WorldWideScience

Sample records for strike warfare simulation

  1. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  2. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  3. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  4. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    National Research Council Canada - National Science Library

    Lambeth, Benjamin

    2007-01-01

    This report documents the exceptional cross-service harmony that the U.S. Air Force and U.S. Navy have steadily developed in their conduct of integrated strike operations since the first Persian Gulf War in 1991...

  5. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  6. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  7. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  8. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  9. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  10. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  11. Simulating Bird Strike on Aircraft Composite Wing Leading Edge.

    OpenAIRE

    Ericsson, Max

    2012-01-01

    In this master thesis project the possibility to model the response of a wing when subjected to bird strike using finite elements is analyzed. Since this transient event lasts only a few milliseconds the used solution method is explicit time integration. The wing is manufactured using carbon fiber laminate. Carbon fiber laminates have orthotropic material properties with different stiffness in different directions. Accordingly, there are damage mechanisms not considered when using metal that ...

  12. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    Science.gov (United States)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  13. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  14. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  15. Striking Clepsydras

    Science.gov (United States)

    Nam, Moon-Hyon

    The term "Striking Clepsydra" is a shortened translation of the Korean name Jagyeongnu (自擊漏, tzu-chi lou in Chinese, literally "automatic-striking water-clock"). It was given to the two monumental time-keeping installations built by chief court engineer Yeong-sil Jang in AD 1432-38 under King Sejong (r. AD 1418-50) of the Joseon dynasty (1392-1910) in Seoul. These were housed separately in the Gyeongbok palace complex as major installations of the Royal Observatory Ganuidae equipped during 1432-38. One was the Striking Palace Clepsydra Borugangnu that was employed as the standard time-keeper from 1434, and the other was the Striking Heavenly Clepsydra Heumgyeonggangnu that was put into use not only as the symbol of Neo-Confucian ideology from 1438, but also as a demonstrational orrery and time-keeper. These were restored several times through the dynasty after loss by fires and warfare, and clepsydra-making technologies were succeeded by the development of armillary clocks in 1669. The National Palace Museum of Korea recreated the 1434 Striking Palace Clepsydra of King Sejong, and the replica was installed for permanent exhibition from November 2007.

  16. A Comparison of Predictive Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants II: COSMO RS and COSMOTherm

    Science.gov (United States)

    2017-04-01

    SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS II: COSMO-RS AND COSMOTHERM ECBC-TR-1454 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...Traditional Chemical Warfare Agents and Simulants II: COSMO-RS and COSMOTherm 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER CB10115...in the ADF 2012 suite of programs for the physico- chemical properties of a set of traditional chemical warfare agents and selected simulants. To

  17. Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

    Directory of Open Access Journals (Sweden)

    So Ryoung Park

    2018-01-01

    Full Text Available An electronic warfare (EW simulator is presented to investigate and evaluate the tracking performance of radar system under the electronic attack situations. The EW simulator has the input section in which the characteristic parameters of radar threat, radar warning receiver, jammer, electromagnetic wave propagation, and simulation scenario can be set up. During the process of simulation, the simulator displays the situations of simulation such as the received signal and its spectrum, radar scope, and angle tracking scope and also calculates the transient and root-mean-squared tracking errors of the range and angle tracking system of radar. Using the proposed EW simulator, we analyze the effect of concealment according to the noise and signal powers under the noise jamming and also analyze the effect of deception by calculating errors between the desired value and the estimated one under the deceptive jamming. Furthermore, the proposed EW simulator can be used to figure out the feature of radar threats based on the information collected from the EW receiver and also used to carry out the electronic attacks efficiently in electronic warfare.

  18. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  19. 12 weeks of simulated barefoot running changes foot-strike patterns in female runners.

    Science.gov (United States)

    McCarthy, C; Fleming, N; Donne, B; Blanksby, B

    2014-05-01

    To investigate the effect of a transition program of simulated barefoot running (SBR) on running kinematics and foot-strike patterns, female recreational athletes (n=9, age 29 ± 3 yrs) without SBR experience gradually increased running distance in Vibram FiveFingers SBR footwear over 12 weeks. Matched controls (n=10, age 30 ± 4 yrs) continued running in standard footwear. A 3-D motion analysis of treadmill running at 12 km/h(-1) was performed by both groups, barefoot and shod, pre- and post-intervention. Post-intervention data indicated a more-forefoot strike pattern in the SBR group compared to controls; both running barefoot (P>0.05), and shod (Pstrike (Pforefoot strike pattern and "barefoot" kinematics, regardless of preferred footwear. © Georg Thieme Verlag KG Stuttgart · New York.

  20. Adsorption and Desorption of Chemical Warfare Agent Simulants on Silica Surfaces with Hydrophobic Coating

    International Nuclear Information System (INIS)

    Park, Eun Ji; Kim, Young Dok

    2013-01-01

    Aim of our study is finding adsorbents suitable for pre-concentration of chemical warfare agents (CWAs). We considered Tenax, bare silica and polydimethylsiloxane (PDMS)-coated silica as adsorbents for dimethyl methylphosphonate (DMMP) and dipropylene glycol methyl ether (DPGME). Tenax showed lower thermal stability, and therefore, desorption of CWA simulants and decomposition of Tenax took place simultaneously. Silica-based adsorbents showed higher thermal stabilities than Tenax. A drawback of silica was that adsorption of CWA simulant (DMMP) was significantly reduced by pre-treatment of the adsorbents with humid air. In the case of PDMS-coated silica, influence of humidity for CWA simulant adsorption was less pronounced due to the hydrophobic nature of PDMS-coating. We propose that PDMS-coated silica can be of potential importance as adsorbent of CWAs for their pre-concentration, which can facilitate detection of these CWAs

  1. Adsorption and Desorption of Chemical Warfare Agent Simulants on Silica Surfaces with Hydrophobic Coating

    Energy Technology Data Exchange (ETDEWEB)

    Park, Eun Ji; Kim, Young Dok [Sungkyunkwan Univ., Suwon (Korea, Republic of)

    2013-07-15

    Aim of our study is finding adsorbents suitable for pre-concentration of chemical warfare agents (CWAs). We considered Tenax, bare silica and polydimethylsiloxane (PDMS)-coated silica as adsorbents for dimethyl methylphosphonate (DMMP) and dipropylene glycol methyl ether (DPGME). Tenax showed lower thermal stability, and therefore, desorption of CWA simulants and decomposition of Tenax took place simultaneously. Silica-based adsorbents showed higher thermal stabilities than Tenax. A drawback of silica was that adsorption of CWA simulant (DMMP) was significantly reduced by pre-treatment of the adsorbents with humid air. In the case of PDMS-coated silica, influence of humidity for CWA simulant adsorption was less pronounced due to the hydrophobic nature of PDMS-coating. We propose that PDMS-coated silica can be of potential importance as adsorbent of CWAs for their pre-concentration, which can facilitate detection of these CWAs.

  2. Chemical warfare agent simulants for human volunteer trials of emergency decontamination: A systematic review.

    Science.gov (United States)

    James, Thomas; Wyke, Stacey; Marczylo, Tim; Collins, Samuel; Gaulton, Tom; Foxall, Kerry; Amlôt, Richard; Duarte-Davidson, Raquel

    2018-01-01

    Incidents involving the release of chemical agents can pose significant risks to public health. In such an event, emergency decontamination of affected casualties may need to be undertaken to reduce injury and possible loss of life. To ensure these methods are effective, human volunteer trials (HVTs) of decontamination protocols, using simulant contaminants, have been conducted. Simulants must be used to mimic the physicochemical properties of more harmful chemicals, while remaining non-toxic at the dose applied. This review focuses on studies that employed chemical warfare agent simulants in decontamination contexts, to identify those simulants most suitable for use in HVTs of emergency decontamination. Twenty-two simulants were identified, of which 17 were determined unsuitable for use in HVTs. The remaining simulants (n = 5) were further scrutinized for potential suitability according to toxicity, physicochemical properties and similarities to their equivalent toxic counterparts. Three suitable simulants, for use in HVTs were identified; methyl salicylate (simulant for sulphur mustard), diethyl malonate (simulant for soman) and malathion (simulant for VX or toxic industrial chemicals). All have been safely used in previous HVTs, and have a range of physicochemical properties that would allow useful inference to more toxic chemicals when employed in future studies of emergency decontamination systems. © 2017 Crown Copyright. Journal of Applied Toxicology published by John Wiley & Sons, Ltd.

  3. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  4. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  5. Environmental Decontamination of a Chemical Warfare Simulant Utilizing a Membrane Vesicle-Encapsulated Phosphotriesterase.

    Science.gov (United States)

    Alves, Nathan J; Moore, Martin; Johnson, Brandy J; Dean, Scott N; Turner, Kendrick B; Medintz, Igor L; Walper, Scott A

    2018-05-09

    While technologies for the remediation of chemical contaminants continue to emerge, growing interest in green technologies has led researchers to explore natural catalytic mechanisms derived from microbial species. One such method, enzymatic degradation, offers an alternative to harsh chemical catalysts and resins. Recombinant enzymes, however, are often too labile or show limited activity when challenged with nonideal environmental conditions that may vary in salinity, pH, or other physical properties. Here, we demonstrate how phosphotriesterase encapsulated in a bacterial outer membrane vesicle can be used to degrade the organophosphate chemical warfare agent (CWA) simulant paraoxon in environmental water samples. We also carried out remediation assays on solid surfaces, including glass, painted metal, and fabric, that were selected as representative materials, which could potentially be contaminated with a CWA.

  6. Fish passage through hydropower turbines: Simulating blade strike using the discrete element method

    International Nuclear Information System (INIS)

    Richmond, M C; Romero-Gomez, P

    2014-01-01

    Among the hazardous hydraulic conditions affecting anadromous and resident fish during their passage though hydro-turbines two common physical processes can lead to injury and mortality: collisions/blade-strike and rapid decompression. Several methods are currently available to evaluate these stressors in installed turbines, e.g. using live fish or autonomous sensor devices, and in reduced-scale physical models, e.g. registering collisions from plastic beads. However, a priori estimates with computational modeling approaches applied early in the process of turbine design can facilitate the development of fish-friendly turbines. In the present study, we evaluated the frequency of blade strike and rapid pressure change by modeling potential fish trajectories with the Discrete Element Method (DEM) applied to fish-like composite particles. In the DEM approach, particles are subjected to realistic hydraulic conditions simulated with computational fluid dynamics (CFD), and particle-structure interactions-representing fish collisions with turbine components such as blades-are explicitly recorded and accounted for in the calculation of particle trajectories. We conducted transient CFD simulations by setting the runner in motion and allowing for unsteady turbulence using detached eddy simulation (DES), as compared to the conventional practice of simulating the system in steady state (which was also done here for comparison). While both schemes yielded comparable bulk hydraulic performance values, transient conditions exhibited an improvement in describing flow temporal and spatial variability. We released streamtraces (in the steady flow solution) and DEM particles (transient solution) at the same locations where sensor fish (SF) were released in previous field studies of the advanced turbine unit. The streamtrace- based results showed a better agreement with SF data than the DEM-based nadir pressures did because the former accounted for the turbulent dispersion at the

  7. Binding affinity and decontamination of dermal decontamination gel to model chemical warfare agent simulants.

    Science.gov (United States)

    Cao, Yachao; Elmahdy, Akram; Zhu, Hanjiang; Hui, Xiaoying; Maibach, Howard

    2018-05-01

    Six chemical warfare agent simulants (trimethyl phosphate, dimethyl adipate, 2-chloroethyl methyl sulfide, diethyl adipate, chloroethyl phenyl sulfide and diethyl sebacate) were studied in in vitro human skin to explore relationship between dermal penetration/absorption and the mechanisms of simulant partitioning between stratum corneum (SC) and water as well as between dermal decontamination gel (DDGel) and water. Both binding affinity to and decontamination of simulants using DDGel were studied. Partition coefficients of six simulants between SC and water (Log P SC/w ) and between DDGel and water (Log P DDGel/w ) were determined. Results showed that DDGel has a similar or higher binding affinity to each simulant compared to SC. The relationship between Log P octanol/water and Log P SC/w as well as between Log P octanol/water and Log P DDGel/w demonstrated that partition coefficient of simulants correlated to their lipophilicity or hydrophilicity. Decontamination efficiency results with DDGel for these simulants were consistent with binding affinity results. Amounts of percentage dose of chemicals in DDGel of trimethyl phosphate, dimethyl adipate, 2-chloroethyl methyl sulfide, diethyl adipate, chloroethyl phenyl sulfide and diethyl sebacate were determined to be 61.15, 85.67, 75.91, 53.53, 89.89 and 76.58, with corresponding amounts absorbed in skin of 0.96, 0.65, 1.68, 0.72, 0.57 and 1.38, respectively. In vitro skin decontamination experiments coupled with a dermal absorption study demonstrated that DDGel can efficiently remove chemicals from skin surface, back-extract from the SC, and significantly reduced chemical penetration into skin or systemic absorption for all six simulants tested. Therefore, DDGel offers a great potential as a NextGen skin Decon platform technology for both military and civilian use. Copyright © 2018 John Wiley & Sons, Ltd.

  8. Binding of chemical warfare agent simulants as guests in a coordination cage: contributions to binding and a fluorescence-based response.

    Science.gov (United States)

    Taylor, Christopher G P; Piper, Jerico R; Ward, Michael D

    2016-05-07

    Cubic coordination cages act as competent hosts for several alkyl phosphonates used as chemical warfare agent simulants; a range of cage/guest structures have been determined, contributions to guest binding analysed, and a fluorescent response to guest binding demonstrated.

  9. QuickStrike ASOC Battlefield Simulation: Preparing the War Fighter to Win

    Science.gov (United States)

    Jones, Richard L.

    2010-01-01

    The QuickStrike ASOC (Air Support Operations Center) Battlefield Simulation fills a crucial gap in USAF and United Kingdom Close Air Support (CAS) and airspace manager training. The system now provides six squadrons with the capability to conduct total-mission training events whenever the personnel and time are available. When the 111th ASOC returned from their first deployment to Afghanistan they realized the training available prior to deployment was inadequate. They sought an organic training capability focused on the ASOC mission that was low cost, simple to use, adaptable, and available now. Using a commercial off-the-shelf simulation, they developed a complete training system by adapting the simulation to their training needs. Through more than two years of spiral development, incorporating lessons learned, the system has matured, and can now realistically replicate the Tactical Operations Center (TOC) in Kabul, Afghanistan, the TOC supporting the mission in Iraq, or can expand to support a major conflict scenario. The training system provides a collaborative workspace for the training audience and exercise control group via integrated software and workstations that can easily adapt to new mission reqUirements and TOC configurations. The system continues to mature. Based on inputs from the war fighter, new capabilities have been incorporated to add realism and simplify the scenario development process. The QuickStrike simulation can now import TBMCS Air Tasking Order air mission data and can provide air and ground tracks to a common operating picture; presented through either C2PC or JADOCS. This oranic capability to practice team processes and tasks and to conduct mission rehearsals proved its value in the 111 h ASOS's next deployment. The ease of scenario development and the simple to learn and intuitive gamelike interface enables the squadrons to develop and share scenarios incorporating lessons learned from every deployment. These war fighters have now

  10. Analysis of the Precursors, Simulants and Degradation Products of Chemical Warfare Agents.

    Science.gov (United States)

    Witkiewicz, Zygfryd; Neffe, Slawomir; Sliwka, Ewa; Quagliano, Javier

    2018-09-03

    Recent advances in analysis of precursors, simulants and degradation products of chemical warfare agents (CWA) are reviewed. Fast and reliable analysis of precursors, simulants and CWA degradation products is extremely important at a time, when more and more terrorist groups and radical non-state organizations use or plan to use chemical weapons to achieve their own psychological, political and military goals. The review covers the open source literature analysis after the time, when the chemical weapons convention had come into force (1997). The authors stated that during last 15 years increased number of laboratories are focused not only on trace analysis of CWA (mostly nerve and blister agents) in environmental and biological samples, but the growing number of research are devoted to instrumental analysis of precursors and degradation products of these substances. The identification of low-level concentration of CWA degradation products is often more important and difficult than the original CWA, because of lower level of concentration and a very large number of compounds present in environmental and biological samples. Many of them are hydrolysis products and are present in samples in the ionic form. For this reason, two or three instrumental methods are used to perform a reliable analysis of these substances.

  11. Using an Earthquake Simulator to Model Tremor Along a Strike Slip Fault

    Science.gov (United States)

    Cochran, E. S.; Richards-Dinger, K. B.; Kroll, K.; Harrington, R. M.; Dieterich, J. H.

    2013-12-01

    We employ the earthquake simulator, RSQSim, to investigate the conditions under which tremor occurs in the transition zone of the San Andreas fault. RSQSim is a computationally efficient method that uses rate- and state- dependent friction to simulate a wide range of event sizes for long time histories of slip [Dieterich and Richards-Dinger, 2010; Richards-Dinger and Dieterich, 2012]. RSQSim has been previously used to investigate slow slip events in Cascadia [Colella et al., 2011; 2012]. Earthquakes, tremor, slow slip, and creep occurrence are primarily controlled by the rate and state constants a and b and slip speed. We will report the preliminary results of using RSQSim to vary fault frictional properties in order to better understand rupture dynamics in the transition zone using observed characteristics of tremor along the San Andreas fault. Recent studies of tremor along the San Andreas fault provide information on tremor characteristics including precise locations, peak amplitudes, duration of tremor episodes, and tremor migration. We use these observations to constrain numerical simulations that examine the slip conditions in the transition zone of the San Andreas Fault. Here, we use the earthquake simulator, RSQSim, to conduct multi-event simulations of tremor for a strike slip fault modeled on Cholame section of the San Andreas fault. Tremor was first observed on the San Andreas fault near Cholame, California near the southern edge of the 2004 Parkfield rupture [Nadeau and Dolenc, 2005]. Since then, tremor has been observed across a 150 km section of the San Andreas with depths between 16-28 km and peak amplitudes that vary by a factor of 7 [Shelly and Hardebeck, 2010]. Tremor episodes, comprised of multiple low frequency earthquakes (LFEs), tend to be relatively short, lasting tens of seconds to as long as 1-2 hours [Horstmann et al., in review, 2013]; tremor occurs regularly with some tremor observed almost daily [Shelly and Hardebeck, 2010; Horstmann

  12. Effects of lactoferrin derived peptides on simulants of biological warfare agents.

    Science.gov (United States)

    Sijbrandij, Tjitske; Ligtenberg, Antoon J; Nazmi, Kamran; Veerman, Enno C I; Bolscher, Jan G M; Bikker, Floris J

    2017-01-01

    Lactoferrin (LF) is an important immune protein in neutrophils and secretory fluids of mammals. Bovine LF (bLF) harbours two antimicrobial stretches, lactoferricin and lactoferampin, situated in close proximity in the N1 domain. To mimic these antimicrobial domain parts a chimeric peptide (LFchimera) has been constructed comprising parts of both stretches (LFcin17-30 and LFampin265-284). To investigate the potency of this construct to combat a set of Gram positive and Gram negative bacteria which are regarded as simulants for biological warfare agents, the effect on bacterial killing, membrane permeability and membrane polarity were determined in comparison to the constituent peptides and the native bLF. Furthermore we aimed to increase the antimicrobial potency of the bLF derived peptides by cationic amino acid substitutions. Overall, the bactericidal activity of the peptides could be related to membrane disturbing effects, i.e. membrane permeabilization and depolarization. Those effects were most prominent for the LFchimera. Arginine residues were found to be crucial for displaying antimicrobial activity, as lysine to arginine substitutions resulted in an increased antimicrobial activity, affecting mostly LFampin265-284 whereas arginine to lysine substitutions resulted in a decreased bactericidal activity, predominantly in case of LFcin17-30.

  13. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  14. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  15. Identification of vapor-phase chemical warfare agent simulants and rocket fuels using laser-induced breakdown spectroscopy

    International Nuclear Information System (INIS)

    Stearns, Jaime A.; McElman, Sarah E.; Dodd, James A.

    2010-01-01

    Application of laser-induced breakdown spectroscopy (LIBS) to the identification of security threats is a growing area of research. This work presents LIBS spectra of vapor-phase chemical warfare agent simulants and typical rocket fuels. A large dataset of spectra was acquired using a variety of gas mixtures and background pressures and processed using partial least squares analysis. The five compounds studied were identified with a 99% success rate by the best method. The temporal behavior of the emission lines as a function of chamber pressure and gas mixture was also investigated, revealing some interesting trends that merit further study.

  16. Identification of vapor-phase chemical warfare agent simulants and rocket fuels using laser-induced breakdown spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Stearns, Jaime A.; McElman, Sarah E.; Dodd, James A.

    2010-05-01

    Application of laser-induced breakdown spectroscopy (LIBS) to the identification of security threats is a growing area of research. This work presents LIBS spectra of vapor-phase chemical warfare agent simulants and typical rocket fuels. A large dataset of spectra was acquired using a variety of gas mixtures and background pressures and processed using partial least squares analysis. The five compounds studied were identified with a 99% success rate by the best method. The temporal behavior of the emission lines as a function of chamber pressure and gas mixture was also investigated, revealing some interesting trends that merit further study.

  17. Acoustic Emission Monitoring of Compression-after-Impact Test of Nano-Particles-Coated CFRP Damaged by Simulated Lightning Strikes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Je Ha; Kwon, Oh Yang; Seo, Seong Wook [Inha University, Incheon (Korea, Republic of)

    2011-02-15

    Nanoparticles-coated and impact-damaged carbon-fiber reinforced plastics(CFRP) laminates were tested under compression-after-impact(CAI) mode and the propagation of damage due to compressive loading has been monitored by acoustic emission(AE). The impact damage was induced not by mechanical loading but by a simulated lightning strike. CFRP laminates were made of carbon prepregs prepared by coating of conductive nano-particles directly on the fibers and the coupons were subjected to simulated lightning strikes with a high voltage/current impulse of 10{approx}40 kA within a few microseconds. The effects of nano-particles coating and the degree of damage induced by the simulated lightning strikes on the AE activities were examined, and the relationship between the compressive residual strength and AE behavior has been evaluated in terms of AE event counts and the onset of AE activity with the compressive loading. The degree of impact damage was also measured in terns of damage area by using ultrasonic C-scan images. From the results assessed during the CAI tests of damaged CFRP showed that AE monitoring appeared to be very useful to differentiate the degree of damage hence the mechanical integrity of composite structures damaged by lightning strikes

  18. Acoustic Emission Monitoring of Compression-after-Impact Test of Nano-Particles-Coated CFRP Damaged by Simulated Lightning Strikes

    International Nuclear Information System (INIS)

    Shin, Je Ha; Kwon, Oh Yang; Seo, Seong Wook

    2011-01-01

    Nanoparticles-coated and impact-damaged carbon-fiber reinforced plastics(CFRP) laminates were tested under compression-after-impact(CAI) mode and the propagation of damage due to compressive loading has been monitored by acoustic emission(AE). The impact damage was induced not by mechanical loading but by a simulated lightning strike. CFRP laminates were made of carbon prepregs prepared by coating of conductive nano-particles directly on the fibers and the coupons were subjected to simulated lightning strikes with a high voltage/current impulse of 10∼40 kA within a few microseconds. The effects of nano-particles coating and the degree of damage induced by the simulated lightning strikes on the AE activities were examined, and the relationship between the compressive residual strength and AE behavior has been evaluated in terms of AE event counts and the onset of AE activity with the compressive loading. The degree of impact damage was also measured in terns of damage area by using ultrasonic C-scan images. From the results assessed during the CAI tests of damaged CFRP showed that AE monitoring appeared to be very useful to differentiate the degree of damage hence the mechanical integrity of composite structures damaged by lightning strikes

  19. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  20. Dual-Function Metal-Organic Framework as a Versatile Catalyst for Detoxifying Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Liu, Yangyang; Moon, Su-Young; Hupp, Joseph T; Farha, Omar K

    2015-12-22

    The nanocrystals of a porphyrin-based zirconium(IV) metal-organic framework (MOF) are used as a dual-function catalyst for the simultaneous detoxification of two chemical warfare agent simulants at room temperature. Simulants of nerve agent (such as GD, VX) and mustard gas, dimethyl 4-nitrophenyl phosphate and 2-chloroethyl ethyl sulfide, have been hydrolyzed and oxidized, respectively, to nontoxic products via a pair of pathways catalyzed by the same MOF. Phosphotriesterase-like activity of the Zr6-containing node combined with photoactivity of the porphyrin linker gives rise to a versatile MOF catalyst. In addition, bringing the MOF crystals down to the nanoregime leads to acceleration of the catalysis.

  1. Lightning Strike Ablation Damage Influence Factors Analysis of Carbon Fiber/Epoxy Composite Based on Coupled Electrical-Thermal Simulation

    Science.gov (United States)

    Yin, J. J.; Chang, F.; Li, S. L.; Yao, X. L.; Sun, J. R.; Xiao, Y.

    2017-10-01

    According to the mathematical analysis model constructed on the basis of energy-balance relationship in lightning strike, and accompany with the simplified calculation strategy of composite resin pyrolysis degree dependent electrical conductivity, an effective three dimensional thermal-electrical coupling analysis finite element model of composite laminate suffered from lightning current was established based on ABAQUS, to elucidate the effects of lighting current waveform parameters and thermal/electrical properties of composite laminate on the extent of ablation damage. Simulated predictions agree well with the composite lightning strike directed effect experimental data, illustrating the potential accuracy of the constructed model. The analytical results revealed that extent of composite lightning strike ablation damage can be characterized by action integral validly, there exist remarkable power function relationships between action integral and visual damage area, projected damage area, maximum damage depth and damage volume of ablation damage, and enhancing the electrical conductivity and specific heat of composite, ablation damage will be descended obviously, power function relationships also exist between electrical conductivity, specific heat and ablation damage, however, the impact of thermal conductivity on the extent of ablation damage is not notable. The conclusions obtained provide some guidance for composite anti-lightning strike structure-function integration design.

  2. Thought about Strategic Demonstration Simulation Warfare Experiment%关于战略级推演模拟型作战实验的思考

    Institute of Scientific and Technical Information of China (English)

    周绍亮; 李雄; 董斐; 付佳

    2011-01-01

    Abstract:Based on classification of warfare experiments, the concept of strategic demonstration simulation warfare experiment is defined. From the standpoint of establishment of national strategic goals, grasping of international situation and education of joint operation command talents, the function and signification of strategic demonstration simulation warfare experiment are discussed. The basic requirements on military strategic policy, coordinated development of army construction and military operations, warfare lab and warfare experiment technologies are analyzed. The strategic demonstration simulation warfare lab is designed by presenting its functional framework, logic concept framework and running mode. The research results provide theoretical reference to promoting innovation development of warfare experiment.%摘要:在划分作战实验类别的基础上,界定了战略级推演模拟型作战实验的基本概念;从国家战略目标确立、国际局势把握、联合作战指挥人才培养的角度,阐述了战略级推演模拟型作战实验的作用及意义;从以军事战略方针为指导、与军队建设和军事作战协调发展、以作战实验机构为依托、以作战实验技术手段为支撑的角度,分析了战略级推演模拟型作战实验的基本要求;从功能结构、逻辑概念结构、运行模式的角度,进行了战略级推演模拟型作战实验室的初步设计。研究结果可为推动作战实验的创新发展提供理论参考。

  3. Decontamination of chemical-warfare agent simulants by polymer surfaces doped with the singlet oxygen generator zinc octaphenoxyphthalocyanine.

    Science.gov (United States)

    Gephart, Raymond T; Coneski, Peter N; Wynne, James H

    2013-10-23

    Using reactive singlet oxygen (1O2), the oxidation of chemical-warfare agent (CWA) simulants has been demonstrated. The zinc octaphenoxyphthalocyanine (ZnOPPc) complex was demonstrated to be an efficient photosensitizer for converting molecular oxygen (O2) to 1O2 using broad-spectrum light (450-800 nm) from a 250 W halogen lamp. This photosensitization produces 1O2 in solution as well as within polymer matrices. The oxidation of 1-naphthol to naphthoquinone was used to monitor the rate of 1O2 generation in the commercially available polymer film Hydrothane that incorporates ZnOPPc. Using electrospinning, nanofibers of ZnOPPc in Hydrothane and polycarbonate were formed and analyzed for their ability to oxidize demeton-S, a CWA simulant, on the surface of the polymers and were found to have similar reactivity as their corresponding films. The Hydrothane films were then used to oxidize CWA simulants malathion, 2-chloroethyl phenyl sulfide (CEPS), and 2-chloroethyl ethyl sulfide (CEES). Through this oxidation process, the CWA simulants are converted into less toxic compounds, thus decontaminating the surface using only O2 from the air and light.

  4. Graphene Nanoplatelet-Polymer Chemiresistive Sensor Arrays for the Detection and Discrimination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Wiederoder, Michael S; Nallon, Eric C; Weiss, Matt; McGraw, Shannon K; Schnee, Vincent P; Bright, Collin J; Polcha, Michael P; Paffenroth, Randy; Uzarski, Joshua R

    2017-11-22

    A cross-reactive array of semiselective chemiresistive sensors made of polymer-graphene nanoplatelet (GNP) composite coated electrodes was examined for detection and discrimination of chemical warfare agents (CWA). The arrays employ a set of chemically diverse polymers to generate a unique response signature for multiple CWA simulants and background interferents. The developed sensors' signal remains consistent after repeated exposures to multiple analytes for up to 5 days with a similar signal magnitude across different replicate sensors with the same polymer-GNP coating. An array of 12 sensors each coated with a different polymer-GNP mixture was exposed 100 times to a cycle of single analyte vapors consisting of 5 chemically similar CWA simulants and 8 common background interferents. The collected data was vector normalized to reduce concentration dependency, z-scored to account for baseline drift and signal-to-noise ratio, and Kalman filtered to reduce noise. The processed data was dimensionally reduced with principal component analysis and analyzed with four different machine learning algorithms to evaluate discrimination capabilities. For 5 similarly structured CWA simulants alone 100% classification accuracy was achieved. For all analytes tested 99% classification accuracy was achieved demonstrating the CWA discrimination capabilities of the developed system. The novel sensor fabrication methods and data processing techniques are attractive for development of sensor platforms for discrimination of CWA and other classes of chemical vapors.

  5. A Polyoxoniobate-Polyoxovanadate Double-Anion Catalyst for Simultaneous Oxidative and Hydrolytic Decontamination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Dong, Jing; Hu, Jufang; Chi, Yingnan; Lin, Zhengguo; Zou, Bo; Yang, Song; Hill, Craig L; Hu, Changwen

    2017-04-10

    A novel double-anion complex, H 13 [(CH 3 ) 4 N] 12 [PNb 12 O 40 (V V O) 2 ⋅(V IV 4 O 12 ) 2 ]⋅22 H 2 O (1), based on bicapped polyoxoniobate and tetranuclear polyoxovanadate was synthesized, characterized by routine techniques and used in the catalytic decontamination of chemical warfare agents. Under mild conditions, 1 catalyzes both hydrolysis of the nerve agent simulant, diethyl cyanophosphonate (DECP) and selective oxidation of the sulfur mustard simulant, 2-chloroethyl ethyl sulfide (CEES). In the oxidative decontamination system 100 % CEES was transformed selectively to nontoxic 2-chloroethyl ethyl sulfoxide and vinyl ethyl sulfoxide using nearly stoichiometric 3 % aqueous H 2 O 2 with a turnover frequency (TOF) of 16 000 h -1 . Importantly, the catalytic activity is maintained even after ten recycles and CEES is completely decontaminated in 3 mins without formation of the highly toxic sulfone by-product. A three-step oxidative mechanism is proposed. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. Ground potential rise on the high voltage substation during lightning strike measurement and simulation results

    Energy Technology Data Exchange (ETDEWEB)

    Wiater, Jaroslaw [Bialystok Technical University (Poland). Electrical Dept.], E-mail: jaroslawwiater@we.pb.edu.pl

    2007-07-01

    This paper will present a ground potential rise (GPR) measurement results. All measurements were made during normal work of the real high voltage substation and according a special procedure developed for this occasion. This procedure does not influence on the protection relays and ensures a proper work of the substation even for 6 kV surges. During measurements current and voltage surges were produced by the impulse generator - UCS 500M6B. Measurement results are compared to simulation results performed in CDEGS software for the same initial conditions. (author)

  7. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  8. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal; Hicks, Kristin A.; Barlaz, Morton A.; De Los Reyes, Francis Delos De Los

    2010-01-01

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  9. Fast and Sustained Degradation of Chemical Warfare Agent Simulants Using Flexible Self-Supported Metal-Organic Framework Filters.

    Science.gov (United States)

    Liang, Huixin; Yao, Aonan; Jiao, Xiuling; Li, Cheng; Chen, Dairong

    2018-06-20

    Self-detoxification filters against lethal chemical warfare agents (CWAs) are highly desirable for the protection of human beings and the environment. In this report, flexible self-supported filters of a series of Zr(IV)-based metal-organic frameworks (MOFs) including UiO-66, UiO-67, and UiO-66-NH 2 were successfully prepared and exhibited fast and sustained degradation of CWA simulants. A half-life as short as 2.4 min was obtained for the catalytic hydrolysis of dimethyl 4-nitrophenyl phosphate, and the percent conversion remained above 90% over a long-term exposure of 120 min, well exceeding those of the previously reported composite MOF filters and the corresponding MOF powders. The outstanding detoxification performance of the self-supported fibrous filter comes from the exceptionally high surface area, excellent pore accessibility, and hierarchical structure from the nano- to macroscale. This work demonstrates, for the first time, MOF-only filters as efficient self-detoxification media, which will offer new opportunities for the design and fabrication of functional materials for toxic chemical protection.

  10. Experimental and Numerical Simulation Analysis of Typical Carbon Woven Fabric/Epoxy Laminates Subjected to Lightning Strike

    Science.gov (United States)

    Yin, J. J.; Chang, F.; Li, S. L.; Yao, X. L.; Sun, J. R.; Xiao, Y.

    2017-12-01

    To clarify the evolution of damage for typical carbon woven fabric/epoxy laminates exposed to lightning strike, artificial lightning testing on carbon woven fabric/epoxy laminates were conducted, damage was assessed using visual inspection and damage peeling approaches. Relationships between damage size and action integral were also elucidated. Results showed that damage appearance of carbon woven fabric/epoxy laminate presents circular distribution, and center of the circle located at the lightning attachment point approximately, there exist no damage projected area dislocations for different layers, visual damage territory represents maximum damage scope; visible damage can be categorized into five modes: resin ablation, fiber fracture and sublimation, delamination, ablation scallops and block-shaped ply-lift; delamination damage due to resin pyrolysis and internal pressure exist obvious distinguish; project area of total damage is linear with action integral for the same type specimens, that of resin ablation damage is linear with action integral, but no correlation with specimen type, for all specimens, damage depth is linear with logarithm of action integral. The coupled thermal-electrical model constructed is capable to simulate the ablation damage for carbon woven fabric/epoxy laminates exposed to simulated lightning current through experimental verification.

  11. Optimization of Intelligent Munition Warfare Using Agent-Based Simulation Software and Design of Experiments Methodology

    National Research Council Canada - National Science Library

    Floersheim, Bruce; Hou, Gene

    2006-01-01

    ... mechanism for a number of vehicles caught in the killzone. Thus, it is useful to study and attempt to model through equations and simulation the interaction between enemy agents and these new munitions...

  12. Chemical warfare agent simulants for human volunteer trials of emergency decontamination: A systematic review

    OpenAIRE

    James, Thomas; Wyke, Stacey; Marczylo, Tim; Collins, Samuel; Gaulton, Tom; Foxall, Kerry; Amlôt, Richard; Duarte‐Davidson, Raquel

    2017-01-01

    Abstract Incidents involving the release of chemical agents can pose significant risks to public health. In such an event, emergency decontamination of affected casualties may need to be undertaken to reduce injury and possible loss of life. To ensure these methods are effective, human volunteer trials (HVTs) of decontamination protocols, using simulant contaminants, have been conducted. Simulants must be used to mimic the physicochemical properties of more harmful chemicals, while remaining ...

  13. Decontamination of chemical warfare sulfur mustard agent simulant by ZnO nanoparticles

    Science.gov (United States)

    Sadeghi, Meysam; Yekta, Sina; Ghaedi, Hamed

    2016-07-01

    In this study, zinc oxide nanoparticles (ZnO NPs) have been surveyed to decontaminate the chloroethyl phenyl sulfide as a sulfur mustard agent simulant. Prior to the reaction, ZnO NPs were successfully prepared through sol-gel method in the absence and presence of polyvinyl alcohol (PVA). PVA was utilized as a capping agent to control the agglomeration of the nanoparticles. The formation, morphology, elemental component, and crystalline size of nanoscale ZnO were certified and characterized by SEM/EDX, XRD, and FT-IR techniques. The decontamination (adsorption and destruction) was tracked by the GC-FID analysis, in which the effects of polarity of the media, such as isopropanol, acetone and n-hexane, reaction time intervals from 1 up to 18 h, and different temperatures, including 25, 35, 45, and 55 °C, on the catalytic/decontaminative capability of the surface of ZnO NPs/PVA were investigated and discussed, respectively. Results demonstrated that maximum decontamination (100 %) occurred in n-hexane solvent at 55 °C after 1 h. On the other hand, the obtained results for the acetone and isopropanol solvents were lower than expected. GC-MS chromatograms confirmed the formation of hydroxyl ethyl phenyl sulfide and phenyl vinyl sulfide as the destruction reaction products. Furthermore, these chromatograms proved the role of hydrolysis and elimination mechanisms on the catalyst considering its surface Bronsted and Lewis acid sites. A non-polar solvent aids material transfer to the reactive surface acid sites without blocking these sites.

  14. Lightning strikes

    International Nuclear Information System (INIS)

    Dance, B.

    1982-01-01

    If a nuclear weapon were struck by a powerful lightning flash, what would happen Scientists have assembled a simulator to produce exceptionally powerful discharges to try to find the answer to this question by practical test. The Sandia facility enables the extremely powerful lightning discharges which occur only once in every hundred lightning strokes to be duplicated. A bolt is composed of a series of strokes between two clouds or between one cloud and the earth. The simulator consists of four circuits, an inductor, a resistor and a special crowbar-switch developed at Sandia. The crowbar is for accuracy in the simulation of a lightning stroke. The test data is conveyed to computers for analysis by means of fibre-optic links. The first series of tests involve the warhead for the Air-Launched Cruise Missile

  15. Graphene oxide as sensitive layer in Love-wave surface acoustic wave sensors for the detection of chemical warfare agent simulants.

    Science.gov (United States)

    Sayago, Isabel; Matatagui, Daniel; Fernández, María Jesús; Fontecha, José Luis; Jurewicz, Izabela; Garriga, Rosa; Muñoz, Edgar

    2016-02-01

    A Love-wave device with graphene oxide (GO) as sensitive layer has been developed for the detection of chemical warfare agent (CWA) simulants. Sensitive films were fabricated by airbrushing GO dispersions onto Love-wave devices. The resulting Love-wave sensors detected very low CWA simulant concentrations in synthetic air at room temperature (as low as 0.2 ppm for dimethyl-methylphosphonate, DMMP, a simulant of sarin nerve gas, and 0.75 ppm for dipropylene glycol monomethyl ether, DPGME, a simulant of nitrogen mustard). High responses to DMMP and DPGME were obtained with sensitivities of 3087 and 760 Hz/ppm respectively. Very low limit of detection (LOD) values (9 and 40 ppb for DMMP and DPGME, respectively) were calculated from the achieved experimental data. The sensor exhibited outstanding sensitivity, good linearity and repeatability to all simulants tested. The detection mechanism is here explained in terms of hydrogen bonding formation between the tested CWA simulants and GO. Copyright © 2015 Elsevier B.V. All rights reserved.

  16. Portable Solid Phase Micro-Extraction Coupled with Ion Mobility Spectrometry System for On-Site Analysis of Chemical Warfare Agents and Simulants in Water Samples

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2014-11-01

    Full Text Available On-site analysis is an efficient approach to facilitate analysis at the location of the system under investigation as it can result in more accurate, more precise and quickly available analytical data. In our work, a novel self-made thermal desorption based interface was fabricated to couple solid-phase microextraction with ion mobility spectrometry for on-site water analysis. The portable interface can be connected with the front-end of an ion mobility spectrometer directly without other modifications. The analytical performance was evaluated via the extraction of chemical warfare agents and simulants in water samples. Several parameters including ionic strength and extraction time have been investigated in detail. The application of the developed method afforded satisfactory recoveries ranging from 72.9% to 114.4% when applied to the analysis of real water samples.

  17. Portable Solid Phase Micro-Extraction Coupled with Ion Mobility Spectrometry System for On-Site Analysis of Chemical Warfare Agents and Simulants in Water Samples

    Science.gov (United States)

    Yang, Liu; Han, Qiang; Cao, Shuya; Yang, Jie; Yang, Junchao; Ding, Mingyu

    2014-01-01

    On-site analysis is an efficient approach to facilitate analysis at the location of the system under investigation as it can result in more accurate, more precise and quickly available analytical data. In our work, a novel self-made thermal desorption based interface was fabricated to couple solid-phase microextraction with ion mobility spectrometry for on-site water analysis. The portable interface can be connected with the front-end of an ion mobility spectrometer directly without other modifications. The analytical performance was evaluated via the extraction of chemical warfare agents and simulants in water samples. Several parameters including ionic strength and extraction time have been investigated in detail. The application of the developed method afforded satisfactory recoveries ranging from 72.9% to 114.4% when applied to the analysis of real water samples. PMID:25384006

  18. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  19. ERO and PIC simulations of gross and net erosion of tungsten in the outer strike-point region of ASDEX Upgrade

    Directory of Open Access Journals (Sweden)

    A. Hakola

    2017-08-01

    Full Text Available We have modelled net and gross erosion of W in low-density l-mode plasmas in the low-field side strike point region of ASDEX Upgrade by ERO and Particle-in-Cell (PIC simulations. The observed net-erosion peak at the strike point was mainly due to the light impurities present in the plasma while the noticeable net-deposition regions surrounding the erosion maximum could be attributed to the strong E ×B drift and the magnetic field bringing eroded particles from a distance of several meters towards the private flux region. Our results also imply that the role of cross-field diffusion is very small in the studied plasmas. The simulations indicate net/gross erosion ratio of 0.2–0.6, which is in line with the literature data and what was determined spectroscopically. The deviations from the estimates extracted from post-exposure ion-beam-analysis data (∼0.6–0.7 are most likely due to the measured re-deposition patterns showing the outcomes of multiple erosion-deposition cycles.

  20. Chemical Warfare Agent Simulants in Gamble’s Fluid: Is the Fluid Toxic? Can It Be Made Safer by Inclusion of Solid Nanocrystalline Metal Oxides?

    Directory of Open Access Journals (Sweden)

    Dennis Karote

    2013-01-01

    Full Text Available The reactions of chemical warfare agent simulants, 2-chloroethyl ethyl sulfide (2-CEES and di-i-propyl fluoro phosphate (DFP, in fluids have been investigated. Data analyses confirm the major degradation pathway to be hydrolysis of 2-CEES to 2-hydroxyethyl ethyl sulfide, along with minor self-condensation products. Among the three fluids examined, 2-CEES degradation was the fastest in Gamble’s fluid during a 96 h period. Upon addition of Exceptional Hazard Attenuation Materials (EHAMs to 2-CEES containing Gamble’s fluid, degradation was generally improved during the first 24 h period. The 96 h outcome was similar for fluid samples with or without EHAM 2 and EHAM 4. EHAM 1-added fluid contained only one degradation product, 2-nitroethyl ethyl sulfide. DFP degradation was the slowest in Gamble’s fluid, but was enhanced by the addition of EHAMs. FTIR and solid state 31P NMR confirm the destructive adsorption of 2-CEES and DFP by the EHAMs. The results collectively demonstrate that 2-CEES and DFP decompose to various extents in Gamble’s fluid over a 96 h period but the fluid still contains a considerable amount of intact simulant. EHAM 1 appears to be promising for 2-CEES and DFP mitigation while EHAM 2 and EHAM 4 work well for early on concentration reduction of 2-CEES and DFP.

  1. Preliminary evaluation of military, commercial and novel skin decontamination products against a chemical warfare agent simulant (methyl salicylate).

    Science.gov (United States)

    Matar, Hazem; Guerreiro, Antonio; Piletsky, Sergey A; Price, Shirley C; Chilcott, Robert P

    2016-01-01

    Rapid decontamination is vital to alleviate adverse health effects following dermal exposure to hazardous materials. There is an abundance of materials and products which can be utilised to remove hazardous materials from the skin. In this study, a total of 15 products were evaluated, 10 of which were commercial or military products and five were novel (molecular imprinted) polymers. The efficacies of these products were evaluated against a 10 µl droplet of (14)C-methyl salicylate applied to the surface of porcine skin mounted on static diffusion cells. The current UK military decontaminant (Fuller's earth) performed well, retaining 83% of the dose over 24 h and served as a benchmark to compare with the other test products. The five most effective test products were Fuller's earth (the current UK military decontaminant), Fast-Act® and three novel polymers [based on itaconic acid, 2-trifluoromethylacrylic acid and N,N-methylenebis(acrylamide)]. Five products (medical moist-free wipes, 5% FloraFree™ solution, normal baby wipes, baby wipes for sensitive skin and Diphotérine™) enhanced the dermal absorption of (14)C-methyl salicylate. Further work is required to establish the performance of the most effective products identified in this study against chemical warfare agents.

  2. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  3. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  4. METHODS OF MEASURING THE EFFECTS OF LIGHTNING BY SIMULATING ITS STRIKES WITH THE INTERVAL ASSESSMENT OF THE RESULTS OF MEASUREMENTS

    Directory of Open Access Journals (Sweden)

    P. V. Kriksin

    2017-01-01

    Full Text Available The article presents the results of the development of new methods aimed at more accurate interval estimate of the experimental values of voltages on grounding devices of substations and circuits in the control cables, that occur when lightning strikes to lightning rods; the abovementioned estimate made it possible to increase the accuracy of the results of the study of lightning noise by 28 %. A more accurate value of interval estimation were achieved by developing a measurement model that takes into account, along with the measured values, different measurement errors and includes the special processing of the measurement results. As a result, the interval of finding the true value of the sought voltage is determined with an accuracy of 95 %. The methods can be applied to the IK-1 and IKP-1 measurement complexes, consisting in the aperiodic pulse generator, the generator of high-frequency pulses and selective voltmeters, respectively. To evaluate the effectiveness of the developed methods series of experimental voltage assessments of grounding devices of ten active high-voltage substation have been fulfilled in accordance with the developed methods and traditional techniques. The evaluation results confirmed the possibility of finding the true values of voltage over a wide range, that ought to be considered in the process of technical diagnostics of lightning protection of substations when the analysis of the measurement results and the development of measures to reduce the effects of lightning are being fulfilled. Also, a comparative analysis of the results of measurements made in accordance with the developed methods and traditional techniques has demonstrated that the true value of the sought voltage may exceed the measured value at an average of 28 %, that ought to be considered in the further analysis of the parameters of lightning protection at the facility and in the development of corrective actions. The developed methods have been

  5. Improving Integrated Operation in the Joint Integrated Mission Model (JIMM) and the Simulated Warfare Environment Data Transfer (SWEDAT) Protocol

    National Research Council Canada - National Science Library

    Mutschler, David W

    2005-01-01

    ...). It allows integrated operation of resources whereby the JIMM threat environment, stimulators virtual cockpits, systems under test, and other agents are combined within the same simulation exercise...

  6. Six Weeks Habituation of Simulated Barefoot Running Induces Neuromuscular Adaptations and Changes in Foot Strike Patterns in Female Runners

    Science.gov (United States)

    Khowailed, Iman Akef; Petrofsky, Jerrold; Lohman, Everett; Daher, Noha

    2015-01-01

    Background The aim of this study was to examine the effects of a 6-week training program of simulated barefoot running (SBR) on running kinetics in habitually shod (wearing shoes) female recreational runners. Material/Methods Twelve female runners age 25.7±3.4 years gradually increased running distance in Vibram FiveFingers minimal shoes over a 6-week period. The kinetic analysis of treadmill running at 10 Km/h was performed pre- and post-intervention in shod running, non-habituated SBR, and habituated SBR conditions. Spatiotemporal parameters, ground reaction force components, and electromyography (EMG) were measured in all conditions. Results Post-intervention data indicated a significant decrease across time in the habituation SBR for EMG activity of the tibialis anterior (TA) in the pre-activation and absorptive phase of running (Prunning, unhabituated SBR, and habituated SBR. Six weeks of SBR was associated with a significant decrease in the loading rates and impact forces. Additionally, SBR significantly decrease the stride length, step duration, and flight time, and stride frequency was significantly higher compared to shod running. Conclusions The findings of this study indicate that changes in motor patterns in previously habitually shod runners are possible and can be accomplished within 6 weeks. Non-habituation SBR did not show a significant neuromuscular adaptation in the EMG activity of TA and GAS as manifested after 6 weeks of habituated SBR. PMID:26166443

  7. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  8. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  9. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  10. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  11. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  12. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  13. Lightning Often Strikes Twice

    Science.gov (United States)

    2005-01-01

    Contrary to popular misconception, lightning often strikes the same place twice. Certain conditions are just ripe for a bolt of electricity to come zapping down; and a lightning strike is powerful enough to do a lot of damage wherever it hits. NASA created the Accurate Location of Lightning Strikes technology to determine the ground strike point of lightning and prevent electrical damage in the immediate vicinity of the Space Shuttle launch pads at Kennedy Space Center. The area surrounding the launch pads is enmeshed in a network of electrical wires and components, and electronic equipment is highly susceptible to lightning strike damage. The accurate knowledge of the striking point is important so that crews can determine which equipment or system needs to be retested following a strike. Accurate to within a few yards, this technology can locate a lightning strike in the perimeter of the launch pad. As an added bonus, the engineers, then knowing where the lightning struck, can adjust the variables that may be attracting the lightning, to create a zone that will be less susceptible to future strikes.

  14. Options with Extreme Strikes

    Directory of Open Access Journals (Sweden)

    Lingjiong Zhu

    2015-07-01

    Full Text Available In this short paper, we study the asymptotics for the price of call options for very large strikes and put options for very small strikes. The stock price is assumed to follow the Black–Scholes models. We analyze European, Asian, American, Parisian and perpetual options and conclude that the tail asymptotics for these option types fall into four scenarios.

  15. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  16. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  17. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  18. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  19. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  20. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  1. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  2. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  3. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  4. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  5. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  6. Algab õppus "Saber Strike"

    Index Scriptorium Estoniae

    2014-01-01

    Täna algab Eestis, Lätis ja Leedus Ameerika Ühendriikide Euroopa väekoondise õppus "Saber Strike", mille eesmärk on maaväeüksuste koostöö harjutamine. Õppusest võtab osa üle 2000 kaitseväelase Baltimaadest, USAst, Ühendkuningriigist, Taanist, Norrast, Soomest ja Saksamaalt. Eestist osaleb õppusel ligi 400 kaitseväelast

  7. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  8. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  9. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  10. The Poster Strikes Back

    DEFF Research Database (Denmark)

    Christensen, Line Hjorth

    2005-01-01

    The paper discusses fundamental issues in relation to placing graphic design in locations such as museums of decorative arts and living history museums. Based on my Ph.D. project on British commercial posters of the interwar years and approached from a combined perspective of museology, semiotics...... and design history, I argue that the poster during the interwar years inhabits a new active position. By exploiting and challenging the commercial and aesthetic paradox out of which it arose, the poster ‘strikes back' as a museologized, exhibited object. Rather than being absorbed into the city swirl...

  11. Global strike hypersonic weapons

    Science.gov (United States)

    Lewis, Mark J.

    2017-11-01

    Beginning in the 1940's, the United States has pursued the development of hypersonic technologies, enabling atmospheric flight in excess of five times the speed of sound. Hypersonic flight has application to a range of military and civilian applications, including commercial transport, space access, and various weapons and sensing platforms. A number of flight tests of hypersonic vehicles have been conducted by countries around the world, including the United States, Russia, and China, that could lead the way to future hypersonic global strike weapon systems. These weapons would be especially effective at penetrating conventional defenses, and could pose a significant risk to national security.

  12. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  13. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  14. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  15. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  16. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  17. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  18. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  19. Hair analysis as a useful procedure for detection of vapour exposure to chemical warfare agents: simulation of sulphur mustard with methyl salicylate.

    Science.gov (United States)

    Spiandore, Marie; Piram, Anne; Lacoste, Alexandre; Josse, Denis; Doumenq, Pierre

    2014-06-01

    Chemical warfare agents (CWA) are highly toxic compounds which have been produced to kill or hurt people during conflicts or terrorist attacks. Despite the fact that their use is strictly prohibited according to international convention, populations' exposure still recently occurred. Development of markers of exposure to CWA is necessary to distinguish exposed victims from unexposed ones. We present the first study of hair usage as passive sampler to assess contamination by chemicals in vapour form. This work presents more particularly the hair adsorption capacity for methyl salicylate used as a surrogate of the vesicant sulphur mustard. Chemical vapours toxicity through the respiratory route has historically been defined through Haber's law's concentration-time (Ct) product, and vapour exposure of hair to methyl salicylate was conducted with various times or doses of exposure in the range of incapacitating and lethal Ct products corresponding to sulphur mustard. Following exposure, extraction of methyl salicylate from hair was conducted by simple soaking in dichloromethane. Methyl salicylate could be detected on hair for vapour concentration corresponding to about one fifth of the sulphur mustard concentration that would kill 50% of exposed individuals (LCt50). The amount of methyl salicylate recovered from hair increased with time or dose of exposure. It showed a good correlation with the concentration-time product, suggesting that hair could be used like a passive sampler to assess vapour exposure to chemical compounds. It introduces great perspectives concerning the use of hair as a marker of exposure to CWA. Copyright © 2014 John Wiley & Sons, Ltd.

  20. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  1. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  2. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  3. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  4. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  5. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  6. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  7. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  8. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  9. Continental United States Hurricane Strikes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Continental U.S. Hurricane Strikes Poster is our most popular poster which is updated annually. The poster includes all hurricanes that affected the U.S. since...

  10. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  11. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  12. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  13. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  14. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  15. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  16. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  17. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  18. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  19. [Physicians' strikes--ethical considerations].

    Science.gov (United States)

    Glick, Shimon; Schwarzfuchs, Dan

    2012-01-01

    Strikes in general represent a solution based on a form of coercion. Historically, the striker caused direct damage to his employer, who was responsible for the perceived unfair treatment of the employee. In the case of strikes in the public sector, the employer is generally not harmed, but innocent citizens suffer in order to pressure the government agencies, a questionable practice from an ethical viewpoint. Physicians' strikes have more serious ethical problems. They cause suffering and death to innocent citizens. They violate the ethical codes to which physicians have committed themselves as professionals, and they seriously impair the trust of the public in physicians. Better and more ethical ways to provide fair compensation for physicians must be employed, perhaps like those used for judges and members of the IDF.

  20. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  1. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  2. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  3. Miners' strike 1984-85

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L; Salter, S [comps.

    1985-01-01

    References relating to the 1984-85 UK miners strike are listed under the following subject headings: events and analysis - a chronological record; short term effects - coal stocks and supplies, electricity supplies, financial, industrial and economic; the miners and their leadership; social aspects - civil liberties, media coverage, mining communities, picketing, policing, the future; pit closures. 240 references.

  4. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  7. Strikes in Serbia since 2000 to 2005

    OpenAIRE

    Novaković Nada

    2005-01-01

    In this article author deals with main characteristics of strikes in Serbia within the period 2000–2005. Analysis starts with thesis that strike is open class conflict within class divided society. Therefore strike is radical form of trade union struggle for workers rights. Main questions in the analysis were: on social structure as a background of strikes, on organizations and trade unions included in it, on effects of strikes in Serbia in the given period. Main thesis of the article is that...

  8. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  9. Respecting the right to strike

    CERN Multimedia

    Staff Association

    2015-01-01

    Since two years the representatives of the employers in the ILO, a tripartite multilateral body responsible for guaranteeing the correct application of an international labour code, try to weaken the global work regulations. On the occasion of the Global Day of Action for the right to strike at the invitation of the Geneva community of Union action (Communauté genevoise d’action syndicale) and the Swiss Trade Union Association (Union syndicale suisse) around noon on Wednesday 18th February some fifty staff representatives of international organizations gathered on the place des Nations in Geneva to reaffirm the importance of this fundamental right, too often flouted. A delegation of the CERN Staff Association was also present. In a short speech, the Staff Association said that, while being one of the fundamental human rights, to be efficient the right to strike must be used intelligently. It must be implemented taking into account the sensitivities of the professional environment and r...

  10. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  11. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    Science.gov (United States)

    2015-03-01

    Chance,” Foreign Affairs 78, no. 4 (1999): 40, EBSCOhost (00157120). See also Tania Voon, “Pointing the Finger : Civilian Casualties of NATO Bombing in...44. EBSCOhost (00157120). Millet , Alan R. The War for Korea, 1950–1951 They Came from the North. Lawrence, KS: University of Kansas Press, 2010...2007. https://www.usnwc.edu/getattachment/a9b8e92d-2c8d-4779-9925-0defea93325c/. Voon, Tania. “Pointing the Finger : Civilian Casualties of NATO Bombing

  12. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    Science.gov (United States)

    2016-06-10

    category of UAS, weighing less than twenty pounds with a ceiling of 1,200 feet and airspeed less than 100 knots. They are typically launched by hand...instrument of first use of force, Article 51 certainly should not apply. One event really crystalized the naval need to use preemptive self-defense. In

  13. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    Science.gov (United States)

    2007-01-01

    a big ‘Bravo Zulu ’ [Navy vernacular for ‘well done’] for the terrific job they did. . . . We did not have a single complaint. We felt like our...another tribal representative, and reveal their hieroglyphics, which are translated by the other tribe into its own hieroglyphics and entered into

  14. When the Ocean Strikes Back

    DEFF Research Database (Denmark)

    Gebauer, Mirjam

    2013-01-01

    The disaster scenario is one of the predominant settings we find unfold in the pop-cultural imagination, namely in films and novels. In recent years, as increased awareness of environmental issues affect the agendas of public debate, we also see local and increasingly global environmental disasters...... is evolving caused by an intelligent life form of the deep sea striking back at mankind. This article aims at discussing in what ways The Swarm uses elements and patterns of the pop-cultural disaster imagination, specifically the disaster and science fiction movie of the 1990s. Furthermore, it investigates...

  15. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  16. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  17. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  18. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  19. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  20. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  2. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  3. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  4. Women, transition and strikes in Serbia

    OpenAIRE

    Novaković, Nada G.

    2014-01-01

    The author, in a sociological way, describes and analyzes the concepts of transition, privatization and strikes in Serbia, particularly the place of women in it. It examines the most important economic and social causes and consequences of these phenomena. The main hypothesis is: women's strikes in the Serbian transition are less efficient than strikes and public protests of women in the developed world and the second Yugoslavia. A strike is a class conflict, in which the workers are fighting...

  5. 14 CFR 35.38 - Lightning strike.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Lightning strike. 35.38 Section 35.38... STANDARDS: PROPELLERS Tests and Inspections § 35.38 Lightning strike. The applicant must demonstrate, by... lightning strike without causing a major or hazardous propeller effect. The limit to which the propeller has...

  6. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  7. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  8. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  9. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  11. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  12. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  13. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  14. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  15. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  16. Prompt Global Strike: China and the Spear

    Science.gov (United States)

    2014-04-01

    Network Centric Warfare), Feihang Daodan (Winged Missiles Journal), Issue 11, November 2006, pp. 18-21; Ou Nancheng, Feng Shuxing, and Cao Yuhua are...affiliated with China’s Liberation Army Equipment Institute. Ou Nancheng, Feng Shuxing, and Cao Yuhua , “Kuaisu quanqiu daji xitong yu kongtian xinxi...Shuxing, and Cao Yunhua are affiliated with the PLA Armaments Institute. Ou Nancheng, Feng Shuxing, and Cao Yuhua , “Kuaisu quanqiu daji xitong yu

  17. Cyber Capabilities for Global Strike in 2035

    Science.gov (United States)

    2012-02-15

    Internet’s Cyber Future.” Charlie Rose Show (MSNBC), 19 February 2009. Rosin, Col Randolph. “To Kill a Mockingbird : The Deconstruction of Information...http://www.af.mil/information/factsheets/factsheet.asp?id=182 (accessed: 6 February 2012). 75 Colonel Randolph Rosin, “To Kill a Mockingbird : The...functional effects” are analogous to conventional “ kill mechanisms.”67 The simplest warfare functional effect in cyberspace is deliberate disruption of

  18. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  19. Estimating the Impact of Bird Strikes

    NARCIS (Netherlands)

    Metz, I.C.; Muhlhausen, Thorsten; Ellerbroek, J.; Hoekstra, J.M.

    2018-01-01

    Bird strikes have the potential to cause severe damage to aircraft. Therefore, measures to reduce the risk of bird strikes are performed at airports. However, this risk is not limited to the airport but is increased in the arrival and departure corridors as well. Consequently, a significant amount

  20. Option Strike Price and Managerial Investment Decisions

    Institute of Scientific and Technical Information of China (English)

    刘鸿雁; 张维

    2003-01-01

    The manager′s investment decisions is modeled when the manager is risk-averse and has stock options as compensation. It is found that the strike price of options is crucial to the investment incentives of managers, and that the correct value, or interval of values, of managerial stock option strike price can bring stockholder and manager interests in agreement.

  1. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  2. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  3. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  4. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  5. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  6. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  7. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  8. Establish an Agent-Simulant Technology Relationship (ASTR)

    Science.gov (United States)

    2017-04-14

    collective protection; CP; decontamination ; decon; contamination avoidance; CA; chemical biological radiological; CBR 16. SECURITY CLASSIFICATION...Within chemical defense, the individual protection (IP), collective protection (CP), decontamination (decon), and contamination avoidance (CA...OT). c. Testing may use chemical warfare agent (CWA), biological warfare agent (BWA), radiological agent, or simulant (surrogate). A simulant is a

  9. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  10. Lightning Strike in Pregnancy With Fetal Injury.

    Science.gov (United States)

    Galster, Kellen; Hodnick, Ryan; Berkeley, Ross P

    2016-06-01

    Injuries from lightning strikes are an infrequent occurrence, and are only rarely noted to involve pregnant victims. Only 13 cases of lightning strike in pregnancy have been previously described in the medical literature, along with 7 additional cases discovered within news media reports. This case report presents a novel case of lightning-associated injury in a patient in the third trimester of pregnancy, resulting in fetal ischemic brain injury and long-term morbidity, and reviews the mechanics of lightning strikes along with common injury patterns of which emergency providers should be aware. Copyright © 2016 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  11. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  12. Expeditionary Strike Group: Command Structure Design Support

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kemple, William G; Kleinman, David L; Hocevar, Susan P

    2005-01-01

    An Expeditionary Strike Group (ESG) is a new capability mix that combines the combat power of three surface combatants and one submarine with an Amphibious Readiness Group/ Marine Expeditionary Unit...

  13. Feature Hepatitis: Hepatitis Can Strike Anyone

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Feature Hepatitis Hepatitis Can Strike Anyone Past Issues / Spring 2009 Table ... from all walks of life are affected by hepatitis, especially hepatitis C, the most common form of ...

  14. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  15. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  16. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  17. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  18. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  19. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  1. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  2. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  3. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  4. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  5. Women, transition and strikes in Serbia

    Directory of Open Access Journals (Sweden)

    Novaković Nada G.

    2014-01-01

    Full Text Available The author, in a sociological way, describes and analyzes the concepts of transition, privatization and strikes in Serbia, particularly the place of women in it. It examines the most important economic and social causes and consequences of these phenomena. The main hypothesis is: women's strikes in the Serbian transition are less efficient than strikes and public protests of women in the developed world and the second Yugoslavia. A strike is a class conflict, in which the workers are fighting for their social and economic rights, threatened by the capitalist class. Elites in government and state authorities protect the interests of big capital at the detriment of the interests of the majority of workers. Exploring women's strikes in transition reveals the nature of the social and political system. Their strikes in enterprises, the blocking of public spaces and public protests are systemic, ie. class determined. As the transition was very fast, the resistance of the strikers was inefficient, and the protests of women became an expression of desperation against the loss of jobs and basic resources for lifehood. In short, this research is about the main causes, the organizational forms and the consequences of strikes in which the majority were women. For this purpose, the author chose to describe an array of strikes in the industries and the companies where women are most employed. The choice of strikes in the economic sector is not accidental, but a consequence of the fact that the women there were the most vulnerable. Women in public institutions and companies had much higher financial and social position. They are less likely to strike and publicly protested. After 2000, these strikes were more successful than worker's strikes in textile, food processing, manufacturing and trade. Relationship between the government and the public towards them was tainted by self-interest and selective. The main criterion for the selection of companies and

  6. Iron-montmorillonite clays as active sorbents for the decontamination of hazardous chemical warfare agents.

    Science.gov (United States)

    Carniato, F; Bisio, C; Evangelisti, C; Psaro, R; Dal Santo, V; Costenaro, D; Marchese, L; Guidotti, M

    2018-02-27

    A class of heterogeneous catalysts based on commercial bentonite from natural origin, containing at least 80 wt% of montmorillonite clay, was designed to transform selectively and under mild conditions toxic organosulfur and organophosphorus chemical warfare agents into non-noxious products with a reduced impact on health and environment. The bentonite from the natural origin was modified by introducing iron species and acid sites in the interlayer space, aiming to obtain a sorbent with strong catalytic oxidising and hydrolytic properties. The catalytic performance of these materials was evaluated in the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, in the presence of aqueous hydrogen peroxide as an oxidant. A new decontamination formulation was, moreover, proposed and obtained by mixing sodium perborate, as a solid oxidant, to iron-bentonite catalysts. Solid-phase decontamination tests, performed on a cotton textile support contaminated with organosulfide and organophosphonate simulant agents revealed the good activity of the solid formulation, especially in the in situ detoxification of blistering agents. Tests carried out on the real blistering warfare agent, sulfur mustard (HD agent), showed that, thanks to the co-presence of the iron-based clay together with the solid oxidant component, a good decontamination of the test surface from the real warfare agent could be achieved (80% contaminant degradation, under ambient conditions, in 24 h).

  7. When Push Comes to Shove: Strikes in Higher Education.

    Science.gov (United States)

    Magney, John

    2002-01-01

    To provide a better sense of how academic unions handle a strike situation, examines six unions who, between 1996 and 2000, went through strikes. Discusses the key issues and outcomes of the strikes. (EV)

  8. The Risk of Striking Accidents During LPG Ships Passage in Ports in Respect to Technical Failures based on Real Time Simulations in Szczecin-Świnoujście Waterway

    Directory of Open Access Journals (Sweden)

    Bąk Andrzej

    2016-10-01

    Full Text Available The method of risk assessment based on ship systems technical failures during the passage in the region of Świnoujście of the large LPG (liquefied petroleum gas tanker is presented. The statistical reliability indicators and the simulation model of ships manoeuvring. The researches carried out within this paper let to determine the safety level and necessary tug escort service during the passage of the ship with the hazardous cargo in the port area.

  9. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  10. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  11. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  12. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  13. Impact Assessment In Special Warfare

    Science.gov (United States)

    2017-12-01

    Systematic Review and Meta-analysis,” Journal of Research in Crime and Delinquency 52, no. 4 (2015). 27 additional rigorous evaluations” of its... statistical methods, can simulate the randomized assignment into treatment and control and improve understanding of cause and effect. Lyall, Blair...demographic information and the geospatial location of each interview. I used the R statistical program to process the original survey data, filter for

  14. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  15. Impact of lightning strikes on hospital functions.

    Science.gov (United States)

    Mortelmans, Luc J M; Van Springel, Gert L J; Van Boxstael, Sam; Herrijgers, Jan; Hoflacks, Stefaan

    2009-01-01

    Two regional hospitals were struck by lightning during a one-month period. The first hospital, which had 236 beds, suffered a direct strike to the building. This resulted in a direct spread of the power peak and temporary failure of the standard power supply. The principle problems, after restoring standard power supply, were with the fire alarm system and peripheral network connections in the digital radiology systems. No direct impact on the hardware could be found. Restarting the servers resolved all problems. The second hospital, which had 436 beds, had a lightning strike on the premises and mainly experienced problems due to induction. All affected installations had a cable connection from outside in one way or another. The power supplies never were endangered. The main problem was the failure of different communication systems (telephone, radio, intercom, fire alarm system). Also, the electronic entrance control went out. During the days after the lightening strike, multiple software problems became apparent, as well as failures of the network connections controlling the technical support systems. There are very few ways to prepare for induction problems. The use of fiber-optic networks can limit damage. To the knowledge of the authors, these are the first cases of lightning striking hospitals in medical literature.

  16. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    Science.gov (United States)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  17. UiO-66-NH2 Metal-Organic Framework (MOF) Nucleation on TiO2, ZnO, and Al2O3 Atomic Layer Deposition-Treated Polymer Fibers: Role of Metal Oxide on MOF Growth and Catalytic Hydrolysis of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Lee, Dennis T; Zhao, Junjie; Oldham, Christopher J; Peterson, Gregory W; Parsons, Gregory N

    2017-12-27

    Metal-organic frameworks (MOFs) chemically bound to polymeric microfibrous textiles show promising performance for many future applications. In particular, Zr-based UiO-66-family MOF-textiles have been shown to catalytically degrade highly toxic chemical warfare agents (CWAs), where favorable MOF/polymer bonding and adhesion are attained by placing a nanoscale metal-oxide layer on the polymer fiber preceding MOF growth. To date, however, the nucleation mechanism of Zr-based MOFs on different metal oxides and how product performance is affected are not well understood. Herein, we provide new insight into how different inorganic nucleation films (i.e., Al 2 O 3 , ZnO, or TiO 2 ) conformally coated on polypropylene (PP) nonwoven textiles via atomic layer deposition (ALD) influence the quality, overall surface area, and the fractional yield of UiO-66-NH 2 MOF crystals solvothermally grown on fiber substrates. Of the materials explored, we find that TiO 2 ALD layers lead to the most effective overall MOF/fiber adhesion, uniformity, and a rapid catalytic degradation rate for a CWA simulant, dimethyl p-nitrophenyl phosphate (DMNP) with t 1/2 = 15 min, 580-fold faster than the catalytic performance of untreated PP textiles. Interestingly, compared to ALD TiO 2 and Al 2 O 3 , ALD ZnO induces a larger MOF yield in solution and mass loading on PP fibrous mats. However, this larger MOF yield is ascribed to chemical instability of the ZnO layer under MOF formation condition, leading to Zn 2+ ions that promote further homogeneous MOF growth. Insights presented here improve understanding of compatibility between active MOF materials and substrate surfaces, which we believe will help advanced MOF composite materials for a variety of useful functions.

  18. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  19. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  20. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  1. PSpice Model of Lightning Strike to a Steel Reinforced Structure

    International Nuclear Information System (INIS)

    Koone, Neil; Condren, Brian

    2003-01-01

    Surges and arcs from lightning can pose hazards to personnel and sensitive equipment, and processes. Steel reinforcement in structures can act as a Faraday cage mitigating lightning effects. Knowing a structure's response to a lightning strike allows hazards associated with lightning to be analyzed. A model of lightning's response in a steel reinforced structure has been developed using PSpice (a commercial circuit simulation). Segments of rebar are modeled as inductors and resistors in series. A program has been written to take architectural information of a steel reinforced structure and 'build' a circuit network that is analogous to the network of reinforcement in a facility. A severe current waveform (simulating a 99th percentile lightning strike), modeled as a current source, is introduced in the circuit network, and potential differences within the structure are determined using PSpice. A visual three-dimensional model of the facility displays the voltage distribution across the structure using color to indicate the potential difference relative to the floor. Clear air arcing distances can be calculated from the voltage distribution using a conservative value for the dielectric breakdown strength of air. Potential validation tests for the model will be presented

  2. Central hyperadrenergic state after lightning strike.

    Science.gov (United States)

    Parsaik, Ajay K; Ahlskog, J Eric; Singer, Wolfgang; Gelfman, Russell; Sheldon, Seth H; Seime, Richard J; Craft, Jennifer M; Staab, Jeffrey P; Kantor, Birgit; Low, Phillip A

    2013-08-01

    To describe and review autonomic complications of lightning strike. Case report and laboratory data including autonomic function tests in a subject who was struck by lightning. A 24-year-old man was struck by lightning. Following that, he developed dysautonomia, with persistent inappropriate sinus tachycardia and autonomic storms, as well as posttraumatic stress disorder (PTSD) and functional neurologic problems. The combination of persistent sinus tachycardia and episodic exacerbations associated with hypertension, diaphoresis, and agitation was highly suggestive of a central hyperadrenergic state with superimposed autonomic storms. Whether the additional PTSD and functional neurologic deficits were due to a direct effect of the lightning strike on the central nervous system or a secondary response is open to speculation.

  3. ["Bell-striking" Saying of Acupuncture Therapy].

    Science.gov (United States)

    Zhao, Jing-Sheng

    2017-04-25

    As an analogy, a prototype of "bell-striking" is proposed in the present paper for exploring the basic properties, major elements, and potential mechanisms of acupuncture stimulation. On the strength of analysis on the physiological basis of acupuncture effect, several fundamental aspects of acupuncture are summarized as a) the body-surface stimulating characters, b) general and local effects, and c) triggering the auto-regulative function of the organism, which mimics the "bell-striking" response. Namely, when stroke, bell will chime, otherwise, chiming will not be heard. During analyzing special contents of acupuncture theory, its formative background should not be separated, and it is improper to take, modern medical theory of the human body as the guiding thinking way for researching the ancient Chinese medical literature.

  4. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  5. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  6. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  7. First-Strike Advantage: The United States’ Counter to China’s Preemptive Integrated Network Electronic Warfare Strategy

    Science.gov (United States)

    2013-06-01

    US, but it was an essential part of the North’s strategy to wear down America’s resolve. J. Proctor , American Resolve and the Art of War: A Study...ocean travel, or worse, describing the physical characteristics of seawater (its salinity, density , and other hydraulic properties) would miss the...of War: Power and the Roots of Conflict (Ithaca, NY: Cornell University Press, 1999), 70. 34 James Clay Moltz, The Politics of Space Security

  8. Proliferation of Precision Strike: Issues for Congress

    Science.gov (United States)

    2012-05-14

    industrial base. Finally, should Congress legislate requirements for DOD to develop precision strike countermeasures and then provide funding for that...Defense, Part 187 – Environmental Effects Abroad of Major Department of Defense Actions, Section 187.3: Definitions. 32 Bryan Clark and Dan Whiteneck...so many missiles ... referring to reports of Venezuelan arms flowing to Colombian guerrillas.... The Chavez regime also has close ties with

  9. Stress distribution of metatarsals during forefoot strike versus rearfoot strike: A finite element study.

    Science.gov (United States)

    Li, Shudong; Zhang, Yan; Gu, Yaodong; Ren, James

    2017-12-01

    Due to the limitations of experimental approaches, comparison of the internal deformation and stresses of the human man foot between forefoot and rearfoot landing is not fully established. The objective of this work is to develop an effective FE modelling approach to comparatively study the stresses and energy in the foot during forefoot strike (FS) and rearfoot strike (RS). The stress level and rate of stress increase in the Metatarsals are established and the injury risk between these two landing styles is evaluated and discussed. A detailed subject specific FE foot model is developed and validated. A hexahedral dominated meshing scheme was applied on the surface of the foot bones and skin. An explicit solver (Abaqus/Explicit) was used to stimulate the transient landing process. The deformation and internal energy of the foot and stresses in the metatarsals are comparatively investigated. The results for forefoot strike tests showed an overall higher average stress level in the metatarsals during the entire landing cycle than that for rearfoot strike. The increase rate of the metatarsal stress from the 0.5 body weight (BW) to 2 BW load point is 30.76% for forefoot strike and 21.39% for rearfoot strike. The maximum rate of stress increase among the five metatarsals is observed on the 1st metatarsal in both landing modes. The results indicate that high stress level during forefoot landing phase may increase potential of metatarsal injuries. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Gait Retraining From Rearfoot Strike to Forefoot Strike does not change Running Economy.

    Science.gov (United States)

    Roper, Jenevieve Lynn; Doerfler, Deborah; Kravitz, Len; Dufek, Janet S; Mermier, Christine

    2017-12-01

    Gait retraining is a method for management of patellofemoral pain, which is a common ailment among recreational runners. The present study investigated the effects of gait retraining from rearfoot strike to forefoot strike on running economy, heart rate, and respiratory exchange ratio immediately post-retraining and one-month post-retraining in recreational runners with patellofemoral pain. Knee pain was also measured. Sixteen participants (n=16) were randomly placed in the control (n=8) or experimental (n=8) group. A 10-minute treadmill RE test was performed by all subjects. The experimental group performed eight gait retraining running sessions where foot strike pattern was switched from rearfoot strike to forefoot strike, while the control group received no intervention. There were no significant differences for running economy (p=0.26), respiratory exchange ratio (p=0.258), or heart rate (p=0.248) between the groups. Knee pain reported on a visual analog scale was also significantly reduced (pstrike to forefoot strike did not affect running economy up to one-month post-retraining while reducing running-related patellofemoral pain. © Georg Thieme Verlag KG Stuttgart · New York.

  11. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  12. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  13. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  14. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  15. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  16. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  17. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  18. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  19. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  20. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  1. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  2. How Drone Strikes and a Fake Vaccination Program Have Inhibited Polio Eradication in Pakistan: An Analysis of National Level Data.

    Science.gov (United States)

    Kennedy, Jonathan

    2017-10-01

    This article investigates whether the United States' counterinsurgency operations have inhibited polio eradication efforts in northwestern Pakistan, the world's last major reservoir of polio. Anecdotal evidence suggests that militants disrupt polio vaccination programs because of suspicions that campaigns are a cover for gathering intelligence on Central Intelligence Agency (CIA) drone targets. This paper analyzes national-level quantitative data to test this argument. Between 2004 and 2012, the number of polio cases in Pakistan closely mirrored the number of drone strikes. But from 2013 onward, polio cases increased while drone strikes fell. This can be explained by the CIA's use of a fake immunization campaign in a failed attempt to obtain the DNA of Osama bin Laden's relatives prior to his assassination in 2011. This seemingly vindicated militants' suspicions that vaccination programs were a cover for espionage. Militants consequently intensified their disruption of immunization campaigns, resulting in an increase in polio cases in Pakistan, as well as in Afghanistan, Syria, and Iraq. For politicians and military planners, drones are attractive because they are said to harm fewer civilians than conventional methods of warfare. However, this paper demonstrates that drone strikes had negative effects on the well-being of civilians in Pakistan and further afield because they undermined global efforts to eradicate polio.

  3. Simulating lightning tests to radar system

    NARCIS (Netherlands)

    Blaj, M.A.; Buesink, Frederik Johannes Karel; Leferink, Frank Bernardus Johannes

    2010-01-01

    The risk of destruction due to lightning makes simulating the effects of lightning strikes a necessity. We modeled a radar enclosure and simulated the effect of a lightning strike. The results have been validated using full threat lightning current tests.

  4. Niobium(V) saponite clay for the catalytic oxidative abatement of chemical warfare agents.

    Science.gov (United States)

    Carniato, Fabio; Bisio, Chiara; Psaro, Rinaldo; Marchese, Leonardo; Guidotti, Matteo

    2014-09-15

    A Nb(V)-containing saponite clay was designed to selectively transform toxic organosulfur chemical warfare agents (CWAs) under extremely mild conditions into nontoxic products with reduced environmental impact. Thanks to the insertion of Nb(V) sites within the saponite framework, a bifunctional catalyst with strong oxidizing and acid properties was obtained. Remarkable activity and high selectivity were observed for the oxidative abatement of (2-chloroethyl)ethyl sulfide (CEES), a simulant of sulfur mustard, at room temperature with aqueous hydrogen peroxide. This performance was significantly better compared to a conventional commercial decontamination powder. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  6. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  7. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  8. Acute transient hemiparesis induced by lightning strike.

    Science.gov (United States)

    Rahmani, Seyed Hesam; Faridaalaee, Gholamreza; Jahangard, Samira

    2015-07-01

    According to data from the National Oceanic and Atmospheric Administration,in the years from 1959 to 1994, lightning was responsible for more than 3000 deaths and nearly 10,000 casualties. The most important characteristic features of lightning injuries are multisystem involvement and widely variable severity. Lightning strikes are primarily a neurologic injury that affects all 3 components of the nervous system: central, autonomic,and peripheral. Neurologic complications of lightning strikes vary from transient benign symptoms to permanent disability. Many patients experience a temporary paralysis called keraunoparalysis. Here we reported a 22-year-old mountaineer man with complaining of left sided hemiparesis after being hit by a lightning strike in the mountain 3 hours ago. There was no loss of consciousness at hitting time. On arrival the patient was alert, awake and hemodynamically stable. In neurologic examination cranial nerves were intact, left sided upper and lower extremity muscle force was I/V with a combination of complete sensory loss, and right-sided muscle force and sensory examination were normal. There is not any evidence of significant vascular impairment in the affected extremities. Brain MRI and CT scan and cervical MRI were normal. During 2 days of admission, with intravenous hydration, heparin 5000 unit SC q12hr and physical therapy of the affected limbs, motor and sensory function improved and was normal except mild paresthesia. He was discharged 1 day later for outpatient follow up while vitamin B1 100mg orally was prescribed.Paresthesia improved after 3 days without further sequels.

  9. Foot-strike pattern and performance in a marathon.

    Science.gov (United States)

    Kasmer, Mark E; Liu, Xue-Cheng; Roberts, Kyle G; Valadao, Jason M

    2013-05-01

    To determine prevalence of heel strike in a midsize city marathon, if there is an association between foot-strike classification and race performance, and if there is an association between foot-strike classification and gender. Foot-strike classification (forefoot, midfoot, heel, or split strike), gender, and rank (position in race) were recorded at the 8.1-km mark for 2112 runners at the 2011 Milwaukee Lakefront Marathon. 1991 runners were classified by foot-strike pattern, revealing a heel-strike prevalence of 93.67% (n = 1865). A significant difference between foot-strike classification and performance was found using a Kruskal-Wallis test (P strike. No significant difference between foot-strike classification and gender was found using a Fisher exact test. In addition, subgroup analysis of the 126 non-heel strikers found no significant difference between shoe wear and performance using a Kruskal-Wallis test. The high prevalence of heel striking observed in this study reflects the foot-strike pattern of most mid-distance to long-distance runners and, more important, may predict their injury profile based on the biomechanics of a heel-strike running pattern. This knowledge can help clinicians appropriately diagnose, manage, and train modifications of injured runners.

  10. A numerical model for bird strike on sidewall structure of an aircraft nose

    Directory of Open Access Journals (Sweden)

    Liu Jun

    2014-06-01

    Full Text Available In order to examine the potential of using the coupled smooth particles hydrodynamic (SPH and finite element (FE method to predict the dynamic responses of aircraft structures in bird strike events, bird-strike tests on the sidewall structure of an aircraft nose are carried out and numerically simulated. The bird is modeled with SPH and described by the Murnaghan equation of state, while the structure is modeled with finite elements. A coupled SPH–FE method is developed to simulate the bird-strike tests and a numerical model is established using a commercial software PAM-CRASH. The bird model shows no signs of instability and correctly modeled the break-up of the bird into particles. Finally the dynamic response such as strains in the skin is simulated and compared with test results, and the simulated deformation and fracture process of the sidewall structure is compared with images recorded by a high speed camera. Good agreement between the simulation results and test data indicates that the coupled SPH–FE method can provide a very powerful tool in predicting the dynamic responses of aircraft structures in events of bird strike.

  11. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  12. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  13. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  14. 2002 Bird Strike Committee USA/Canada Conference

    National Research Council Canada - National Science Library

    Dolbeer, Richard

    2002-01-01

    Over 380 people from 20 countries and 17 exhibitors attended the 4th annual joint meeting of Bird Strike Committee-USA and Bird Strike Committee Canada in Sacramento, California on October 21-24, 2002...

  15. effect of strikes on management and planning of educational ...

    African Journals Online (AJOL)

    Global Journal

    Strike is an event that consumes and waste a lot of time which implies that ... from this paper. KEYWORDS: Strikes, Management, Planning, Educational, Activities, Universities ..... employers; and Introduction of new technology which affect the ...

  16. BIRD/WILDLIFE STRIKE CONTROL FOR SAFER AIR ...

    African Journals Online (AJOL)

    Osondu

    2012-06-05

    Jun 5, 2012 ... Keywords: bird/wildlife, strike, aviation, hazard, control. Introduction ... Ethiopian Journal of Environmental Studies and Management EJESM Vol. 5 No. 3 2012 .... Aircraft Bird. Strike Avoidance Rader System (ABARS) and.

  17. Strike-slip tectonics during rift linkage

    Science.gov (United States)

    Pagli, C.; Yun, S. H.; Ebinger, C.; Keir, D.; Wang, H.

    2017-12-01

    The kinematics of triple junction linkage and the initiation of transforms in magmatic rifts remain debated. Strain patterns from the Afar triple junction provide tests of current models of how rifts grow to link in area of incipient oceanic spreading. Here we present a combined analysis of seismicity, InSAR and GPS derived strain rate maps to reveal that the plate boundary deformation in Afar is accommodated primarily by extensional tectonics in the Red Sea and Gulf of Aden rifts, and does not require large rotations about vertical axes (bookshelf faulting). Additionally, models of stress changes and seismicity induced by recent dykes in one sector of the Afar triple junction provide poor fit to the observed strike-slip earthquakes. Instead we explain these patterns as rift-perpendicular shearing at the tips of spreading rifts where extensional strains terminate against less stretched lithosphere. Our results demonstrate that rift-perpendicular strike-slip faulting between rift segments achieves plate boundary linkage during incipient seafloor spreading.

  18. Properties of Lightning Strike Protection Coatings

    Science.gov (United States)

    Gagne, Martin

    Composite materials are being increasingly used by many industries. In the case of aerospace companies, those materials are installed on their aircraft to save weight, and thus, fuel costs. These aircraft are lighter, but the loss of electrical conductivity makes aircraft vulnerable to lightning strikes, which hit commercial aircrafts on average once per year. This makes lightning strike protection very important, and while current metallic expanded copper foils offer good protection, they increase the weight of composites. Therefore, under the CRIAQ COMP-502 project, a team of industrial partners and academic researchers are investigating new conductive coatings with the following characteristics: High electromagnetic protection, high mechanical resistance, good environmental protection, manufacturability and moderate cost. The main objectives of this thesis, as part of this project, was to determine the main characteristics, such as electrical and tribomechanical properties, of conductive coatings on composite panels. Their properties were also to be tested after destructive tests such as current injection and environmental testing. Bombardier Aerospace provided the substrate, a composite of carbon fiber reinforced epoxy matrix, and the current commercial product, a surfacing film that includes an expanded copper foil used to compare with the other coatings. The conductive coatings fabricated by the students are: silver nanoparticles inside a binding matrix (PEDOT:PSS or a mix of Epoxy and PEDOT:PSS), silvered carbon nanofibers embedded in the surfacing film, cold sprayed tin, graphene oxide functionalized with silver nanowires, and electroless plated silver. Additionally as part of the project and thesis, magnetron sputtered aluminum coated samples were fabricated. There are three main types of tests to characterize the conductive coatings: electrical, mechanical and environmental. Electrical tests consist of finding the sheet resistance and specific resistivity

  19. Evaluating the Effects of a Bird Strike Advisory System

    NARCIS (Netherlands)

    Metz, I.C.; Mühlhausen, T; Ellerbroek, J.; Hoekstra, J.M.

    2016-01-01

    Bird strikes have operational impacts and cause economic loss to the aviation industry. In the worst case, the damages resulting from bird strikes lead to crashes. The highest risk for bird strikes lies in the area below 3000 ft and thus mainly in airport environments. Despite intense efforts from

  20. effects of strike cost on economic development in nigeria

    African Journals Online (AJOL)

    USER

    same firm, in other firms even in other industries (Kempner, 1980). For example ... The main purpose of this paper is to examine the strike cost and productivity in. Nigeria. ... Obnoxious Policies: Workers do go on strike when management makes obnoxious ... ASUU had to go on strike; the FGN had rescinded the decision.

  1. Forward to the Past: Strikes and Striking as Dialogue by other ...

    African Journals Online (AJOL)

    In Nigeria, from the colonial period to the present, the employment of strikes and protests by nationalists, Nigerian workers and civil society groups has been established as one of the potent means of conveying viewpoints, positions as well as the demand for equality, fairness, social justice and reforms. It has been used as ...

  2. A bird strike handbook for base-level managers

    Science.gov (United States)

    Payson, R. P.; Vance, J. D.

    1984-09-01

    To help develop more awareness about bird strikes and bird strike reduction techniques, this thesis compiled all relevant information through an extensive literature search, review of base-level documents, and personal interviews. The final product--A Bird Strike Handbook for Base-Level Managers--provides information on bird strike statistics, methods to reduce the strike hazards, and means to obtain additional assistance. The handbook is organized for use by six major base agencies: Maintenance, Civil Engineering, Operations, Air Field Management, Safety, and Air Traffic Control. An appendix follows at the end.

  3. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  4. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  5. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  6. Strikes and solidarity: coalfield conflict in Britain, 1889-1966

    Energy Technology Data Exchange (ETDEWEB)

    Roy Church; Quentin Outram [University of East Anglia, Norwich (United Kingdom)

    2002-05-01

    This book investigates the history of strike activity in the British coal mining industry, a byword for industrial militancy since the late nineteenth century. Contents: 1. Interpreting coalfield conflict: focus and formulations; 2. Tradition and modernity: the mining industry 1889-1940; 3. Employers and workers: organizations and strategies; 4. Employers and workers: ideologies, attitudes and political orientations; 5. Configurations of strike activity; 6. Strike participation and solidarity before 1912; 7. Strikes, organization and consciousness in 1912 and after; 8. Conflictual context? The 'isolated mass' revisited; 9. Mining and modernity: size, sectionalism and solidarity; 10. The foundations of strike propensity; 11. Miners and management: agency and action; 12. Industrial relations and strikes after nationalization; 13. International perspectives; 14. Myths and realities: strikes, solidarity and 'militant miners'.

  7. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  8. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  9. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  10. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  11. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  12. Lightning Strike Induced Damage Mechanisms of Carbon Fiber Composites

    Science.gov (United States)

    Kawakami, Hirohide

    Composite materials have a wide application in aerospace, automotive, and other transportation industries, because of the superior structural and weight performances. Since carbon fiber reinforced polymer composites possess a much lower electrical conductivity as compared to traditional metallic materials utilized for aircraft structures, serious concern about damage resistance/tolerance against lightning has been rising. Main task of this study is to clarify the lightning damage mechanism of carbon fiber reinforced epoxy polymer composites to help further development of lightning strike protection. The research on lightning damage to carbon fiber reinforced polymer composites is quite challenging, and there has been little study available until now. In order to tackle this issue, building block approach was employed. The research was started with the development of supporting technologies such as a current impulse generator to simulate a lightning strike in a laboratory. Then, fundamental electrical properties and fracture behavior of CFRPs exposed to high and low level current impulse were investigated using simple coupon specimens, followed by extensive parametric investigations in terms of different prepreg materials frequently used in aerospace industry, various stacking sequences, different lightning intensity, and lightning current waveforms. It revealed that the thermal resistance capability of polymer matrix was one of the most influential parameters on lightning damage resistance of CFRPs. Based on the experimental findings, the semi-empirical analysis model for predicting the extent of lightning damage was established. The model was fitted through experimental data to determine empirical parameters and, then, showed a good capability to provide reliable predictions for other test conditions and materials. Finally, structural element level lightning tests were performed to explore more practical situations. Specifically, filled-hole CFRP plates and patch

  13. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  14. Geological Effects on Lightning Strike Distributions

    KAUST Repository

    Berdahl, J. Scott

    2016-05-16

    Recent advances in lightning detection networks allow for detailed mapping of lightning flash locations. Longstanding rumors of geological influence on cloud-to-ground (CG) lightning distribution and recent commercial claims based on such influence can now be tested empirically. If present, such influence could represent a new, cheap and efficient geophysical tool with applications in mineral, hydrothermal and oil exploration, regional geological mapping, and infrastructure planning. This project applies statistical analysis to lightning data collected by the United States National Lightning Detection Network from 2006 through 2015 in order to assess whether the huge range in electrical conductivities of geological materials plays a role in the spatial distribution of CG lightning. CG flash densities are mapped for twelve areas in the contiguous United States and compared to elevation and geology, as well as to the locations of faults, railroads and tall towers including wind turbines. Overall spatial randomness is assessed, along with spatial correlation of attributes. Negative and positive polarity lightning are considered separately and together. Topography and tower locations show a strong influence on CG distribution patterns. Geology, faults and railroads do not. This suggests that ground conductivity is not an important factor in determining lightning strike location on scales larger than current flash location accuracies, which are generally several hundred meters. Once a lightning channel is established, however, ground properties at the contact point may play a role in determining properties of the subsequent stroke.

  15. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  16. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  17. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  18. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  19. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  20. Children on hunger strike: child abuse or legitimate protest?

    OpenAIRE

    Mok, A.; Nelson, E. A.; Murphy, J.; Hampson, A.; Hendriks, J. H.

    1996-01-01

    The issue of children on hunger strike (voluntary total fasting) has not been reported before. The World Medical Association Declaration of Tokyo 1975 and the Declaration of Malta 1991 (revised 1992) provide clinicians with guidelines for the management of adult patients on hunger strike but do not mention children. We report the management of 14 Vietnamese children, aged 1 to 12 years, who took part in a hunger strike at a refugee detention centre in Hong Kong.

  1. The effect of hand dominance on martial arts strikes.

    Science.gov (United States)

    Neto, Osmar Pinto; Silva, Jansen Henrique; Marzullo, Ana Carolina de Miranda; Bolander, Richard P; Bir, Cynthia A

    2012-08-01

    The main goal of this study was to compare dominant and non-dominant martial arts palm strikes under different circumstances that usually happen during martial arts and combative sports applications. Seven highly experienced (10±5 years) right hand dominant Kung Fu practitioners performed strikes with both hands, stances with left or right lead legs, and with the possibility or not of stepping towards the target (moving stance). Peak force was greater for the dominant hand strikes (1593.76±703.45 N vs. 1042.28±374.16 N; p<.001), whereas no difference was found in accuracy between the hands (p=.141). Additionally, peak force was greater for the strikes with moving stance (1448.75±686.01 N vs. 1201.80±547.98 N; p=.002) and left lead leg stance (1378.06±705.48 N vs. 1269.96±547.08 N). Furthermore, the difference in peak force between strikes with moving and stationary stances was statistically significant only for the strikes performed with a left lead leg stance (p=.007). Hand speed was higher for the dominant hand strikes (5.82±1.08 m/s vs. 5.24±0.78 m/s; p=.001) and for the strikes with moving stance (5.79±1.01 m/s vs. 5.29±0.90 m/s; p<.001). The difference in hand speed between right and left hand strikes was only significant for strikes with moving stance. In summary, our results suggest that the stronger palm strike for a right-handed practitioner is a right hand strike on a left lead leg stance moving towards the target. Copyright © 2011 Elsevier B.V. All rights reserved.

  2. Foot strike patterns after obstacle clearance during running.

    Science.gov (United States)

    Scholten, Shane D; Stergiou, Nicholas; Hreljac, Alan; Houser, Jeremy; Blanke, Daniel; Alberts, L Russell

    2002-01-01

    Running over obstacles of sufficient height requires heel strike (HS) runners to make a transition in landing strategy to a forefoot (FF) strike, resulting in similar ground reaction force patterns to those observed while landing from a jump. Identification of the biomechanical variables that distinguish between the landing strategies may offer some insight into the reasons that the transition occurs. The purpose of this study was to investigate the difference in foot strike patterns and kinetic parameters of heel strike runners between level running and running over obstacles of various heights. Ten heel strike subjects ran at their self-selected pace under seven different conditions: unperturbed running (no obstacle) and over obstacles of six different heights (10%, 12.5%, 15%, 17.5%, 20%, and 22.5% of their standing height). The obstacle was placed directly before a Kistler force platform. Repeated measures ANOVAs were performed on the subject means of selected kinetic parameters. The statistical analysis revealed significant differences (P strike patterns were affected by the increased obstacle height. Between the 12.5% and 15% obstacle conditions, the group response changed from a heel strike to a forefoot strike pattern. At height > 15%, the pattern was more closely related to the foot strike patterns found in jumping activities. This strategy change may represent a gait transition effected as a mechanism to protect against increased impact forces. Greater involvement of the ankle and the calf muscles could have assisted in attenuating the increased impact forces while maintaining speed after clearing the obstacle.

  3. Debunking the viper's strike: harmless snakes kill a common assumption.

    Science.gov (United States)

    Penning, David A; Sawvel, Baxter; Moon, Brad R

    2016-03-01

    To survive, organisms must avoid predation and acquire nutrients and energy. Sensory systems must correctly differentiate between potential predators and prey, and elicit behaviours that adjust distances accordingly. For snakes, strikes can serve both purposes. Vipers are thought to have the fastest strikes among snakes. However, strike performance has been measured in very few species, especially non-vipers. We measured defensive strike performance in harmless Texas ratsnakes and two species of vipers, western cottonmouths and western diamond-backed rattlesnakes, using high-speed video recordings. We show that ratsnake strike performance matches or exceeds that of vipers. In contrast with the literature over the past century, vipers do not represent the pinnacle of strike performance in snakes. Both harmless and venomous snakes can strike with very high accelerations that have two key consequences: the accelerations exceed values that can cause loss of consciousness in other animals, such as the accelerations experienced by jet pilots during extreme manoeuvres, and they make the strikes faster than the sensory and motor responses of mammalian prey and predators. Both harmless and venomous snakes can strike faster than the blink of an eye and often reach a target before it can move. © 2016 The Author(s).

  4. Technology, Effects and Doctrines of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1981-01-01

    The development and the status of the nuclear weapons systems and of the systems for their delivery are explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategic doctrines for winning rather than preventing nuclear war have come to the foreground. Plans for the tactical first-use of nuclear weapons have been accepted. Alternatively, the retaliation capacity of the opponent could be destroyed by surprise attack - The First Strike. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. This applies especially to a First Strike situation. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme ease, decisions may be left entirely to machines, and men would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. Solutions for the principal problem of the world, war or peace, cannot be found On the level of technology, but only on that of practical policy of detente, disarmament, collaboration and reconciliation. (author)

  5. Simulations

    CERN Document Server

    Ngada, Narcisse

    2015-06-15

    The complexity and cost of building and running high-power electrical systems make the use of simulations unavoidable. The simulations available today provide great understanding about how systems really operate. This paper helps the reader to gain an insight into simulation in the field of power converters for particle accelerators. Starting with the definition and basic principles of simulation, two simulation types, as well as their leading tools, are presented: analog and numerical simulations. Some practical applications of each simulation type are also considered. The final conclusion then summarizes the main important items to keep in mind before opting for a simulation tool or before performing a simulation.

  6. A decade of U.S. Air Force bat strikes

    Science.gov (United States)

    Peurach, Suzanne C.; Dove, Carla J.; Stepko, Laura

    2009-01-01

    From 1997 through 2007, 821 bat strikes were reported to the U.S. Air Force (USAF) Safety Center by aircraft personnel or ground crew and sent to the National Museum of Natural History, Smithsonian Institution, for identification. Many samples were identified by macroscopic and or microscopic comparisons with bat specimens housed in the museum and augmented during the last 2 years by DNA analysis. Bat remains from USAF strikes during this period were received at the museum from 40 states in the United States and from 20 countries. We confirmed that 46% of the strikes were caused by bats, but we did not identify them further; we identified 5% only to the family or genus level, and 49% to the species level. Fifty-five of the 101 bat-strike samples submitted for DNA analysis have been identified to the species level. Twenty-five bat species have been recorded striking USAF planes worldwide. The Brazilian free-tailed bat (Tadarida brasiliensis; n = 173) is the species most commonly identified in USAF strike impacts, followed by the red bat (Lasiurus borealis; n = 83). Bat strikes peak during the spring and fall, with >57% occurring from August through October; 82% of the reports that included time of strike were recorded between 2100 and 0900 hours. More than 12% of the bat strikes were reported at >300 m above ground level (AGL). Although $825,000 and >50% of this sum was attributable to 5 bat-strike incidents. Only 5 bats from the 10 most damaging bat strikes were identified to the species level, either because we did not receive remains with the reports or the sample was insufficient for identification.

  7. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  8. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  9. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  10. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  11. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  12. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  13. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  14. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  15. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  16. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  17. Martial arts striking hand peak acceleration, accuracy and consistency.

    Science.gov (United States)

    Neto, Osmar Pinto; Marzullo, Ana Carolina De Miranda; Bolander, Richard P; Bir, Cynthia A

    2013-01-01

    The goal of this paper was to investigate the possible trade-off between peak hand acceleration and accuracy and consistency of hand strikes performed by martial artists of different training experiences. Ten male martial artists with training experience ranging from one to nine years volunteered to participate in the experiment. Each participant performed 12 maximum effort goal-directed strikes. Hand acceleration during the strikes was obtained using a tri-axial accelerometer block. A pressure sensor matrix was used to determine the accuracy and consistency of the strikes. Accuracy was estimated by the radial distance between the centroid of each subject's 12 strikes and the target, whereas consistency was estimated by the square root of the 12 strikes mean squared distance from their centroid. We found that training experience was significantly correlated to hand peak acceleration prior to impact (r(2)=0.456, p =0.032) and accuracy (r(2)=0. 621, p=0.012). These correlations suggest that more experienced participants exhibited higher hand peak accelerations and at the same time were more accurate. Training experience, however, was not correlated to consistency (r(2)=0.085, p=0.413). Overall, our results suggest that martial arts training may lead practitioners to achieve higher striking hand accelerations with better accuracy and no change in striking consistency.

  18. Orthotic intervention in forefoot and rearfoot strike running patterns.

    Science.gov (United States)

    Stackhouse, Carrie Laughton; Davis, Irene McClay; Hamill, Joseph

    2004-01-01

    To compare the differential effect of custom orthoses on the lower extremity mechanics of a forefoot and rearfoot strike pattern. Fifteen subjects ran with both a forefoot and a rearfoot strike pattern with and without orthoses. Lower extremity kinematic and kinetic variables were compared between strike pattern and orthotic conditions. Foot orthoses have been shown to be effective in controlling excessive rearfoot motion in rearfoot strikers. The effect of orthotic intervention on rearfoot motion in forefoot strikers has not been previously reported. Five trials were collected for each condition. Peak rearfoot eversion, eversion excursion, eversion velocity, peak inversion moment, and inversion work were compared between conditions. Kinematic variables in the sagittal plane of the rearfoot and in the frontal and sagittal plane of the knee were also determined. Increased rearfoot excursions and velocities and decreased peak eversion were noted in the forefoot strike pattern compared to the rearfoot strike pattern. Orthotic intervention, however,did not significantly change rearfoot motion in either strike pattern. Reductions in internal rotation and abduction of the knee were noted with orthotic intervention. Foot orthoses do not differentially effect rearfoot motion of a rearfoot strike and a forefoot strike running pattern. Orthotic intervention has a larger and more systematic effect on rearfoot kinetics compared to rearfoot kinematics.

  19. Teaching Striking Skills in Elementary Physical Education Using Woodball

    Science.gov (United States)

    Chang, Seung Ho; Lee, Jihyun

    2017-01-01

    Object control (OC) skills are a part of fundamental motor skills and basic functional skills, which work as a prerequisite to becoming a skilled performer in many sports. Of various OC skills, striking is one of the most difficult to master due to a variety of interrelated movement components. A form of vertical or underarm striking is a more…

  20. Strike kinematics and performance in juvenile ball pythons (Python regius).

    Science.gov (United States)

    Ryerson, William G; Tan, Weimin

    2017-08-01

    The rapid strike of snakes has interested researchers for decades. Although most work has focused on the strike performance of vipers, recent work has shown that other snakes outside of the Viperidae can strike with the same velocities and accelerations. However, to date all of these examples focus on performance in adult snakes. Here, we use high-speed video to measure the strike kinematics and performance of 10 juvenile (pythons, Python regius. We find that juvenile P. regius strike at levels comparable to larger snakes, but with shorter durations and over shorter distances. We conclude that the juvenile P. regius maintain performance likely through manipulation of the axial musculature and accompanying elastic tissues, and that this is a first step to understanding ontogenetic changes in behavior and a potential avenue for understanding how captivity may also impact behavior. © 2017 Wiley Periodicals, Inc.

  1. Strike Point Control on EAST Using an Isoflux Control Method

    International Nuclear Information System (INIS)

    Xing Zhe; Xiao Bingjia; Luo Zhengping; Walker, M. L.; Humphreys, D. A.

    2015-01-01

    For the advanced tokamak, the particle deposition and thermal load on the divertor is a big challenge. By moving the strike points on divertor target plates, the position of particle deposition and thermal load can be shifted. We could adjust the Poloidal Field (PF) coil current to achieve the strike point position feedback control. Using isoflux control method, the strike point position can be controlled by controlling the X point position. On the basis of experimental data, we establish relational expressions between X point position and strike point position. Benchmark experiments are carried out to validate the correctness and robustness of the control methods. The strike point position is successfully controlled following our command in the EAST operation. (paper)

  2. Expertise of using striking techniques for power stroke in badminton.

    Science.gov (United States)

    Zhu, Qin

    2013-10-01

    Two striking techniques (fast swing and angled striking) were examined to see if they allowed effective use of string tension for the power stroke in badminton. 12 participants (4 novices, 4 recreational, and 4 expert badminton players) were recorded by a fast-speed camera while striking a shuttlecock with racquets of 8 different string tensions. The peak speed of the shuttlecock, the racquet angle and the shuttlecock angle were analyzed. The results showed that expert players succeeded in using both striking techniques to overcome the constraint of string tension and produce a consistently superior stroke. Failure to use either striking technique resulted in inferior performance that was constrained by string tension. Expertise in badminton allows the necessary motor adjustments based on the affordance perception of the string tension.

  3. Wavelet transform analysis of electromyography kung fu strikes data.

    Science.gov (United States)

    Neto, Osmar Pinto; Marzullo, Ana Carolina de Miranda

    2009-11-01

    In martial arts and contact sports strikes are performed at near maximum speeds. For that reason, electromyography (EMG) analysis of such movements is non-trivial. This paper has three main goals: firstly, to investigate the differences in the EMG activity of muscles during strikes performed with and without impacts; secondly, to assess the advantages of using Sum of Significant Power (SSP) values instead of root mean square (rms) values when analyzing EMG data; and lastly to introduce a new method of calculating median frequency values using wavelet transforms (WMDF). EMG data of the deltoid anterior (DA), triceps brachii (TB) and brachioradialis (BR) muscles were collected from eight Kung Fu practitioners during strikes performed with and without impacts. SSP results indicated significant higher muscle activity (p = 0.023) for the strikes with impact. WMDF results, on the other hand, indicated significant lower values (p = 0. 007) for the strikes with impact. SSP results presented higher sensitivity than rms to quantify important signal differences and, at the same time, presented lower inter-subject coefficient of variations. The result of increase in SSP values and decrease in WMDF may suggest better synchronization of motor units for the strikes with impact performed by the experienced Kung Fu practitioners. Key PointsThe results show higher muscle activity and lower electromyography median frequencies for strikes with impact compared to strikes without.SSP results presented higher sensitivity and lower inter-subject coefficient of variations than rms results.Kung Fu palm strikes with impact may present better motor units' synchronization than strikes without.

  4. The Teacher Strike: School District Protection Procedures. A Manual for School District Officials on How to Handle a Teachers' Strike.

    Science.gov (United States)

    Igoe, Joseph A.; DiRocco, Anthony P.

    This booklet is designed to give practical and realistic advice to school district officials faced with the possibility of a teachers' strike. It is intended for use both by school district administrators and school board members. The booklet is organized into four sections that focus in turn on signs of a pending teachers' strike, union…

  5. The Effect of Strike Face Geometry on the Dynamic Delamination of Composite Back Plates

    Science.gov (United States)

    2015-01-01

    behind the ceramic (Zuogang et al. 2010). In many cases, Kevlar , S-2 glass, ultra-high-molecular-weight polyethylene, or a similar high- performance...thin, translucent S-2 glass/SC-15 epoxy backing plate. A 0.30-cal. fragment-simulating projectile (FSP) was used to strike the front of the target... epoxy was chosen as the composite backing. Quasi-static material and high strain- rate properties for this composite are well characterized and have been

  6. Determine the Foot Strike Pattern Using Inertial Sensors

    Directory of Open Access Journals (Sweden)

    Tzyy-Yuang Shiang

    2016-01-01

    Full Text Available From biomechanical point of view, strike pattern plays an important role in preventing potential injury risk in running. Traditionally, strike pattern determination was conducted by using 3D motion analysis system with cameras. However, the procedure is costly and not convenient. With the rapid development of technology, sensors have been applied in sport science field lately. Therefore, this study was designed to determine the algorithm that can identify landing strategies with a wearable sensor. Six healthy male participants were recruited to perform heel and forefoot strike strategies at 7, 10, and 13 km/h speeds. The kinematic data were collected by Vicon 3D motion analysis system and 2 inertial measurement units (IMU attached on the dorsal side of both shoes. The data of each foot strike were gathered for pitch angle and strike index analysis. Comparing the strike index from IMU with the pitch angle from Vicon system, our results showed that both signals exhibited highly correlated changes between different strike patterns in the sagittal plane (r=0.98. Based on the findings, the IMU sensors showed potential capabilities and could be extended beyond the context of sport science to other fields, including clinical applications.

  7. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  8. Setting up a mobile Lidar (DIAL) system for detecting chemical warfare agents

    International Nuclear Information System (INIS)

    Tehrani, M Kavosh; Jaafari, E; Mobashery, A; Mohammad, M Malek

    2015-01-01

    The mobile light detection and ranging DIAL system of Malek Ashtar University of Technology has been developed for the detection of chemical warfare agents whose absorption wavelengths are in the range of 9.2–10.8 μm tunable CO 2 lasers of the system. In this paper, this system is first described and then ammonia detection is analyzed experimentally. Also, experimental results of detecting a sarin agent simulant, dimethyl–methyl phosphonate (DMMP), are presented. The power levels received from different ranges to detect specific concentrations of NH 3 and DMMP have been measured and debated. The primary test results with a 150 ns clipped pulse width by passive pinhole plasma shutter indicate that the system is capable of monitoring several species of pollutants in the range of about 1 km, with a 20 m spatial and 2 min temporal resolution. (paper)

  9. "Thunderstruck": penetrating thoracic injury from lightning strike.

    Science.gov (United States)

    van Waes, Oscar J F; van de Woestijne, Pieter C; Halm, Jens A

    2014-04-01

    Lightning strike victims are rarely presented at an emergency department. Burns are often the primary focus. This case report describes the improvised explosive device like-injury to the thorax due to lightning strike and its treatment, which has not been described prior in (kerauno)medicine. Penetrating injury due to blast from lightning strike is extremely rare. These "shrapnel" injuries should however be ruled out in all patients struck by lightning. Copyright © 2013 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  10. Strike action by nurses in South Africa: A value clarification

    Directory of Open Access Journals (Sweden)

    Marie Muller

    2001-09-01

    Full Text Available The Labour Relations Act (South Africa, 1991 made provision for protected strike action by employees, subject to certain conditions, procedures and negotiated agreements. This led to the removal of the strike clause in the Nursing Act (South Africa, 1992. The labour rights of all citizens are entrenched in the Constitution of the country (South Africa, 1996. Participation in strike action by the nurse/ midwife, regardless of the legal requirements and specifications, does, however, pose an ethical question. It is therefore necessary to conduct a value clarification on strike action by nurses in South Africa. The purpose of this research is to explore and describe the perceived values of participants from an accessible population on this phenomenon. A qualitative, exploratory and descriptive research design was deployed. The perceived values of nurses on strike action were collected by means of an openended questionnaire/sketch. Over a period of three years a purposive and convenient sampling method was used, involving all the enrolled post basic nursing/midwifery students/ learners at a particular Nursing Education Institution. The justification of the sample was further enhanced by also collecting data on the participants’ age and provincial distribution location. Although a 63% sample realisation (of the accessible population was achieved, this represents only 1,5% of the registered nursing/midwifery population in the country. A descriptive analysis of the participants’ age and provincial distribution was undertaken, as well as a content analysis of their perceived values on strike action. The mean age of the participants was 48 years, which could be attributed to the fact that most of them were enrolled for a post-basic Diploma in Community Nursing Science. Most of the responses (52,7% were against strike action and 32,5% supported strike action by nurses as a constitutional and legal right. A fairly substantial number of participants (14

  11. Physicians' strikes and the competing bases of physicians' moral obligations.

    Science.gov (United States)

    MacDougall, D Robert

    2013-09-01

    Many authors have addressed the morality of physicians' strikes on the assumption that medical practice is morally different from other kinds of occupations. This article analyzes three prominent theoretical accounts that attempt to ground such special moral obligations for physicians--practice-based accounts, utilitarian accounts, and social contract accounts--and assesses their applicability to the problem of the morality of strikes. After critiquing these views, it offers a fourth view grounding special moral obligations in voluntary commitments, and explains why this is a preferable basis for understanding physicians' moral obligations in general and especially as pertaining to strikes.

  12. MONOSODIUM TITANATE MULTI-STRIKE TESTING

    International Nuclear Information System (INIS)

    BARNES, MARKJ

    2004-01-01

    Research over the past decade has studied the adsorption of plutonium and uranium onto monosodium titanate (MST) in alkaline solutions. Tests showed that MST would remove the targeted radionuclides from simulated alkaline waste. Testing also indicated that Pu removal kinetics and Np capacity of the MST material impacts the size of equipment and waste blending plans for the Salt Waste Processing Facility (SWPF). Additionally, calculations suggested the baseline MST process may not achieve the desired decontamination in wastes containing elevated concentrations of Pu and Np. In this task, the authors investigated the performance of non-baseline process parameters and their effectiveness for treating waste feed in the Salt Waste Processing Facility. The work addresses a DOE request in support of technical needs expressed, in part, by the Engineering, Procurement, and Construction Contractors for the Salt Waste Processing Facility. The work investigated the effect of increased MST addition (up to 1.2 g/L) and the benefit of extra filtration steps with multiple additions of MST to salt waste containing actinides and strontium. Both simulant and actual waste testing occurred. Actual waste tests used a Tank 39H composite waste solution. In addition, testing to determine desorption of actinides from residual MST occurred. The release of sorbed Sr and actinides from loaded MST during the washing stages in the Salt Waste Processing Facility is an unresolved process behavior. Desorption tests assessed this potential problem using loaded MST from the residue of the MST adsorption tests. Analysis of non-radioactive Sr in the tests proved difficult due to the low concentration of nonradioactive Sr and its nearness to the method detection limit for ICP-MS. Efforts to use AMP to minimize dilution of actual waste for removal from the cell did not help for this analysis since instrument dilution still proved necessary due to the salt content

  13. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  14. Ethical and legal consideration of prisoner's hunger strike in Serbia.

    Science.gov (United States)

    Alempijevic, Djordje; Pavlekic, Snezana; Jecmenica, Dragan; Nedeljkov, Aleksandra; Jankovic, Milos

    2011-03-01

    Hunger strike of prisoners and detainees remains a major human rights and ethical issue for medical professionals. We are reporting on a case of a 48-year-old male sentenced prisoner, intravenous heroin user, who went on a hunger strike and died 15 days later. Throughout the fasting period, the prisoner, who was capable of decision making, refused any medical examination. Autopsy findings were not supporting prolonged starvation, while toxicology revealed benzodiazepines and opiates in blood and urine. Cause of death was given as "heroin intoxication" in keeping with detection of 6-MAM. Legal and ethical issues pertinent to medical examination and treatment of prisoners on hunger strike are explored in accordance with legislation and professional ethical standards in Serbia. A recommendation for the best autopsy practice in deaths following hunger strike has been made. © 2011 American Academy of Forensic Sciences.

  15. Continental United States Hurricane Strikes 1950-2012

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Continental U.S. Hurricane Strikes Poster is our most popular poster which is updated annually. The poster includes all hurricanes that affected the U.S. since...

  16. BIRD/WILDLIFE STRIKE CONTROL FOR SAFER AIR ...

    African Journals Online (AJOL)

    Osondu

    2012-06-05

    Jun 5, 2012 ... Several factors including lack of adequate data, shortage of funds, inadequate training of staff and lack of ... Keywords: bird/wildlife, strike, aviation, hazard, control. Introduction ..... implications of some human activities within.

  17. 2005 Significant U.S. Hurricane Strikes Poster

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 2005 Significant U.S. Hurricane Strikes poster is one of two special edition posters for the Atlantic Hurricanes. This beautiful poster contains two sets of...

  18. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  19. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  20. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  1. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  2. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  3. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  4. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  5. Comparison of force, power, and striking efficiency for a Kung Fu strike performed by novice and experienced practitioners: preliminary analysis.

    Science.gov (United States)

    Neto, Osmar Pinto; Magini, Marcio; Saba, Marcelo M F; Pacheco, Marcos Tadeu Tavares

    2008-02-01

    This paper presents a comparison of force, power, and efficiency values calculated from Kung Fu Yau-Man palm strikes, when performed by 7 experienced and 6 novice men. They performed 5 palm strikes to a freestanding basketball, recorded by high-speed camera at 1000 Hz. Nonparametric comparisons and correlations showed experienced practitioners presented larger values of mean muscle force, mean impact force, mean muscle power, mean impact power, and mean striking efficiency, as is noted in evidence obtained for other martial arts. Also, an interesting result was that for experienced Kung Fu practitioners, muscle power was linearly correlated with impact power (p = .98) but not for the novice practitioners (p = .46).

  6. Effects of footwear and strike type on running economy.

    Science.gov (United States)

    Perl, Daniel P; Daoud, Adam I; Lieberman, Daniel E

    2012-07-01

    This study tests if running economy differs in minimal shoes versus standard running shoes with cushioned elevated heels and arch supports and in forefoot versus rearfoot strike gaits. We measured the cost of transport (mL O(2)·kg(-1)·m(-1)) in subjects who habitually run in minimal shoes or barefoot while they were running at 3.0 m·s(-1) on a treadmill during forefoot and rearfoot striking while wearing minimal and standard shoes, controlling for shoe mass and stride frequency. Force and kinematic data were collected when subjects were shod and barefoot to quantify differences in knee flexion, arch strain, plantar flexor force production, and Achilles tendon-triceps surae strain. After controlling for stride frequency and shoe mass, runners were 2.41% more economical in the minimal-shoe condition when forefoot striking and 3.32% more economical in the minimal-shoe condition when rearfoot striking (P forefoot and rearfoot striking did not differ significantly in cost for either minimal- or standard-shoe running. Arch strain was not measured in the shod condition but was significantly greater during forefoot than rearfoot striking when barefoot. Plantar flexor force output was significantly higher in forefoot than in rearfoot striking and in barefoot than in shod running. Achilles tendon-triceps surae strain and knee flexion were also lower in barefoot than in standard-shoe running. Minimally shod runners are modestly but significantly more economical than traditionally shod runners regardless of strike type, after controlling for shoe mass and stride frequency. The likely cause of this difference is more elastic energy storage and release in the lower extremity during minimal-shoe running.

  7. The “Surgical” Legitimacy of Drone Strikes? Issues of Sovereignty and Human Rights in the Use of Unmanned Aerial Systems in Pakistan

    Directory of Open Access Journals (Sweden)

    Alcides Eduardo dos Reis Peron

    2014-12-01

    Full Text Available The Revolution in Military Affairs had an important role in providing the United States Armed Forces the technical instruments necessary to conduct high-risky operations in the context of Irregular Warfare. The development of these instruments, such as Unmanned Aerial Vehicles (UAV, allowed the emergence of a discourse of surgical and lean wars by the George W. Bush and Barack Obama administrations, whose legitimacy of the interventions were related to the accuracy and technical superiority of the UAVs. Focusing in the case of the U.S. drone strikes in Pakistan, this article seeks to debate the legal limits of the employment of these instruments. Despite the supposed accuracy and visual capacity of the UAVs, we argue that there are several information on the deaths of civilians, and legal limitations in the International Humanitarian Law, that constrain the employment of this instrument, and illegitimate the argument of surgical war.

  8. WAVELET TRANSFORM ANALYSIS OF ELECTROMYOGRAPHY KUNG FU STRIKES DATA

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Miranda Marzullo

    2009-11-01

    Full Text Available In martial arts and contact sports strikes are performed at near maximum speeds. For that reason, electromyography (EMG analysis of such movements is non-trivial. This paper has three main goals: firstly, to investigate the differences in the EMG activity of muscles during strikes performed with and without impacts; secondly, to assess the advantages of using Sum of Significant Power (SSP values instead of root mean square (rms values when analyzing EMG data; and lastly to introduce a new method of calculating median frequency values using wavelet transforms (WMDF. EMG data of the deltoid anterior (DA, triceps brachii (TB and brachioradialis (BR muscles were collected from eight Kung Fu practitioners during strikes performed with and without impacts. SSP results indicated significant higher muscle activity (p = 0.023 for the strikes with impact. WMDF results, on the other hand, indicated significant lower values (p = 0. 007 for the strikes with impact. SSP results presented higher sensitivity than rms to quantify important signal differences and, at the same time, presented lower inter-subject coefficient of variations. The result of increase in SSP values and decrease in WMDF may suggest better synchronization of motor units for the strikes with impact performed by the experienced Kung Fu practitioners

  9. VARIATION OF STRIKE INCENTIVES IN DEEP REDUCTIONS; FINAL

    International Nuclear Information System (INIS)

    G.H. CANAVAN

    2001-01-01

    This note studies the sensitivity of strike incentives to deep offensive force reductions using exchange, cost, and game theoretic decision models derived and discussed in companion reports. As forces fall, weapon allocations shift from military to high value targets, with the shift being half complete at about 1,000 weapons. By 500 weapons, the first and second strikes are almost totally on high value. The dominant cost for striking first is that of damage to one's high value, which is near total absent other constraints, and hence proportional to preferences for survival of high value. Changes in military costs are largely offsetting, so total first strike costs change little. The resulting costs at decision nodes are well above the costs of inaction, so the preferred course is inaction for all offensive reductions studied. As the dominant cost for striking first is proportional to the preference for survival of high value. There is a wide gap between the first strike cost and that of inaction for the parameters studied here. These conclusions should be insensitive to significant reductions in the preference for survival of high value, which is the most sensitive parameter

  10. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  11. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  12. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  13. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  14. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  15. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  16. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  17. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  18. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  19. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  20. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  1. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  2. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  3. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  4. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  5. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  6. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  7. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  8. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  9. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  10. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  11. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  12. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  13. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  14. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  15. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  16. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  17. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  18. Predicting timing of foot strike during running, independent of striking technique, using principal component analysis of joint angles.

    Science.gov (United States)

    Osis, Sean T; Hettinga, Blayne A; Leitch, Jessica; Ferber, Reed

    2014-08-22

    As 3-dimensional (3D) motion-capture for clinical gait analysis continues to evolve, new methods must be developed to improve the detection of gait cycle events based on kinematic data. Recently, the application of principal component analysis (PCA) to gait data has shown promise in detecting important biomechanical features. Therefore, the purpose of this study was to define a new foot strike detection method for a continuum of striking techniques, by applying PCA to joint angle waveforms. In accordance with Newtonian mechanics, it was hypothesized that transient features in the sagittal-plane accelerations of the lower extremity would be linked with the impulsive application of force to the foot at foot strike. Kinematic and kinetic data from treadmill running were selected for 154 subjects, from a database of gait biomechanics. Ankle, knee and hip sagittal plane angular acceleration kinematic curves were chained together to form a row input to a PCA matrix. A linear polynomial was calculated based on PCA scores, and a 10-fold cross-validation was performed to evaluate prediction accuracy against gold-standard foot strike as determined by a 10 N rise in the vertical ground reaction force. Results show 89-94% of all predicted foot strikes were within 4 frames (20 ms) of the gold standard with the largest error being 28 ms. It is concluded that this new foot strike detection is an improvement on existing methods and can be applied regardless of whether the runner exhibits a rearfoot, midfoot, or forefoot strike pattern. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Electric converters of electromagnetic strike machine with battery power

    Science.gov (United States)

    Usanov, K. M.; Volgin, A. V.; Kargin, V. A.; Moiseev, A. P.; Chetverikov, E. A.

    2018-03-01

    At present, the application of pulse linear electromagnetic engines to drive strike machines for immersion of rod elements into the soil, strike drilling of shallow wells, dynamic probing of soils is recognized as quite effective. The pulse linear electromagnetic engine performs discrete consumption and conversion of electrical energy into mechanical work. Pulse dosing of a stream transmitted by the battery source to the pulse linear electromagnetic engine of the energy is provided by the electrical converter. The electric converters with the control of an electromagnetic strike machine as functions of time and armature movement, which form the unipolar supply pulses of voltage and current necessary for the normal operation of a pulse linear electromagnetic engine, are proposed. Electric converters are stable in operation, implement the necessary range of output parameters control determined by the technological process conditions, have noise immunity and automatic disconnection of power supply in emergency modes.

  20. VARIATION OF STRIKE INCENTIVES WITH DAMAGE PREFERENCES; FINAL

    International Nuclear Information System (INIS)

    G. CANAVAN

    2001-01-01

    For START III level forces, strike allocations and magnitudes vary little with L, but first strike costs vary directly with L, which means that for K reflecting a preference for the survival of high value targets over their destruction and a preference for high value over military targets, the costs of action are far greater than those of inaction for a wide range of values of damage preference L. Thus, if both sides have much greater preferences for the survival of their high value targets than for military targets or destruction, they do not see a net incentive to strike, and crises are terminated by inaction. Recent decades suggest strong preferences for the survival of high value and that this has contributed to the lack of direct conflict during that period

  1. Simulation

    DEFF Research Database (Denmark)

    Gould, Derek A; Chalmers, Nicholas; Johnson, Sheena J

    2012-01-01

    Recognition of the many limitations of traditional apprenticeship training is driving new approaches to learning medical procedural skills. Among simulation technologies and methods available today, computer-based systems are topical and bring the benefits of automated, repeatable, and reliable p...... performance assessments. Human factors research is central to simulator model development that is relevant to real-world imaging-guided interventional tasks and to the credentialing programs in which it would be used....

  2. Joint stiffness and running economy during imposed forefoot strike before and after a long run in rearfoot strike runners.

    Science.gov (United States)

    Melcher, Daniel A; Paquette, Max R; Schilling, Brian K; Bloomer, Richard J

    2017-12-01

    Research has focused on the effects of acute strike pattern modifications on lower extremity joint stiffness and running economy (RE). Strike pattern modifications on running biomechanics have mostly been studied while runners complete short running bouts. This study examined the effects of an imposed forefoot strike (FFS) on RE and ankle and knee joint stiffness before and after a long run in habitual rearfoot strike (RFS) runners. Joint kinetics and RE were collected before and after a long run. Sagittal joint kinetics were computed from kinematic and ground reaction force data that were collected during over-ground running trials in 13 male runners. RE was measured during treadmill running. Knee flexion range of motion, knee extensor moment and ankle joint stiffness were lower while plantarflexor moment and knee joint stiffness were greater during imposed FFS compared with RFS. The long run did not influence the difference in ankle and knee joint stiffness between strike patterns. Runners were more economical during RFS than imposed FFS and RE was not influenced by the long run. These findings suggest that using a FFS pattern towards the end of a long run may not be mechanically or metabolically beneficial for well-trained male RFS runners.

  3. Fabrication and assessment of a thin flexible surface coating made of pristine graphene for lightning strike protection

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, B. [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Soltani, S.A. [Department of Aerospace Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Le, L.N. [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Asmatulu, R., E-mail: ramazan.asmatulu@wichita.edu [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States)

    2017-02-15

    A thin flexible coating made of pristine graphene was fabricated and applied on the surface of a commercial carbon fiber epoxy prepreg laminate to protect it against the lightning strike. To assess the coating’s effectiveness, the coated laminate was subjected to the simulated lightning strike as well as the electromagnetic interference shielding effectiveness (EMI SE) testing. It was observed that the damaged area and volume in the coated laminate were reduced by 94% and 96%, respectively, as compared to the laminate without the coating. Moreover, the coated laminate had an average EMI SE of 51 dB over 100–2000 MHz range, 55 dB over 8–12 GHz range, and 60 dB over 12–18 GHz range marking 22%, 44%, and 49% improvement in EMI SE for each frequency range, respectively. The results indicate a great potential for the developed coating to protect the commercially available prepreg composites against the lightning strike.

  4. Fabrication and assessment of a thin flexible surface coating made of pristine graphene for lightning strike protection

    International Nuclear Information System (INIS)

    Zhang, B.; Soltani, S.A.; Le, L.N.; Asmatulu, R.

    2017-01-01

    A thin flexible coating made of pristine graphene was fabricated and applied on the surface of a commercial carbon fiber epoxy prepreg laminate to protect it against the lightning strike. To assess the coating’s effectiveness, the coated laminate was subjected to the simulated lightning strike as well as the electromagnetic interference shielding effectiveness (EMI SE) testing. It was observed that the damaged area and volume in the coated laminate were reduced by 94% and 96%, respectively, as compared to the laminate without the coating. Moreover, the coated laminate had an average EMI SE of 51 dB over 100–2000 MHz range, 55 dB over 8–12 GHz range, and 60 dB over 12–18 GHz range marking 22%, 44%, and 49% improvement in EMI SE for each frequency range, respectively. The results indicate a great potential for the developed coating to protect the commercially available prepreg composites against the lightning strike.

  5. [Force-feeding of hunger-striking prisoners].

    Science.gov (United States)

    Glick, Shimon

    2014-09-01

    In contrast to the position of the World Medical Association and the Ethics Council of the Israel Medical Association, the author argues for forced-feeding of hunger-striking prisoners when their condition reaches a stage of danger of death or permanent injury. This position is based on the priority of human life over autonomy, and of a communitarian ethic. This position is supported by a District Court decision ordering the feeding of a hunger-striking prisoner, by a Supreme Court decision imposing surgery on a non-consenting prisoner, and in line with Israel's Patient's Right Law.

  6. MORE THAN A LABOR DISPUTE: THE PATCO STRIKE OF 1981

    Directory of Open Access Journals (Sweden)

    Paul L. Butterworth

    2005-01-01

    Full Text Available On August 3, 1981, 13,000 air traffic controllers walked off the job. Under US law, the strike was illegal. President Ronald Reagan ordered the strikers as a group to return to work; when they did not, he ordered individual strikers to return, and again they refused. Two days later the president fired the strikers. Reagan's action transformed relations between organized labor and American management, and created the worst turbulence to hit the American airways in recent history. “More Than a Labor Dispute” examines the work stoppage and aftermath through the eyes of two controllers and a pilot, all of whom worked during the strike.

  7. Remarkable rates of lightning strike mortality in Malawi.

    Science.gov (United States)

    Mulder, Monique Borgerhoff; Msalu, Lameck; Caro, Tim; Salerno, Jonathan

    2012-01-01

    Livingstone's second mission site on the shore of Lake Malawi suffers very high rates of consequential lightning strikes. Comprehensive interviewing of victims and their relatives in seven Traditional Authorities in Nkhata Bay District, Malawi revealed that the annual rate of consequential strikes was 419/million, more than six times higher than that in other developing countries; the rate of deaths from lightning was 84/million/year, 5.4 times greater than the highest ever recorded. These remarkable figures reveal that lightning constitutes a significant stochastic source of mortality with potential life history consequences, but it should not deflect attention away from the more prominent causes of mortality in this rural area.

  8. Simulation

    CERN Document Server

    Ross, Sheldon

    2006-01-01

    Ross's Simulation, Fourth Edition introduces aspiring and practicing actuaries, engineers, computer scientists and others to the practical aspects of constructing computerized simulation studies to analyze and interpret real phenomena. Readers learn to apply results of these analyses to problems in a wide variety of fields to obtain effective, accurate solutions and make predictions about future outcomes. This text explains how a computer can be used to generate random numbers, and how to use these random numbers to generate the behavior of a stochastic model over time. It presents the statist

  9. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  10. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  11. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  12. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  13. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  14. Metal-Organic Framework Modified Glass Substrate for Analysis of Highly Volatile Chemical Warfare Agents by Paper Spray Mass Spectrometry.

    Science.gov (United States)

    Dhummakupt, Elizabeth S; Carmany, Daniel O; Mach, Phillip M; Tovar, Trenton M; Ploskonka, Ann M; Demond, Paul S; DeCoste, Jared B; Glaros, Trevor

    2018-03-07

    Paper spray mass spectrometry has been shown to successfully analyze chemical warfare agent (CWA) simulants. However, due to the volatility differences between the simulants and real G-series (i.e., sarin, soman) CWAs, analysis from an untreated paper substrate proved difficult. To extend the analytical lifetime of these G-agents, metal-organic frameworks (MOFs) were successfully integrated onto the paper spray substrates to increase adsorption and desorption. In this study, several MOFs and nanoparticles were tested to extend the analytical lifetimes of sarin, soman, and cyclosarin on paper spray substrates. It was found that the addition of either UiO-66 or HKUST-1 to the paper substrate increased the analytical lifetime of the G-agents from less than 5 min detectability to at least 50 min.

  15. Torts Liability for Strike Action and Third Party Rights.

    Science.gov (United States)

    Raday, Frances

    1979-01-01

    Studies the nature of the torts liability incurred in strikes and the extent of existing immunities bestowed on strikers and their organizers, and explores the principles that should govern liability and immunity. Available from Israel Law Review Association, c/o Faculty of Law, Hebrew University of Jerusalem, Mount Scopus, P.O.B. 24100, Jerusalem…

  16. Delayed Post Mortem Predation in Lightning Strike Carcasses ...

    African Journals Online (AJOL)

    Campbell Murn

    An adult giraffe was struck dead by lightning on a game farm outside. Phalaborwa, South Africa in March 2014. Interestingly, delayed post-mortem predation occurred on the carcass, which according to the farm owners was an atypical phenomenon for the region. Delayed post-mortem scavenging on lightning strike ...

  17. EDITORIAL Plagiarism - time to strike at the epidemic

    African Journals Online (AJOL)

    admin

    Plagiarism - time to strike at the epidemic. Lukman Yusuf1, Abraham Aseffa2. We live in a globalized world where information is instantly shared across continents. The number of biomedical journals available for reference is quite enormous and there is a sudden huge surge of free open access journals in the last few years ...

  18. Analysis of the effects of frequent strikes on academic performance ...

    African Journals Online (AJOL)

    The history of Academic Staff Union of Universities (ASUU)'s strike can be traced back to 1978, the period of the beginning of the decline in the oil boom, when the country faced the consequences of the failure by its rulers to use the oil wealth to generate production and a social welfare system. Military dictatorship had ...

  19. When the Corporate Storm Strikes the Academy: Faculty Response Required

    Science.gov (United States)

    DeBoy, James L.

    2015-01-01

    When the corporate storm strikes the academy, faculty must be willing and able to repel administrative assaults upon academic freedom, shared governance, and tenure. This paper will describe the on-going clash between administrators who embrace the corporate mindset and faculty who cherish traditions of shared governance and collegial…

  20. Force, reaction time, and precision of Kung Fu strikes.

    Science.gov (United States)

    Neto, Osmar Pinto; Bolander, Richard; Pacheco, Marcos Tadeu Tavares; Bir, Cynthia

    2009-08-01

    The goal was to compare values of force, precision, and reaction time of several martial arts punches and palm strikes performed by advanced and intermediate Kung Fu practitioners, both men and women. 13 Kung Fu practitioners, 10 men and three women, participated. Only the men, three advanced and seven intermediate, were considered for comparisons between levels. Reaction time values were obtained using two high speed cameras that recorded each strike at 2500 Hz. Force of impact was measured by a load cell. For comparisons of groups, force data were normalized by participant's body mass and height. Precision of the strikes was determined by a high speed pressure sensor. The results show that palm strikes were stronger than punches. Women in the study presented, on average, lower values of reaction time and force but higher values of precision than men. Advanced participants presented higher forces than intermediate participants. Significant negative correlations between the values of force and precision and the values of force and reaction time were also found.

  1. Striking Inside Angola with 32 Battalion | Scheepers | Scientia ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 42, No 1 (2014) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Striking Inside Angola with 32 ...

  2. Assemblage of strike-slip faults and tectonic extension and ...

    Indian Academy of Sciences (India)

    12

    the formation, evolution and distribution of these strike-slip faults have important. 80 ...... function of coal-derived gas study for natural gas industry development in China; .... Bohai-Zhangjiakou seismotectonic zone based on 3D visco-elastic ...

  3. Management of patients during hunger strike and refeeding phase.

    Science.gov (United States)

    Eichelberger, M; Joray, M L; Perrig, M; Bodmer, M; Stanga, Z

    2014-01-01

    Hunger strikers resuming nutritional intake may develop a life-threatening refeeding syndrome (RFS). Consequently, hunger strikers represent a core challenge for the medical staff. The objective of the study was to test the effectiveness and safety of evidence-based recommendations for prevention and management of RFS during the refeeding phase. This was a retrospective, observational data analysis of 37 consecutive, unselected cases of prisoners on a hunger strike during a 5-y period. The sample consisted of 37 cases representing 33 individual patients. In seven cases (18.9%), the hunger strike was continued during the hospital stay, in 16 episodes (43.2%) cessation of the hunger strike occurred immediately after admission to the security ward, and in 14 episodes (37.9%) during hospital stay. In the refeed cases (n = 30), nutritional replenishment occurred orally, and in 25 (83.3%) micronutrients substitutions were made based on the recommendations. The gradual refeeding with fluid restriction occurred over 10 d. Uncomplicated dyselectrolytemia was documented in 12 cases (40%) within the refeeding phase. One case (3.3%) presented bilateral ankle edemas as a clinical manifestation of moderate RFS. Intensive medical treatment was not necessary and none of the patients died. Seven episodes of continued hunger strike were observed during the entire hospital stay without medical complications. Our data suggested that seriousness and rate of medical complications during the refeeding phase can be kept at a minimum in a hunger strike population. This study supported use of recommendations to optimize risk management and to improve treatment quality and patient safety in this vulnerable population. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  5. Implications of Incessant Strike Actions on the Implementation of Technical Education Programme in Nigeria

    Science.gov (United States)

    Adavbiele, J. A.

    2015-01-01

    This paper was designed to x-ray the implications of incessant strike actions on the implementation of Technical education programme in Nigeria. The paper took an exploratory view on the concept of strike actions in Nigeria with particular references on notable strike actions that have occurred in Nigeria. The types of strike were explained and…

  6. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  7. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  8. Feasibility of Observing and Characterizing Single Ion Strikes in Microelectronic Components

    International Nuclear Information System (INIS)

    Dingreville, Remi Philippe Michel; Hattar, Khalid Mikhiel; Bufford, Daniel Charles

    2015-01-01

    The transient degradation of semiconductor device performance under irradiation has long been an issue of concern. A single high-energy charged particle can degrade or permanently destroy the microelectronic component, potentially altering the course or function of the systems. Disruption of the the crystalline structure through the introduction of quasi-stable defect structures can change properties from semiconductor to conductor. Typically, the initial defect formation phase is followed by a recovery phase in which defect-defect or defect-dopant interactions modify the characteristics of the damaged structure. In this LDRD Express, in-situ ion irradiation transmission microscopy (TEM) in-situ TEM experiments combined with atomistic simulations have been conducted to determine the feasibility of imaging and characterizing the defect structure resulting from a single cascade in silicon. In-situ TEM experiments have been conducted to demonstrate that a single ion strike can be observed in Si thin films with nanometer resolution in real time using the in-situ ion irradiation transmission electron microscope (I 3 TEM). Parallel to this experimental effort, ion implantation has been numerically simulated using Molecular Dynamics (MD). This numerical framework provides detailed predictions of the damage and follow the evolution of the damage during the first nanoseconds. The experimental results demonstrate that single ion strike can be observed in prototypical semiconductors.

  9. Striking Seasonality in the Secular Warming of the Northern Continents: Structure and Mechanisms

    Science.gov (United States)

    Nigam, S.; Thomas, N. P.

    2017-12-01

    The linear trend in twentieth-century surface air temperature (SAT)—a key secular warming signal— exhibits striking seasonal variations over Northern Hemisphere continents; SAT trends are pronounced in winter and spring but notably weaker in summer and fall. The SAT trends in historical twentieth-century climate simulations informing the Intergovernmental Panel for Climate Change's Fifth Assessment show varied (and often unrealistic) strength and structure, and markedly weaker seasonal variation. The large intra-ensemble spread of winter SAT trends in some historical simulations was surprising, especially in the context of century-long linear trends, with implications for the detection of the secular warming signal. The striking seasonality of observed secular warming over northern continents warrants an explanation and the representation of related processes in climate models. Here, the seasonality of SAT trends over North America is shown to result from land surface-hydroclimate interactions and, to an extent, also from the secular change in low-level atmospheric circulation and related thermal advection. It is argued that the winter dormancy and summer vigor of the hydrologic cycle over middle- to high-latitude continents permit different responses to the additional incident radiative energy from increasing greenhouse gas concentrations. The seasonal cycle of climate, despite its monotony, provides an expanded phase space for the exposition of the dynamical and thermodynamical processes generating secular warming, and an exceptional cost-effective opportunity for benchmarking climate projection models.

  10. Light-induced bird strikes on vessels in Southwest Greenland

    DEFF Research Database (Denmark)

    Merkel, Flemming Ravn; Johansen, Kasper Lambert

    2011-01-01

    Light-induced bird strikes are known to occur when vessels navigate during darkness in icy waters using powerful searchlight. In Southwest Greenland, which is important internationally for wintering seabirds, we collected reports of incidents of bird strikes over 2–3 winters (2006–2009) from navy...... vessels, cargo vessels and trawlers (total n = 19). Forty-one incidents were reported: mainly close to land (birds were reported killed in a single incident. All occurred between 5 p.m. and 6 a.m. and significantly more birds were involved when...... visibility was poor (snow) rather than moderate or good. Among five seabird species reported, the common eider (Somateria mollissima) accounted for 95% of the bird casualties. Based on spatial analyses of data on vessel traffic intensity and common eider density we are able to predict areas with high risk...

  11. Triggered lightning strikes to aircraft and natural intracloud discharges

    Science.gov (United States)

    Mazur, Vladislav

    1989-01-01

    The physical model of Mazur (1989) for triggering lightning strikes by aircraft was used to interpret the initiation of intracloud flashes observed by the French UHF-VHF interferometric system. It is shown that both the intracloud discharges and airplane-triggered lightning strikes were initiated by simultaneous bidirectional development of the negative stepped leader and the positive leader-continous current process. However, the negative stepped leader phase in triggered flashes is of shorter duration (tens of milliseconds), than that in intracloud flashes (usually hundreds of milliseconds). This is considered to be due to the fact that, on the aircraft there is a single initiation process, versus the numerous initiation processes that occur inside the cloud.

  12. Concept of a Conducting Composite Material for Lightning Strike Protection

    OpenAIRE

    Katunin A.; Krukiewicz K.; Herega A.; Catalanotti G.

    2016-01-01

    The paper focuses on development of a multifunctional material which allows conducting of electrical current and simultaneously holds mechanical properties of a polymeric composite. Such material could be applied for exterior fuselage elements of an aircraft in order to minimize damage occurring during lightning strikes. The concept introduced in this paper is presented from the points of view of various scientific disciplines including materials science, chemistry, structural physics and mec...

  13. 2018 NDIA Precision Strike Annual Review (PSAR-18)

    Science.gov (United States)

    2018-03-20

    Planning Agenda as of 9 MAR 18 Ginny Sniegon: 703-575-6653 PRECISION STRIKE ANNUAL REVIEW (PSAR-18) 20 MARCH 2018...Ginny Sniegon PSA Programs Vice-Chair: Captain David “Jumbo” Baird, USN Annual Review Chair: Kurt Chankaya Congressional & William J. Perry...0745 PSA ANNUAL REVIEW WELCOME: Ken Masson—PSA Chairman 0755 PSAR-18 OPENING REMARKS: Kurt Chankaya—PSAR-18 Event Chair 0800 CONGRESSIONAL

  14. Oscillation thresholds for "striking outwards" reeds coupled to a resonator

    OpenAIRE

    Silva , Fabrice; Kergomard , Jean; Vergez , Christophe

    2007-01-01

    International audience; This paper considers a "striking outwards" reed coupled to a resonator. This expression, due to Helmholtz, is not discussed here : it corresponds to the most common model of a lip-type valve, when the valve is assumed to be a one degree of freedom oscillator. The presented work is an extension of the works done by Wilson and Beavers (1974), Tarnopolsky (2000). The range of the playing frequencies is investigated. The first results are analytical : when no losses are pr...

  15. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress

    Science.gov (United States)

    2016-03-23

    current fighter aircraft. The cost of extending the lives of current fighter aircraft and acquiring other major weapon systems, while continuing to... Norway . Ongoing Manufacturing and Reliability Progress Continue Page 12 GAO-16-489T rework, and repair costs have remained steady over...Program Progress Why GAO Did This Study With estimated acquisition costs of nearly $400 billion, the F-35 Joint Strike Fighter—also known as the

  16. Foot strike pattern in children during shod-unshod running.

    Science.gov (United States)

    Latorre Román, Pedro Ángel; Balboa, Fernando Redondo; Pinillos, Felipe García

    2017-10-01

    The purpose of this study was to determine the foot strike patterns (FSPs) and neutral support (no INV/EVE and no foot rotation) in children, as well as to determine the influence of shod/unshod conditions and sex. A total of 713 children, aged 6 to 16 years, participated in this study (Age=10.28±2.71years, body mass index [BMI]=19.70±3.91kg/m 2 , 302 girls and 411 boys). A sagittal and frontal-plane video (240Hz) was recorded using a high-speed camcorder, to record the following variables: rearfoot strike (RFS), midfoot strike (MFS), forefoot strike (FFS), inversion/eversion (INV/EVE) and foot rotation on initial contact. RFS prevalence was similar between boys and girls in both shod and unshod conditions. In the unshod condition there was a significant reduction (p<0.001) of RFS prevalence both in boys (shod condition=83.95% vs. 62.65% unshod condition) and in girls (shod condition=87.85% vs. 62.70% unshod condition). No significant differences were found in INV/EVE and foot rotation between sex groups. In the unshod condition there was a significant increase (p<0.001) of neutral support (no INV/EVE) both in boys (shod condition=12.55% vs. 22.22% unshod condition) and in girls (shod condition=17.9% vs. 28.15% unshod condition). In addition, in the unshod condition there is a significant reduction (p<0.001) of neutral support (no foot rotation) both in boys (shod condition=21.55% vs. 11.10% unshod condition) and in girls (shod condition=21.05% vs. 11.95% unshod condition). In children, RFS prevalence is lower than adult's population. Additionally, barefoot running reduced the prevalence of RFS and INV/EVE, however increased foot rotation. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Active strike-slip faulting in El Salvador, Central America

    Science.gov (United States)

    Corti, Giacomo; Carminati, Eugenio; Mazzarini, Francesco; Oziel Garcia, Marvyn

    2005-12-01

    Several major earthquakes have affected El Salvador, Central America, during the Past 100 yr as a consequence of oblique subduction of the Cocos plate under the Caribbean plate, which is partitioned between trench-orthogonal compression and strike-slip deformation parallel to the volcanic arc. Focal mechanisms and the distribution of the most destructive earthquakes, together with geomorphologic evidence, suggest that this transcurrent component of motion may be accommodated by a major strike-slip fault (El Salvador fault zone). We present field geological, structural, and geomorphological data collected in central El Salvador that allow the constraint of the kinematics and the Quaternary activity of this major seismogenic strike-slip fault system. Data suggest that the El Salvador fault zone consists of at least two main ˜E-W fault segments (San Vicente and Berlin segments), with associated secondary synthetic (WNW-ESE) and antithetic (NNW-SSE) Riedel shears and NW-SE tensional structures. The two main fault segments overlap in a dextral en echelon style with the formation of an intervening pull-apart basin. Our original geological and geomorphologic data suggest a late Pleistocene Holocene slip rate of ˜11 mm/yr along the Berlin segment, in contrast with low historical seismicity. The kinematics and rates of deformation suggested by our new data are consistent with models involving slip partitioning during oblique subduction, and support the notion that a trench-parallel component of motion between the Caribbean and Cocos plates is concentrated along E-W dextral strike-slip faults parallel to the volcanic arc.

  18. Methyl salicylate: a reactive chemical warfare agent surrogate to detect reaction with hypochlorite.

    Science.gov (United States)

    Salter, W Bruce; Owens, Jeffery R; Wander, Joseph D

    2011-11-01

    Methyl salicylate (MeS) has a rich history as an inert physical simulant for the chemical warfare agents sulfur mustard and soman, where it is used extensively for liquid- and vapor-permeation testing. Here we demonstrate possible utility of MeS as a reactivity simulant for chlorine-based decontaminants. In these experiments MeS was reacted with sodium hypochlorite varying stoichiometry, temperature, reaction time, and pH. No colored oxidation products were observed; however, chlorination of the aromatic ring occurred ortho (methyl 3-chlorosalicylate) and para (methyl 5-chlorosalicylate) to the position bearing the -OH group in both the mono- and disubstituted forms. The monosubstituted para product accumulated initially, and the ortho and 3,5-dichloro products formed over the next several hours. Yields from reactions conducted below pH 11 declined rapidly with decreasing pH. Reactions run at 40 °C produced predominantly para substitution, while those run at 0 °C produced lower yields of ortho- and para-substituted products. Reactions were also carried out on textile substrates of cotton, 50/50 nylon-cotton, and a meta aramid. The textile data broadly reproduced reaction times and stoichiometry observed in the liquid phase, but are complicated by physical and possibly chemical interactions with the fabric. These data indicate that, for hypochlorite-containing neutralizing agents operating at strongly alkaline pH, one can expect MeS to react stoichiometrically with the hypochlorite it encounters. This suggests utility of MeS in lieu of such highly hazardous surrogates as monochloroalkyl sulfides as a simulant for threat scenarios involving the stoichiometric decomposition of sulfur mustard. Specifically, the extent of coverage of the simulant on a fabric by the neutralizing agent can be directly measured. Similar reactivity toward other halogen oxidizing agents is likely but remains to be demonstrated.

  19. High-Velocity Impact Behaviour of Prestressed Composite Plates under Bird Strike Loading

    Directory of Open Access Journals (Sweden)

    Sebastian Heimbs

    2012-01-01

    Full Text Available An experimental and numerical analysis of the response of laminated composite plates under high-velocity impact loads of soft body gelatine projectiles (artificial birds is presented. The plates are exposed to tensile and compressive preloads before impact in order to cover realistic loading conditions of representative aeronautic structures under foreign object impact. The modelling methodology for the composite material, delamination interfaces, impact projectile, and preload using the commercial finite element code Abaqus are presented in detail. Finally, the influence of prestress and of different delamination modelling approaches on the impact response is discussed and a comparison to experimental test data is given. Tensile and compressive preloading was found to have an influence on the damage pattern. Although this general behaviour could be predicted well by the simulations, further numerical challenges for improved bird strike simulation accuracy are highlighted.

  20. Rearfoot striking runners are more economical than midfoot strikers.

    Science.gov (United States)

    Ogueta-Alday, Ana; Rodríguez-Marroyo, José Antonio; García-López, Juan

    2014-03-01

    This study aimed to analyze the influence of foot strike pattern on running economy and biomechanical characteristics in subelite runners with a similar performance level. Twenty subelite long-distance runners participated and were divided into two groups according to their foot strike pattern: rearfoot (RF, n = 10) and midfoot (MF, n = 10) strikers. Anthropometric characteristics were measured (height, body mass, body mass index, skinfolds, circumferences, and lengths); physiological (VO2max, anaerobic threshold, and running economy) and biomechanical characteristics (contact and flight times, step rate, and step length) were registered during both incremental and submaximal tests on a treadmill. There were no significant intergroup differences in anthropometrics, VO2max, or anaerobic threshold measures. RF strikers were 5.4%, 9.3%, and 5.0% more economical than MF at submaximal speeds (11, 13, and 15 km·h respectively, although the difference was not significant at 15 km·h, P = 0.07). Step rate and step length were not different between groups, but RF showed longer contact time (P Foot strike pattern affected both contact and flight times, which may explain the differences in running economy.

  1. Striking dynamics and kinetic properties of boxing and MMA gloves

    Directory of Open Access Journals (Sweden)

    Benjamin Lee

    2014-08-01

    Full Text Available With the growing popularity of Mixed Martial Arts (MMA as a competitive sport, questions regarding the dynamic response and properties of MMA gloves arise. High-energy impacts from punches are very similar to boxing yet MMA competition requires the use of 4 oz fingerless glove, compared to the larger full enclosure boxing glove. This work assessed the kinetic properties and strike dynamics of MMA gloves and compared findings with traditional boxing gloves. Gloves mounted on a molded fist were impacted repetitively on an instrumental anvil designed for impact, over a 5 hour period resulting in 10,000 continuous and consistent strikes. Kinetic data from impacts were sampled at the beginning of the data collection and subsequently every 30 minutes (every 1,000 strikes. MMA gloves produced 4-5 times greater peak force and 5 times faster load rate compared to the boxing glove. However, MMA gloves also showed signs of material fatigue, with peak force increasing by 35% and rate of loading increasing by 60% over the duration of the test. Boxing glove characteristics did deteriorate but to a lesser extent. In summary, the kinetic properties of MMA glove differed substantially from the boxing glove resulting in impacts characterized by higher peak forces and more rapid development of force. Material properties including stiffness and thickness play a role in the kinetic characteristics upon impact, and can be inferred to alter injury mechanisms of blunt force trauma.

  2. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  3. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  4. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  5. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  6. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  7. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  8. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  9. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  10. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  11. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  12. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  13. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  14. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  15. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  16. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  17. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  18. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  19. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  20. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  1. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  2. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  3. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  4. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  5. Water-driven micromotors for rapid photocatalytic degradation of biological and chemical warfare agents.

    Science.gov (United States)

    Li, Jinxing; Singh, Virendra V; Sattayasamitsathit, Sirilak; Orozco, Jahir; Kaufmann, Kevin; Dong, Renfeng; Gao, Wei; Jurado-Sanchez, Beatriz; Fedorak, Yuri; Wang, Joseph

    2014-11-25

    Threats of chemical and biological warfare agents (CBWA) represent a serious global concern and require rapid and efficient neutralization methods. We present a highly effective micromotor strategy for photocatalytic degradation of CBWA based on light-activated TiO2/Au/Mg microspheres that propel autonomously in natural water and obviate the need for external fuel, decontaminating reagent, or mechanical agitation. The activated TiO2/Au/Mg micromotors generate highly reactive oxygen species responsible for the efficient destruction of the cell membranes of the anthrax simulant Bacillus globigii spore, as well as rapid and complete in situ mineralization of the highly persistent organophosphate nerve agents into nonharmful products. The water-driven propulsion of the TiO2/Au/Mg micromotors facilitates efficient fluid transport and dispersion of the photogenerated reactive oxidative species and their interaction with the CBWA. Coupling of the photocatalytic surface of the micromotors and their autonomous water-driven propulsion thus leads to a reagent-free operation which holds a considerable promise for diverse "green" defense and environmental applications.

  6. Ultra-Fast Degradation of Chemical Warfare Agents Using MOF-Nanofiber Kebabs.

    Science.gov (United States)

    Zhao, Junjie; Lee, Dennis T; Yaga, Robert W; Hall, Morgan G; Barton, Heather F; Woodward, Ian R; Oldham, Christopher J; Walls, Howard J; Peterson, Gregory W; Parsons, Gregory N

    2016-10-10

    The threat associated with chemical warfare agents (CWAs) motivates the development of new materials to provide enhanced protection with a reduced burden. Metal-organic frame-works (MOFs) have recently been shown as highly effective catalysts for detoxifying CWAs, but challenges still remain for integrating MOFs into functional filter media and/or protective garments. Herein, we report a series of MOF-nanofiber kebab structures for fast degradation of CWAs. We found TiO 2 coatings deposited via atomic layer deposition (ALD) onto polyamide-6 nanofibers enable the formation of conformal Zr-based MOF thin films including UiO-66, UiO-66-NH 2 , and UiO-67. Cross-sectional TEM images show that these MOF crystals nucleate and grow directly on and around the nanofibers, with strong attachment to the substrates. These MOF-functionalized nanofibers exhibit excellent reactivity for detoxifying CWAs. The half-lives of a CWA simulant compound and nerve agent soman (GD) are as short as 7.3 min and 2.3 min, respectively. These results therefore provide the earliest report of MOF-nanofiber textile composites capable of ultra-fast degradation of CWAs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Poly High Internal Phase Emulsion for the Immobilization of Chemical Warfare Agents.

    Science.gov (United States)

    Wright, Alexander J; Main, Marcus J; Cooper, Nicholas J; Blight, Barry A; Holder, Simon J

    2017-09-20

    We report a facile method for the absorption (characterized by the weight/weight swelling degree, Q) of a variety of chemical warfare agents (CWAs); including sulfur mustard (HD) (Q = 40) and V-series (VM, VX, i-Bu-VX, n-Bu-VX) of nerve agents (Q ≥ 45) and a simulant, methyl benzoate (Q = 55), through the use of a poly(styrene-co-vinyl benzyl chloride-co-divinylbenzene) lightly cross-linked poly high internal phase emulsion (polyHIPE). By varying the vinyl benzyl chloride (VBC) content and the volume of the internal phase of the precursor emulsion it is demonstrated that absorption is facilitated both by the swelling of the polymer and the uptake of liquid in the pores. In particular the sample prepared from a 95% internal emulsion water content showed rapid swelling (<5 min to total absorption) and the ability to swell both from a monolithic state and from a compressed state, making these systems ideal practical candidates for the rapid immobilization of CWAs.

  8. Comparison of Three Sample Preparation Methods for Analysis of Chemical Warfare Agent Stimulants in Water

    International Nuclear Information System (INIS)

    Alessandro Sassolini

    2015-01-01

    Analytical chemistry in CBRNe (Chemical Biological Radiological Nuclear explosive) context requires not only high quality data; quickness, ruggedness and robustness are also mandatory. In this work, three samples preparation methods were compared using several organophosphorus pesticides as test compounds, used as stimulants of nerve CWA (Chemical Warfare Agents) to choose the one with best characteristics. Result was obtained better with the Dispersive Liquid-Liquid Micro Extraction (DLLME), relatively new in CBRNe field, obtaining uncertainty for different simulants between 8 and 15 % while a quantification limit between 0.01 and 0.08 μg/ l. To optimize this extraction method, different organo chlorinated solvents also tested but not relevant difference in these tests was obtained. In this work, all samples were analyzed by using a gas chromatography coupled with mass spectrometer (GC-MS) and also with Gas Chromatograph coupled with Nitrogen Phosphorous Detector (NPD) for DLLME samples to evaluate a low cost and rugged instrument adapt to field analytical methods with good performance in terms of uncertainty and sensibility even if poorer respect to the mass spectrometry. (author)

  9. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  10. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  11. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  12. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  13. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  14. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  15. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  16. The effects of preferred and non-preferred running strike patterns on tissue vibration properties.

    Science.gov (United States)

    Enders, Hendrik; von Tscharner, Vinzenz; Nigg, Benno M

    2014-03-01

    To characterize soft tissue vibrations during running with a preferred and a non-preferred strike pattern in shoes and barefoot. Cross-sectional study. Participants ran at 3.5 m s(-1) on a treadmill in shoes and barefoot using a rearfoot and a forefoot strike for each footwear condition. The preferred strike patterns for the subjects were a rearfoot strike and a forefoot strike for shod and barefoot running, respectively. Vibrations were recorded with an accelerometer overlying the belly of the medial gastrocnemius. Thirteen non-linearly scaled wavelets were used for the analysis. Damping was calculated as the overall decay of power in the acceleration signal post ground contact. A higher damping coefficient indicates higher damping capacities of the soft tissue. The shod rearfoot strike showed a 93% lower damping coefficient than the shod forefoot strike (pforefoot strike showed a trend toward a lower damping coefficient compared to a barefoot rearfoot strike. Running barefoot with a forefoot strike resulted in a significantly lower damping coefficient than a forefoot strike when wearing shoes (pstrike showed lower damping compared to a barefoot rearfoot strike (p<0.001). While rearfoot striking showed lower vibration frequencies in shod and barefoot running, it did not consistently result in lower damping coefficients. This study showed that the use of a preferred movement resulted in lower damping coefficients of running related soft tissue vibrations. Copyright © 2013 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  17. Is the foot striking pattern more important than barefoot or shod conditions in running?

    Science.gov (United States)

    Shih, Yo; Lin, Kuan-Lun; Shiang, Tzyy-Yuang

    2013-07-01

    People have advocated barefoot running, claiming that it is better suited to human nature. Humans usually run barefoot using a forefoot strike and run shod using a heel strike. The striking pattern was thought to be a key factor that contributes to the benefit of barefoot running. The purpose of this study is to use scientific data to prove that the striking pattern is more important than barefoot or shod conditions for runners on running injuries prevention. Twelve habitually male shod runners were recruited to run under four varying conditions: barefoot running with a forefoot strike, barefoot running with a heel strike, shod running with a forefoot strike, and shod running with a heel strike. Kinetic and kinematic data and electromyography signals were recorded during the experiments. The results showed that the lower extremity can gain more compliance when running with a forefoot strike. Habitually shod runners can gain more shock absorption by changing the striking pattern to a forefoot strike when running with shoes and barefoot conditions. Habitually shod runners may be subject to injuries more easily when they run barefoot while maintaining their heel strike pattern. Higher muscle activity in the gastrocnemius was observed when running with a forefoot strike, which may imply a greater training load on the muscle and a tendency for injury. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. Patellofemoral joint stress during running with alterations in foot strike pattern.

    Science.gov (United States)

    Vannatta, Charles Nathan; Kernozek, Thomas W

    2015-05-01

    This study aimed to quantify differences in patellofemoral joint stress that may occur when healthy runners alter their foot strike pattern from their habitual rearfoot strike to a forefoot strike to gain insight on the potential etiology and treatment methods of patellofemoral pain. Sixteen healthy female runners completed 20 running trials in a controlled laboratory setting under rearfoot strike and forefoot strike conditions. Kinetic and kinematic data were used to drive a static optimization technique to estimate individual muscle forces to input into a model of the patellofemoral joint to estimate joint stress during running. Peak patellofemoral joint stress and the stress-time integral over stance phase decreased by 27% and 12%, respectively, in the forefoot strike condition (P forefoot strike condition (P forefoot strike (P forefoot strike condition (P strike pattern to a forefoot strike results in consistent reductions in patellofemoral joint stress independent of changes in step length. Thus, implementation of forefoot strike training programs may be warranted in the treatment of runners with patellofemoral pain. However, it is suggested that the transition to a forefoot strike pattern should be completed in a graduated manner.

  19. Global Strike 2035: Considerations for Enabling Effective Command and Control

    Science.gov (United States)

    2012-02-16

    reach places .1 Broadly grouped under the moniker Global Strike,2 this family-of-systems capability should mature by 2035 leading to the realization of...and] ‘micro-actors with massive impact,’…[combine] with new technology and new or transfigured ways of war, but the old threats also remain and have...as the Joint Time-Sensitive Targets Manager (JTSTM),38 “operators and analysts [could] access the same dynamic common operating picture…to provide

  20. Principles Governing the Mechanics and Control of Snake Strikes

    Science.gov (United States)

    2015-06-26

    small, potentially evasive target with an impact sufficient for prey capture but without 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13...strike a small, potentially evasive target with an impact sufficient for prey capture but without damaging their lightly-built skull. Although the...p o rt io n o f To ta l M as s Segment Number Boa/Python Mean Colubrid Mean Viper Mean Figure 3 – Proportion of body mass in each of 10 equal-length

  1. A Study of Interactions Between Thrust and Strike-slip Faults

    Directory of Open Access Journals (Sweden)

    Jeng-Cheng Wang

    2013-01-01

    Full Text Available A 3-D finite difference method is applied in this study to investigate a spontaneous rupture within a fault system which includes a primary thrust fault and two strike-slip sub-faults. With the occurrence of a rupture on a fault, the rupture condition follows Coulomb¡¦s friction law wherein the stress-slip obeys the slip-weakening fracture criteria. To overcome the geometrical complexity of such a system, a finite difference method is encoded in two different coordinate systems; then, the calculated displacements are connected between the two systems using a 2-D interpolation technique. The rupture is initiated at the center of the main fault under the compression of regional tectonic stresses and then propagates to the boundaries whereby the main fault rupture triggers two strike-slip sub-faults. Simulation results suggest that the triggering of two sub-faults is attributed to two primary factors, regional tectonic stresses and the relative distances between the two sub-faults and the main fault.

  2. The lightning striking probability for offshore wind turbine blade with salt fog contamination

    Science.gov (United States)

    Li, Qingmin; Ma, Yufei; Guo, Zixin; Ren, Hanwen; Wang, Guozheng; Arif, Waqas; Fang, Zhiyang; Siew, Wah Hoon

    2017-08-01

    The blades of an offshore wind turbine are prone to be adhered with salt fog after long-time exposure in the marine-atmosphere environment, and salt fog reduces the efficiency of the lightning protection system. In order to study the influence of salt fog on lightning striking probability (LSP), the lightning discharge process model for the wind turbine blade is adopted in this paper considering the accumulation mechanism of surface charges around the salt fog area. The distribution of potential and electric field with the development of the downward leader is calculated by COMSOL Multiphysics LiveLink for MATLAB. A quantitative characterization method is established to calculate the LSP base on the average electric field before the return stroke and the LSP distribution of the blade is shown in the form of a graphic view. The simulation results indicate that the receptor and conductor area close to the receptor area are more likely to get struck by lightning, and the LSP increases under the influence of salt fog. The validity of the model is verified by experiments. Furthermore, the receptor can protect the blade from lightning strikes effectively when the lateral distance between the rod electrode and receptor is short. The influence of salt fog on LSP is more obvious if salt fog is close to the receptor or if the scope of salt fog area increases.

  3. The role of trade union organization in solving labor disputes and strikes in Vietnam

    Directory of Open Access Journals (Sweden)

    Nguen T.H.

    2017-01-01

    Full Text Available the article describes the role of the trade union organization in solving labor disputes and strikes and the legal basis of the role of trade union organization in solving labor disputes and strikes in Vietnam.

  4. THE EFFECT OF STEP RATE MANIPULATION ON FOOT STRIKE PATTERN OF LONG DISTANCE RUNNERS.

    Science.gov (United States)

    Allen, Darrell J; Heisler, Hollie; Mooney, Jennifer; Kring, Richard

    2016-02-01

    Running gait retraining to change foot strike pattern in runners from a heel strike pattern to a non heel- strike pattern has been shown to reduce impact forces and may help to reduce running related injuries. Step rate manipulation above preferred is known to help decrease step length, foot inclination angle, and vertical mass excursion, but has not yet been evaluated as a method to change foot strike pattern. The purpose of this study was to investigate the effect of step rate manipulation on foot strike pattern in shod recreational runners who run with a heel strike pattern. A secondary purpose was to describe the effect of step rate manipulation at specific percentages above preferred on foot inclination angle at initial contact. Forty volunteer runners, who were self-reported heel strikers and had a weekly running mileage of at least 10 miles, were recruited. Runners were confirmed to be heel strikers during the warm up period on the treadmill. The subject's step rate was determined at their preferred running pace. A metronome was used to increase step rate above the preferred step rate by 5%, 10% and 15%. 2D video motion analysis was utilized to determine foot strike pattern and to measure foot inclination angle at initial contact for each step rate condition. There was a statistically significant change in foot strike pattern from a heel strike pattern to a mid-foot or forefoot strike pattern at both 10% and 15% step rates above preferred. Seven of the 40 subjects (17.5%) changed from a heel- strike pattern to a non- heel strike pattern at +10% and 12 of the 40 subjects (30%) changed to a non-heel strike pattern at +15%. Mean foot inclination angle at initial contact showed a statistically significant change (reduction) as step rate increased. Step rate manipulation of 10% or greater may be enough to change foot strike pattern from a heel strike to a mid-foot or forefoot strike pattern in a small percentage of recreational runners who run in traditional

  5. Onset of aseismic creep on major strike-slip faults

    KAUST Repository

    Ç akir, Ziyadin; Ergintav, Semih; Ö zener, Haluk; Doǧan, Uǧur; Akoglu, Ahmet; Meghraoui, Mustapha; Reilinger, Robert E.

    2012-01-01

    Time series analysis of spaceborne synthetic aperture radar (SAR) data, GPS measurements, and fi eld observations reveal that the central section of the Izmit (Turkey) fault that slipped with a supershear rupture velocity in the A.D. 1999, Mw7.4, Izmit earthquake began creeping aseismically following the earthquake. Rapid initial postseismic afterslip decayed logarithmically with time and appears to have reached a steady rate comparable to the preearthquake full fault-crossing rate, suggesting that it may continue for decades and possibly until late in the earthquake cycle. If confi rmed by future monitoring, these observations identify postseismic afterslip as a mechanism for initiating creep behavior along strike-slip faults. Long-term afterslip and/or creep has signifi cant implications for earthquake cycle models, recurrence intervals of large earthquakes, and accordingly, seismic hazard estimation along mature strike-slip faults, in particular for Istanbul which is believed to lie adjacent to a seismic gap along the North Anatolian fault in the Sea of Marmara. © 2012 Geological Society of America.

  6. Onset of aseismic creep on major strike-slip faults

    KAUST Repository

    Çakir, Ziyadin

    2012-10-02

    Time series analysis of spaceborne synthetic aperture radar (SAR) data, GPS measurements, and fi eld observations reveal that the central section of the Izmit (Turkey) fault that slipped with a supershear rupture velocity in the A.D. 1999, Mw7.4, Izmit earthquake began creeping aseismically following the earthquake. Rapid initial postseismic afterslip decayed logarithmically with time and appears to have reached a steady rate comparable to the preearthquake full fault-crossing rate, suggesting that it may continue for decades and possibly until late in the earthquake cycle. If confi rmed by future monitoring, these observations identify postseismic afterslip as a mechanism for initiating creep behavior along strike-slip faults. Long-term afterslip and/or creep has signifi cant implications for earthquake cycle models, recurrence intervals of large earthquakes, and accordingly, seismic hazard estimation along mature strike-slip faults, in particular for Istanbul which is believed to lie adjacent to a seismic gap along the North Anatolian fault in the Sea of Marmara. © 2012 Geological Society of America.

  7. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  8. Foot strike and injury rates in endurance runners: a retrospective study.

    Science.gov (United States)

    Daoud, Adam I; Geissler, Gary J; Wang, Frank; Saretsky, Jason; Daoud, Yahya A; Lieberman, Daniel E

    2012-07-01

    This retrospective study tests if runners who habitually forefoot strike have different rates of injury than runners who habitually rearfoot strike. We measured the strike characteristics of middle- and long-distance runners from a collegiate cross-country team and quantified their history of injury, including the incidence and rate of specific injuries, the severity of each injury, and the rate of mild, moderate, and severe injuries per mile run. Of the 52 runners studied, 36 (69%) primarily used a rearfoot strike and 16 (31%) primarily used a forefoot strike. Approximately 74% of runners experienced a moderate or severe injury each year, but those who habitually rearfoot strike had approximately twice the rate of repetitive stress injuries than individuals who habitually forefoot strike. Traumatic injury rates were not significantly different between the two groups. A generalized linear model showed that strike type, sex, race distance, and average miles per week each correlate significantly (P strike have significantly higher rates of repetitive stress injury than those who mostly forefoot strike. This study does not test the causal bases for this general difference. One hypothesis, which requires further research, is that the absence of a marked impact peak in the ground reaction force during a forefoot strike compared with a rearfoot strike may contribute to lower rates of injuries in habitual forefoot strikers.

  9. Causes of falls of hangingwall over gullies adjacent to stabilizing strike pillars

    CSIR Research Space (South Africa)

    Turner, PA

    1987-08-01

    Full Text Available This report discusses the occurrence of falls of ground in strike gullies. Falls of hangingwall over strike gullies on the up-dip side of strike stabilizing pillars in longwall mining systems were investigated. Gullies were examined in both...

  10. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  11. Analysis of Transient Phenomena Due to a Direct Lightning Strike on a Wind Energy System

    Directory of Open Access Journals (Sweden)

    João P. S. Catalão

    2012-07-01

    Full Text Available This paper is concerned with the protection of wind energy systems against the direct effects of lightning. As wind power generation undergoes rapid growth, lightning damages involving wind turbines have come to be regarded as a serious problem. Nevertheless, very few studies exist yet in Portugal regarding lightning protection of wind energy systems using numerical codes. A new case study is presented in this paper, based on a wind turbine with an interconnecting transformer, for the analysis of transient phenomena due to a direct lightning strike to the blade. Comprehensive simulation results are provided by using models of the Restructured Version of the Electro-Magnetic Transients Program (EMTP, and conclusions are duly drawn.

  12. Mass and performance optimization of an airplane wing leading edge structure against bird strike using Taguchi-based grey relational analysis

    Directory of Open Access Journals (Sweden)

    Hassan Pahange

    2016-08-01

    Full Text Available Collisions between birds and aircraft are one of the most dangerous threats to flight safety. In this study, smoothed particles hydrodynamics (SPH method is used for simulating the bird strike to an airplane wing leading edge structure. In order to verify the model, first, experiment of bird strike to a flat aluminum plate is simulated, and then bird impact on an airplane wing leading edge structure is investigated. After that, considering dimensions of wing internal structural components like ribs, skin and spar as design variables, we try to minimize structural mass and wing skin deformation simultaneously. To do this, bird strike simulations to 18 different wing structures are made based on Taguchi’s L18 factorial design of experiment. Then grey relational analysis is used to minimize structural mass and wing skin deformation due to the bird strike. The analysis of variance (ANOVA is also applied and it is concluded that the most significant parameter for the performance of wing structure against impact is the skin thickness. Finally, a validation simulation is conducted under the optimal condition to show the improvement of performance of the wing structure.

  13. Plantar loading changes with alterations in foot strike patterns during a single session in habitual rear foot strike female runners.

    Science.gov (United States)

    Kernozek, Thomas W; Vannatta, Charles N; Gheidi, Naghmeh; Kraus, Sydnie; Aminaka, Naoko

    2016-03-01

    Characterize plantar loading parameters when habitually rear foot strike (RFS) runners change their pattern to a non-rear foot strike (NRFS). Experimental. University biomechanics laboratory. Twenty three healthy female runners (Age: 22.17 ± 1.64 yrs; Height: 168.91 ± 5.46 cm; Mass: 64.29 ± 7.11 kg). Plantar loading was measured using an in-sole pressure sensor while running down a 20-m runway restricted to a range of 3.52-3.89 m/s under two conditions, using the runner's typical RFS, and an adapted NRFS pattern. Repeated measures multivariate analysis of variance was performed to detect differences in loading between these two conditions. Force and pressure variables were greater in the forefoot and phalanx in NRFS and greater in the heel and mid foot in RFS pattern, but the total force imposed upon the whole foot and contact time remained similar between conditions. Total peak pressure was higher and contact area was lower during NRFS running. The primary finding of this investigation is that there are distinctly different plantar loads when changing from a RFS to NRFS during running. So, during a transition from RFS to a NRFS pattern; a period of acclimation should be considered to allow for adaptations to these novel loads incurred on plantar regions of the foot. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Effect of inherited structures on strike-slip plate boundaries: insight from analogue modelling of the central Levant Fracture System, Lebanon

    Science.gov (United States)

    Ghalayini, Ramadan; Daniel, Jean-Marc; Homberg, Catherine; Nader, Fadi

    2015-04-01

    Analogue sandbox modeling is a tool to simulate deformation style and structural evolution of sedimentary basins. The initial goal is to test what is the effect of inherited and crustal structures on the propagation, evolution, and final geometry of major strike-slip faults at the boundary between two tectonic plates. For this purpose, we have undertaken a series of analogue models to validate and reproduce the structures of the Levant Fracture System, a major NNE-SSW sinistral strike-slip fault forming the boundary between the Arabian and African plates. Onshore observations and recent high quality 3D seismic data in the Levant Basin offshore Lebanon demonstrated that Mesozoic ENE striking normal faults were reactivated into dextral strike-slip faults during the Late Miocene till present day activity of the plate boundary which shows a major restraining bend in Lebanon with a ~ 30°clockwise rotation in its trend. Experimental parameters consisted of a silicone layer at the base simulating the ductile crust, overlain by intercalated quartz sand and glass sand layers. Pre-existing structures were simulated by creating a graben in the silicone below the sand at an oblique (>60°) angle to the main throughgoing strike-slip fault. The latter contains a small stepover at depth to create transpression during sinistral strike-slip movement and consequently result in mountain building similarly to modern day Lebanon. Strike-slip movement and compression were regulated by steady-speed computer-controlled engines and the model was scanned using a CT-scanner continuously while deforming to have a final 4D model of the system. Results showed that existing normal faults were reactivated into dextral strike-slip faults as the sinistral movement between the two plates accumulated. Notably, the resulting restraining bend is asymmetric and segmented into two different compartments with differing geometries. One compartment shows a box fold anticline, while the second shows an

  15. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  16. Magma storage in a strike-slip caldera.

    Science.gov (United States)

    Saxby, J; Gottsmann, J; Cashman, K; Gutiérrez, E

    2016-07-22

    Silicic calderas form during explosive volcanic eruptions when magma withdrawal triggers collapse along bounding faults. The nature of specific interactions between magmatism and tectonism in caldera-forming systems is, however, unclear. Regional stress patterns may control the location and geometry of magma reservoirs, which in turn may control the spatial and temporal development of faults. Here we provide new insight into strike-slip volcano-tectonic relations by analysing Bouguer gravity data from Ilopango caldera, El Salvador, which has a long history of catastrophic explosive eruptions. The observed low gravity beneath the caldera is aligned along the principal horizontal stress orientations of the El Salvador Fault Zone. Data inversion shows that the causative low-density structure extends to ca. 6 km depth, which we interpret as a shallow plumbing system comprising a fractured hydrothermal reservoir overlying a magmatic reservoir with vol% exsolved vapour. Fault-controlled localization of magma constrains potential vent locations for future eruptions.

  17. Striking an interim balance of the ongoing climate debate

    International Nuclear Information System (INIS)

    Schoenwiese, C.D.

    1995-01-01

    After the Berlin UN conference of the signatory states to the Climate Change Convention it seems appropriate to strike an interim balance of the ongoing debate about the global climate change, as it has meanwhile evolved from an issue discussed among experts to an issue of public debate. Such a ''progress report'' seems to be opportune also because doubts are mounting in the face of proclaimed countermeasures. The article therefore reviews and summarizes facts and figures, discussing emissions and concentrations, the physical properties of greenhouse gases, as well as uncertainties of model calculations and of interpretations of measured data. The current situation calls for application of alternative models and concepts, and consideration of natural processes in competition with man-made impacts on the climate within the framework of optimized interpretation, in order to have probabilistic data at hand for decision-making. (orig.) [de

  18. Migraine strikes as neuronal excitability reaches a tipping point.

    Directory of Open Access Journals (Sweden)

    Marten Scheffer

    Full Text Available Self-propagating waves of cerebral neuronal firing, known as spreading depolarisations, are believed to be at the roots of migraine attacks. We propose that the start of spreading depolarisations corresponds to a critical transition that occurs when dynamic brain networks approach a tipping point. We show that this hypothesis is consistent with current pathogenetic insights and observed dynamics. Our view implies that migraine strikes when modulating factors further raise the neuronal excitability in genetically predisposed subjects to a level where even minor perturbations can trigger spreading depolarisations. A corollary is that recently discovered generic early warning indicators for critical transitions may be used to predict the onset of migraine attacks even before patients are clinically aware. This opens up new avenues for dissecting the mechanisms for the onset of migraine attacks and for identifying novel prophylactic treatment targets for the prevention of attacks.

  19. A Probabilistic, Facility-Centric Approach to Lightning Strike Location

    Science.gov (United States)

    Huddleston, Lisa L.; Roeder, William p.; Merceret, Francis J.

    2012-01-01

    A new probabilistic facility-centric approach to lightning strike location has been developed. This process uses the bivariate Gaussian distribution of probability density provided by the current lightning location error ellipse for the most likely location of a lightning stroke and integrates it to determine the probability that the stroke is inside any specified radius of any location, even if that location is not centered on or even with the location error ellipse. This technique is adapted from a method of calculating the probability of debris collisionith spacecraft. Such a technique is important in spaceport processing activities because it allows engineers to quantify the risk of induced current damage to critical electronics due to nearby lightning strokes. This technique was tested extensively and is now in use by space launch organizations at Kennedy Space Center and Cape Canaveral Air Force Station. Future applications could include forensic meteorology.

  20. Foot-strike haemolysis in an ultramarathon runner.

    Science.gov (United States)

    Fazal, Abid A; Whittemore, Mary S; DeGeorge, Katharine C

    2017-12-13

    This case report describes mild anaemia and intravascular haemolysis in an otherwise healthy 41-year-old ultramarathon runner. In long-distance endurance athletes, trace gastrointestinal bleeding and plasma volume expansion are recognised sources of mild anaemia, often found incidentally. However, repetitive forceful foot striking can lead to blood cell lysis in the feet, resulting in a mild macrocytic anaemia and intravascular haemolysis, as was demonstrated in the patient described herein. Mild anaemia in runners, often called 'runner's pseudoanaemia', is typically clinically insignificant and does not require intervention. However, an unexplained anaemia can cause undue worry for otherwise healthy patients and lead to costly further testing, providing an argument against routine testing with complete blood counts in healthy, asymptomatic patients. © BMJ Publishing Group Ltd (unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  1. [Physiological changes and related nursing care issues during hunger strike].

    Science.gov (United States)

    Hsieh, Yeu-Shan; Chen, Shiu-Lien

    2005-08-01

    The use of hunger strike as a tool to assert grievances has been around for ages and has occasionally happened in the world. Hunger strikers' motives may differ, but their tool is the same--the voluntary refusal of food. Fasting not only results in body weight loss, but also in physiological and neurological function changes, and, of course, it may even threaten life. The health care of hunger strikers is complex. It involves medical staff, medical ethics and guidance for the management of the hunger strikers. Improper medical management may not only undermine the hunger striker's dignity but also risk further damage to his or her health. By understanding hunger strikers' physiological changes and related ethical issues, therefore, we aim to identify appropriate forms of nursing care management and guidance for the care of hunger strikers.

  2. Precision Strike Training in Lean Manufacturing: A Workplace Literacy Guidebook [and] Final Report on Precision Strike Workplace Literacy Training at CertainTeed Corporation.

    Science.gov (United States)

    National Alliance of Business, Inc., Washington, DC.

    CertainTeed's Precision Strike training program was designed to close the gaps between the current status of its workplace and where that work force needed to be to compete successfully in global markets. Precision Strike included Skills and Knowledge in Lifelong Learning (SKILL) customized, computerized lessons in basic skills, one-on-one…

  3. When strike comes to town... anticipated and actual behavioural reactions to a one-day, pre-announced, complete rail strike in the Netherlands

    NARCIS (Netherlands)

    Rietveld, P.; Exel, N.J.A.

    2009-01-01

    We conducted secondary analysis on data collected among rail users, days before and after a national rail strike in the Netherlands. Our aim was to compare anticipated and actual behavioural reactions to the rail strike, investigate associations with traveller and trip characteristics, and perceived

  4. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  5. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  6. THE EFFECTS OF HEIGHT AND DISTANCE ON THE FORCE PRODUCTION AND ACCELERATION IN MARTIAL ARTS STRIKES

    Directory of Open Access Journals (Sweden)

    Cynthia A. Bir

    2009-11-01

    Full Text Available Almost all cultures have roots in some sort of self defence system and yet there is relatively little research in this area, outside of a sports related environment. This project investigated different applications of strikes from Kung Fu practitioners that have not been addressed before in the literature. Punch and palm strikes were directly compared from different heights and distances, with the use of a load cell, accelerometers, and high speed video. The data indicated that the arm accelerations of both strikes were similar, although the force and resulting acceleration of the target were significantly greater for the palm strikes. Additionally, the relative height at which the strike was delivered was also investigated. The overall conclusion is that the palm strike is a more effective strike for transferring force to an object. It can also be concluded that an attack to the chest would be ideal for maximizing impact force and moving an opponent off balance

  7. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  8. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  9. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  10. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  11. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  12. Broad-Spectrum Liquid- and Gas-Phase Decontamination of Chemical Warfare Agents by One-Dimensional Heteropolyniobates.

    Science.gov (United States)

    Guo, Weiwei; Lv, Hongjin; Sullivan, Kevin P; Gordon, Wesley O; Balboa, Alex; Wagner, George W; Musaev, Djamaladdin G; Bacsa, John; Hill, Craig L

    2016-06-20

    A wide range of chemical warfare agents and their simulants are catalytically decontaminated by a new one-dimensional polymeric polyniobate (P-PONb), K12 [Ti2 O2 ][GeNb12 O40 ]⋅19 H2 O (KGeNb) under mild conditions and in the dark. Uniquely, KGeNb facilitates hydrolysis of nerve agents Sarin (GB) and Soman (GD) (and their less reactive simulants, dimethyl methylphosphonate (DMMP)) as well as mustard (HD) in both liquid and gas phases at ambient temperature and in the absence of neutralizing bases or illumination. Three lines of evidence establish that KGeNb removes DMMP, and thus likely GB/GD, by general base catalysis: a) the k(H2 O)/k(D2 O) solvent isotope effect is 1.4; b) the rate law (hydrolysis at the same pH depends on the amount of P-PONb present); and c) hydroxide is far less active against the above simulants at the same pH than the P-PONbs themselves, a critical control experiment. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  14. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  15. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  16. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  17. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  18. San Andreas-sized Strike-slip Fault on Europa

    Science.gov (United States)

    1998-01-01

    This mosaic of the south polar region of Jupiter's moon Europa shows the northern 290 kilometers (180 miles) of a strike-slip fault named Astypalaea Linea. The entire fault is about 810 kilometers (500 miles) long, about the size of the California portion of the San Andreas fault, which runs from the California-Mexico border north to the San Francisco Bay. In a strike-slip fault, two crustal blocks move horizontally past one another, similar to two opposing lanes of traffic. Overall motion along the fault seems to have followed a continuous narrow crack along the feature's entire length, with a path resembling steps on a staircase crossing zones that have been pulled apart. The images show that about 50 kilometers (30 miles) of displacement have taken place along the fault. The fault's opposite sides can be reconstructed like a puzzle, matching the shape of the sides and older, individual cracks and ridges broken by its movements. [figure removed for brevity, see original site] The red line marks the once active central crack of the fault. The black line outlines the fault zone, including material accumulated in the regions which have been pulled apart. Bends in the fault have allowed the surface to be pulled apart. This process created openings through which warmer, softer ice from below Europa's brittle ice shell surface, or frozen water from a possible subsurface ocean, could reach the surface. This upwelling of material formed large areas of new ice within the boundaries of the original fault. A similar pulling-apart phenomenon can be observed in the geological trough surrounding California's Salton Sea, in Death Valley and the Dead Sea. In those cases, the pulled-apart regions can include upwelled materials, but may be filled mostly by sedimentary and eroded material from above. One theory is that fault motion on Europa is induced by the pull of variable daily tides generated by Jupiter's gravitational tug on Europa. Tidal tension opens the fault and

  19. Fate of chemical warfare agents and toxic industrial chemicals in landfills.

    Science.gov (United States)

    Bartelt-Hunt, Shannon L; Barlaz, Morton A; Knappe, Detlef R U; Kjeldsen, Peter

    2006-07-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs) in MSW landfills was predicted with a mathematical model. Five blister agents [sulfur mustard (HD), nitrogen mustard (HN-2), lewisite (L), ethyldichloroarsine (ED), and phosgene oxime (CX)], eight nerve agents [tabun (GA), sarin (GB), soman (GD), GE, GF, VX, VG, and VM], one riot-control agent [CS], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis half-lives. Monte Carlo simulations were performed to assess the influence of uncertainty in model input parameters on CWA/TIC fate predictions. Correlation analyses showed that uncertainty in hydrolysis rate constants was the primary contributor to variance of CWA fate predictions, while uncertainty in the Henry's Law constant and landfill gas-production rate accounted for most of the variance of TIC fate predictions. CWA hydrolysates were more persistent than the parent CWAs, but limited information is available on abiotic or biotic transformation rates for these chemicals.

  20. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  1. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  2. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Effect of public transport strikes on air pollution levels in Barcelona (Spain).

    Science.gov (United States)

    Basagaña, Xavier; Triguero-Mas, Margarita; Agis, David; Pérez, Noemí; Reche, Cristina; Alastuey, Andrés; Querol, Xavier

    2018-01-01

    Public transport strikes can lead to an increase of the number of private vehicle trips, which in turn can increase air pollution levels. We aimed to estimate the change in air pollution concentrations during public transport strikes in the city of Barcelona (Spain). Data on strikes of the metro, train or bus systems were collected from government records (2005-2016). We collected daily concentrations of NOx; particulate matter with an aerodynamic diameter smaller than 10μm (PM10), 2.5μm (PM2.5), and 1μm (PM1); particle number concentration (N); black carbon (BC) and CO from research and official monitoring stations. We fitted linear regression models for each pollutant with the strike indicator as an independent variable, and models were adjusted for day of the week, month, year, and holiday periods. During the study period, there were 208days affected by a strike of the metro (28), train (106) or bus (91) systems. Half of the strikes were partial, most of them were single-day strikes, there was little overlap between strikes of the different transport systems, and all strikes had to comply with mandatory minimal services. When pooling all types of strikes, NOx and BC showed higher levels during strike days in comparison with non-strike days (increase between 4.1% and 7.7%, with higher increases for NO). The increases in these concentrations were more evident during full day and multiday metro strikes. In conclusion, alterations in public transport have consequences on air quality. This highlights the importance of public transport in reducing air pollution concentrations in cities. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  5. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  6. MRI findings of Wernicke encephalopathy revisited due to hunger strike

    Energy Technology Data Exchange (ETDEWEB)

    Unlu, Ercument [Department of Radiology, Trakya University School of Medicine, Mimar Sinan m, Muammer Aksoy c, Yorulmaz apt, No 50, D-1 22030 Edirne (Turkey)]. E-mail: drercument@yahoo.com; Cakir, Bilge [Department of Radiology, Trakya University School of Medicine, Mimar Sinan m, Muammer Aksoy c, Yorulmaz apt, No 50, D-1 22030 Edirne (Turkey); Asil, Talip [Department of Neurology, Trakya University School of Medicine, Edirne (Turkey)

    2006-01-15

    Background and Purpose: The purpose of this study was to determine the characteristic magnetic resonance imaging (MRI) findings among a group of patients who presented with Wernicke encephalopathy (WE) due to the neurological complications of a long-term hunger strike (HS). Methods: MRI studies also including the fluid-attenuated inversion recovery (FLAIR) sequence and diffusion-weighted imaging (DWI) of six male patients with WE aged from 25 to 38 years (mean age 31 years) were evaluated. Results: In all subjects, T2-weighted sequences, FLAIR and DWI revealed a signal hyperintensity within the posteromedial thalami and surrounding the third ventricle. In particular, on coronal images, the hyperintense areas around the third ventricle showed a suggestive 'double wing' configuration. We observed an increased signal on proton-density and T2-weighted images in the mamillary bodies of three patients. Four patients demonstrated additional hyperintensities within the periaqueductal region and/or the tectal plate. At least one lesion area in five of six patients demonstrated contrast enhancement. Conclusion: The consistent imaging findings of our study suggest that MRI is a reliable means of diagnosing WE. Acute WE is sometimes underdiagnosed, yet early diagnosis and treatment of WE is crucial in order to avoid persistent brain damage. MRI, including postcontrast T1-weighted imaging, DWI beneath standardized T2-weighted imaging, and FLAIR sequences may prove to be a valuable adjunct to clinical diagnosis and to provide additional information in acute and/or subacute WE.

  7. Accident scenarios triggered by lightning strike on atmospheric storage tanks

    International Nuclear Information System (INIS)

    Necci, Amos; Argenti, Francesca; Landucci, Gabriele; Cozzani, Valerio

    2014-01-01

    Severe Natech accidents may be triggered by lightning strike affecting storage tanks containing relevant inventories of hazardous materials. The present study focused on the identification of event sequences and accident scenarios following lightning impact on atmospheric tanks. Reference event trees, validated using past accident analysis, are provided to describe the specific accident chains identified, accounting for reference protection and mitigation safety barriers usually adopted in current industrial practice. An overall methodology was outlined to allow the calculation of the expected frequencies of final scenarios following lightning impact on atmospheric storage tanks, taking into account the expected performance of available safety barriers. The methodology was applied to a case study in order to better understand the data that may be obtained and their importance in the framework of quantitative risk assessment (QRA) and of the risk management of industrial facilities with respect to external hazards due to natural events. - Highlights: • Event sequences following lightning impact on atmospheric tanks were identified. • Reference event trees including standard safety barriers were obtained. • Safety barriers applied in industrial practice were assessed to quantify event trees. • Frequencies of final scenarios following lightning impact on tanks were calculated. • Natech scenarios caused by lightning have an important influence on risk profiles

  8. Electric converters of electromagnetic strike machine with capacitor supply

    Science.gov (United States)

    Usanov, K. M.; Volgin, A. V.; Kargin, V. A.; Moiseev, A. P.; Chetverikov, E. A.

    2018-03-01

    The application of pulse linear electromagnetic engines in small power strike machines (energy impact is 0.01...1.0 kJ), where the characteristic mode of rare beats (pulse seismic vibrator, the arch crash device bins bulk materials), is quite effective. At the same time, the technical and economic performance of such machines is largely determined by the ability of the power source to provide a large instantaneous power of the supply pulses in the winding of the linear electromagnetic motor. The use of intermediate energy storage devices in power systems of rare-shock LEME makes it possible to obtain easily large instantaneous powers, forced energy conversion, and increase the performance of the machine. A capacitor power supply of a pulsed source of seismic waves is proposed for the exploration of shallow depths. The sections of the capacitor storage (CS) are connected to the winding of the linear electromagnetic motor by thyristor dischargers, the sequence of activation of which is determined by the control device. The charge of the capacitors to the required voltage is made directly from the battery source, or through the converter from a battery source with a smaller number of batteries.

  9. MRI findings of Wernicke encephalopathy revisited due to hunger strike

    International Nuclear Information System (INIS)

    Unlu, Ercument; Cakir, Bilge; Asil, Talip

    2006-01-01

    Background and Purpose: The purpose of this study was to determine the characteristic magnetic resonance imaging (MRI) findings among a group of patients who presented with Wernicke encephalopathy (WE) due to the neurological complications of a long-term hunger strike (HS). Methods: MRI studies also including the fluid-attenuated inversion recovery (FLAIR) sequence and diffusion-weighted imaging (DWI) of six male patients with WE aged from 25 to 38 years (mean age 31 years) were evaluated. Results: In all subjects, T2-weighted sequences, FLAIR and DWI revealed a signal hyperintensity within the posteromedial thalami and surrounding the third ventricle. In particular, on coronal images, the hyperintense areas around the third ventricle showed a suggestive 'double wing' configuration. We observed an increased signal on proton-density and T2-weighted images in the mamillary bodies of three patients. Four patients demonstrated additional hyperintensities within the periaqueductal region and/or the tectal plate. At least one lesion area in five of six patients demonstrated contrast enhancement. Conclusion: The consistent imaging findings of our study suggest that MRI is a reliable means of diagnosing WE. Acute WE is sometimes underdiagnosed, yet early diagnosis and treatment of WE is crucial in order to avoid persistent brain damage. MRI, including postcontrast T1-weighted imaging, DWI beneath standardized T2-weighted imaging, and FLAIR sequences may prove to be a valuable adjunct to clinical diagnosis and to provide additional information in acute and/or subacute WE

  10. Cellular nonlinear networks for strike-point localization at JET

    International Nuclear Information System (INIS)

    Arena, P.; Fortuna, L.; Bruno, M.; Vagliasindi, G.; Murari, A.; Andrew, P.; Mazzitelli, G.

    2005-01-01

    At JET, the potential of fast image processing for real-time purposes is thoroughly investigated. Particular attention is devoted to smart sensors based on system on chip technology. The data of the infrared cameras were processed with a chip implementing a cellular nonlinear network (CNN) structure so as to support and complement the magnetic diagnostics in the real-time localization of the strike-point position in the divertor. The circuit consists of two layers of complementary metal-oxide semiconductor components, the first being the sensor and the second implementing the actual CNN. This innovative hardware has made it possible to determine the position of the maximum thermal load with a time resolution of the order of 30 ms. Good congruency has been found with the measurement from the thermocouples in the divertor, proving the potential of the infrared data in locating the region of the maximum thermal load. The results are also confirmed by JET magnetic codes, both those used for the equilibrium reconstructions and those devoted to the identification of the plasma boundary

  11. Quantifying the Influence of Lightning Strike Pressure Loading on Composite Specimen Damage

    Science.gov (United States)

    Foster, P.; Abdelal, G.; Murphy, A.

    2018-04-01

    Experimental work has shown that a component of lightning strike damage is caused by a mechanical loading. As the profile of the pressure loading is unknown a number of authors propose different pressure loads, varying in form, application area and magnitude. The objective of this paper is to investigate the potential contribution of pressure loading to composite specimen damage. This is achieved through a simulation study using an established modelling approach for composite damage prediction. The study examines the proposed shockwave loads from the literature. The simulation results are compared with measured test specimen damage examining the form and scale of damage. The results for the first time quantify the significance of pressure loading, demonstrating that although a pressure load can cause damage consistent with that measured experimentally, it has a negligible contribution to the overall scale of damage. Moreover the requirements for a pressure to create the damage behaviours typically witnessed in testing requires that the pressure load be within a very precise window of magnitude and loading area.

  12. The General Strike - An Artist Talk on the Work of Santiago Sierra & Claire Fontaine

    OpenAIRE

    Mansoor, Jaleh

    2012-01-01

    The General Strike, the organized refusal to work among a critical mass of laborers, has been attendant upon and responsive to the capitalist form of accumulation since the latter’s inception. Having variously emerged and receded as a broadly recognized means of resistance since the mid 19th century, the potential of a general strike to precipitate capitalism's inherent tendency to crisis was forcefully expressed by the anti-austerity movement in Greece and in Spain in 2012. A general strike ...

  13. Comparison of foot strike patterns of barefoot and minimally shod runners in a recreational road race

    OpenAIRE

    Peter Larson

    2014-01-01

    Background: Previous studies of foot strike patterns of distance runners in road races have typically found that the overwhelming majority of shod runners initially contact the ground on the rearfoot. However, none of these studies has attempted to quantify foot strike patterns of barefoot or minimally shod runners. This study classifies foot strike patterns of barefoot and minimally shod runners in a recreational road race. Methods: High-speed video footage was obtained of 169 barefoot an...

  14. Review of the Lightning Strike Incident at Launch Complex 37 on July 27, 1967, and Comparison to a Gemini Lightning Strike

    Science.gov (United States)

    Llewellyn, J. A.

    1967-01-01

    The Launch Complex 37 lightning strike of July 27, 1967, was reviewed and compared to a similar incident on the Gemini Program. Available data indicate little likelihood of damaging currents having been present in SA-204 Launch Vehicle or the ground equipment during the July 27th incident. Based on the results of subsystem and system testing after the strike, anticipated results of future testing, the six months elapsed time between the strike-and launch, and the fact that much of the critical airborne electrical/electronic equipment has been removed since the strike for other reasons, no new actions are considered necessary at this time in the Gemini case, significant failures occurred in both airborne and ground circuits. Due to the resultant semi, condlictor uncertainty, and the relatively' short time prior to planned launch, all critical airborne components containing semiconduetors were replaced, and a sophisticated data comparison task was implemented.

  15. ‘The Nairobi General Strike [1950]: from protest to insurgency’

    OpenAIRE

    Hyde, David

    2002-01-01

    The Nairobi General Strike [1950] was the culmination of Kenya’s post war strike wave and urban upheaval. An unprecedented upsurge occurred with the general strikes in Mombasa [1947] led by the African Workers Federation [A.W.F.] and in Nairobi by the East African Trades Union Congress [E.A.T.U.C.]. While this has been termed and treated as a city wide strike, there is enough evidence to suggest a movement that went some way beyond Nairobi. The extent of the cohesion and reciprocal impacts am...

  16. Relationship between foot strike pattern, running speed, and footwear condition in recreational distance runners.

    Science.gov (United States)

    Cheung, Roy T H; Wong, Rodney Y L; Chung, Tim K W; Choi, R T; Leung, Wendy W Y; Shek, Diana H Y

    2017-06-01

    Compared to competitive runners, recreational runners appear to be more prone to injuries, which have been associated with foot strike patterns. Surprisingly, only few studies had examined the foot strike patterns outside laboratories. Therefore, this study compared the foot strike patterns in recreational runners at outdoor tracks with previously reported data. We also investigated the relationship between foot strike pattern, speed, and footwear in this cohort. Among 434 recreational runners analysed, 89.6% of them landed with rearfoot strike (RFS). Only 6.9 and 3.5% landed with midfoot and forefoot, respectively. A significant shift towards non-RFS was observed in our cohort, when compared with previously reported data. When speed increased by 1 m/s, the odds of having forefoot strike and midfoot strike relative to RFS increased by 2.3 times and 2.6 times, respectively. Runners were 9.2 times more likely to run with a forefoot strike in minimalists compared to regular running shoes, although 70% of runners in minimalists continued to use a RFS. These findings suggest that foot strike pattern may differ across running conditions and runners should consider these factors in order to mitigate potential injury.

  17. A model of high-rate indentation of a cylindrical striking pin into a deformable body

    Science.gov (United States)

    Zalazinskaya, E. A.; Zalazinsky, A. G.

    2017-12-01

    Mathematical modeling of an impact and high-rate indentation to a significant depth of a flat-faced hard cylindrical striking pin into a massive deformable target body is carried out. With the application of the kinematic extreme theorem of the plasticity theory and the kinetic energy variation theorem, the phase trajectories of the striking pin are calculated, the initial velocity of the striking pin in the body, the limit values of the inlet duct length, and the depth of striking pin penetration into the target are determined.

  18. The Chinese nuclear arsenal and its second-strike capability

    International Nuclear Information System (INIS)

    Cabestan, Jean-Pierre

    2013-03-01

    It is well known that China possesses a second- strike capability, but a great deal of uncertainty persists on the subject. Over the last few years, without officially adjusting its doctrine, China has nonetheless defined its objectives. In April 2010, the People's Liberation Army Daily indicated that China needed such a capability and contended that ballistic missile submarines (SSBNs) would constitute the safest means of delivery. In the same year, the IISS estimated that the People's Liberation Army was in possession of 90 ICBMs (66 ground-based missiles and 24 SLBMs) and 400 IRBM mainly aimed at Taiwan and Japan. The Pentagon's 2012 report proposed 50-75 ICBMs and 80 -120 IRBM and MRBM. While it is established that the People's Liberation Army is developing Jin class submarines (type-094, of which there are currently two in service, which will soon rise to five) and is developing solid-propellant missiles, which could be activated more quickly, not a great deal is known about the progress of these two projects. The JL-2 (7400 km), which is mounted on SSBNs, is still being tested. In parallel, the traditional principle to which China adheres - no first use of nuclear weapons - seems to have been slightly dented. Thus, in January 2011, the Japanese press agency Kyodo (relayed by Stratfor) reported that the People's Liberation Army had lowered the threshold for use of its strategic weapons: it could henceforth envisage a preventive nuclear strike against a nuclear power that had by conventional means destroyed key strategic targets on its territory, such as a nuclear power station, a dam, or a large city, having provided prior warning to the aggressor. But what most worries the U.S. and its Asian allies, particularly the Japanese, is the quasi-total opacity of the Chinese military nuclear programme. While in April 2010, the United States and Russia signed a treaty limiting their number of strategic weapons to 1550 by 2018, China considers that its programme cannot

  19. Positive Emotions Associated with "Counter-Strike" Game Playing.

    Science.gov (United States)

    Shin, Mirim; Heard, Rob; Suo, Chao; Chow, Chin Moi

    2012-10-01

    Digital game playing engages people for long periods of time. The pleasure offered by digital games may explain the players' consumption of this activity. Games may elicit both positive and negative emotions, which can be measured by encephalography (EEG). The EEG alpha asymmetry index (AI) is different in positive and negative emotions and so may be used to distinguish positive from negative emotions that occur during gaming. We hypothesized that the "Counter-Strike" (CS) game (Valve Software, Bellevue, WA) is pleasurable and demonstrable with a positive EEG AI. Twelve male participants ages 18-30 years underwent EEG recordings continuously during and postgame. EEG was also recorded pregame for control conditions of baseline (sitting on a chair staring at a blank wall), movement (moving fingers on the computer keyboard with a blank screen), sound (listening to the sound of the CS game with a blank screen), and screen (watching the CS game without playing). Self-ratings of emotional responses were completed at pre-, during, and postgame. A significant decrease in the EEG AI was observed under the screen condition compared with baseline, whereas an increase was observed postgame compared with the screen condition. The participants demonstrated a positive EEG AI following the "shoot" events (shoot opponents) and negative emotions after the "being shot" events. Subjective ratings of emotional response indicated happiness during and postgame, but anger and arousal were reported only during the game. The overall results are consistent with the hypothesis that predominantly positive emotional reactions are elicited from playing the CS game and concur with positive subjective ratings of happiness. Future studies may explore the relationship of game pleasure and obsessive game play.

  20. The Empire Strikes Back. Russian National Cinema After 2005

    Directory of Open Access Journals (Sweden)

    Tomasz Rawski

    2017-11-01

    Full Text Available The Empire Strikes Back. Russian National Cinema After 2005 The paper provides critical analysis of the latest wave of Russian national cinema (2005-2013, considered one of key instruments of Vladimir Putin’s nation-building cultural policy. The analysis, focused mostly on historical film and war film, reveals the concept of an ‘imperial nation’ as the main concept underlying this policy. The new Russian nation-concept is calculated to binding elements from two former Russian imperial traditions: tradition of the Russian Empire and the Soviet tradition, thus trying to overcome the identity crisis in contemporary Russia.   Imperium kontratakuje. Rosyjskie kino narodowe po 2005 roku Artykuł zajmuje się krytyczną analizą filmów najnowszej fali rosyjskiego kina narodowego (2005-2013, uważanej tu za jedno z kluczowych narzędzi polityki kulturalnej Władimira Putina obliczonej na budowanie narodu. Autorzy artykułu skupiają się przede wszystkim na filmie historycznym i wojennym, odsłaniając pojęcie „imperialnego narodu” jako konceptu stojącego u podstaw oficjalnej polityki. Nowe rosyjskie pojęcie narodu łączy w sobie dwie tradycje rosyjskie: tradycję Imperium Rosyjskiego oraz tradycję Związku Radzieckiego, próbując w ten sposób przezwyciężyć kryzys tożsamościowy współczesnej Rosji.

  1. Assessment of performing an MST strike in Tank 21H

    Energy Technology Data Exchange (ETDEWEB)

    Poirier, Michael R.

    2014-09-29

    Previous Savannah River National Laboratory (SRNL) tank mixing studies performed for the Small Column Ion Exchange (SCIX) project have shown that 3 Submersible Mixer Pumps (SMPs) installed in Tank 41 are sufficient to support actinide removal by MST sorption as well as subsequent resuspension and removal of settled solids. Savannah River Remediation (SRR) is pursuing MST addition into Tank 21 as part of the Large Tank Strike (LTS) project. The preliminary scope for LTS involves the use of three standard slurry pumps (installed in N, SE, and SW risers) in a Type IV tank. Due to the differences in tank size, internal interferences, and pump design, a separate mixing evaluation is required to determine if the proposed configuration will allow for MST suspension and strontium and actinide sorption. The author performed the analysis by reviewing drawings for Tank 21 [W231023] and determining the required cleaning radius or zone of influence for the pumps. This requirement was compared with previous pilot-scale MST suspension data collected for SCIX that determined the cleaning radius, or zone of influence, as a function of pump operating parameters. The author also reviewed a previous Tank 50 mixing analysis that examined the ability of standard slurry pumps to suspend sludge particles. Based on a review of the pilot-scale SCIX mixing tests and Tank 50 pump operating experience, three standard slurry pumps should be able to suspend sludge and MST to effectively sorb strontium and actinides onto the MST. Using the SCIX data requires an assumption about the impact of cooling coils on slurry pump mixing. The basis for this assumption is described in this report. Using the Tank 50 operating experience shows three standard slurry pumps should be able to suspend solids if the shear strength of the settled solids is less than 160 Pa. Because Tank 21 does not contain cooling coils, the shear strength could be larger.

  2. Lower limb joint angles and ground reaction forces in forefoot strike and rearfoot strike runners during overground downhill and uphill running.

    Science.gov (United States)

    Kowalski, Erik; Li, Jing Xian

    2016-11-01

    This study investigated the normal and parallel ground reaction forces during downhill and uphill running in habitual forefoot strike and habitual rearfoot strike (RFS) runners. Fifteen habitual forefoot strike and 15 habitual RFS recreational male runners ran at 3 m/s ± 5% during level, uphill and downhill overground running on a ramp mounted at 6° and 9°. Results showed that forefoot strike runners had no visible impact peak in all running conditions, while the impact peaks only decreased during the uphill conditions in RFS runners. Active peaks decreased during the downhill conditions in forefoot strike runners while active loading rates increased during downhill conditions in RFS runners. Compared to the level condition, parallel braking peaks were larger during downhill conditions and parallel propulsive peaks were larger during uphill conditions. Combined with previous biomechanics studies, our findings suggest that forefoot strike running may be an effective strategy to reduce impacts, especially during downhill running. These findings may have further implications towards injury management and prevention.

  3. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  4. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  5. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  6. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  7. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  8. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  9. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  10. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  11. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  12. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  13. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  14. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  15. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  16. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  17. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  18. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  19. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  20. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed