive and ad hoc methods. More importantly, such an approach can provide context for both the development of new techniques and their critical examination. As with any new mathematical framework, it is necessary to demonstrate its viability on problems of practical importance. At Sandia, lab-centric, prototype application problems in fluid mechanics, reacting flows, magnetohydrodynamics (MHD), shock hydrodynamics and materials science span an important subset of DOE Office of Science applications and form an ideal proving ground for new approaches in multiscale science.

  6. Relevance of separation science and technology to nuclear fuel complex operations

    International Nuclear Information System (INIS)

    Rao, S.M.; Ojha, P.B.; Rajashri, M.; Mirji, K.V.; Kalidas, R.

    2004-01-01

    During the last three decades at Nuclear Fuel Complex (NFC), Hyderabad, the Science and Technology of separation to produce various reactor grade materials in tonnage quantity is being practiced in the fields of Zr/Hf, U and Nb/Ta. Apart from this, the separation science is also being used in the production of various high purity materials and in the analytical field. The separation science and technology that is used in the production and characterisation of reactor grade materials has many striking differences from that of the common metals. The relevance and significance of separation science in the field of nuclear materials arises mainly due to the harmful effects w.r.t corrosion property and absorption of neutron caused by the presence of impurities, that are to be brought down to ppm or sub ppm level. In many cases low separation factors, that too from a multi component system call for effective process control at every stage of the bulk production so as to get quality product consistently. This article brings out the importance of separation science and technology and various process standardisations/developments that have been carried out at NFC, starting from laboratory scale to pilot scale and up to industrial scale production in the case of (i) Uranium refining (ii) Zr-Hf separation (iii) Ta-Nb separation and (iv) High purity materials production. (author)

  7. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  8. The regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    Fowler, E.

    1978-01-01

    The history of the Agreement, known as the RCA, is given and the operation of the Agreement, its achievements and current projects are described. The Agreement entered into force in 1972 for a period of five years and has been extended for an additional five years. Any IAEA Member State in the area of South Asia, South East Asia, the Pacific and the Far East may become a party to the Agreement. The purpose of the Agreement is to promote and co-ordinate research, development and training projects in nuclear science and technology through co-operation between the appropriate national institutions and with the assistance of the IAEA. The current RCA co-operative projects cover a broad spectrum of technologies and interests, among which are: food and agriculture, medicine, environmental research, industrial applications, training, research reactor use including radioisotope production, and physical research such as nuclear data programs

  9. Low-Power Operation and Plasma Characterization of a Qualification Model SPT-140 Hall Thruster for NASA Science Missions

    Science.gov (United States)

    Garner, Charles E.; Jorns, Benjamin A.; van Derventer, Steven; Hofer, Richard R.; Rickard, Ryan; Liang, Raymond; Delgado, Jorge

    2015-01-01

    Hall thruster systems based on commercial product lines can potentially lead to lower cost electric propulsion (EP) systems for deep space science missions. A 4.5-kW SPT-140 Hall thruster presently under qualification testing by SSL leverages the substantial heritage of the SPT-100 being flown on Russian and US commercial satellites. The Jet Propulsion Laboratory is exploring the use of commercial EP systems, including the SPT-140, for deep space science missions, and initiated a program to evaluate the SPT-140 in the areas of low power operation and thruster operating life. A qualification model SPT-140 designated QM002 was evaluated for operation and plasma properties along channel centerline, from 4.5 kW to 0.8 kW. Additional testing was performed on a development model SPT-140 designated DM4 to evaluate operation with a Moog proportional flow control valve (PFCV). The PFCV was commanded by an SSL engineering model PPU-140 Power Processing Unit (PPU). Performance measurements on QM002 at 0.8 kW discharge power were 50 mN of thrust at a total specific impulse of 1250 s, a total thruster efficiency of 0.38, and discharge current oscillations of under 3% of the mean current. Steady-state operation at 0.8 kW was demonstrated during a 27 h firing. The SPT-140 DM4 was operated in closed-loop control of the discharge current with the PFCV and PPU over discharge power levels of 0.8-4.5 kW. QM002 and DM4 test data indicate that the SPT-140 design is a viable candidate for NASA missions requiring power throttling down to low thruster input power.

  10. Multi-Mission Geographic Information System for Science Operations: A Test Case Using MSL Data

    Science.gov (United States)

    Calef, F. J.; Abarca, H. E.; Soliman, T.; Abercrombie, S. P.; Powell, M. W.

    2017-06-01

    The Multi-Mission Geographic Information System (MMGIS) is a NASA AMMOS project in its second year of development, built to display and query science products in a spatial context. We present our progress building this tool using MSL in situ data.

  11. Female and male communication in co-operative problem solving in high school science

    NARCIS (Netherlands)

    Harskamp, Egbert; Dhig, Ning; Tremante, A; Welsch, F; Malpica, F

    2007-01-01

    Empirical evidence is presented that males working in mixed-gender dyads on science problems do better than their female partners. This is not the case when males and females work in same gender dyads. There is a difference in communication style in mixed gender dyads in comparison with same gender

  12. Testing the efficiency of rover science protocols for robotic sample selection: A GeoHeuristic Operational Strategies Test

    Science.gov (United States)

    Yingst, R. A.; Bartley, J. K.; Chidsey, T. C.; Cohen, B. A.; Gilleaudeau, G. J.; Hynek, B. M.; Kah, L. C.; Minitti, M. E.; Williams, R. M. E.; Black, S.; Gemperline, J.; Schaufler, R.; Thomas, R. J.

    2018-05-01

    The GHOST field tests are designed to isolate and test science-driven rover operations protocols, to determine best practices. During a recent field test at a potential Mars 2020 landing site analog, we tested two Mars Science Laboratory data-acquisition and decision-making methods to assess resulting science return and sample quality: a linear method, where sites of interest are studied in the order encountered, and a "walkabout-first" method, where sites of interest are examined remotely before down-selecting to a subset of sites that are interrogated with more resource-intensive instruments. The walkabout method cost less time and fewer resources, while increasing confidence in interpretations. Contextual data critical to evaluating site geology was acquired earlier than for the linear method, and given a higher priority, which resulted in development of more mature hypotheses earlier in the analysis process. Combined, this saved time and energy in the collection of data with more limited spatial coverage. Based on these results, we suggest that the walkabout method be used where doing so would provide early context and time for the science team to develop hypotheses-critical tests; and that in gathering context, coverage may be more important than higher resolution.

  13. Vertical-Sensing Effectiveness and CONOPS Tool for Operational Requirements (VECTOR)

    National Research Council Canada - National Science Library

    Green, Gary; Catanzarite, James; Jacobs, Denice

    2005-01-01

    Network-Centric Warfare (NCW) is the emerging concept of operations for the U.S. Armed Forces. It will allow for a decisive warfighting advantage through the increased speed of command and also the high quality shared awareness...

  14. What Is the Role of Survivability Operations in the Current Force?

    National Research Council Canada - National Science Library

    Smallfield, Jason

    2003-01-01

    .... The problem, however, is that most of these changes do not adequately address the role that survivability operations should play across the full spectrum of conflict at the tactical level of warfare...

  15. Commercial Fast Freight Ferry Designs and Their Application to Operational Logistics

    National Research Council Canada - National Science Library

    McIntyre, Ian

    2000-01-01

    .... As we enter the era of Network Centric Warfare (NCW), where Speed of Command is often measured in seconds, theater operational logistics must keep pace with an increased demand for speed in the battlespace...

  16. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  17. Science serving people. International Atomic Energy Agency technical co-operation for development

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This brochure tells the story of how the IAEA is helping to harness knowledge to promote development and deliver real benefits to the poor. It demonstrates how nuclear science and technology applications are being employed to overcome the challenges of water scarcity, food insecurity, malnutrition, malaria, environmental degradation and many other problems. It also shows how the complementary development, safety, and security initiatives of the IAEA are fulfilling the 'Atoms for Peace' mandate of the Agency in the developing world.

  18. Science serving people. International Atomic Energy Agency technical co-operation for development

    International Nuclear Information System (INIS)

    2002-07-01

    This brochure tells the story of how the IAEA is helping to harness knowledge to promote development and deliver real benefits to the poor. It demonstrates how nuclear science and technology applications are being employed to overcome the challenges of water scarcity, food insecurity, malnutrition, malaria, environmental degradation and many other problems. It also shows how the complementary development, safety, and security initiatives of the IAEA are fulfilling the 'Atoms for Peace' mandate of the Agency in the developing world

  19. Lightning Observations from the International Space Station (ISS) for Science Research and Operational Applications

    Science.gov (United States)

    Blakeslee, R. J.; Christian, H. J.; Mach, D. M.; Buechler, D. E.; Koshak, W. J.; Walker, T. D.; Bateman, M.; Stewart, M. F.; O'Brien, S.; Wilson, T.; hide

    2015-01-01

    There exist several core science applications of LIS lightning observations, that range from weather and climate to atmospheric chemistry and lightning physics due to strong quantitative connections that can be made between lightning and other geophysical processes of interest. The space-base vantage point, such as provided by ISS LIS, still remains an ideal location to obtain total lightning observations on a global basis.

  20. First 3 years of operation of RIACS (Research Institute for Advanced Computer Science) (1983-1985)

    Science.gov (United States)

    Denning, P. J.

    1986-01-01

    The focus of the Research Institute for Advanced Computer Science (RIACS) is to explore matches between advanced computing architectures and the processes of scientific research. An architecture evaluation of the MIT static dataflow machine, specification of a graphical language for expressing distributed computations, and specification of an expert system for aiding in grid generation for two-dimensional flow problems was initiated. Research projects for 1984 and 1985 are summarized.

  1. Science serving people. International Atomic Energy Agency technical co-operation for development

    International Nuclear Information System (INIS)

    2002-12-01

    This brochure tells the story of how the IAEA is helping to harness knowledge to promote development and deliver real benefits to the poor. It demonstrates how nuclear science and technology applications are being employed to overcome the challenges of water scarcity, food insecurity, malnutrition, malaria, environmental degradation and many other problems. It also shows how the complementary development, safety, and security initiatives of the IAEA are fulfilling the 'Atoms for Peace' mandate of the Agency in the developing world

  2. Soldiers’ Psychological Responses to Tactical Nuclear Warfare

    Science.gov (United States)

    1992-02-01

    530. Greene , T.L. (1987). Description of a nuclear battlefield. In R.H. Young & B.H. Drum (Edo.), Proceedings of the Defense Nuclear Agency Symposium...ATTN: DEPT OF BEHAVOR SCI & LEADERSHIP ATTN: PMS/PMA-423 ATTN: DEPT OF PHYSICS COL J G CAMPBELL ATTN: SCIENCE RESEARCH LAB OPERATIONAL TEST & EVALUATION

  3. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  4. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  5. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  6. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  7. Co-operation Agreement for the promotion of nuclear science and technology in Latin America and the Caribbean (ARCAL)

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Co-operation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean (ARCAL) which was opened for signature on 25 September 1998 and shall come into force after deposit of the instrument of ratification by ten Member States. It shall remain in force for ten years, and may be extended by periods of five years if the Member States so agree. By 15 september 1999, there were 14 Signatories to the above Agreement

  8. Text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1994-01-01

    As of 1 September 1994, notifications of acceptance of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), in accordance with Article XIII thereof, had been received by the Director General from the Governments of: Tunisia, Egypt, Algeria, Nigeria, Madagascar, Libya, Morocco, Kenya, Sudan, Ghana, Tanzania, Mauritius, Cameroon, South Africa, Zaire, Ethiopia, Zambia, Niger. The Agreement entered into force on 4 April 1990, the date of receipt of the third notification of acceptance

  9. What’s Operations Research? and Why Should We (Interagents) Care?

    Science.gov (United States)

    2010-02-09

    OR (from DSB Report on ISR applications) – World War I • Thomas Edison led anti-submarine warfare tactics study/development – World War II • English...Operations – Joint Warfare – Resources/Readiness/Training – Acquisition – Interdisciplinary Advances in OR • Recent Special Meetings – Power and Energy...the scientific method to inform decisions • Early applications were military operations focused – Lanchester equations of combat – Anti-submarine

  10. The text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1990-04-01

    The document reproduces the text of an African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology among African Member States that was endorsed by the Board of Governors on 21 February 1990

  11. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes.

    Science.gov (United States)

    Fennell, John F; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M

    2017-04-28

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions.

  12. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  13. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  14. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  15. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  16. Operation of the Institute for Computer Applications in Science and Engineering

    Science.gov (United States)

    1975-01-01

    The ICASE research program is described in detail; it consists of four major categories: (1) efficient use of vector and parallel computers, with particular emphasis on the CDC STAR-100; (2) numerical analysis, with particular emphasis on the development and analysis of basic numerical algorithms; (3) analysis and planning of large-scale software systems; and (4) computational research in engineering and the natural sciences, with particular emphasis on fluid dynamics. The work in each of these areas is described in detail; other activities are discussed, a prognosis of future activities are included.

  17. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  18. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  19. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  20. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  1. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  2. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  3. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  4. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  5. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  6. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  7. The Acme of Skill: Nonkinetic Warfare

    Science.gov (United States)

    2008-05-01

    results are mixed. For the im- mense cost that often accompanies war, the returns of war are not guaranteed. On nonkinetic operations, it may appear that...ing, together with other kinetic capabilities such as emphasizing irregular operations, increasing ground troop levels, and recruiting foreign

  8. Concept Specification by PRECIS Role Operators: Some Technical Problems with Social Science and Humanities Literature.

    Science.gov (United States)

    Mahapatra, M.; Biswas, S. C.

    1985-01-01

    Two hundred journal articles related to fields of taxation, genetic psychology, and Shakespearean drama published from 1970-1980 were analyzed and PRECIS input strings were drawn. Occasions when input string and index entries looked incomplete and unexpressive after losing context of document are provided with solutions. Role operator schema is…

  9. Operating a Microwave Radiation Detection Monitor. Module 10. Vocational Education Training in Environmental Health Sciences.

    Science.gov (United States)

    Consumer Dynamics Inc., Rockville, MD.

    This module, one of 25 on vocational education training for careers in environmental health occupations, contains self-instructional materials on operating a microwave radiation detection monitor. Following guidelines for students and instructors and an introduction that explains what the student will learn are three lessons: (1) testing the…

  10. Glass science tutorial: Lecture number-sign 2, Operating electric glass melters. James N. Edmonson, Lecturer

    International Nuclear Information System (INIS)

    Kruger, A.A.

    1994-10-01

    This report contains basic information on electric furnaces used for glass melting and on the properties of glass useful for the stabilization of radioactive wastes. Furnace nomenclature, furnace types, typical silicate glass composition and properties, thermal conductivity information, kinetics of the melting process, glass furnace refractory materials composition and thermal conductivity, and equations required for the operation of glass melters are included

  11. Mining Pribram in science and technology. Proceedings of Session R - Mechanization of mine operations

    International Nuclear Information System (INIS)

    Kolar, J.; Bernatik, O.

    1987-01-01

    The proceedings contain 30 papers of which two deal with uranium mine problems, viz.: ''Current and prospective orientation of mechanized driving of mines and underground infrastructures'' and ''The operation of rail-less mine mechanization in the Hamr area''. (J.B.)

  12. MSFC Doppler Lidar Science experiments and operations plans for 1981 airborne test flight

    Science.gov (United States)

    Fichtl, G. H.; Bilbro, J. W.; Kaufman, J. W.

    1981-01-01

    The flight experiment and operations plans for the Doppler Lidar System (DLS) are provided. Application of DLS to the study of severe storms and local weather penomena is addressed. Test plans involve 66 hours of flight time. Plans also include ground based severe storm and local weather data acquisition.

  13. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  14. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  15. Catching the ’Network Science’ Bug: Insight and Opportunity for the Operations Researcher

    Science.gov (United States)

    2008-01-21

    publication: Operations Research agents often interface in a decentralized and asynchronous manner, and where the interaction of “ selfish ” agents...interaction of the two. For example, in a metabolic network, the activation of a gene may alter the biochemical pathways that in turn can alter other genes , and...people, computers, vehicles, cells, or genes . In these systems, all configurations are not feasible, simply because survival for these systems means

  16. Mine Warfare: Lessons Learned and Forgotten

    National Research Council Canada - National Science Library

    Evangelista, Rickson E

    2008-01-01

    .... This analysis focuses on four battles/operations that involved mine countermeasures: The Battle of Mobile Bay, the amphibious landings at Inchon and Wonsan, and the planned amphibious landing into Kuwait. If the U.S...

  17. Risk, Military Ethics and Irregular Warfare

    Science.gov (United States)

    2011-12-01

    permissible; they are obligatory. Given the state’s moral obligation to protect its citizens, 6 military operations conducted in their defense are prima ... facie obligated, even when conducting those operations exposes combatants to harm. 7 Thus, in what I will refer to as the “traditional view,” by taking...feature of the traditional view. In an article co-written in 2005 with then Major General Amos Yadlin, Kasher remarked: “the duty to minimize casualties

  18. Olfaction Warfare: Odor as Sword and Shield

    Science.gov (United States)

    2013-03-01

    movies Rugrats Go Wild! (2003) and Spy Kids: All the Time in the World (2011). A modern version of a smell distributing system for cinemas is the...Odorvision system developed by the French company Olf-action and demonstrated at the Lisbon show in 2011. The smells are distributed from dispensers...mounted under the ceiling of the cinema . Another similar smell distributing system is SpotScents, developed by Media Information Science Laboratories

  19. A freely available real-time operating system well suited for astronomy and the physical sciences

    Science.gov (United States)

    Pedretti, Ettore; Monnier, John D.; Thureau, Nathalie D.; Berger, David H.

    2006-06-01

    This paper wants to be a practical example in building a real-time data-acquisition and control system from scratch using relatively non-expensive PC hardware and open-source software. The practical example of building the control system for the Michigan Infrared Combiner (MIRC) at the CHARA interferometer will be used to give the reader a 'hands-on' experience in installing and configuring the RTAI-Fusion real-time operating system and developing a complete control system with it.

  20. Status report of the end-to-end ASKAP software system: towards early science operations

    Science.gov (United States)

    Guzman, Juan Carlos; Chapman, Jessica; Marquarding, Malte; Whiting, Matthew

    2016-08-01

    The Australian SKA Pathfinder (ASKAP) is a novel centimetre radio synthesis telescope currently in the commissioning phase and located in the midwest region of Western Australia. It comprises of 36 x 12 m diameter reflector antennas each equipped with state-of-the-art and award winning Phased Array Feeds (PAF) technology. The PAFs provide a wide, 30 square degree field-of-view by forming up to 36 separate dual-polarisation beams at once. This results in a high data rate: 70 TB of correlated visibilities in an 8-hour observation, requiring custom-written, high-performance software running in dedicated High Performance Computing (HPC) facilities. The first six antennas equipped with first-generation PAF technology (Mark I), named the Boolardy Engineering Test Array (BETA) have been in use since 2014 as a platform to test PAF calibration and imaging techniques, and along the way it has been producing some great science results. Commissioning of the ASKAP Array Release 1, that is the first six antennas with second-generation PAFs (Mark II) is currently under way. An integral part of the instrument is the Central Processor platform hosted at the Pawsey Supercomputing Centre in Perth, which executes custom-written software pipelines, designed specifically to meet the ASKAP imaging requirements of wide field of view and high dynamic range. There are three key hardware components of the Central Processor: The ingest nodes (16 x node cluster), the fast temporary storage (1 PB Lustre file system) and the processing supercomputer (200 TFlop system). This High-Performance Computing (HPC) platform is managed and supported by the Pawsey support team. Due to the limited amount of data generated by BETA and the first ASKAP Array Release, the Central Processor platform has been running in a more "traditional" or user-interactive mode. But this is about to change: integration and verification of the online ingest pipeline starts in early 2016, which is required to support the full

  1. "G.P.S Matrices" programme: A method to improve the mastery level of social science students in matrices operations

    Science.gov (United States)

    Lee, Ken Voon

    2013-04-01

    The purpose of this action research was to increase the mastery level of Form Five Social Science students in Tawau II National Secondary School in the operations of addition, subtraction and multiplication of matrices in Mathematics. A total of 30 students were involved. Preliminary findings through the analysis of pre-test results and questionnaire had identified the main problem faced in which the students felt confused with the application of principles of the operations of matrices when performing these operations. Therefore, an action research was conducted using an intervention programme called "G.P.S Matrices" to overcome the problem. This programme was divided into three phases. 'Gift of Matrices' phase aimed at forming matrix teaching aids. The second and third phases were 'Positioning the Elements of Matrices' and 'Strenghtening the Concept of Matrices'. These two phases were aimed at increasing the level of understanding and memory of the students towards the principles of matrix operations. Besides, this third phase was also aimed at creating an interesting learning environment. A comparison between the results of pre-test and post-test had shown a remarkable improvement in students' performances after implementing the programme. In addition, the analysis of interview findings also indicated a positive feedback on the changes in students' attitude, particularly in the aspect of students' understanding level. Moreover, the level of students' memory also increased following the use of the concrete matrix teaching aids created in phase one. Besides, teachers felt encouraging when conducive learning environment was created through students' presentation activity held in third phase. Furthermore, students were voluntarily involved in these student-centred activities. In conclusion, this research findings showed an increase in the mastery level of students in these three matrix operations and thus the objective of the research had been achieved.

  2. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  3. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  4. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  5. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  6. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  7. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  8. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  9. The role of science in support of operational decision-making during oil spills

    International Nuclear Information System (INIS)

    Walker, A.H.; Robinson, J.H.

    1991-01-01

    The potential for environmental damage is the principal rationale for responding to oil spills in the United States, and most other countries. Numerous factors influence response decisions regarding containment, cleanup and treatment operations. Important influences which drive how decisions will be made include politics, economics, environmental concerns, public relations, and aesthetics. A common misperceptions that scientific information cannot be generated on a real-time basis, that is, that scientific studies generally require more time to conduct than the spill response time frame permits. This paper discusses how to organize a scientific program in support of operational decision-making during oil spills, using NOAA's Scientific Support Team as an illustrative example. The paper also describes various types of scientific activities, including use of types of off-the-shelf technology and instrumentation, which can be conducted at the time of a spill, such as those implemented during the EXXON VALDEZ. Lastly, the paper provides guidance on how to generate and mange valid scientific information in ways that are relevant to timely response decision-making

  10. Assessment of Clinical Stressful Factors Among Academic Students of Nursing and Operating Room of Dezful University of Medical Sciences (2015

    Directory of Open Access Journals (Sweden)

    Mojtaba Raji

    2016-07-01

    Full Text Available Background and Objective: Nursing students are exposed to clinical environmental stresses in addition to educational environmental stresses. The aim of this study was to assessment of clinical stressful factors among Academic Students of Nursing and Operating Room of Dezful University of Medical Sciences in 2015.Materials and Methods: This study was a description-analytical study with 234 students of nursing and operation room up to two semesters for enrolled. Data was using a self-made researcher Questionnaire consisted of demographic information and clinical stressful factors. Data analysis was performed by descriptive and inferential statistics using SPSS-PC (v.20.Results: The findings showed that the main stressors in students of nursing and operation room were unpleasant emotions and least stressful areas were interpersonal communication in a clinical environment. The results showed that the average score of the field of education and humiliating experiences using Spearman correlation test (P=0/045 (r=0/16.Conclusion: Study showed, the mean stress is the moderate level. Stressful areas obtained in the four areas of personal communication, clinical practice stressful, unpleasant feelings and humiliating experience that fortunately, in many cases reform and change.

  11. Atmosphere Assessment for MARS Science Laboratory Entry, Descent and Landing Operations

    Science.gov (United States)

    Cianciolo, Alicia D.; Cantor, Bruce; Barnes, Jeff; Tyler, Daniel, Jr.; Rafkin, Scot; Chen, Allen; Kass, David; Mischna, Michael; Vasavada, Ashwin R.

    2013-01-01

    On August 6, 2012, the Mars Science Laboratory rover, Curiosity, successfully landed on the surface of Mars. The Entry, Descent and Landing (EDL) sequence was designed using atmospheric conditions estimated from mesoscale numerical models. The models, developed by two independent organizations (Oregon State University and the Southwest Research Institute), were validated against observations at Mars from three prior years. In the weeks and days before entry, the MSL "Council of Atmospheres" (CoA), a group of atmospheric scientists and modelers, instrument experts and EDL simulation engineers, evaluated the latest Mars data from orbiting assets including the Mars Reconnaissance Orbiter's Mars Color Imager (MARCI) and Mars Climate Sounder (MCS), as well as Mars Odyssey's Thermal Emission Imaging System (THEMIS). The observations were compared to the mesoscale models developed for EDL performance simulation to determine if a spacecraft parameter update was necessary prior to entry. This paper summarizes the daily atmosphere observations and comparison to the performance simulation atmosphere models. Options to modify the atmosphere model in the simulation to compensate for atmosphere effects are also presented. Finally, a summary of the CoA decisions and recommendations to the MSL project in the days leading up to EDL is provided.

  12. science

    International Development Research Centre (IDRC) Digital Library (Canada)

    David Spurgeon

    Give us the tools: science and technology for development. Ottawa, ...... altered technical rela- tionships among the factors used in the process of production, and the en- .... to ourselves only the rights of audit and periodic substantive review." If a ...... and destroying scarce water reserves, recreational areas and a generally.

  13. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  14. Thinking about Science and Christian Orthodox Beliefs: A Survey Study of Teacher Beliefs

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2011-01-01

    Since its origination in the late 19th Century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  15. Applying the Science of Science Communication to Climate Change and Clean Energy: Lessons Learned from the NSF- and PBS-supported "Earth: The Operators' Manual"

    Science.gov (United States)

    Haines-Stiles, G.; Akuginow, E.; Sanford, C.

    2014-12-01

    Yale legal scholar and professor of psychology Dan Kahan has criticized the climate change science community for not applying what's known about effective communications strategies to topics with potentially controversial content. "Earth: The Operators' Manual," funded by NSF's Informal Science Education program and appearing on PBS was hosted by Penn State geoscientist Richard Alley. From the initial proposal forward into airing on public television in 2011 and 2012, ETOM aimed to be authoritative and apolitical while still being engaging to general audiences. Based on social scientific insights from project Advisor, Suzanne Moser, and others, ETOM aimed to avoid "climate porn" scare tactics and over-used footage, and to enlist a diverse group of "messengers" in addition to Alley. An important design criterion was to give equal time to clean energy solutions while pulling no punches as to the consensus findings of leading climate scientists. With the ETOM project now completed and final reports submitted to NSF, what results can be shared to inform future efforts? And how did ETOM compare in audience impact with other major media efforts such as Al Gore's "An Inconvenient Truth" or Showtime's more recent "Years of Living Dangerously"? Results reported draw on the external evaluation by Rockman Et Al, and include both quantitative and qualitative data. Key findings are the importance of including Texan ranchers enthusiastic about wind power alongside Navy Admirals adamant that climate change is human-caused and Marines implementing solar energy to reduce casualties incurred while transporting fossil fuels. In-person presentations by Alley and others at science centers served as de facto focus groups for scripting the TV programs, along with actual focus groups convened by Rockman. The 3rd program, ENERGY QUEST USA, documented 5 quite different communities, from Alaska to Forth Worth, Baltimore, Portland and Kansas, all using competition, local values, and economic

  16. Electronic Warfare and Radar Systems Engineering Handbook

    Science.gov (United States)

    2012-06-01

    Program GIG Global Information Grid GIGO Garbage In / Garbage Out GOCO Government Owned Contract Operated GOFO General Officer / Flag Officer...Usually, for economy , signals are sampled at the minimum rate required, with the result that the quantization noise introduced is white noise spread

  17. The future of naval ocean science research

    Science.gov (United States)

    Orcutt, John A.; Brink, Kenneth

    The Ocean Studies Board (OSB) of the National Research Council reviewed the changing role of basic ocean science research in the Navy at a recent board meeting. The OSB was joined by Gerald Cann, assistant secretary of the Navy for research, development, and acquisition; Geoffrey Chesbrough, oceanographer of the Navy; Arthur Bisson, deputy assistant secretary of the Navy for antisubmarine warfare; Robert Winokur, technical director of the Office of the Oceanographer of the Navy; Bruce Robinson, director of the new science directorate at the Office of Naval Research (ONR); and Paul Gaffney, commanding officer of the Naval Research Laboratory (NRL). The past 2-3 years have brought great changes to the Navy's mission with the dissolution of the former Soviet Union and challenges presented by conflicts in newly independent states and developing nations. The new mission was recently enunciated in a white paper, “From the Sea: A New Direction for the Naval Service,” which is signed by the secretary of the Navy, the chief of naval operations, and the commandant of the Marine Corps. It departs from previous plans by proposing a heavier emphasis on amphibious operations and makes few statements about the traditional Navy mission of sea-lane control.

  18. Performance of the Digital Science Partnership Remotely-Operated 0.5-Meter Corrected Dall-Kirkham Telescopes

    Science.gov (United States)

    Kielkopf, John F.; Carter, B.; Brown, C.; Hart, R.; Hay, J.; Waite, I.

    2007-12-01

    The Digital Science Partnership, a collaboration of the University of Louisville and the University of Southern Queensland, operates a pair of 0.5-meter telescopes for teaching, research, and informal education. The instruments were installed at sites near Toowoomba, Australia, and Louisville, Kentucky in 2006. The Planewave Instruments optical systems employ a unique Dall-Kirkham design incorporating a two-element corrector that demagnifies the image, flattens the focal plane, and reduces coma. These instruments have a moderately fast f/6.8 focal ratio and maintain image quality with little vignetting over a field 42 mm in diameter (0.7 degree). With a 9-micron pixel CCD such as the KAF-6303E, the image scale of 0.55 seconds of arc per pixel typically yields seeing-limited image quality at our sites. The telescopes and their enclosure are operated in a live remote observing mode through Linux-based software, including a dome-control system that uses RFID tags for absolute rotation encoding. After several months of testing and development we have examples of images and photometry from both sites that illustrate the performance of the system. We will discuss image quality, as well as practical matters such as pointing accuracy and field acquisition, auto-guiding, communication latency in large file transfer, and our experience with remote observing assisted by teleconferencing. Time-delay-integration (TDI) imaging, in which the telescope is stationary while the CCD is clocked to track in right ascension, is under study. The technique offers wide fields of view with very high signal-to-noise ratio, and can be implemented in robotically operated instruments used in monitoring, rapid-response, and educational programs. Results for conventional and TDI imaging from the dark site in Australia compared to the brighter suburban site in Kentucky show the benefits of access to dark sites through international partnerships that remote operation technology offers.

  19. Recent advances in nuclear forensic science - The identification of unknown nuclear materials and co-operation with the legal authorities

    International Nuclear Information System (INIS)

    Ray, I.L.F.; Schubert, A.; Schenkel, R.

    2001-01-01

    Full text: Nuclear Forensic Science is a new branch of forensic science, which has arisen out of necessity following the dissolution of the former Soviet Union and East Block countries. One result of this break up was the emergence of a new form of smuggling, involving nuclear materials, radioactive sources and scrap metal contaminated with radioactive substances. Since 1994 the Institute for Transuranium Elements of the European Commission Joint Research Centre has played a major role in combating the illicit trafficking in nuclear materials and contaminated scrap metals. The Institute has the advantages of extensive experience in handling these materials, which require sophisticated instruments mounted in glove boxes. As part of the European Commission Joint Research Centre the Institute is also independent of national interests within the European Union and abroad. Some twenty-five cases of illicit trafficking have been examined so far. Some of the latest cases will be described and the methods developed at the Institute for isotopic and microstructural fingerprinting of nuclear materials will be illustrated. The microstructural fingerprint is a new technique developed here, which complements the isotopic analysis of the samples, and is highly characteristic of the production process and subsequent history of the materials involved. Furthermore, the microstructural fingerprint cannot be disguised by, for example, the addition of other substances or isotopes to the sample. An extensive database on commercial nuclear materials is maintained by the Institute, and this is being enlarged to include microstructural information such as porosity, grain size, precipitation, dislocation structures, pellet surface roughness, etc. The database can be used for comparison when samples of unknown provenance are seized. The Institute places emphasis on developing close co-operation with the legal authorities to optimize the side-by-side working of law enforcement officers and

  20. Swarming and the Future of Warfare

    Science.gov (United States)

    2005-01-01

    and Plans DIVARTY Division Artillery DoD Department of Defense EO Electro-Optical EXFOR Experimental Force FLIR Forward-Looking Infrared FOFA Follow-on...HUMINT Human Intelligence xiii IED Improvised Explosive Device IFV Infantry Fighting Vehicle 10 Information Operations IR Infrared ISR Intelligence...and the rifles of WW2 (9 out of 1,000). 37 No longer could artillery unlimber within 300 yards and shoot at infantry with relative impunity since

  1. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Civil affairs CAPs combined action platoons CAS close-air support CBI China-Burma-India [theater] CDI Community Defense Initiative CENTCOM [U.S...special forces’ creed has changed over time, the sentiment has remained. The history of the basic unit of special forces—the SFODA—can be traced back to...reassigned CIDG forces no longer held the advantage of insight into local cultural norms and daily activities since they were no longer operating near

  2. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  3. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  4. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  5. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  6. Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8

    Science.gov (United States)

    2010-03-01

    Office and be able to ―push‖ to Theater Battle Management Core Systems ( TBMCS ). Task Characteristics 1. Task Overview: a. Tasks are constrained by...push‖ to TBMCS . Task Characteristics 2. Task Overview: a. Tasks are constrained by class time. In the first part of the course, trainers give an...documents, query them. PSYOP Instructor Targeting and Guidance Interface Facility (TGIF) interfaces IWPC to TBMCS PSYOP Instructor IWPC 4.0

  7. 2005 Net Centric Operations, Interoperability and Systems Integration Conference - Facilitating Net Centric Operations and Warfare

    Science.gov (United States)

    2005-03-24

    QoS to “the edge” – High bandwidth tactical ad-hoc mobile communications – Laser communications and high bandwidth RF relays – QoS management...Information Management Information Assurance Director, Information Assurance Cross- Cutting & Inter-Dependent Domains ASD(NII)/CIO leads Intelligence...Layer Common ServicesDCGS Integration Backbone (DIB) Data level – J2EE and the Metadata Framework ( MDF ) Application level – J2EE and the workflow engine

  8. Special Operations Research Topics 2016

    Science.gov (United States)

    2015-01-01

    Senior Fellow Alvaro de Souza Pinheiro Major General, Brazilian Army, Ret. JSOU Associate Fellow James F. Powers, Jr. Colonel, U.S. Army, Ret. JSOU...goal is to shape the operating environment, counter threats, and advance U.S. interests prior to a threat or crisis neces- sitating large-scale...Role of SOF in political warfare: Achieving national objectives short of war E9. The human domain in crisis , conflict, and war: Influencing

  9. Nonstandard Logistics Success in Unconventional Warfare

    Science.gov (United States)

    2015-11-01

    water from local farms , vendors, and markets. The PACE plan would be con- stantly updated as the operational picture changes, such as a variation in...sus- tainability. For example, if a forward element is purchasing a noticeable amount of rice from a local farm , the team might begin purchasing rice...another OE be forced to use another item that has value. Cash may work in a city center, but a goat in a rural area is just as valuable and easily sold

  10. Operational Art and Risk: Why Doctrine Does Not Help

    Science.gov (United States)

    2013-05-23

    across all levels of warfare towards a single immutable strategic end state. 19 The critical factor for the operational artists is the arrangement of...of tactical actions to strategic objectives happens from tactical to strategic levels of war. 20 Operational art is the mental gymnastics that creates

  11. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  12. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  13. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  14. From Berlin-Dahlem to the Fronts of World War I: The Role of Fritz Haber and his Kaiser Wilhelm Institute in German Chemical Warfare

    OpenAIRE

    Friedrich, B.; James, J.

    2017-01-01

    There is little doubt that Fritz Haber (1868–1934) was the driving force behind the centrally directed development of chemical warfare in Germany, whose use during World War I violated international law and elicited both immediate and enduring moral criticism. The chlorine cloud attack at Ypres on 22 April 1915 amounted to the first use of a weapon of mass destruction and as such marks a turning point in world history. Following the “success” at Ypres, Haber, eager to employ science in resolv...

  15. The text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The full text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972 (INFCIRC/167) (extended first in 1977 and then in 1982) for a further period of five years with effect from 12 June 1987, is reproduced

  16. ARCAL. Regional co-operative arrangements for the promotion of nuclear science and technology in Latin America, Phase I (1985-1990)

    International Nuclear Information System (INIS)

    Gillen, V.A.

    1990-09-01

    The Regional Co-operative Arrangement for the Promotion of Nuclear Science and Technology in Latin America, ARCAL, has completed its first five-year phase (1985-1989). This booklet summarizes the first phase of the ARCAL programme and contains descriptions of projects in the fields of agriculture, medicine, industry and energy

  17. The Text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, extended first in 1977 and then in 1982, for a further period of five years with effect from 12 June 1987, is reproduced herein for the information of all Members [fr

  18. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [es

  19. The Text of the Agreement between the Agency and the Governments of Norway, Poland and Yugoslavia concerning Co-operative Research in Reactor Science

    International Nuclear Information System (INIS)

    1971-01-01

    The texts of the Agreement between the Agency and the Governments of Norway, Poland and Yugoslavia concerning Co-operative Research in Reactor Science, and of the Minutes of Signature thereof are reproduced herein for the information of all Members. This Agreement entered into force on 10 April 1970.

  20. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it

  1. The text of the second agreement to extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology

    International Nuclear Information System (INIS)

    1998-03-01

    The document reproduces the text of the Second Agreement to Extend the 1987 Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology for a further period of five years with effect from 12 june 1997, i.e., through 11 June 2002

  2. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [fr

  3. The Text of the Agreement between the Agency and the Governments of Norway, Poland and Yugoslavia concerning Co-operative Research in Reactor Science

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1971-03-18

    The texts of the Agreement between the Agency and the Governments of Norway, Poland and Yugoslavia concerning Co-operative Research in Reactor Science, and of the Minutes of Signature thereof are reproduced herein for the information of all Members. This Agreement entered into force on 10 April 1970.

  4. The Text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1982-12-01

    The text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, fist extended in 1977, for a further period of five years with effect from 12 June 1982, is reproduced herein for the information of all Members

  5. Biological and environmental hazards associated with exposure to chemical warfare agents: arsenicals.

    Science.gov (United States)

    Li, Changzhao; Srivastava, Ritesh K; Athar, Mohammad

    2016-08-01

    Arsenicals are highly reactive inorganic and organic derivatives of arsenic. These chemicals are very toxic and produce both acute and chronic tissue damage. On the basis of these observations, and considering the low cost and simple methods of their bulk syntheses, these agents were thought to be appropriate for chemical warfare. Among these, the best-known agent that was synthesized and weaponized during World War I (WWI) is Lewisite. Exposure to Lewisite causes painful inflammatory and blistering responses in the skin, lung, and eye. These chemicals also manifest systemic tissue injury following their cutaneous exposure. Although largely discontinued after WWI, stockpiles are still known to exist in the former Soviet Union, Germany, Italy, the United States, and Asia. Thus, access by terrorists or accidental exposure could be highly dangerous for humans and the environment. This review summarizes studies that describe the biological, pathophysiological, toxicological, and environmental effects of exposure to arsenicals, with a major focus on cutaneous injury. Studies related to the development of novel molecular pathobiology-based antidotes against these agents are also described. © 2016 New York Academy of Sciences.

  6. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  7. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  8. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  9. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  10. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  11. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  12. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  13. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  14. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  15. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  16. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  17. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  18. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  19. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  20. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  1. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  2. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  3. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  4. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  5. Operational Art and the German 1918 Offensives

    OpenAIRE

    Zabecki, D T

    2009-01-01

    At the tactical level of war the Germans are widely regarded as having had the most innovative and proficient army of World War I. Likewise, many historians would agree that the Germans suffered from serious, if not fatal, shortcomings at the strategic level of war. It is at the middle level of warfare, the operational level, that the Germans seem to be the most difficult to evaluate. Although the operational was only fully accepted in the 1980s by many Western militaries as...

  6. NASA's Rodent Research Project: Validation of Flight Hardware, Operations and Science Capabilities for Conducting Long Duration Experiments in Space

    Science.gov (United States)

    Choi, S. Y.; Beegle, J. E.; Wigley, C. L.; Pletcher, D.; Globus, R. K.

    2015-01-01

    Research using rodents is an essential tool for advancing biomedical research on Earth and in space. Rodent Research (RR)-1 was conducted to validate flight hardware, operations, and science capabilities that were developed at the NASA Ames Research Center. Twenty C57BL/6J adult female mice were launched on Sept 21, 2014 in a Dragon Capsule (SpaceX-4), then transferred to the ISS for a total time of 21-22 days (10 commercial mice) or 37 (10 validation mice). Tissues collected on-orbit were either rapidly frozen or preserved in RNA later at less than or equal to -80 C (n=2/group) until their return to Earth. Remaining carcasses were rapidly frozen for dissection post-flight. The three controls groups at Kennedy Space Center consisted of: Basal mice euthanized at the time of launch, Vivarium controls, housed in standard cages, and Ground Controls (GC), housed in flight hardware within an environmental chamber. FLT mice appeared more physically active on-orbit than GC, and behavior analysis are in progress. Upon return to Earth, there were no differences in body weights between FLT and GC at the end of the 37 days in space. RNA was of high quality (RIN greater than 8.5). Liver enzyme activity levels of FLT mice and all control mice were similar in magnitude to those of the samples that were optimally processed in the laboratory. Liver samples collected from the intact frozen FLT carcasses had RNA RIN of 7.27 +/- 0.52, which was lower than that of the samples processed on-orbit, but similar to those obtained from the control group intact carcasses. Nonetheless, the RNA samples from the intact carcasses were acceptable for the most demanding transcriptomic analyses. Adrenal glands, thymus and spleen (organs associated with stress response) showed no significant difference in weights between FLT and GC. Enzymatic activity was also not significantly different. Over 3,000 tissues collected from the four groups of mice have become available for the Biospecimen Sharing

  7. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  8. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    Internet, to recruit, indoctrinate and train individuals.223 Cinema -quality propaganda videos are produced...ideological identity to participate in a perceived to be legitimate UW-like operation without actually physically showing-up on the battlefield, if

  9. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  10. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  11. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  12. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  13. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  14. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  15. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  16. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  17. Seafloor Science and Remotely Operated Vehicle (SSROV) Day Camp: A Week-Long, Hands-On STEM Summer Camp

    Science.gov (United States)

    Wheat, C. G.; Fournier, T.; Monahan, K.; Paul, C.

    2015-12-01

    RETINA (Robotic Exploration Technologies IN Astrobiology) has developed a program geared towards stimulating our youth with innovative and relevant hands-on learning modules under a STEM umbrella. Given the breadth of potential science and engineering topics that excite children, the RETINA Program focuses on interactive participation in the design and development of simple robotic and sensor systems, providing a range of challenges to engage students through project-based learning (PBL). Thus, young students experience scientific discovery through the use and understanding of technology. This groundwork serves as the foundation for SSROV Camp, a week-long, summer day camp for 6th-8th grade students. The camp is centered on the sensors and platforms that guide seafloor exploration and discovery and builds upon the notion that transformative discoveries in the deep sea result from either sampling new environments or making new measurements with sensors adapted to this extreme environment. These technical and scientific needs are folded into the curriculum. Each of the first four days of the camp includes four team-based, hands-on technical challenges, communication among peer groups, and competition. The fifth day includes additional activities, culminating in camper-led presentations to describe a planned mission based on a given geologic setting. Presentations include hypotheses, operational requirements and expected data products. SSROV Camp was initiated last summer for three sessions, two in Monterey, CA and one in Oxford, MS. Campers from both regions grasped key elements of the program, based on written responses to questions before and after the camp. On average, 32% of the pre-test questions were answered correctly compared with 80% of the post-test questions. Additional confirmation of gains in campers' knowledge, skills, and critical thinking on environmental issues and engineering problems were apparent during the "jeopardy" competition, nightly homework

  18. 77 FR 6795 - Notification of a Public Meeting of the Science Advisory Board (SAB) Animal Feeding Operations...

    Science.gov (United States)

    2012-02-09

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9629-4] Notification of a Public Meeting of the Science... Agency (EPA). ACTION: Notice. SUMMARY: The EPA Science Advisory Board (SAB) Staff Office announces a public meeting of the SAB Panel to conduct a peer review on the EPA documents, ``Draft--Development of...

  19. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  20. Water-driven micromotors for rapid photocatalytic degradation of biological and chemical warfare agents.

    Science.gov (United States)

    Li, Jinxing; Singh, Virendra V; Sattayasamitsathit, Sirilak; Orozco, Jahir; Kaufmann, Kevin; Dong, Renfeng; Gao, Wei; Jurado-Sanchez, Beatriz; Fedorak, Yuri; Wang, Joseph

    2014-11-25

    Threats of chemical and biological warfare agents (CBWA) represent a serious global concern and require rapid and efficient neutralization methods. We present a highly effective micromotor strategy for photocatalytic degradation of CBWA based on light-activated TiO2/Au/Mg microspheres that propel autonomously in natural water and obviate the need for external fuel, decontaminating reagent, or mechanical agitation. The activated TiO2/Au/Mg micromotors generate highly reactive oxygen species responsible for the efficient destruction of the cell membranes of the anthrax simulant Bacillus globigii spore, as well as rapid and complete in situ mineralization of the highly persistent organophosphate nerve agents into nonharmful products. The water-driven propulsion of the TiO2/Au/Mg micromotors facilitates efficient fluid transport and dispersion of the photogenerated reactive oxidative species and their interaction with the CBWA. Coupling of the photocatalytic surface of the micromotors and their autonomous water-driven propulsion thus leads to a reagent-free operation which holds a considerable promise for diverse "green" defense and environmental applications.