WorldWideScience

Sample records for strike warfare simulation

  1. Simulating the Risk of Bird Strikes

    NARCIS (Netherlands)

    Metz, I.C.; Ellerbroek, J.; Muhlhausen, Thorsten; Kügler, D.; Hoekstra, J.M.

    2017-01-01

    This paper presents a fast-time simulation environment for assessing the risk of bird strikes in aviation. An existing air traffic simulator was enhanced in order to simulate air and bird traffic simultaneously and to recognize collisions between birds and aircraft. Furthermore, a method was

  2. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  3. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  4. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    Science.gov (United States)

    2016-06-10

    missiles at terrorist training camps in Afghanistan and a pharmaceutical plant in Sudan. This strike was justified because passive support had been...Accessed November 15, 2015. http://www.deseret news.com/article/933571/ Colombia -troops-seize-model-planes-in-bomb- plot.html?pg=all. ______. 2015. A

  5. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  6. Analysis of Simulated Aircraft Lightning Strikes and Their Electromagnetic Effects

    National Research Council Canada - National Science Library

    Gruden, James

    2001-01-01

    To survive the intense electromagnetic fields associated with a lightning strike, proper design of aircraft electrical control systems requires knowledge of the transient current pulse associated with a lightning strike...

  7. Monte Carlo Simulation to Estimate Likelihood of Direct Lightning Strikes

    Science.gov (United States)

    Mata, Carlos; Medelius, Pedro

    2008-01-01

    A software tool has been designed to quantify the lightning exposure at launch sites of the stack at the pads under different configurations. In order to predict lightning strikes to generic structures, this model uses leaders whose origins (in the x-y plane) are obtained from a 2D random, normal distribution.

  8. Simulating Bird Strike on Aircraft Composite Wing Leading Edge.

    OpenAIRE

    Ericsson, Max

    2012-01-01

    In this master thesis project the possibility to model the response of a wing when subjected to bird strike using finite elements is analyzed. Since this transient event lasts only a few milliseconds the used solution method is explicit time integration. The wing is manufactured using carbon fiber laminate. Carbon fiber laminates have orthotropic material properties with different stiffness in different directions. Accordingly, there are damage mechanisms not considered when using metal that ...

  9. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  10. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  11. Simulation and measurement of melting effects on metal sheets caused by direct lightning strikes

    Science.gov (United States)

    Kern, Alexander

    1991-01-01

    Direct lightning strikes melt metal parts of various systems, like fuel and propellant tanks of rockets and airplanes, at the point of strike. Responsible for this melting are the impulse current and, if occurring, the long duration current, both carrying a remarkable charge Q. For studying these meltings the simulation in the laboratory has to be based on the parameters of natural lightnings. International standards exist defining certain threat levels of natural lightnings and giving possible generator circuits for the simulation. The melting caused by both types of lightning currents show different appearance. Their characteristics, their differences in melting and heating of metal sheets are investigated. Nevertheless the simulation of lightning in the laboratory is imperfect. While natural lightning is a discharge without a counter electrode, the simulation always demands a close counter electrode. The influence of this counter electrode is studied.

  12. FD-TD numerical simulation of an entire lightning strike on the C160 aircraft

    Science.gov (United States)

    Alliot, J. C.; Grando, J.; Muller, J. D.; Ferrieres, X.

    1991-01-01

    Experimental transient electromagnetic field measurements were performed on a Transall C160 aircraft during in-flight lightning strikes. The data allow a test of the predictive capabilities of a three dimensional time domain finite difference code (ALICE) developed at ONERA in order to investigate lightning-aircraft interactions. Using a transfer function technique in the 3D code, it is shown that a bi-leader attached to an aircraft can be simulated by a linear model, and so the electromagnetic fields can be calculated anywhere on the vehicle. Comparison of experimental and numerical results were made for several lightning strikes. Skin current density and electromagnetic field distributions are discussed in detail.

  13. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  14. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    Science.gov (United States)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  15. The use of advanced simulation in the training of anesthesiologists to treat chemical warfare casualties.

    Science.gov (United States)

    Berkenstadt, Haim; Ziv, Amitai; Barsuk, Daphna; Levine, Inbal; Cohen, Amir; Vardi, Amir

    2003-06-01

    Training anesthesiologists to treat nerve gas intoxication in a mass casualty scenario is a complicated task. The scenario is an unfamiliar medical situation involving the need to decontaminate patients before providing definitive medical treatment, and the need for physical protection to the medical team before decontamination. We describe the development of a simulation-based training program. In one site of a virtual hospital, anesthesiologists were trained in initial airway and breathing resuscitation before decontamination while wearing full protective gear. In another site, they were trained in the treatment of critically-ill patients with combined conventional and chemical injuries or severe intoxication. Intubation simulators of newborn, pediatric, and adult patients, advanced full-scale simulators, and actors simulating patients were used. Initial airway, breathing, and antidotal treatment were performed successfully, with or without full protective gear. The gas mask did not interfere with orotracheal intubation, but limited effective communication within the medical team. Chemical protective gloves were the limiting factor in the performance of medical tasks such as fixing the orotracheal tube. Twenty-two participants (88%) pointed out that the simulated cases represented realistic problems in this scenario, and all 25 participants found the simulated-based training superior to previous traditional training they had in this field. Using advanced simulation, we were able to train anesthesiologists to treat nerve gas intoxication casualties and to learn about the limitations of providing medical care in this setting. Advanced medical simulation can be used to train anesthesiologists to treat nonconventional warfare casualties. The limitations of medical performance in full protective gear can be learned from this training.

  16. Structural Effect of Thioureas on the Detection of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Ha, Seonggyun; Lee, Minhe; Seo, Hyun Ook; Song, Sun Gu; Kim, Kyung-Su; Park, Chan Heum; Kim, Il Hee; Kim, Young Dok; Song, Changsik

    2017-08-25

    The ability to rapidly detect, identify, and monitor chemical warfare agents (CWAs) is imperative for both military and civilian defense. Since most CWAs and their simulants have an organophosphonate group, which is a hydrogen (H)-bond acceptor, many H-bond donors have been developed to effectively bind to the organophosphonate group. Although thioureas have been actively studied as an organocatalyst, they are relatively less investigated in CWA detection. In addition, there is a lack of studies on the structure-property relationship for gas phase detection. In this study, we synthesized various thioureas of different chemical structures, and tested them for sensing dimethylmethylphosphonate (DMMP), a CWA simulant. Molecular interaction between DMMP and thiourea was measured by 1 H NMR titration and supported by density functional theory (DFT) calculations. Strong H-bond donor ability of thiourea may cause self-aggregation, and CH-π interaction can play an important role in the DMMP detection. Gas-phase adsorption of DMMP was also measured using a quartz crystal microbalance (QCM) and analyzed using the simple Langmuir isotherm, showing the importance of structure-induced morphology of thioureas on the surface.

  17. Simulating Blade-Strike on Fish passing through Marine Hydrokinetic Turbines

    Energy Technology Data Exchange (ETDEWEB)

    Romero Gomez, Pedro DJ; Richmond, Marshall C.

    2014-06-16

    The study reported here evaluated the occurrence, frequency, and intensity of blade strike of fish on an axial-flow marine hydrokinetic turbine by using two modeling approaches: a conventional kinematic formulation and a proposed Lagrangian particle- based scheme. The kinematic model included simplifying assumptions of fish trajectories such as distribution and velocity. The proposed method overcame the need for such simplifications by integrating the following components into a computational fluid dynamics (CFD) model: (i) advanced eddy-resolving flow simulation, (ii) generation of ambient turbulence based on field data, (iii) moving turbine blades in highly transient flows, and (iv) Lagrangian particles to mimic the potential fish pathways. The test conditions to evaluate the blade-strike probability and fish survival rate were: (i) the turbulent environment, (ii) the fish size, and (iii) the approaching flow velocity. The proposed method offered the ability to produce potential fish trajectories and their interaction with the rotating turbine. Depending upon the scenario, the percentile of particles that registered a collision event ranged from 6% to 19% of the released sample size. Next, by using a set of experimental correlations of the exposure-response of living fish colliding with moving blades, the simulated collision data were used as input variables to estimate the survival rate of fish passing through the operating turbine. The resulting survival rates were greater than 96% in all scenarios, which is comparable to or better than known survival rates for conventional hydropower turbines. The figures of strike probability and mortality rate were amplified by the kinematic model. The proposed method offered the advantage of expanding the evaluation of other mechanisms of stress and injury on fish derived from hydrokinetic turbines and related devices.

  18. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  19. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  20. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  1. Acoustic Emission Monitoring of Compression-after-Impact Test of Nano-Particles-Coated CFRP Damaged by Simulated Lightning Strikes

    International Nuclear Information System (INIS)

    Shin, Je Ha; Kwon, Oh Yang; Seo, Seong Wook

    2011-01-01

    Nanoparticles-coated and impact-damaged carbon-fiber reinforced plastics(CFRP) laminates were tested under compression-after-impact(CAI) mode and the propagation of damage due to compressive loading has been monitored by acoustic emission(AE). The impact damage was induced not by mechanical loading but by a simulated lightning strike. CFRP laminates were made of carbon prepregs prepared by coating of conductive nano-particles directly on the fibers and the coupons were subjected to simulated lightning strikes with a high voltage/current impulse of 10∼40 kA within a few microseconds. The effects of nano-particles coating and the degree of damage induced by the simulated lightning strikes on the AE activities were examined, and the relationship between the compressive residual strength and AE behavior has been evaluated in terms of AE event counts and the onset of AE activity with the compressive loading. The degree of impact damage was also measured in terns of damage area by using ultrasonic C-scan images. From the results assessed during the CAI tests of damaged CFRP showed that AE monitoring appeared to be very useful to differentiate the degree of damage hence the mechanical integrity of composite structures damaged by lightning strikes

  2. A Comparison of QSAR Based Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants

    Science.gov (United States)

    2014-07-01

    AND EXPERIMENTAL DATA FOR SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS ECBC-TR-1259 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Cabalo , Jerry B. (ECBC); and Knox, Craig K. (Leidos) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  3. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  4. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  5. Lightning Strike Ablation Damage Influence Factors Analysis of Carbon Fiber/Epoxy Composite Based on Coupled Electrical-Thermal Simulation

    Science.gov (United States)

    Yin, J. J.; Chang, F.; Li, S. L.; Yao, X. L.; Sun, J. R.; Xiao, Y.

    2017-10-01

    According to the mathematical analysis model constructed on the basis of energy-balance relationship in lightning strike, and accompany with the simplified calculation strategy of composite resin pyrolysis degree dependent electrical conductivity, an effective three dimensional thermal-electrical coupling analysis finite element model of composite laminate suffered from lightning current was established based on ABAQUS, to elucidate the effects of lighting current waveform parameters and thermal/electrical properties of composite laminate on the extent of ablation damage. Simulated predictions agree well with the composite lightning strike directed effect experimental data, illustrating the potential accuracy of the constructed model. The analytical results revealed that extent of composite lightning strike ablation damage can be characterized by action integral validly, there exist remarkable power function relationships between action integral and visual damage area, projected damage area, maximum damage depth and damage volume of ablation damage, and enhancing the electrical conductivity and specific heat of composite, ablation damage will be descended obviously, power function relationships also exist between electrical conductivity, specific heat and ablation damage, however, the impact of thermal conductivity on the extent of ablation damage is not notable. The conclusions obtained provide some guidance for composite anti-lightning strike structure-function integration design.

  6. Graphene Nanoplatelet-Polymer Chemiresistive Sensor Arrays for the Detection and Discrimination of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Wiederoder, Michael S; Nallon, Eric C; Weiss, Matt; McGraw, Shannon K; Schnee, Vincent P; Bright, Collin J; Polcha, Michael P; Paffenroth, Randy; Uzarski, Joshua R

    2017-11-22

    A cross-reactive array of semiselective chemiresistive sensors made of polymer-graphene nanoplatelet (GNP) composite coated electrodes was examined for detection and discrimination of chemical warfare agents (CWA). The arrays employ a set of chemically diverse polymers to generate a unique response signature for multiple CWA simulants and background interferents. The developed sensors' signal remains consistent after repeated exposures to multiple analytes for up to 5 days with a similar signal magnitude across different replicate sensors with the same polymer-GNP coating. An array of 12 sensors each coated with a different polymer-GNP mixture was exposed 100 times to a cycle of single analyte vapors consisting of 5 chemically similar CWA simulants and 8 common background interferents. The collected data was vector normalized to reduce concentration dependency, z-scored to account for baseline drift and signal-to-noise ratio, and Kalman filtered to reduce noise. The processed data was dimensionally reduced with principal component analysis and analyzed with four different machine learning algorithms to evaluate discrimination capabilities. For 5 similarly structured CWA simulants alone 100% classification accuracy was achieved. For all analytes tested 99% classification accuracy was achieved demonstrating the CWA discrimination capabilities of the developed system. The novel sensor fabrication methods and data processing techniques are attractive for development of sensor platforms for discrimination of CWA and other classes of chemical vapors.

  7. In Situ Probes of Capture and Decomposition of Chemical Warfare Agent Simulants by Zr-Based Metal Organic Frameworks

    Energy Technology Data Exchange (ETDEWEB)

    Plonka, Anna M.; Wang, Qi; Gordon, Wesley O.; Balboa, Alex; Troya, Diego; Guo, Weiwei; Sharp, Conor H.; Senanayake, Sanjaya D.; Morris, John R.; Hill, Craig L.; Frenkel, Anatoly I. (BNL); (Virginia Tech); (ECBC); (Emory); (SBU)

    2017-01-18

    Zr-based metal organic frameworks (MOFs) have been recently shown to be among the fastest catalysts of nerve-agent hydrolysis in solution. We report a detailed study of the adsorption and decomposition of a nerve-agent simulant, dimethyl methylphosphonate (DMMP), on UiO-66, UiO-67, MOF-808, and NU-1000 using synchrotron-based X-ray powder diffraction, X-ray absorption, and infrared spectroscopy, which reveals key aspects of the reaction mechanism. The diffraction measurements indicate that all four MOFs adsorb DMMP (introduced at atmospheric pressures through a flow of helium or air) within the pore space. In addition, the combination of X-ray absorption and infrared spectra suggests direct coordination of DMMP to the Zr6 cores of all MOFs, which ultimately leads to decomposition to phosphonate products. These experimental probes into the mechanism of adsorption and decomposition of chemical warfare agent simulants on Zr-based MOFs open new opportunities in rational design of new and superior decontamination materials.

  8. Transport behavior of surrogate biological warfare agents in a simulated landfill: Effect of leachate recirculation and water infiltration

    KAUST Repository

    Saikaly, Pascal

    2010-11-15

    An understanding of the transport behavior of biological warfare (BW) agents in landfills is required to evaluate the suitability of landfills for the disposal of building decontamination residue (BDR) following a bioterrorist attack on a building. Surrogate BW agents, Bacillus atrophaeus spores and Serratia marcescens, were spiked into simulated landfill reactors that were filled with synthetic building debris (SBD) and operated for 4 months with leachate recirculation or water infiltration. Quantitative polymerase chain reaction (Q-PCR) was used to monitor surrogate transport. In the leachate recirculation reactors, <10% of spiked surrogates were eluted in leachate over 4 months. In contrast, 45% and 31% of spiked S. marcescens and B. atrophaeus spores were eluted in leachate in the water infiltration reactors. At the termination of the experiment, the number of retained cells and spores in SBD was measured over the depth of the reactor. Less than 3% of the total spiked S. marcescens cells and no B. atrophaeus spores were detected in SBD. These results suggest that significant fractions of the spiked surrogates were strongly attached to SBD. © 2010 American Chemical Society.

  9. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  10. Air Force Electronic Warfare Evaluation Simulator (AFEWES) Infrared Test and Evaluation Capabilities

    National Research Council Canada - National Science Library

    Jackson, II, Hank D; Blair, Tommy L; Ensor, Bruce A

    2007-01-01

    ...) test facility currently has the ability to simulate a complete IRCM test environment, including IR missiles in flight, aircraft in flight, and various IR countermeasures including maneuvers, point...

  11. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  12. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  13. Computational Investigations of Potential Energy Function Development for Metal--Organic Framework Simulations, Metal Carbenes, and Chemical Warfare Agents

    Science.gov (United States)

    Cioce, Christian R.

    sigma donates, and subsequent back-bonding occurs into a pi* antibonding orbital. This is a different type of interaction not seen in the three existing classes of metal-carbene complexes, namely Fischer, Schrock, and Grubbs. Finally, the virtual engineering of enhanced chemical warfare agent (CWA) detection systems is discussed. As part of a U.S. Department of Defense supported research project, in silico chemical modifications to a previously synthesized zinc-porphyrin, ZnCS1, were made to attempt to achieve preferential binding of the nerve agent sarin versus its simulant, DIMP (diisopropyl methylphosphonate). Upon modification, a combination of steric effects and induced hydrogen bonding allowed for the selective binding of sarin. The success of this work demonstrates the role that high performance computing can play in national security research, without the associated costs and high security required for experimentation.

  14. Experimental and Numerical Simulation Analysis of Typical Carbon Woven Fabric/Epoxy Laminates Subjected to Lightning Strike

    Science.gov (United States)

    Yin, J. J.; Chang, F.; Li, S. L.; Yao, X. L.; Sun, J. R.; Xiao, Y.

    2017-12-01

    To clarify the evolution of damage for typical carbon woven fabric/epoxy laminates exposed to lightning strike, artificial lightning testing on carbon woven fabric/epoxy laminates were conducted, damage was assessed using visual inspection and damage peeling approaches. Relationships between damage size and action integral were also elucidated. Results showed that damage appearance of carbon woven fabric/epoxy laminate presents circular distribution, and center of the circle located at the lightning attachment point approximately, there exist no damage projected area dislocations for different layers, visual damage territory represents maximum damage scope; visible damage can be categorized into five modes: resin ablation, fiber fracture and sublimation, delamination, ablation scallops and block-shaped ply-lift; delamination damage due to resin pyrolysis and internal pressure exist obvious distinguish; project area of total damage is linear with action integral for the same type specimens, that of resin ablation damage is linear with action integral, but no correlation with specimen type, for all specimens, damage depth is linear with logarithm of action integral. The coupled thermal-electrical model constructed is capable to simulate the ablation damage for carbon woven fabric/epoxy laminates exposed to simulated lightning current through experimental verification.

  15. Decontamination of chemical warfare sulfur mustard agent simulant by ZnO nanoparticles

    Science.gov (United States)

    Sadeghi, Meysam; Yekta, Sina; Ghaedi, Hamed

    2016-07-01

    In this study, zinc oxide nanoparticles (ZnO NPs) have been surveyed to decontaminate the chloroethyl phenyl sulfide as a sulfur mustard agent simulant. Prior to the reaction, ZnO NPs were successfully prepared through sol-gel method in the absence and presence of polyvinyl alcohol (PVA). PVA was utilized as a capping agent to control the agglomeration of the nanoparticles. The formation, morphology, elemental component, and crystalline size of nanoscale ZnO were certified and characterized by SEM/EDX, XRD, and FT-IR techniques. The decontamination (adsorption and destruction) was tracked by the GC-FID analysis, in which the effects of polarity of the media, such as isopropanol, acetone and n-hexane, reaction time intervals from 1 up to 18 h, and different temperatures, including 25, 35, 45, and 55 °C, on the catalytic/decontaminative capability of the surface of ZnO NPs/PVA were investigated and discussed, respectively. Results demonstrated that maximum decontamination (100 %) occurred in n-hexane solvent at 55 °C after 1 h. On the other hand, the obtained results for the acetone and isopropanol solvents were lower than expected. GC-MS chromatograms confirmed the formation of hydroxyl ethyl phenyl sulfide and phenyl vinyl sulfide as the destruction reaction products. Furthermore, these chromatograms proved the role of hydrolysis and elimination mechanisms on the catalyst considering its surface Bronsted and Lewis acid sites. A non-polar solvent aids material transfer to the reactive surface acid sites without blocking these sites.

  16. Graphene oxide as sensitive layer in Love-wave surface acoustic wave sensors for the detection of chemical warfare agent simulants.

    Science.gov (United States)

    Sayago, Isabel; Matatagui, Daniel; Fernández, María Jesús; Fontecha, José Luis; Jurewicz, Izabela; Garriga, Rosa; Muñoz, Edgar

    2016-02-01

    A Love-wave device with graphene oxide (GO) as sensitive layer has been developed for the detection of chemical warfare agent (CWA) simulants. Sensitive films were fabricated by airbrushing GO dispersions onto Love-wave devices. The resulting Love-wave sensors detected very low CWA simulant concentrations in synthetic air at room temperature (as low as 0.2 ppm for dimethyl-methylphosphonate, DMMP, a simulant of sarin nerve gas, and 0.75 ppm for dipropylene glycol monomethyl ether, DPGME, a simulant of nitrogen mustard). High responses to DMMP and DPGME were obtained with sensitivities of 3087 and 760 Hz/ppm respectively. Very low limit of detection (LOD) values (9 and 40 ppb for DMMP and DPGME, respectively) were calculated from the achieved experimental data. The sensor exhibited outstanding sensitivity, good linearity and repeatability to all simulants tested. The detection mechanism is here explained in terms of hydrogen bonding formation between the tested CWA simulants and GO. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Lightning strikes

    International Nuclear Information System (INIS)

    Dance, B.

    1982-01-01

    If a nuclear weapon were struck by a powerful lightning flash, what would happen Scientists have assembled a simulator to produce exceptionally powerful discharges to try to find the answer to this question by practical test. The Sandia facility enables the extremely powerful lightning discharges which occur only once in every hundred lightning strokes to be duplicated. A bolt is composed of a series of strokes between two clouds or between one cloud and the earth. The simulator consists of four circuits, an inductor, a resistor and a special crowbar-switch developed at Sandia. The crowbar is for accuracy in the simulation of a lightning stroke. The test data is conveyed to computers for analysis by means of fibre-optic links. The first series of tests involve the warhead for the Air-Launched Cruise Missile

  18. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  19. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  20. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  1. ERO and PIC simulations of gross and net erosion of tungsten in the outer strike-point region of ASDEX Upgrade

    Directory of Open Access Journals (Sweden)

    A. Hakola

    2017-08-01

    Full Text Available We have modelled net and gross erosion of W in low-density l-mode plasmas in the low-field side strike point region of ASDEX Upgrade by ERO and Particle-in-Cell (PIC simulations. The observed net-erosion peak at the strike point was mainly due to the light impurities present in the plasma while the noticeable net-deposition regions surrounding the erosion maximum could be attributed to the strong E ×B drift and the magnetic field bringing eroded particles from a distance of several meters towards the private flux region. Our results also imply that the role of cross-field diffusion is very small in the studied plasmas. The simulations indicate net/gross erosion ratio of 0.2–0.6, which is in line with the literature data and what was determined spectroscopically. The deviations from the estimates extracted from post-exposure ion-beam-analysis data (∼0.6–0.7 are most likely due to the measured re-deposition patterns showing the outcomes of multiple erosion-deposition cycles.

  2. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  3. METHODS OF MEASURING THE EFFECTS OF LIGHTNING BY SIMULATING ITS STRIKES WITH THE INTERVAL ASSESSMENT OF THE RESULTS OF MEASUREMENTS

    Directory of Open Access Journals (Sweden)

    P. V. Kriksin

    2017-01-01

    Full Text Available The article presents the results of the development of new methods aimed at more accurate interval estimate of the experimental values of voltages on grounding devices of substations and circuits in the control cables, that occur when lightning strikes to lightning rods; the abovementioned estimate made it possible to increase the accuracy of the results of the study of lightning noise by 28 %. A more accurate value of interval estimation were achieved by developing a measurement model that takes into account, along with the measured values, different measurement errors and includes the special processing of the measurement results. As a result, the interval of finding the true value of the sought voltage is determined with an accuracy of 95 %. The methods can be applied to the IK-1 and IKP-1 measurement complexes, consisting in the aperiodic pulse generator, the generator of high-frequency pulses and selective voltmeters, respectively. To evaluate the effectiveness of the developed methods series of experimental voltage assessments of grounding devices of ten active high-voltage substation have been fulfilled in accordance with the developed methods and traditional techniques. The evaluation results confirmed the possibility of finding the true values of voltage over a wide range, that ought to be considered in the process of technical diagnostics of lightning protection of substations when the analysis of the measurement results and the development of measures to reduce the effects of lightning are being fulfilled. Also, a comparative analysis of the results of measurements made in accordance with the developed methods and traditional techniques has demonstrated that the true value of the sought voltage may exceed the measured value at an average of 28 %, that ought to be considered in the further analysis of the parameters of lightning protection at the facility and in the development of corrective actions. The developed methods have been

  4. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  5. Measurement of Toxic industrial Chemicals, Chemical Warfare Agents and Their Simulants: A LWIR Passive Standoff Detection Study

    Science.gov (United States)

    2007-04-01

    Les mesures ont été effectuées à différentes concentrations et à faibles contrastes thermiques dans un environnement à ciel ouvert. Les mesures... thermique (LWIR) pour la détection en retrait dans un environnement militaire est maintenant une priorité. Le projet CATSI-EDM est le premier...fitting procedure. Figure 42 shows simulations performed with the Line-by-Line Radiative Transfer Model (LBLRTM) [12] incorporating the same

  6. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  7. An Examination of Options to Reduce Underway Training Days through the Use of Simulation

    Science.gov (United States)

    2008-01-01

    better exploit simulation, the Deputy Chief of Naval Operations for Resources , Requirements, and Assessments, Assessment Division (OPNAV N81), asked the...NCO) antimine warfare (AMW) strike warfare ( STW ) fleet support operations–medical (FSO-M) intelligence (INT) mobility–damage control (MOB-D). The...Number of exercises M is si o n a re a 0 100 200 300 400 500 600 MOB-S C2W MOB-E MOB-N SUW AW ASW CCC MIW NCO AMW STW INT FSO-M MOB-D Summary

  8. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  9. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  10. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  11. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  12. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  13. Lightning Often Strikes Twice

    Science.gov (United States)

    2005-01-01

    Contrary to popular misconception, lightning often strikes the same place twice. Certain conditions are just ripe for a bolt of electricity to come zapping down; and a lightning strike is powerful enough to do a lot of damage wherever it hits. NASA created the Accurate Location of Lightning Strikes technology to determine the ground strike point of lightning and prevent electrical damage in the immediate vicinity of the Space Shuttle launch pads at Kennedy Space Center. The area surrounding the launch pads is enmeshed in a network of electrical wires and components, and electronic equipment is highly susceptible to lightning strike damage. The accurate knowledge of the striking point is important so that crews can determine which equipment or system needs to be retested following a strike. Accurate to within a few yards, this technology can locate a lightning strike in the perimeter of the launch pad. As an added bonus, the engineers, then knowing where the lightning struck, can adjust the variables that may be attracting the lightning, to create a zone that will be less susceptible to future strikes.

  14. Options with Extreme Strikes

    Directory of Open Access Journals (Sweden)

    Lingjiong Zhu

    2015-07-01

    Full Text Available In this short paper, we study the asymptotics for the price of call options for very large strikes and put options for very small strikes. The stock price is assumed to follow the Black–Scholes models. We analyze European, Asian, American, Parisian and perpetual options and conclude that the tail asymptotics for these option types fall into four scenarios.

  15. Should doctors strike?

    Science.gov (United States)

    Park, John J; Murray, Scott A

    2014-05-01

    Last year in June, British doctors went on strike for the first time since 1975. Amidst a global economic downturn and with many health systems struggling with reduced finances, around the world the issue of public health workers going on strike is a very real one. Almost all doctors will agree that we should always follow the law, but often the law is unclear or does not cover a particular case. Here we must appeal to ethical discussion. The General Medical Council, in its key guidance document for practising doctors, Good Medical Practice, claims that 'Good doctors make the care of their patients their first concern'. Is this true? And if so, how is this relevant to the issue of striking? One year on since the events, we carefully reflect and argue whether it was right for doctors to pursue strike action, and call for greater discussion of ethical issues such as the recent strikes, particularly among younger members of the profession.

  16. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  17. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  18. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  19. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  20. A right to strike?

    Science.gov (United States)

    Jennings, K; Western, G

    1997-07-01

    During 1995, there was a major shift in the United Kingdom in the debate of whether it is right for nurses to strike. The Royal College of Nursing, the former advocate of a non-industrial action policy, moved towards the UNISON position that industrial action is ethical in some circumstances, as well as the necessary thing to do. The authors, both nurses and UNISON officials, look at the reasons for this change and why UNISON's historical position sees industrial action as an effective weapon in defending services, as well as wages and jobs. It can be right to strike.

  1. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  2. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  3. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  4. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  5. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  6. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  7. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  8. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  9. Hair analysis as a useful procedure for detection of vapour exposure to chemical warfare agents: simulation of sulphur mustard with methyl salicylate.

    Science.gov (United States)

    Spiandore, Marie; Piram, Anne; Lacoste, Alexandre; Josse, Denis; Doumenq, Pierre

    2014-06-01

    Chemical warfare agents (CWA) are highly toxic compounds which have been produced to kill or hurt people during conflicts or terrorist attacks. Despite the fact that their use is strictly prohibited according to international convention, populations' exposure still recently occurred. Development of markers of exposure to CWA is necessary to distinguish exposed victims from unexposed ones. We present the first study of hair usage as passive sampler to assess contamination by chemicals in vapour form. This work presents more particularly the hair adsorption capacity for methyl salicylate used as a surrogate of the vesicant sulphur mustard. Chemical vapours toxicity through the respiratory route has historically been defined through Haber's law's concentration-time (Ct) product, and vapour exposure of hair to methyl salicylate was conducted with various times or doses of exposure in the range of incapacitating and lethal Ct products corresponding to sulphur mustard. Following exposure, extraction of methyl salicylate from hair was conducted by simple soaking in dichloromethane. Methyl salicylate could be detected on hair for vapour concentration corresponding to about one fifth of the sulphur mustard concentration that would kill 50% of exposed individuals (LCt50). The amount of methyl salicylate recovered from hair increased with time or dose of exposure. It showed a good correlation with the concentration-time product, suggesting that hair could be used like a passive sampler to assess vapour exposure to chemical compounds. It introduces great perspectives concerning the use of hair as a marker of exposure to CWA. Copyright © 2014 John Wiley & Sons, Ltd.

  10. Algab õppus "Saber Strike"

    Index Scriptorium Estoniae

    2014-01-01

    Täna algab Eestis, Lätis ja Leedus Ameerika Ühendriikide Euroopa väekoondise õppus "Saber Strike", mille eesmärk on maaväeüksuste koostöö harjutamine. Õppusest võtab osa üle 2000 kaitseväelase Baltimaadest, USAst, Ühendkuningriigist, Taanist, Norrast, Soomest ja Saksamaalt. Eestist osaleb õppusel ligi 400 kaitseväelast

  11. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  12. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  13. Global strike hypersonic weapons

    Science.gov (United States)

    Lewis, Mark J.

    2017-11-01

    Beginning in the 1940's, the United States has pursued the development of hypersonic technologies, enabling atmospheric flight in excess of five times the speed of sound. Hypersonic flight has application to a range of military and civilian applications, including commercial transport, space access, and various weapons and sensing platforms. A number of flight tests of hypersonic vehicles have been conducted by countries around the world, including the United States, Russia, and China, that could lead the way to future hypersonic global strike weapon systems. These weapons would be especially effective at penetrating conventional defenses, and could pose a significant risk to national security.

  14. Impulse of a Kendo Strike

    Directory of Open Access Journals (Sweden)

    Masahiro Abe

    2012-06-01

    Full Text Available An expert swordsman struck a target with a kendo sword. The velocity and force of the strike were measured. The relationship between the strike velocity, impact force and effective mass of the sword was investigated. It was shown that the effective mass of the sword remains constant for typical strike velocities.

  15. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  16. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  17. Strike Point Control for the National Spherical Torus Experiment (NSTX)

    International Nuclear Information System (INIS)

    Kolemen, E.; Gates, D.A.; Rowley, C.W.; Kasdin, N.J.; Kallman, J.; Gerhardt, S.; Soukhanovskii, V.; Mueller, D.

    2010-01-01

    This paper presents the first control algorithm for the inner and outer strike point position for a Spherical Torus (ST) fusion experiment and the performance analysis of the controller. A liquid lithium divertor (LLD) will be installed on NSTX which is believed to provide better pumping than lithium coatings on carbon PFCs. The shape of the plasma dictates the pumping rate of the lithium by channeling the plasma to LLD, where strike point location is the most important shape parameter. Simulations show that the density reduction depends on the proximity of strike point to LLD. Experiments were performed to study the dynamics of the strike point, design a new controller to change the location of the strike point to desired location and stabilize it. The most effective PF coils in changing inner and outer strike points were identified using equilibrium code. The PF coil inputs were changed in a step fashion between various set points and the step response of the strike point position was obtained. From the analysis of the step responses, PID controllers for the strike points were obtained and the controller was tuned experimentally for better performance. The strike controller was extended to include the outer-strike point on the inner plate to accommodate the desired low outer-strike points for the experiment with the aim of achieving 'snowflake' divertor configuration in NSTX.

  18. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  19. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  20. Precision Strike Annual Programs Review

    Science.gov (United States)

    2009-03-11

    Damage Area*• GPS / INS Navigation + SAL Terminal • Precise əm CEP • Low Probability of Collateral Damage • GPS Extends Glide Range to 10+km • Agile...Page 311 Mar 09 Unclassified Unclassified Viper Strike Lineage Viper Strike SAL Seeker Proof of Principle Demos I & II Hunter-Viper Strike Quick...Information Management • CCA - Clinger Cohen Act • RIT- Rapid Improvement Team • BMMP – Business Management Modernization Program • BTA/ERAM – Business

  1. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  2. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  3. Investigation of statistics strategies for improving the discriminating power of laser-induced breakdown spectroscopy for chemical and biological warfare agent simulants

    International Nuclear Information System (INIS)

    Munson, Chase A.; De Lucia, Frank C.; Piehler, Thuvan; McNesby, Kevin L.; Miziolek, Andrzej W.

    2005-01-01

    Laser-induced breakdown spectroscopy spectra of bacterial spores, molds, pollens and nerve agent simulants have been acquired. The performance of several statistical methodologies-linear correlation, principal components analysis, and soft independent model of class analogy-has been evaluated for their ability to differentiate between the various samples. The effect of data selection (total spectra, peak intensities, and intensity ratios) and pre-treatments (e.g., averaging) on the statistical models have also been studied. Results indicate the use of spectral averaging and weighting schemes may be used to significantly improve sample differentiation

  4. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  5. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  6. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  7. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  8. Continental United States Hurricane Strikes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Continental U.S. Hurricane Strikes Poster is our most popular poster which is updated annually. The poster includes all hurricanes that affected the U.S. since...

  9. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  10. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  11. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  12. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  13. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  14. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  15. [Physicians' strikes--ethical considerations].

    Science.gov (United States)

    Glick, Shimon; Schwarzfuchs, Dan

    2012-01-01

    Strikes in general represent a solution based on a form of coercion. Historically, the striker caused direct damage to his employer, who was responsible for the perceived unfair treatment of the employee. In the case of strikes in the public sector, the employer is generally not harmed, but innocent citizens suffer in order to pressure the government agencies, a questionable practice from an ethical viewpoint. Physicians' strikes have more serious ethical problems. They cause suffering and death to innocent citizens. They violate the ethical codes to which physicians have committed themselves as professionals, and they seriously impair the trust of the public in physicians. Better and more ethical ways to provide fair compensation for physicians must be employed, perhaps like those used for judges and members of the IDF.

  16. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    Science.gov (United States)

    2007-01-01

    Reuven Leopold, Sea-Based Aviation and the Next U.S. Aircraft Carrier Design: The CVX , MIT Security Studies Program Occasional Paper, Cambridge, Mass...www.rand.org/pubs/monographs/MG404/ Leopold, Reuven, Sea-Based Aviation and the Next U.S. Aircraft Carrier Design: The CVX , MIT Security Studies

  17. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    Science.gov (United States)

    2015-03-01

    keep the war contained in Korea. The British and the French , already spread thin because of their forces in Malaya and Indochina , were weary of...collateral damage, is a historically contingent process. This thesis examines three case studies- the Korean War , the Vietnam War , and the Kosovo air campaign...administrations and war strategists have put the priority of 1nitigat ing collateral damage at different levels. Understanding the reasoning and

  18. Combat Pair: The Evolution of Air Force-Navy Integration in Strike Warfare

    National Research Council Canada - National Science Library

    Lambeth, Benjamin

    2007-01-01

    ... any significant interoperability features. The most influential factor accounting for this gradual trend toward integration was the nation's ten-year experience with Operations Northern and Southern Watch, in which both Air Force land-based...

  19. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    remote Pech Valley to work alongside the tribesmen, build a local defense force, and attempt to bring stability to a contentious area.70 These...fighting positions, reduced an improvised explosive device and discovered thirty pounds of high-grade ammonium nitrate.”79 These operations, along...rebuilding infrastructure, increasing legitimacy of the local government, and bringing rule of law to the area).”103 This formula saw success in

  20. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  1. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  2. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  3. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  4. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  5. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  6. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  7. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  8. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  9. Respecting the right to strike

    CERN Multimedia

    Staff Association

    2015-01-01

    Since two years the representatives of the employers in the ILO, a tripartite multilateral body responsible for guaranteeing the correct application of an international labour code, try to weaken the global work regulations. On the occasion of the Global Day of Action for the right to strike at the invitation of the Geneva community of Union action (Communauté genevoise d’action syndicale) and the Swiss Trade Union Association (Union syndicale suisse) around noon on Wednesday 18th February some fifty staff representatives of international organizations gathered on the place des Nations in Geneva to reaffirm the importance of this fundamental right, too often flouted. A delegation of the CERN Staff Association was also present. In a short speech, the Staff Association said that, while being one of the fundamental human rights, to be efficient the right to strike must be used intelligently. It must be implemented taking into account the sensitivities of the professional environment and r...

  10. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  11. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  12. Macular damage following lightning strikes.

    Science.gov (United States)

    Augustin, A J; Koch, F; Böker, T

    1995-07-01

    Two men with recent history of lightining strike were referred to our hospital. Both patients complained of metamorphosia in one eye and reduced visual acuity. Funduscopy revealed target-like alterations at the fovea. Fluorescein angiography showed window defects of the central retinal pigment epithelium in both patients. One patient developed an anterior subcapsular cataract. If the eye is part of the current-circuit, the melanin granules of the iris, pigment epithelium, and choroid might act as a resistor. The resulting accumulation of heat may lead to damage of the surrounding tissues.

  13. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  14. Women, transition and strikes in Serbia

    OpenAIRE

    Novaković, Nada G.

    2014-01-01

    The author, in a sociological way, describes and analyzes the concepts of transition, privatization and strikes in Serbia, particularly the place of women in it. It examines the most important economic and social causes and consequences of these phenomena. The main hypothesis is: women's strikes in the Serbian transition are less efficient than strikes and public protests of women in the developed world and the second Yugoslavia. A strike is a class conflict, in which the workers are fighting...

  15. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  16. 14 CFR 35.38 - Lightning strike.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Lightning strike. 35.38 Section 35.38... STANDARDS: PROPELLERS Tests and Inspections § 35.38 Lightning strike. The applicant must demonstrate, by... lightning strike without causing a major or hazardous propeller effect. The limit to which the propeller has...

  17. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  18. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  19. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  20. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  1. Strikes in Serbia since 2000 to 2005

    Directory of Open Access Journals (Sweden)

    Novaković Nada

    2005-01-01

    Full Text Available In this article author deals with main characteristics of strikes in Serbia within the period 2000–2005. Analysis starts with thesis that strike is open class conflict within class divided society. Therefore strike is radical form of trade union struggle for workers rights. Main questions in the analysis were: on social structure as a background of strikes, on organizations and trade unions included in it, on effects of strikes in Serbia in the given period. Main thesis of the article is that every power dislike strikes and is ready to do everything to diminish them. Main reason lies in the class nature of social conflict that underlie them. Main processes that underlie strike phenomena in Serbia since 2000. are the processes of originally capital accumulation. These bring about the formation of new capitalist class and proletariat of all professions. Author gives a brief analysis of privatization process, as well as of restructuring of public sector and deregulation of economy trying to show the role of all of it in origins of strikes. Main conclusion is that there are large number of strikes in all parts of society, that are well organized, with support of one or more trade unions. For these in power they are factor of obstacle on the way of successful transition. As for the reasons and outcomes these strikes are akin to the strikes at the beginning of 19th century.

  2. Third-party support for strike action.

    Science.gov (United States)

    Kelloway, E Kevin; Francis, Lori; Catano, Victor M; Dupré, Kathryne E

    2008-07-01

    Labor strikes are often seen as battles for public support. Members of the public are asked to show respect for a strike by refusing to cross the picket line or by joining strikers on the picket line. Such public support may affect the morale of strikers and influence the strike's duration. Despite the perceived importance of the public in labor disputes, members of third parties have not been considered in previous strike research. In 2 studies, the authors show that a new measure of third-party strike support is unidimensional and highly reliable. In both cases, union attitudes and perceptions of distributive justice were significant predictors of support for strike action. Those who are more supportive of unions in general and believe that the contract offered to the strikers was unfair were more likely to support the strike by engaging in such actions as conversing with strikers, writing letters, and refusing to cross the picket line.

  3. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  4. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  5. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  6. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  7. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  8. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  9. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  10. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  11. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  12. 14 CFR 29.631 - Bird strike.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Bird strike. 29.631 Section 29.631... STANDARDS: TRANSPORT CATEGORY ROTORCRAFT Design and Construction General § 29.631 Bird strike. The... safe landing (for Category B) after impact with a 2.2-lb (1.0 kg) bird when the velocity of the...

  13. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  14. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  15. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  16. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  17. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  18. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  19. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  20. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  1. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  2. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  3. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  4. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  5. An Exploratory Analysis of Littoral Combat Ships Ability to Protect Expeditionary Strike Groups

    National Research Council Canada - National Science Library

    Efimba, Motale

    2003-01-01

    ...) to augment or replace the current defenses of Expeditionary Strike Groups (ESG). Specifically, LCS's ability to help defend an ESGs in an anti-access scenario against a high-density small boat attack is simulated. Numbers of CRUDES...

  6. A numerical model for bird strike on sidewall structure of an aircraft nose

    OpenAIRE

    Liu, Jun; Li, Yulong; Gao, Xiaosheng; Yu, Xiancheng

    2014-01-01

    In order to examine the potential of using the coupled smooth particles hydrodynamic (SPH) and finite element (FE) method to predict the dynamic responses of aircraft structures in bird strike events, bird-strike tests on the sidewall structure of an aircraft nose are carried out and numerically simulated. The bird is modeled with SPH and described by the Murnaghan equation of state, while the structure is modeled with finite elements. A coupled SPH–FE method is developed to simulate the bird...

  7. Lightning Strike in Pregnancy With Fetal Injury.

    Science.gov (United States)

    Galster, Kellen; Hodnick, Ryan; Berkeley, Ross P

    2016-06-01

    Injuries from lightning strikes are an infrequent occurrence, and are only rarely noted to involve pregnant victims. Only 13 cases of lightning strike in pregnancy have been previously described in the medical literature, along with 7 additional cases discovered within news media reports. This case report presents a novel case of lightning-associated injury in a patient in the third trimester of pregnancy, resulting in fetal ischemic brain injury and long-term morbidity, and reviews the mechanics of lightning strikes along with common injury patterns of which emergency providers should be aware. Copyright © 2016 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  8. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  9. Expeditionary Strike Group: Command Structure Design Support

    National Research Council Canada - National Science Library

    Hutchins, Susan G; Kemple, William G; Kleinman, David L; Hocevar, Susan P

    2005-01-01

    An Expeditionary Strike Group (ESG) is a new capability mix that combines the combat power of three surface combatants and one submarine with an Amphibious Readiness Group/ Marine Expeditionary Unit...

  10. The Chicago Teachers Strike and Its Public

    Science.gov (United States)

    Shuffelton, Amy B.

    2014-01-01

    This article considers the 2012 Chicago Teachers Strike in light of John Dewey's "The Public and Its Problems." It engages Dewey's conceptualization of practical reason to challenge the educational reform movement's commitment to technocratic decision-making.

  11. Strikes in the public sector in Denmark

    DEFF Research Database (Denmark)

    Scheuer, Steen; Ibsen, Flemming; Høgedahl, Laust

    2016-01-01

    This article looks at strikes by employees in the public sector, discusses the theoretical background to these conflicts and shows – based on a case study of three strikes in the Danish public sector – how different union strategies lead to very different outcomes in terms of economic gains......, while public sector unions trying to move up the wage hierarchy cannot expect much help from fellow public sector unions, often quite the reverse....

  12. The Risk of Striking Accidents During LPG Ships Passage in Ports in Respect to Technical Failures based on Real Time Simulations in Szczecin-Świnoujście Waterway

    Directory of Open Access Journals (Sweden)

    Bąk Andrzej

    2016-10-01

    Full Text Available The method of risk assessment based on ship systems technical failures during the passage in the region of Świnoujście of the large LPG (liquefied petroleum gas tanker is presented. The statistical reliability indicators and the simulation model of ships manoeuvring. The researches carried out within this paper let to determine the safety level and necessary tug escort service during the passage of the ship with the hazardous cargo in the port area.

  13. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  14. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  15. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  16. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  17. Women, transition and strikes in Serbia

    Directory of Open Access Journals (Sweden)

    Novaković Nada G.

    2014-01-01

    Full Text Available The author, in a sociological way, describes and analyzes the concepts of transition, privatization and strikes in Serbia, particularly the place of women in it. It examines the most important economic and social causes and consequences of these phenomena. The main hypothesis is: women's strikes in the Serbian transition are less efficient than strikes and public protests of women in the developed world and the second Yugoslavia. A strike is a class conflict, in which the workers are fighting for their social and economic rights, threatened by the capitalist class. Elites in government and state authorities protect the interests of big capital at the detriment of the interests of the majority of workers. Exploring women's strikes in transition reveals the nature of the social and political system. Their strikes in enterprises, the blocking of public spaces and public protests are systemic, ie. class determined. As the transition was very fast, the resistance of the strikers was inefficient, and the protests of women became an expression of desperation against the loss of jobs and basic resources for lifehood. In short, this research is about the main causes, the organizational forms and the consequences of strikes in which the majority were women. For this purpose, the author chose to describe an array of strikes in the industries and the companies where women are most employed. The choice of strikes in the economic sector is not accidental, but a consequence of the fact that the women there were the most vulnerable. Women in public institutions and companies had much higher financial and social position. They are less likely to strike and publicly protested. After 2000, these strikes were more successful than worker's strikes in textile, food processing, manufacturing and trade. Relationship between the government and the public towards them was tainted by self-interest and selective. The main criterion for the selection of companies and

  18. Active and recent strike-slip tectonics

    Science.gov (United States)

    Nur, Amos; Boccaletti, Mario

    An international workshop cosponsored by the Department of Geology, University of Florence, Italy and the Department of Geophysics, Stanford University, Stanford, Calif., was held in Florence, Italy, April 18-20, 1989,on the topic of active and recent strike-slip tectonics in the continental crust. Workshop participants from Turkey, Ethiopia, Israel, Greece, and various universities in Italy, Spain, West Germany, France, the United Kingdom, Brazil, and the United States reported on a broad range of studies involving strike-slip faulting in continental crustal setting. As it turned out, much of the work reported on involved aspects of strike-slip faulting that are only poorly understood, especially crustal deformation, which is distributed over a multiplicity of faults, or even fault domains.One of the rewarding aspects of this workshop was the diversity of geographic areas and geological settings covered by the reporters. The north and east Anatolian faults, the Dead Sea transform zone, western Turkey, north and central Greece, Malta, Sicily, southern Italy, the bethic Cordillera in southern Spain, Tunisia, Tibet and southwest China, offshore Brazil, Alaska, Nevada, and California. A recurring observation reported for all those areas was mixed mode faulting, i.e., the coterminous or sequential occurrence of strike-slip and normal faulting, or strike-slip and thrust, and in many instances also strikeslip, normal and thrust faulting in a single tectonic setting.

  19. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  20. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  1. ELMs, strike point jumps and SOL currents

    International Nuclear Information System (INIS)

    Solano, Emilia R.; Jachmich, S.; Villone, F.; Hawkes, N.; Guenther, K.; Korotkov, A.; Stamp, M.; Andrew, P.; Conboy, J.; Mattews, G.F.; Corre, Y.; Loarte, A.; Pitts, R.A.; Cenedese, A.; Kempenaars, M.; Bolzonella, T.; Rachlew, E.

    2005-01-01

    Plasma equilibria before and after ELMs in JET are investigated. ELMs could be associated with fragile equilibria and separatrix instabilities: previously closed field lines would open up, releasing plasma current and leading to the formation of a new, smaller separatrix. This model could explain experimental observations of sudden jumps and shifts in strike point positions. Novel instability mechanisms are discussed to explain the large transient jumps observed in the strike point position: positive X-point instability, due to positive toroidal current density at the X-point and diamagnetic instability, due to negative inboard toroidal current density. (author)

  2. Strikes, solidarity and scabs. Union members participation norms and williengness to participate in strikes.

    NARCIS (Netherlands)

    Akkerman, A.; Born, M.; Torenvlied, R.

    2013-01-01

    This article studies how participation norms affect workers' willingness to strike. A factor analysis on the responses of 468 Dutch union members about appropriate behavior during a strike produces two factors. The first factor reflects a "solidarity norm" favoring group solidarity; the second

  3. The Front Line: No Strikes, Just Balls.

    Science.gov (United States)

    Unks, Gerald

    1979-01-01

    Recent actions of British teachers suggest an alternative to the teacher strike. Those teachers dramatically demonstrated their grievances by withholding the voluntary extra services they customarily perform. American teachers could accomplish the same end by collectively refusing to perform extraneous administrative services: collecting money,…

  4. When Lightning Strikes a Second Time

    Science.gov (United States)

    Allen, Kent

    2017-01-01

    The chances of lightning striking twice are infinitesimal, at best. What are the odds, in middle age, of being struck with a jarring bolt of figurative lightning, then a few months later being an eyewitness as the same sizzle in the sky jolts a group of students--those decision-makers of tomorrow? The author describes two experiences that proved…

  5. Impact of lightning strikes on hospital functions.

    Science.gov (United States)

    Mortelmans, Luc J M; Van Springel, Gert L J; Van Boxstael, Sam; Herrijgers, Jan; Hoflacks, Stefaan

    2009-01-01

    Two regional hospitals were struck by lightning during a one-month period. The first hospital, which had 236 beds, suffered a direct strike to the building. This resulted in a direct spread of the power peak and temporary failure of the standard power supply. The principle problems, after restoring standard power supply, were with the fire alarm system and peripheral network connections in the digital radiology systems. No direct impact on the hardware could be found. Restarting the servers resolved all problems. The second hospital, which had 436 beds, had a lightning strike on the premises and mainly experienced problems due to induction. All affected installations had a cable connection from outside in one way or another. The power supplies never were endangered. The main problem was the failure of different communication systems (telephone, radio, intercom, fire alarm system). Also, the electronic entrance control went out. During the days after the lightening strike, multiple software problems became apparent, as well as failures of the network connections controlling the technical support systems. There are very few ways to prepare for induction problems. The use of fiber-optic networks can limit damage. To the knowledge of the authors, these are the first cases of lightning striking hospitals in medical literature.

  6. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  7. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  8. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  9. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  10. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  11. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  12. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  13. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  14. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  15. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  16. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  17. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  18. First-Strike Advantage: The United States’ Counter to China’s Preemptive Integrated Network Electronic Warfare Strategy

    Science.gov (United States)

    2013-06-01

    Security 35, no. 2 (2010): 25-26. 16 Gerson, “No First Use: The Next Step for U.S. Nuclear Policy,” 26. 17 Robert Gilpin hypothesizes that states...will only try to change the international system if the expected benefits exceed the expected costs. Robert Gilpin , War and Change in World Politics...International Security 35, no. 2 (2010/10/01 2010): 7-47. Gibson, William. Neuromancer. New York: Ace, 1984. Gilpin , Robert . War and Change in World

  19. [Management of the hunger strike in prison].

    Science.gov (United States)

    Fayeulle, Stéphanie; Renou, Frédéric; Protais, Emmanuel; Hédouin, Valéry; Wartel, Guillaume; Yvin, Jean-Luc

    2010-10-01

    Entering prison can feed pre-existent behavior of demands or generate them. Several means of expression are then used. Hunger strike is an average privileged act. It belongs to prison culture. Estimate how practitioners working in prison take care of the hunger strikers. The study, realised in 2008, was led with all the Units of Consultations and Ambulatory Care in France. It is a declarative investigation where a medical testimony by unit was asked. From 174 "maisons d'arrêt" and establishments for punishment in France, 95 answers were obtained. This situation was already seen by 98,8% of the doctors. The motives for hunger strike were mainly judicial for "maisons d'arrêt" (70,1%) and prison motives for detention centers (68,7%). Mainly, doctors opted for a neutral attitude (63% of the cases). The hunger strikes were mostly brief (less than a week in 85% of the cases). Only 5,5% of the doctors proposed written information concerning the risks incurred during a fast. A doctor in 4 approximately (23%) was already witness to complications due to fasting. The fact that a patient may refuse care makes the medical approach difficult. Faced with such a situation, 45% of the doctors privileged their duty of care, 28% respected the patient's wishes, and 27% did not pronounce. From a therapeutic point of view, the place of treatment using vitamins was rarely recognized (32,7%). Hunger strike is rarely severe, but it is rather frequent in prison so that every doctor working there will be confronted with it. The refeeding syndrome seems often ignored. The coverage of hunger strike is governed by the law, but ethical questions stay in the appreciation of every doctor. Copyright © 2010 Elsevier Masson SAS. All rights reserved.

  20. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  1. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  2. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  3. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  4. Gait Retraining From Rearfoot Strike to Forefoot Strike does not change Running Economy.

    Science.gov (United States)

    Roper, Jenevieve Lynn; Doerfler, Deborah; Kravitz, Len; Dufek, Janet S; Mermier, Christine

    2017-12-01

    Gait retraining is a method for management of patellofemoral pain, which is a common ailment among recreational runners. The present study investigated the effects of gait retraining from rearfoot strike to forefoot strike on running economy, heart rate, and respiratory exchange ratio immediately post-retraining and one-month post-retraining in recreational runners with patellofemoral pain. Knee pain was also measured. Sixteen participants (n=16) were randomly placed in the control (n=8) or experimental (n=8) group. A 10-minute treadmill RE test was performed by all subjects. The experimental group performed eight gait retraining running sessions where foot strike pattern was switched from rearfoot strike to forefoot strike, while the control group received no intervention. There were no significant differences for running economy (p=0.26), respiratory exchange ratio (p=0.258), or heart rate (p=0.248) between the groups. Knee pain reported on a visual analog scale was also significantly reduced (p<0.05) as a result of retraining. The present study demonstrates that retraining from rearfoot strike to forefoot strike did not affect running economy up to one-month post-retraining while reducing running-related patellofemoral pain. © Georg Thieme Verlag KG Stuttgart · New York.

  5. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  6. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  7. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  8. PSpice Model of Lightning Strike to a Steel Reinforced Structure

    International Nuclear Information System (INIS)

    Koone, Neil; Condren, Brian

    2003-01-01

    Surges and arcs from lightning can pose hazards to personnel and sensitive equipment, and processes. Steel reinforcement in structures can act as a Faraday cage mitigating lightning effects. Knowing a structure's response to a lightning strike allows hazards associated with lightning to be analyzed. A model of lightning's response in a steel reinforced structure has been developed using PSpice (a commercial circuit simulation). Segments of rebar are modeled as inductors and resistors in series. A program has been written to take architectural information of a steel reinforced structure and 'build' a circuit network that is analogous to the network of reinforcement in a facility. A severe current waveform (simulating a 99th percentile lightning strike), modeled as a current source, is introduced in the circuit network, and potential differences within the structure are determined using PSpice. A visual three-dimensional model of the facility displays the voltage distribution across the structure using color to indicate the potential difference relative to the floor. Clear air arcing distances can be calculated from the voltage distribution using a conservative value for the dielectric breakdown strength of air. Potential validation tests for the model will be presented

  9. Simulating lightning tests to radar system

    NARCIS (Netherlands)

    Blaj, M.A.; Buesink, Frederik Johannes Karel; Leferink, Frank Bernardus Johannes

    2010-01-01

    The risk of destruction due to lightning makes simulating the effects of lightning strikes a necessity. We modeled a radar enclosure and simulated the effect of a lightning strike. The results have been validated using full threat lightning current tests.

  10. ["Bell-striking" Saying of Acupuncture Therapy].

    Science.gov (United States)

    Zhao, Jing-Sheng

    2017-04-25

    As an analogy, a prototype of "bell-striking" is proposed in the present paper for exploring the basic properties, major elements, and potential mechanisms of acupuncture stimulation. On the strength of analysis on the physiological basis of acupuncture effect, several fundamental aspects of acupuncture are summarized as a) the body-surface stimulating characters, b) general and local effects, and c) triggering the auto-regulative function of the organism, which mimics the "bell-striking" response. Namely, when stroke, bell will chime, otherwise, chiming will not be heard. During analyzing special contents of acupuncture theory, its formative background should not be separated, and it is improper to take, modern medical theory of the human body as the guiding thinking way for researching the ancient Chinese medical literature.

  11. Central hyperadrenergic state after lightning strike.

    Science.gov (United States)

    Parsaik, Ajay K; Ahlskog, J Eric; Singer, Wolfgang; Gelfman, Russell; Sheldon, Seth H; Seime, Richard J; Craft, Jennifer M; Staab, Jeffrey P; Kantor, Birgit; Low, Phillip A

    2013-08-01

    To describe and review autonomic complications of lightning strike. Case report and laboratory data including autonomic function tests in a subject who was struck by lightning. A 24-year-old man was struck by lightning. Following that, he developed dysautonomia, with persistent inappropriate sinus tachycardia and autonomic storms, as well as posttraumatic stress disorder (PTSD) and functional neurologic problems. The combination of persistent sinus tachycardia and episodic exacerbations associated with hypertension, diaphoresis, and agitation was highly suggestive of a central hyperadrenergic state with superimposed autonomic storms. Whether the additional PTSD and functional neurologic deficits were due to a direct effect of the lightning strike on the central nervous system or a secondary response is open to speculation.

  12. Improving work conditions through strike: Examination of nurses' attitudes through perceptions of two physician strikes in Israel.

    Science.gov (United States)

    Gafni-Lachter, Liat; Admi, Hanna; Eilon, Yael; Lachter, Jesse

    2017-01-01

    Strikes are means to influence policies related to working conditions, yet raise ethical dilemmas for healthcare workers. Nurse strikes have become more prominent around the world. To assess the change in Israeli nurses' attitudes towards strikes in light of two physician strikes that have preceded a nursing strike. An anonymous survey was administered once in 2000 (N = 106) and again in 2011 (n = 175) following 110 days of a physician strike, to assess nurses' attitudes towards the strike and resulting ethical issues. A statistically significant change (p working conditions related to professional and public health agendas.

  13. Stress distribution of metatarsals during forefoot strike versus rearfoot strike: A finite element study.

    Science.gov (United States)

    Li, Shudong; Zhang, Yan; Gu, Yaodong; Ren, James

    2017-12-01

    Due to the limitations of experimental approaches, comparison of the internal deformation and stresses of the human man foot between forefoot and rearfoot landing is not fully established. The objective of this work is to develop an effective FE modelling approach to comparatively study the stresses and energy in the foot during forefoot strike (FS) and rearfoot strike (RS). The stress level and rate of stress increase in the Metatarsals are established and the injury risk between these two landing styles is evaluated and discussed. A detailed subject specific FE foot model is developed and validated. A hexahedral dominated meshing scheme was applied on the surface of the foot bones and skin. An explicit solver (Abaqus/Explicit) was used to stimulate the transient landing process. The deformation and internal energy of the foot and stresses in the metatarsals are comparatively investigated. The results for forefoot strike tests showed an overall higher average stress level in the metatarsals during the entire landing cycle than that for rearfoot strike. The increase rate of the metatarsal stress from the 0.5 body weight (BW) to 2 BW load point is 30.76% for forefoot strike and 21.39% for rearfoot strike. The maximum rate of stress increase among the five metatarsals is observed on the 1st metatarsal in both landing modes. The results indicate that high stress level during forefoot landing phase may increase potential of metatarsal injuries. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  15. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  16. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  17. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  18. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  19. How Drone Strikes and a Fake Vaccination Program Have Inhibited Polio Eradication in Pakistan: An Analysis of National Level Data.

    Science.gov (United States)

    Kennedy, Jonathan

    2017-10-01

    This article investigates whether the United States' counterinsurgency operations have inhibited polio eradication efforts in northwestern Pakistan, the world's last major reservoir of polio. Anecdotal evidence suggests that militants disrupt polio vaccination programs because of suspicions that campaigns are a cover for gathering intelligence on Central Intelligence Agency (CIA) drone targets. This paper analyzes national-level quantitative data to test this argument. Between 2004 and 2012, the number of polio cases in Pakistan closely mirrored the number of drone strikes. But from 2013 onward, polio cases increased while drone strikes fell. This can be explained by the CIA's use of a fake immunization campaign in a failed attempt to obtain the DNA of Osama bin Laden's relatives prior to his assassination in 2011. This seemingly vindicated militants' suspicions that vaccination programs were a cover for espionage. Militants consequently intensified their disruption of immunization campaigns, resulting in an increase in polio cases in Pakistan, as well as in Afghanistan, Syria, and Iraq. For politicians and military planners, drones are attractive because they are said to harm fewer civilians than conventional methods of warfare. However, this paper demonstrates that drone strikes had negative effects on the well-being of civilians in Pakistan and further afield because they undermined global efforts to eradicate polio.

  20. A numerical model for bird strike on sidewall structure of an aircraft nose

    Directory of Open Access Journals (Sweden)

    Liu Jun

    2014-06-01

    Full Text Available In order to examine the potential of using the coupled smooth particles hydrodynamic (SPH and finite element (FE method to predict the dynamic responses of aircraft structures in bird strike events, bird-strike tests on the sidewall structure of an aircraft nose are carried out and numerically simulated. The bird is modeled with SPH and described by the Murnaghan equation of state, while the structure is modeled with finite elements. A coupled SPH–FE method is developed to simulate the bird-strike tests and a numerical model is established using a commercial software PAM-CRASH. The bird model shows no signs of instability and correctly modeled the break-up of the bird into particles. Finally the dynamic response such as strains in the skin is simulated and compared with test results, and the simulated deformation and fracture process of the sidewall structure is compared with images recorded by a high speed camera. Good agreement between the simulation results and test data indicates that the coupled SPH–FE method can provide a very powerful tool in predicting the dynamic responses of aircraft structures in events of bird strike.

  1. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  2. Acute transient hemiparesis induced by lightning strike.

    Science.gov (United States)

    Rahmani, Seyed Hesam; Faridaalaee, Gholamreza; Jahangard, Samira

    2015-07-01

    According to data from the National Oceanic and Atmospheric Administration,in the years from 1959 to 1994, lightning was responsible for more than 3000 deaths and nearly 10,000 casualties. The most important characteristic features of lightning injuries are multisystem involvement and widely variable severity. Lightning strikes are primarily a neurologic injury that affects all 3 components of the nervous system: central, autonomic,and peripheral. Neurologic complications of lightning strikes vary from transient benign symptoms to permanent disability. Many patients experience a temporary paralysis called keraunoparalysis. Here we reported a 22-year-old mountaineer man with complaining of left sided hemiparesis after being hit by a lightning strike in the mountain 3 hours ago. There was no loss of consciousness at hitting time. On arrival the patient was alert, awake and hemodynamically stable. In neurologic examination cranial nerves were intact, left sided upper and lower extremity muscle force was I/V with a combination of complete sensory loss, and right-sided muscle force and sensory examination were normal. There is not any evidence of significant vascular impairment in the affected extremities. Brain MRI and CT scan and cervical MRI were normal. During 2 days of admission, with intravenous hydration, heparin 5000 unit SC q12hr and physical therapy of the affected limbs, motor and sensory function improved and was normal except mild paresthesia. He was discharged 1 day later for outpatient follow up while vitamin B1 100mg orally was prescribed.Paresthesia improved after 3 days without further sequels.

  3. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  4. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  5. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  6. Lightning strike-induced brachial plexopathy

    Directory of Open Access Journals (Sweden)

    Amita N Bhargava

    2014-01-01

    Full Text Available We describe a patient who presented with a history of lightning strike injury. Following the injury, he sustained acute right upper limb weakness with pain. Clinically, the lesion was located to the upper and middle trunk of the right brachial plexus, and the same confirmed with electrophysiological studies. Nerve damage due to lightning injuries is considered very rare, and a plexus damage has been described infrequently, if ever. Thus, the proposed hypothesis that lightning rarely causes neuropathy, as against high-voltage electric current, due to its shorter duration of exposure not causing severe burns which lead to nerve damage, needs to be reconsidered.

  7. Strike-slip tectonics during rift linkage

    Science.gov (United States)

    Pagli, C.; Yun, S. H.; Ebinger, C.; Keir, D.; Wang, H.

    2017-12-01

    The kinematics of triple junction linkage and the initiation of transforms in magmatic rifts remain debated. Strain patterns from the Afar triple junction provide tests of current models of how rifts grow to link in area of incipient oceanic spreading. Here we present a combined analysis of seismicity, InSAR and GPS derived strain rate maps to reveal that the plate boundary deformation in Afar is accommodated primarily by extensional tectonics in the Red Sea and Gulf of Aden rifts, and does not require large rotations about vertical axes (bookshelf faulting). Additionally, models of stress changes and seismicity induced by recent dykes in one sector of the Afar triple junction provide poor fit to the observed strike-slip earthquakes. Instead we explain these patterns as rift-perpendicular shearing at the tips of spreading rifts where extensional strains terminate against less stretched lithosphere. Our results demonstrate that rift-perpendicular strike-slip faulting between rift segments achieves plate boundary linkage during incipient seafloor spreading.

  8. The initiation and linkage of surface fractures above a buried strike ...

    Indian Academy of Sciences (India)

    In nature, these set ups roughly simulate a major strike slip basement fault system with a package of sedimentary rocks deforming by basement-induced wrenching and/or transpression. Models were made up of clay mixed with water in the ratio 3:1. Approximate undrained shear strength of the clay paste was around 2 KPa ...

  9. Bird strike incidence at Addis Ababa Bole International Airport ...

    African Journals Online (AJOL)

    The time and rate of bird strike incidences, species composition and number of birds involved in strikes, and the behaviour of birds were recorded at Bole International Airport from December 1994 to December 1995. The gut contents of the birds struck by aircraft were analyzed. A total of 33 bird strikes were recorded during ...

  10. Evaluating the Effects of a Bird Strike Advisory System

    NARCIS (Netherlands)

    Metz, I.C.; Mühlhausen, T; Ellerbroek, J.; Hoekstra, J.M.

    2016-01-01

    Bird strikes have operational impacts and cause economic loss to the aviation industry. In the worst case, the damages resulting from bird strikes lead to crashes. The highest risk for bird strikes lies in the area below 3000 ft and thus mainly in airport environments. Despite intense efforts from

  11. effects of strike cost on economic development in nigeria

    African Journals Online (AJOL)

    USER

    productivity as in most cases strike cost (wages and salaries as well as other unavoidable payments) are paid during the .... Many times the Nigeria Labour Congress (NLC) and students have had to strike against ... the direct compensation package and other conditions of service. This is the most popular cause of strike in ...

  12. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  13. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  14. Forward to the Past: Strikes and Striking as Dialogue by other ...

    African Journals Online (AJOL)

    In Nigeria, from the colonial period to the present, the employment of strikes and protests by nationalists, Nigerian workers and civil society groups has been established as one of the potent means of conveying viewpoints, positions as well as the demand for equality, fairness, social justice and reforms. It has been used as ...

  15. Simulations

    CERN Document Server

    Ngada, Narcisse

    2015-06-15

    The complexity and cost of building and running high-power electrical systems make the use of simulations unavoidable. The simulations available today provide great understanding about how systems really operate. This paper helps the reader to gain an insight into simulation in the field of power converters for particle accelerators. Starting with the definition and basic principles of simulation, two simulation types, as well as their leading tools, are presented: analog and numerical simulations. Some practical applications of each simulation type are also considered. The final conclusion then summarizes the main important items to keep in mind before opting for a simulation tool or before performing a simulation.

  16. Technology, Effects and Doctrines of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1981-01-01

    The development and the status of the nuclear weapons systems and of the systems for their delivery are explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategic doctrines for winning rather than preventing nuclear war have come to the foreground. Plans for the tactical first-use of nuclear weapons have been accepted. Alternatively, the retaliation capacity of the opponent could be destroyed by surprise attack - The First Strike. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. This applies especially to a First Strike situation. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme ease, decisions may be left entirely to machines, and men would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. Solutions for the principal problem of the world, war or peace, cannot be found On the level of technology, but only on that of practical policy of detente, disarmament, collaboration and reconciliation. (author)

  17. Influence of strike object grounding on close lightning electric fields

    Science.gov (United States)

    Baba, Yoshihiro; Rakov, Vladimir A.

    2008-06-01

    Using the finite difference time domain (FDTD) method, we have calculated vertical electric field Ez, horizontal (radial) electric field Eh, and azimuthal magnetic field Hϕ produced on the ground surface by lightning strikes to 160-m- and a 553-m-high conical strike objects representing the Peissenberg tower (Germany) and the CN Tower (Canada), respectively. The fields were computed for a typical subsequent stroke at distances d' from the bottom of the object ranging from 5 to 100 m for the 160-m tower and from 10 to 300 m for the 553-m tower. Grounding of the 160-m object was assumed to be accomplished by its underground basement represented by a 10-m-radius and 8-m-long perfectly conducting cylinder with or without a reference ground plane located 2 m below. The reference ground plane simulates, to some extent, a higher-conducting ground layer that is expected to exist below the water table. The configuration without reference ground plane actually means that this plane is present, but is located at an infinitely large depth. Grounding of the 553-m object was modeled in a similar manner but in the absence of reference ground plane only. In all cases considered, waveforms of Eh and Hϕ are not much influenced by the presence of strike object, while waveforms of Ez are. Waveforms of Ez are essentially unipolar (as they are in the absence of strike object) when the ground conductivity σ is 10 mS/m (the equivalent transient grounding impedance is several ohms) or greater. Thus, for the CN Tower, for which σ ≥ 10 mS/m, the occurrence of Ez polarity change is highly unlikely. For the 160-m tower and for σ = 1 and 0.1 mS/m, waveforms of Ez become bipolar (exhibit polarity change) at d' ≤ 10 m and d' ≤ 50 m, respectively, regardless of the presence of the reference ground plane. The corresponding equivalent transient grounding impedances are about 30 and 50 Ω in the absence of the reference ground plane and smaller than 10 Ω in the presence of the reference

  18. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  19. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  20. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  1. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  2. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  3. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  4. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  5. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  6. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  7. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  8. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  9. Concussion in professional football: biomechanics of the striking player--part 8.

    Science.gov (United States)

    Viano, David C; Pellman, Elliot J

    2005-02-01

    Concussive impacts in professional football were simulated in laboratory tests to determine the collision mechanics resulting in injury to the struck player and the biomechanics of the striking players, who were not concussed or neck-injured in the tackle. Twenty-seven helmet-to-helmet collisions were reconstructed in laboratory tests using Hybrid III dummies. The head impact velocity, direction, and kinematics matched game video. Translational and rotational head accelerations and six-axis upper neck loads and moments were used to evaluate how the striking player delivered the concussive blow. The neck injury criterion, Nij, was calculated to assess neck injury risks in the striking player. The time-averaged impact force reached 6372 +/- 2486 N at 7.2 milliseconds because of 46.8 +/- 21.7 g head acceleration and 3624 +/- 1729 N neck compression force in the striking player. Fifty-seven percent of the load was contributed by neck compression. The striking players had their heads down and lined up the impact axis through their necks and torsos. This allowed momentum transfer with minimal neck bending and increased the effective mass of the striking player to 1.67 times that of the struck player at peak load. The impact caused 94.3 +/- 27.5 g head acceleration in the concussed players and 67.9 +/- 14.5 g without concussion (t = 2.06, df = 25, P = 0.025). The striking player's Nij was greater than tolerance in 9 of 27 cases by exceeding the 4000 N neck compression limit. For these cases, the average neck compression force was 6631 +/- 977 N (range, 5210-8194 N). Nij was 1.25 +/- 0.16 for eight cases above the tolerance Nij = 1.0. In the NFL, striking players line up their heads, necks, and torsos to deliver maximum force to the other player in helmet-to-helmet impacts. The concussive force is from acceleration of the striking player's head and torso load through the neck. Even though neck responses exceeded tolerances, no striking player experienced neck injury or

  10. Geological Effects on Lightning Strike Distributions

    KAUST Repository

    Berdahl, J. Scott

    2016-05-16

    Recent advances in lightning detection networks allow for detailed mapping of lightning flash locations. Longstanding rumors of geological influence on cloud-to-ground (CG) lightning distribution and recent commercial claims based on such influence can now be tested empirically. If present, such influence could represent a new, cheap and efficient geophysical tool with applications in mineral, hydrothermal and oil exploration, regional geological mapping, and infrastructure planning. This project applies statistical analysis to lightning data collected by the United States National Lightning Detection Network from 2006 through 2015 in order to assess whether the huge range in electrical conductivities of geological materials plays a role in the spatial distribution of CG lightning. CG flash densities are mapped for twelve areas in the contiguous United States and compared to elevation and geology, as well as to the locations of faults, railroads and tall towers including wind turbines. Overall spatial randomness is assessed, along with spatial correlation of attributes. Negative and positive polarity lightning are considered separately and together. Topography and tower locations show a strong influence on CG distribution patterns. Geology, faults and railroads do not. This suggests that ground conductivity is not an important factor in determining lightning strike location on scales larger than current flash location accuracies, which are generally several hundred meters. Once a lightning channel is established, however, ground properties at the contact point may play a role in determining properties of the subsequent stroke.

  11. Collective bargaining and strikes among physicians.

    Science.gov (United States)

    Keith, S N

    1984-11-01

    UNLIKE EMPLOYEES IN OTHER SECTORS OF THE ECONOMY, HEALTH CARE WORKERS ARE DIRECTED TOWARD ONE ULTIMATE GOAL: making people well and keeping them healthy. The development of collective bargaining and union activities during this century has had a great impact on all industries in the United States and the western world. However, only in recent years have workers in the health care sector been affected by the organized labor movement. The history of collective bargaining and strikes among physicians, the key decision-makers in the health care sector, is even more recent. Because of their central position, physicians' collective activity has had and will continue to have tremendous implications for the viability of the present health care system and the quality of patient care. Even though most physicians continue to function as individual, entrepreneurial service providers and "professionals," physicians as a group are more frequently being seen as members of a utility like industry. Their importance to individuals and society as a whole, it can be argued, is second to none; if physicians refuse to work there can be no worse set of outcomes. To estimate the potential future impact of growing collective action on the part of physicians, this article explores the general historical developments.

  12. Absolute probability estimates of lethal vessel strikes to North Atlantic right whales in Roseway Basin, Scotian Shelf.

    Science.gov (United States)

    van der Hoop, Julie M; Vanderlaan, Angelia S M; Taggart, Christopher T

    2012-10-01

    Vessel strikes are the primary source of known mortality for the endangered North Atlantic right whale (Eubalaena glacialis). Multi-institutional efforts to reduce mortality associated with vessel strikes include vessel-routing amendments such as the International Maritime Organization voluntary "area to be avoided" (ATBA) in the Roseway Basin right whale feeding habitat on the southwestern Scotian Shelf. Though relative probabilities of lethal vessel strikes have been estimated and published, absolute probabilities remain unknown. We used a modeling approach to determine the regional effect of the ATBA, by estimating reductions in the expected number of lethal vessel strikes. This analysis differs from others in that it explicitly includes a spatiotemporal analysis of real-time transits of vessels through a population of simulated, swimming right whales. Combining automatic identification system (AIS) vessel navigation data and an observationally based whale movement model allowed us to determine the spatial and temporal intersection of vessels and whales, from which various probability estimates of lethal vessel strikes are derived. We estimate one lethal vessel strike every 0.775-2.07 years prior to ATBA implementation, consistent with and more constrained than previous estimates of every 2-16 years. Following implementation, a lethal vessel strike is expected every 41 years. When whale abundance is held constant across years, we estimate that voluntary vessel compliance with the ATBA results in an 82% reduction in the per capita rate of lethal strikes; very similar to a previously published estimate of 82% reduction in the relative risk of a lethal vessel strike. The models we developed can inform decision-making and policy design, based on their ability to provide absolute, population-corrected, time-varying estimates of lethal vessel strikes, and they are easily transported to other regions and situations.

  13. Children on hunger strike: child abuse or legitimate protest?

    Science.gov (United States)

    Mok, A.; Nelson, E. A.; Murphy, J.; Hampson, A.; Hendriks, J. H.

    1996-01-01

    The issue of children on hunger strike (voluntary total fasting) has not been reported before. The World Medical Association Declaration of Tokyo 1975 and the Declaration of Malta 1991 (revised 1992) provide clinicians with guidelines for the management of adult patients on hunger strike but do not mention children. We report the management of 14 Vietnamese children, aged 1 to 12 years, who took part in a hunger strike at a refugee detention centre in Hong Kong. PMID:8597690

  14. Children on hunger strike: child abuse or legitimate protest?

    OpenAIRE

    Mok, A.; Nelson, E. A.; Murphy, J.; Hampson, A.; Hendriks, J. H.

    1996-01-01

    The issue of children on hunger strike (voluntary total fasting) has not been reported before. The World Medical Association Declaration of Tokyo 1975 and the Declaration of Malta 1991 (revised 1992) provide clinicians with guidelines for the management of adult patients on hunger strike but do not mention children. We report the management of 14 Vietnamese children, aged 1 to 12 years, who took part in a hunger strike at a refugee detention centre in Hong Kong.

  15. The effect of hand dominance on martial arts strikes.

    Science.gov (United States)

    Neto, Osmar Pinto; Silva, Jansen Henrique; Marzullo, Ana Carolina de Miranda; Bolander, Richard P; Bir, Cynthia A

    2012-08-01

    The main goal of this study was to compare dominant and non-dominant martial arts palm strikes under different circumstances that usually happen during martial arts and combative sports applications. Seven highly experienced (10±5 years) right hand dominant Kung Fu practitioners performed strikes with both hands, stances with left or right lead legs, and with the possibility or not of stepping towards the target (moving stance). Peak force was greater for the dominant hand strikes (1593.76±703.45 N vs. 1042.28±374.16 N; p<.001), whereas no difference was found in accuracy between the hands (p=.141). Additionally, peak force was greater for the strikes with moving stance (1448.75±686.01 N vs. 1201.80±547.98 N; p=.002) and left lead leg stance (1378.06±705.48 N vs. 1269.96±547.08 N). Furthermore, the difference in peak force between strikes with moving and stationary stances was statistically significant only for the strikes performed with a left lead leg stance (p=.007). Hand speed was higher for the dominant hand strikes (5.82±1.08 m/s vs. 5.24±0.78 m/s; p=.001) and for the strikes with moving stance (5.79±1.01 m/s vs. 5.29±0.90 m/s; p<.001). The difference in hand speed between right and left hand strikes was only significant for strikes with moving stance. In summary, our results suggest that the stronger palm strike for a right-handed practitioner is a right hand strike on a left lead leg stance moving towards the target. Copyright © 2011 Elsevier B.V. All rights reserved.

  16. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  17. Debunking the viper's strike: harmless snakes kill a common assumption.

    Science.gov (United States)

    Penning, David A; Sawvel, Baxter; Moon, Brad R

    2016-03-01

    To survive, organisms must avoid predation and acquire nutrients and energy. Sensory systems must correctly differentiate between potential predators and prey, and elicit behaviours that adjust distances accordingly. For snakes, strikes can serve both purposes. Vipers are thought to have the fastest strikes among snakes. However, strike performance has been measured in very few species, especially non-vipers. We measured defensive strike performance in harmless Texas ratsnakes and two species of vipers, western cottonmouths and western diamond-backed rattlesnakes, using high-speed video recordings. We show that ratsnake strike performance matches or exceeds that of vipers. In contrast with the literature over the past century, vipers do not represent the pinnacle of strike performance in snakes. Both harmless and venomous snakes can strike with very high accelerations that have two key consequences: the accelerations exceed values that can cause loss of consciousness in other animals, such as the accelerations experienced by jet pilots during extreme manoeuvres, and they make the strikes faster than the sensory and motor responses of mammalian prey and predators. Both harmless and venomous snakes can strike faster than the blink of an eye and often reach a target before it can move. © 2016 The Author(s).

  18. Strong Algerian Earthquake Strikes Near Capital City

    Science.gov (United States)

    Ayadi, A.; Maouche, S.; Harbi, A.; Meghraoui, M.; Beldjoudi, H.; Oussadou, F.; Mahsas, A.; Benouar, D.; Heddar, A.; Rouchiche, Y.; Kherroubi, A.; Frogneux, M.; Lammali, K.; Benhamouda, F.; Sebaï, A.; Bourouis, S.; Alasset, P. J.; Aoudia, A.; Cakir, Z.; Merahi, M.; Nouar, O.; Yelles, A.; Bellik, A.; Briole, P.; Charade, O.; Thouvenot, F.; Semane, F.; Ferkoul, A.; Deramchi, A.; Haned, S. A.

    On 21 May 2003, a damaging earthquake of Mw 6.8 struck the region of Boumerdes 40 km east of Algiers in northern Algeria (Figure 1). The mainshock, which lasted ~ 36-40 s, had devastating effects and claimed about 2300 victims, caused more than 11,450 injuries, and left about 200,000 people homeless. It destroyed and seriously damaged around 180,000 housing units and 6000 public buildings with losses estimated at $5 billion. The mainshock was widely felt within a radius of ~ 400 km in Algeria. To the north, the earthquake was felt in southeastern Spain, including the Balearic Islands, and also in Sardinia and in southern France. The mainshock location, which was calculated at 36.91°N, 3.58°E (15 km offshore of Zemmouri; Figure 1), and the local magnitude (Md 6.4) are from seismic records of local stations. International seismological centers obtained Mw 6.8 (NEIC) with a thrust focal mechanism solution and 1.83 × 1026 dyne.cm for the seismic moment. A sequence of aftershocks affected the epicentral area with two strong shocks reaching Mw 5.8 on 27 and 29 May 2003. Field investigations allowed us to assign a maximum intensity X (European Macroseismic Scale 98) and to report rockfalls, minor surface cracks, and liquefaction phenomena. The mainshock was not associated with inland surface faulting, but one of the most striking coseismic effects is the coastal uplift and the backwash along the littoral of the Mitidja basin.

  19. Incorporating Ensemble-based Probabilistic Forecasts into a Campaign Simulation in the Weather Impact Assessment Tool (WIAT)

    Science.gov (United States)

    2010-06-01

    STW Strike Warfare UAV Unmanned Aerial Vehicle VBA Visual Basic for Applications WIAT Weather Impact Assessment Tool WIAT* Weather Impact...increased budget and research resources will be devoted to the continued development of probabilistic forecasting techniques and products. Deterministic...managing resources . The ability of the forecaster to accurately predict the most likely evolution of weather parameters and to communicate a qualitative

  20. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  1. A decade of U.S. Air Force bat strikes

    Science.gov (United States)

    Peurach, Suzanne C.; Dove, Carla J.; Stepko, Laura

    2009-01-01

    From 1997 through 2007, 821 bat strikes were reported to the U.S. Air Force (USAF) Safety Center by aircraft personnel or ground crew and sent to the National Museum of Natural History, Smithsonian Institution, for identification. Many samples were identified by macroscopic and or microscopic comparisons with bat specimens housed in the museum and augmented during the last 2 years by DNA analysis. Bat remains from USAF strikes during this period were received at the museum from 40 states in the United States and from 20 countries. We confirmed that 46% of the strikes were caused by bats, but we did not identify them further; we identified 5% only to the family or genus level, and 49% to the species level. Fifty-five of the 101 bat-strike samples submitted for DNA analysis have been identified to the species level. Twenty-five bat species have been recorded striking USAF planes worldwide. The Brazilian free-tailed bat (Tadarida brasiliensis; n = 173) is the species most commonly identified in USAF strike impacts, followed by the red bat (Lasiurus borealis; n = 83). Bat strikes peak during the spring and fall, with >57% occurring from August through October; 82% of the reports that included time of strike were recorded between 2100 and 0900 hours. More than 12% of the bat strikes were reported at >300 m above ground level (AGL). Although $825,000 and >50% of this sum was attributable to 5 bat-strike incidents. Only 5 bats from the 10 most damaging bat strikes were identified to the species level, either because we did not receive remains with the reports or the sample was insufficient for identification.

  2. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  3. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  4. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  5. Reporting the Great Railroad Strike: How Ideology Shaped the News.

    Science.gov (United States)

    Coward, John

    The Great Railroad Strike of 1877, a national catastrophe and the major news story of the year, was the first national labor strike in U.S. history. Because of the ideological bias of the press, specifically its implicit commitment to capitalism and to objectivity (itself a "myth" of social order), newspapers of the period could be…

  6. The public's attitude towards strike action by healthcare workers and ...

    African Journals Online (AJOL)

    The strength of the associations was determined by Cramer's V. Results. Results revealed strong opinions among the population regarding strikes, numerous misapprehensions when it comes to striking and rights, a poor awareness of other healthcare-related rights and the perception of poor treatment at public hospitals.

  7. Teaching Striking Skills in Elementary Physical Education Using Woodball

    Science.gov (United States)

    Chang, Seung Ho; Lee, Jihyun

    2017-01-01

    Object control (OC) skills are a part of fundamental motor skills and basic functional skills, which work as a prerequisite to becoming a skilled performer in many sports. Of various OC skills, striking is one of the most difficult to master due to a variety of interrelated movement components. A form of vertical or underarm striking is a more…

  8. LAW AND ETHICS OF STRIKES IN THE NIGERIAN HEALTH SYSTEM

    African Journals Online (AJOL)

    2014-10-06

    Oct 6, 2014 ... employment. Kidnapping has been affecting virtually every sector of the Nigerian economy. Thus it is not the right of any health worker to embark on strike. Rather the right to strike can be derived from the principle of collective bargaining, which according to Ahmed (2014) is an essential principle. Workers ...

  9. Ban on right to strike by police challenged

    NARCIS (Netherlands)

    Grünell, M.

    2008-01-01

    After months of negotiation between the police force and the minister of the interior on the renewal of the collective agreement, the police trade unions began threatening industrial action and strikes in December 2007. The courts were divided on the issue, with some ruling out strikes as a means of

  10. Martial arts striking hand peak acceleration, accuracy and consistency.

    Science.gov (United States)

    Neto, Osmar Pinto; Marzullo, Ana Carolina De Miranda; Bolander, Richard P; Bir, Cynthia A

    2013-01-01

    The goal of this paper was to investigate the possible trade-off between peak hand acceleration and accuracy and consistency of hand strikes performed by martial artists of different training experiences. Ten male martial artists with training experience ranging from one to nine years volunteered to participate in the experiment. Each participant performed 12 maximum effort goal-directed strikes. Hand acceleration during the strikes was obtained using a tri-axial accelerometer block. A pressure sensor matrix was used to determine the accuracy and consistency of the strikes. Accuracy was estimated by the radial distance between the centroid of each subject's 12 strikes and the target, whereas consistency was estimated by the square root of the 12 strikes mean squared distance from their centroid. We found that training experience was significantly correlated to hand peak acceleration prior to impact (r(2)=0.456, p =0.032) and accuracy (r(2)=0. 621, p=0.012). These correlations suggest that more experienced participants exhibited higher hand peak accelerations and at the same time were more accurate. Training experience, however, was not correlated to consistency (r(2)=0.085, p=0.413). Overall, our results suggest that martial arts training may lead practitioners to achieve higher striking hand accelerations with better accuracy and no change in striking consistency.

  11. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  12. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  13. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  14. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  15. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  16. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  17. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  18. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  19. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  20. Risk Considerations of Bird Strikes to Space Launch Vehicles

    Science.gov (United States)

    Hales, Christy; Ring, Robert

    2016-01-01

    Within seconds after liftoff of the Space Shuttle during mission STS-114, a turkey vulture impacted the vehicle's external tank. The contact caused no apparent damage to the Shuttle, but the incident led NASA to consider the potential consequences of bird strikes during a Shuttle launch. The environment at Kennedy Space Center provides unique bird strike challenges due to the Merritt Island National Wildlife Refuge and the Atlantic Flyway bird migration routes. NASA is currently refining risk assessment estimates for the probability of bird strike to space launch vehicles. This paper presents an approach for analyzing the risks of bird strikes to space launch vehicles and presents an example. The migration routes, types of birds present, altitudes of those birds, exposed area of the launch vehicle, and its capability to withstand impacts affect the risk due to bird strike. A summary of significant risk contributors is discussed.

  1. Power electromagnetic strike machine for engineering-geological surveys

    Science.gov (United States)

    Usanov, K. M.; Volgin, A. V.; Chetverikov, E. A.; Kargin, V. A.; Moiseev, A. P.; Ivanova, Z. I.

    2017-10-01

    When implementing the processes of dynamic sensing of soils and pulsed nonexplosive seismic exploration, the most common and effective method is the strike one, which is provided by a variety of structure and parameters of pneumatic, hydraulic, electrical machines of strike action. The creation of compact portable strike machines which do not require transportation and use of mechanized means is important. A promising direction in the development of strike machines is the use of pulsed electromagnetic actuator characterized by relatively low energy consumption, relatively high specific performance and efficiency, and providing direct conversion of electrical energy into mechanical work of strike mass with linear movement trajectory. The results of these studies allowed establishing on the basis of linear electromagnetic motors the electromagnetic pulse machines with portable performance for dynamic sensing of soils and land seismic pulse of small depths.

  2. Wavelet transform analysis of electromyography kung fu strikes data.

    Science.gov (United States)

    Neto, Osmar Pinto; Marzullo, Ana Carolina de Miranda

    2009-11-01

    In martial arts and contact sports strikes are performed at near maximum speeds. For that reason, electromyography (EMG) analysis of such movements is non-trivial. This paper has three main goals: firstly, to investigate the differences in the EMG activity of muscles during strikes performed with and without impacts; secondly, to assess the advantages of using Sum of Significant Power (SSP) values instead of root mean square (rms) values when analyzing EMG data; and lastly to introduce a new method of calculating median frequency values using wavelet transforms (WMDF). EMG data of the deltoid anterior (DA), triceps brachii (TB) and brachioradialis (BR) muscles were collected from eight Kung Fu practitioners during strikes performed with and without impacts. SSP results indicated significant higher muscle activity (p = 0.023) for the strikes with impact. WMDF results, on the other hand, indicated significant lower values (p = 0. 007) for the strikes with impact. SSP results presented higher sensitivity than rms to quantify important signal differences and, at the same time, presented lower inter-subject coefficient of variations. The result of increase in SSP values and decrease in WMDF may suggest better synchronization of motor units for the strikes with impact performed by the experienced Kung Fu practitioners. Key PointsThe results show higher muscle activity and lower electromyography median frequencies for strikes with impact compared to strikes without.SSP results presented higher sensitivity and lower inter-subject coefficient of variations than rms results.Kung Fu palm strikes with impact may present better motor units' synchronization than strikes without.

  3. Cyber Capabilities for Global Strike in 2035

    Science.gov (United States)

    2012-02-15

    Wallace, Benjamin. “The Rise and Fall of Bitcoin .” Wired, December 2011. Walter, Chip. “Kryder’s Law.” Scientific American, 25 July 2005, available...2011, when a hacker broke into the “ bitcoin ” virtual currency exchange based in Tokyo and spoofed the system by simulating a massive sell-off...driving the exchange rate toward zero, and allowing him to acquire 2,000 bitcoins (worth over $40,000 at the time) for virtually nothing. See: Benjamin

  4. Strikes by physicians: a historical perspective toward an ethical evaluation.

    Science.gov (United States)

    Thompson, Stephen L; Salmon, J Warren

    2006-01-01

    Current conditions surrounding the house of medicine-including corporate and government cost-containment strategies, increasing market-penetration schemes in health care, along with clinical scrutiny and the administrative control imposed under privatization by managed care firms, insurance companies, and governments-have spurred an upsurge in physician unionization, which requires a revisiting of the issue of physician strikes. Strikes by physicians have been relatively rare events in medical history. When they have occurred, they have aroused intense debate over their ethical justification among professionals and the public alike, notwithstanding what caused the strikes. As physicians and other health care providers increasingly find employment within organizations as wage-contract employees and their work becomes more highly rationalized, more physicians will join labor organizations to protect both their economic and their professional interests. As a result, these physicians will have to come to terms with the use of the strike weapon. On the surface, many health care strikes may not ever seem justifiable, but in certain defined situations a strike would be not only permissible but an ethical imperative. With an exacerbation of labor strife in the health sector in many nations, it is crucial to explore the question of what constitutes an ethical physician strike.

  5. Determine the Foot Strike Pattern Using Inertial Sensors

    Directory of Open Access Journals (Sweden)

    Tzyy-Yuang Shiang

    2016-01-01

    Full Text Available From biomechanical point of view, strike pattern plays an important role in preventing potential injury risk in running. Traditionally, strike pattern determination was conducted by using 3D motion analysis system with cameras. However, the procedure is costly and not convenient. With the rapid development of technology, sensors have been applied in sport science field lately. Therefore, this study was designed to determine the algorithm that can identify landing strategies with a wearable sensor. Six healthy male participants were recruited to perform heel and forefoot strike strategies at 7, 10, and 13 km/h speeds. The kinematic data were collected by Vicon 3D motion analysis system and 2 inertial measurement units (IMU attached on the dorsal side of both shoes. The data of each foot strike were gathered for pitch angle and strike index analysis. Comparing the strike index from IMU with the pitch angle from Vicon system, our results showed that both signals exhibited highly correlated changes between different strike patterns in the sagittal plane (r=0.98. Based on the findings, the IMU sensors showed potential capabilities and could be extended beyond the context of sport science to other fields, including clinical applications.

  6. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  7. Strike action by nurses in South Africa: A value clarification

    Directory of Open Access Journals (Sweden)

    Marie Muller

    2001-09-01

    Full Text Available The Labour Relations Act (South Africa, 1991 made provision for protected strike action by employees, subject to certain conditions, procedures and negotiated agreements. This led to the removal of the strike clause in the Nursing Act (South Africa, 1992. The labour rights of all citizens are entrenched in the Constitution of the country (South Africa, 1996. Participation in strike action by the nurse/ midwife, regardless of the legal requirements and specifications, does, however, pose an ethical question. It is therefore necessary to conduct a value clarification on strike action by nurses in South Africa. The purpose of this research is to explore and describe the perceived values of participants from an accessible population on this phenomenon. A qualitative, exploratory and descriptive research design was deployed. The perceived values of nurses on strike action were collected by means of an openended questionnaire/sketch. Over a period of three years a purposive and convenient sampling method was used, involving all the enrolled post basic nursing/midwifery students/ learners at a particular Nursing Education Institution. The justification of the sample was further enhanced by also collecting data on the participants’ age and provincial distribution location. Although a 63% sample realisation (of the accessible population was achieved, this represents only 1,5% of the registered nursing/midwifery population in the country. A descriptive analysis of the participants’ age and provincial distribution was undertaken, as well as a content analysis of their perceived values on strike action. The mean age of the participants was 48 years, which could be attributed to the fact that most of them were enrolled for a post-basic Diploma in Community Nursing Science. Most of the responses (52,7% were against strike action and 32,5% supported strike action by nurses as a constitutional and legal right. A fairly substantial number of participants (14

  8. "Thunderstruck": penetrating thoracic injury from lightning strike.

    Science.gov (United States)

    van Waes, Oscar J F; van de Woestijne, Pieter C; Halm, Jens A

    2014-04-01

    Lightning strike victims are rarely presented at an emergency department. Burns are often the primary focus. This case report describes the improvised explosive device like-injury to the thorax due to lightning strike and its treatment, which has not been described prior in (kerauno)medicine. Penetrating injury due to blast from lightning strike is extremely rare. These "shrapnel" injuries should however be ruled out in all patients struck by lightning. Copyright © 2013 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  9. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  10. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  11. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  12. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  13. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  14. Simulation

    DEFF Research Database (Denmark)

    Gould, Derek A; Chalmers, Nicholas; Johnson, Sheena J

    2012-01-01

    Recognition of the many limitations of traditional apprenticeship training is driving new approaches to learning medical procedural skills. Among simulation technologies and methods available today, computer-based systems are topical and bring the benefits of automated, repeatable, and reliable...... performance assessments. Human factors research is central to simulator model development that is relevant to real-world imaging-guided interventional tasks and to the credentialing programs in which it would be used....

  15. The “Surgical” Legitimacy of Drone Strikes? Issues of Sovereignty and Human Rights in the Use of Unmanned Aerial Systems in Pakistan

    Directory of Open Access Journals (Sweden)

    Alcides Eduardo dos Reis Peron

    2014-12-01

    Full Text Available The Revolution in Military Affairs had an important role in providing the United States Armed Forces the technical instruments necessary to conduct high-risky operations in the context of Irregular Warfare. The development of these instruments, such as Unmanned Aerial Vehicles (UAV, allowed the emergence of a discourse of surgical and lean wars by the George W. Bush and Barack Obama administrations, whose legitimacy of the interventions were related to the accuracy and technical superiority of the UAVs. Focusing in the case of the U.S. drone strikes in Pakistan, this article seeks to debate the legal limits of the employment of these instruments. Despite the supposed accuracy and visual capacity of the UAVs, we argue that there are several information on the deaths of civilians, and legal limitations in the International Humanitarian Law, that constrain the employment of this instrument, and illegitimate the argument of surgical war.

  16. Air Force B-21 Long Range Strike Bomber

    Science.gov (United States)

    2016-04-14

    go.usa.gov/cswxQ. 3 The other top priorities, as enunciated by Air Force officials on many occasions, are the F-35A Lightning II fighter and the KC-46A...concept of large aircraft carrying long-range weaponry has resurfaced as DOD’s proposed “Arsenal Plane .” See, inter alia, James Drew, “USAF flaunts...arsenal plane ’ concept at Air Warfare Symposium,” FlightGlobal.com, February 26, 2016, https://www.flightglobal.com/news/articles/usaf-flaunts-arsenal

  17. Lethal and Legal The Ethics of Drone Strikes

    Science.gov (United States)

    2015-12-01

    of warfare.6 Key rationales for the use of armed drones are that they are legal, effective, and ethical. According to White House spokesman James ...journalist James Foley in August 2014 was in retalia- tion for U.S. airstrikes in Iraq.98 These medium- and long-term second order effects caused by lethal...20Security%20 Detention%20in%20Non-International%20Armed%20Conflict.pdf. 36. Benjamin Wittes , “Amnesty International Responds,” Law- fare, October

  18. Continental United States Hurricane Strikes 1950-2012

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Continental U.S. Hurricane Strikes Poster is our most popular poster which is updated annually. The poster includes all hurricanes that affected the U.S. since...

  19. 2005 Significant U.S. Hurricane Strikes Poster

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The 2005 Significant U.S. Hurricane Strikes poster is one of two special edition posters for the Atlantic Hurricanes. This beautiful poster contains two sets of...

  20. Ethical and legal consideration of prisoner's hunger strike in Serbia.

    Science.gov (United States)

    Alempijevic, Djordje; Pavlekic, Snezana; Jecmenica, Dragan; Nedeljkov, Aleksandra; Jankovic, Milos

    2011-03-01

    Hunger strike of prisoners and detainees remains a major human rights and ethical issue for medical professionals. We are reporting on a case of a 48-year-old male sentenced prisoner, intravenous heroin user, who went on a hunger strike and died 15 days later. Throughout the fasting period, the prisoner, who was capable of decision making, refused any medical examination. Autopsy findings were not supporting prolonged starvation, while toxicology revealed benzodiazepines and opiates in blood and urine. Cause of death was given as "heroin intoxication" in keeping with detection of 6-MAM. Legal and ethical issues pertinent to medical examination and treatment of prisoners on hunger strike are explored in accordance with legislation and professional ethical standards in Serbia. A recommendation for the best autopsy practice in deaths following hunger strike has been made. © 2011 American Academy of Forensic Sciences.

  1. Nuclear First Strike-Have the Rules Changed?

    National Research Council Canada - National Science Library

    Carter, Rosemary M

    2008-01-01

    .... Nuclear first strike is the policy that reserves the right to use nuclear weapons against an enemy before that enemy employs a like weapon without any constraints on the decision to employ the weapon...

  2. Joint Strike Fighter fit for duty in Europe?

    NARCIS (Netherlands)

    Heerkens, Johannes M.G.

    2000-01-01

    Focuses on the potential growth of the Joint Strike Fighter (JSF) market in Europe. Competition between Lockheed Martin and Boeing for the fighter's design contract; Disadvantages of the fighter plane; Stealth performance of JSF.

  3. Comparison of force, power, and striking efficiency for a Kung Fu strike performed by novice and experienced practitioners: preliminary analysis.

    Science.gov (United States)

    Neto, Osmar Pinto; Magini, Marcio; Saba, Marcelo M F; Pacheco, Marcos Tadeu Tavares

    2008-02-01

    This paper presents a comparison of force, power, and efficiency values calculated from Kung Fu Yau-Man palm strikes, when performed by 7 experienced and 6 novice men. They performed 5 palm strikes to a freestanding basketball, recorded by high-speed camera at 1000 Hz. Nonparametric comparisons and correlations showed experienced practitioners presented larger values of mean muscle force, mean impact force, mean muscle power, mean impact power, and mean striking efficiency, as is noted in evidence obtained for other martial arts. Also, an interesting result was that for experienced Kung Fu practitioners, muscle power was linearly correlated with impact power (p = .98) but not for the novice practitioners (p = .46).

  4. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  5. Local avian density influences risk of mortality from window strikes

    Science.gov (United States)

    Sabo, Ann M.; Hagemeyer, Natasha D.G.; Lahey, Ally S.

    2016-01-01

    Up to a billion birds die per year in North America as a result of striking windows. Both transparent and reflective glass panes are a cause for concern, misleading birds by either acting as invisible, impenetrable barriers to desired resources, or reflecting those resources over a large surface area. A high number of window strikes occur during migration, but little is known about the factors of susceptibility, or whether particular avian taxa are more vulnerable than others. We report on a study of window strikes and mist-netting data at the Virginia Zoological Park (Norfolk, Virginia, USA), conducted in the autumn of 2013 and 2014. We focused on three factors likely to contribute to an individual’s predisposition to collide with windows: (i) taxonomic classification, (ii) age, and (iii) migrant vs. resident status. Thrushes, dominated by the partial migrant American Robin (Turdus migratorius), were significantly less likely to strike glass than be sampled in mist nets (χ2 = 9.21, p = 0.002), while wood-warblers (Parulidae) were more likely to strike than expected (χ2 = 13.55, p windows (45.4%) was not significantly different (χ2 = 0.05, p = 0.827) than the population of juvenile birds naturally occurring at the zoo (48.8%). Migrants, however, were significantly more susceptible to window strikes than residents (χ2 = 6.35, p = 0.012). Our results suggest that resident birds are able to learn to avoid and thus reduce their likelihood of striking windows; this intrinsic risk factor may help explain the apparent susceptibility of certain taxa to window strikes. PMID:27366656

  6. NASA storm hazards research in lightning strikes to aircraft

    Science.gov (United States)

    Fisher, B. D.; Brown, P. W.; Plumer, J. A.

    1985-01-01

    The lightning strike condition data gathered in the 1980-1984 period are presented, together with the lightning attachment point analysis for the NASA F-106B research aircraft are presented. The analysis of the experienced 637 direct lightning strikes shows that the highest strike rates (2.1 strikes/min and 13 strikes/penetration) occurred at altitudes between 38,000 and 40,000 ft. The regions of highest risk for an aircraft to experience a direct lightning strike were the areas of thunderstorms where the ambient temperature was colder than -40 C and where the relative turbulence and precipitation intensities were characterized as negligible to light. The presence and location of lightning, therefore, did not necessarily indicate the presence and location of hazardous precipitation and turbulence. The total onboard data show that the lightning attachment patterns on this aircraft fall into four general categories, although the 1984 data suggest that the entire surface of the F-106B may be susceptible to lightning attachment.

  7. WAVELET TRANSFORM ANALYSIS OF ELECTROMYOGRAPHY KUNG FU STRIKES DATA

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Miranda Marzullo

    2009-11-01

    Full Text Available In martial arts and contact sports strikes are performed at near maximum speeds. For that reason, electromyography (EMG analysis of such movements is non-trivial. This paper has three main goals: firstly, to investigate the differences in the EMG activity of muscles during strikes performed with and without impacts; secondly, to assess the advantages of using Sum of Significant Power (SSP values instead of root mean square (rms values when analyzing EMG data; and lastly to introduce a new method of calculating median frequency values using wavelet transforms (WMDF. EMG data of the deltoid anterior (DA, triceps brachii (TB and brachioradialis (BR muscles were collected from eight Kung Fu practitioners during strikes performed with and without impacts. SSP results indicated significant higher muscle activity (p = 0.023 for the strikes with impact. WMDF results, on the other hand, indicated significant lower values (p = 0. 007 for the strikes with impact. SSP results presented higher sensitivity than rms to quantify important signal differences and, at the same time, presented lower inter-subject coefficient of variations. The result of increase in SSP values and decrease in WMDF may suggest better synchronization of motor units for the strikes with impact performed by the experienced Kung Fu practitioners

  8. Simulation

    CERN Document Server

    Ross, Sheldon

    2006-01-01

    Ross's Simulation, Fourth Edition introduces aspiring and practicing actuaries, engineers, computer scientists and others to the practical aspects of constructing computerized simulation studies to analyze and interpret real phenomena. Readers learn to apply results of these analyses to problems in a wide variety of fields to obtain effective, accurate solutions and make predictions about future outcomes. This text explains how a computer can be used to generate random numbers, and how to use these random numbers to generate the behavior of a stochastic model over time. It presents the statist

  9. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  10. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  11. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  12. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  13. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  14. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  15. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  16. [The Teachers' Right to Strike Versus the Students' Right to an Education.

    Science.gov (United States)

    Powell, Edward M.

    The speaker establishes himself in opposition to teacher strikes, outlines the scope of teacher strikes, discusses arguments for and against the right of teachers to strike, presents the kinds of strikes that are possible, outlines what a board and the administration can do to head off a strike, and presents the American Association of School…

  17. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  18. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  19. Isolated Sensorineural Hearing Loss as a Sequela after Lightning Strike

    Directory of Open Access Journals (Sweden)

    Mahfuz Turan

    2015-01-01

    Full Text Available In most of the surviving patients after a lightning strike, audiovestibular abnormalities have been reported. The most frequently reported type of abnormalities is a tympanic membrane perforation with hearing loss and external ear canal burn. However a sensor neural hearing loss and mixed type hearing loss can also occur, but these occur rarely. A nineteen-year-old female patient had, after a lightning strike, serious burns on the left ear, behind the ear, and on the chest and neck. She also had in her left ear 108 dB hearing loss with irregular central perforation and in her right ear 52 dB sensorineural hearing loss. There was no hearing loss before the strike. A hearing aid was recommended for the right ear and good care and follow-up were recommended for the left ear. A lightning strike can cause serious audiological damage. Therefore, it is necessary to make a careful audiovestibular evaluation of the patients. Although there exist rarely healed cases from sensorineural hearing loss after lightning strike in literature, in our case hearing loss occurred bilaterally and then it healed unilaterally. This condition is quite rare in literature.

  20. DISCRETE ELEMENT MODELING OF BLADE–STRIKE FREQUENCY AND SURVIVAL OF FISH PASSING THROUGH HYDROKINETIC TURBINES

    Energy Technology Data Exchange (ETDEWEB)

    Romero Gomez, Pedro DJ; Richmond, Marshall C.

    2014-04-17

    Evaluating the consequences from blade-strike of fish on marine hydrokinetic (MHK) turbine blades is essential for incorporating environmental objectives into the integral optimization of machine performance. For instance, experience with conventional hydroelectric turbines has shown that innovative shaping of the blade and other machine components can lead to improved designs that generate more power without increased impacts to fish and other aquatic life. In this work, we used unsteady computational fluid dynamics (CFD) simulations of turbine flow and discrete element modeling (DEM) of particle motion to estimate the frequency and severity of collisions between a horizontal axis MHK tidal energy device and drifting aquatic organisms or debris. Two metrics are determined with the method: the strike frequency and survival rate estimate. To illustrate the procedure step-by-step, an exemplary case of a simple runner model was run and compared against a probabilistic model widely used for strike frequency evaluation. The results for the exemplary case showed a strong correlation between the two approaches. In the application case of the MHK turbine flow, turbulent flow was modeled using detached eddy simulation (DES) in conjunction with a full moving rotor at full scale. The CFD simulated power and thrust were satisfactorily comparable to experimental results conducted in a water tunnel on a reduced scaled (1:8.7) version of the turbine design. A cloud of DEM particles was injected into the domain to simulate fish or debris that were entrained into the turbine flow. The strike frequency was the ratio of the count of colliding particles to the crossing sample size. The fish length and approaching velocity were test conditions in the simulations of the MHK turbine. Comparisons showed that DEM-based frequencies tend to be greater than previous results from Lagrangian particles and probabilistic models, mostly because the DEM scheme accounts for both the geometric

  1. Predicting timing of foot strike during running, independent of striking technique, using principal component analysis of joint angles.

    Science.gov (United States)

    Osis, Sean T; Hettinga, Blayne A; Leitch, Jessica; Ferber, Reed

    2014-08-22

    As 3-dimensional (3D) motion-capture for clinical gait analysis continues to evolve, new methods must be developed to improve the detection of gait cycle events based on kinematic data. Recently, the application of principal component analysis (PCA) to gait data has shown promise in detecting important biomechanical features. Therefore, the purpose of this study was to define a new foot strike detection method for a continuum of striking techniques, by applying PCA to joint angle waveforms. In accordance with Newtonian mechanics, it was hypothesized that transient features in the sagittal-plane accelerations of the lower extremity would be linked with the impulsive application of force to the foot at foot strike. Kinematic and kinetic data from treadmill running were selected for 154 subjects, from a database of gait biomechanics. Ankle, knee and hip sagittal plane angular acceleration kinematic curves were chained together to form a row input to a PCA matrix. A linear polynomial was calculated based on PCA scores, and a 10-fold cross-validation was performed to evaluate prediction accuracy against gold-standard foot strike as determined by a 10 N rise in the vertical ground reaction force. Results show 89-94% of all predicted foot strikes were within 4 frames (20 ms) of the gold standard with the largest error being 28 ms. It is concluded that this new foot strike detection is an improvement on existing methods and can be applied regardless of whether the runner exhibits a rearfoot, midfoot, or forefoot strike pattern. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. VARIATION OF STRIKE INCENTIVES WITH DAMAGE PREFERENCES; FINAL

    International Nuclear Information System (INIS)

    G. CANAVAN

    2001-01-01

    For START III level forces, strike allocations and magnitudes vary little with L, but first strike costs vary directly with L, which means that for K reflecting a preference for the survival of high value targets over their destruction and a preference for high value over military targets, the costs of action are far greater than those of inaction for a wide range of values of damage preference L. Thus, if both sides have much greater preferences for the survival of their high value targets than for military targets or destruction, they do not see a net incentive to strike, and crises are terminated by inaction. Recent decades suggest strong preferences for the survival of high value and that this has contributed to the lack of direct conflict during that period

  3. Fabrication and assessment of a thin flexible surface coating made of pristine graphene for lightning strike protection

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, B. [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Soltani, S.A. [Department of Aerospace Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Le, L.N. [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States); Asmatulu, R., E-mail: ramazan.asmatulu@wichita.edu [Department of Mechanical Engineering, Wichita State University, 1845 Fairmount St., Wichita, KS 67260-0133 (United States)

    2017-02-15

    A thin flexible coating made of pristine graphene was fabricated and applied on the surface of a commercial carbon fiber epoxy prepreg laminate to protect it against the lightning strike. To assess the coating’s effectiveness, the coated laminate was subjected to the simulated lightning strike as well as the electromagnetic interference shielding effectiveness (EMI SE) testing. It was observed that the damaged area and volume in the coated laminate were reduced by 94% and 96%, respectively, as compared to the laminate without the coating. Moreover, the coated laminate had an average EMI SE of 51 dB over 100–2000 MHz range, 55 dB over 8–12 GHz range, and 60 dB over 12–18 GHz range marking 22%, 44%, and 49% improvement in EMI SE for each frequency range, respectively. The results indicate a great potential for the developed coating to protect the commercially available prepreg composites against the lightning strike.

  4. Comparison of blade-strike modeling results with empirical data

    Energy Technology Data Exchange (ETDEWEB)

    Ploskey, Gene R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carlson, Thomas J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2004-03-01

    This study is the initial stage of further investigation into the dynamics of injury to fish during passage through a turbine runner. As part of the study, Pacific Northwest National Laboratory (PNNL) estimated the probability of blade strike, and associated injury, as a function of fish length and turbine operating geometry at two adjacent turbines in Powerhouse 1 of Bonneville Dam. Units 5 and 6 had identical intakes, stay vanes, wicket gates, and draft tubes, but Unit 6 had a new runner and curved discharge ring to minimize gaps between the runner hub and blades and between the blade tips and discharge ring. We used a mathematical model to predict blade strike associated with two Kaplan turbines and compared results with empirical data from biological tests conducted in 1999 and 2000. Blade-strike models take into consideration the geometry of the turbine blades and discharges as well as fish length, orientation, and distribution along the runner. The first phase of this study included a sensitivity analysis to consider the effects of difference in geometry and operations between families of turbines on the strike probability response surface. The analysis revealed that the orientation of fish relative to the leading edge of a runner blade and the location that fish pass along the blade between the hub and blade tip are critical uncertainties in blade-strike models. Over a range of discharges, the average prediction of injury from blade strike was two to five times higher than average empirical estimates of visible injury from shear and mechanical devices. Empirical estimates of mortality may be better metrics for comparison to predicted injury rates than other injury measures for fish passing at mid-blade and blade-tip locations.

  5. [Force-feeding of hunger-striking prisoners].

    Science.gov (United States)

    Glick, Shimon

    2014-09-01

    In contrast to the position of the World Medical Association and the Ethics Council of the Israel Medical Association, the author argues for forced-feeding of hunger-striking prisoners when their condition reaches a stage of danger of death or permanent injury. This position is based on the priority of human life over autonomy, and of a communitarian ethic. This position is supported by a District Court decision ordering the feeding of a hunger-striking prisoner, by a Supreme Court decision imposing surgery on a non-consenting prisoner, and in line with Israel's Patient's Right Law.

  6. Sound Quality and Striking Position of a Conga Drum

    Directory of Open Access Journals (Sweden)

    Dylan Harvey

    2014-12-01

    Full Text Available The relationship between the location at which a drum membrane was struck and the quality of sound produced was investigated by striking the drum at several distances between the center and the rim. Through analyzing the harmonics of the wave produced from the impact, it was shown that as the striking location changes, the relative amplitudes of different modes of vibration also changes. It was found that sound of a higher pitch is produced at the rim of the drum than anywhere else on the drum head due to higher modes of vibration becoming dominant.

  7. MORE THAN A LABOR DISPUTE: THE PATCO STRIKE OF 1981

    Directory of Open Access Journals (Sweden)

    Paul L. Butterworth

    2005-01-01

    Full Text Available On August 3, 1981, 13,000 air traffic controllers walked off the job. Under US law, the strike was illegal. President Ronald Reagan ordered the strikers as a group to return to work; when they did not, he ordered individual strikers to return, and again they refused. Two days later the president fired the strikers. Reagan's action transformed relations between organized labor and American management, and created the worst turbulence to hit the American airways in recent history. “More Than a Labor Dispute” examines the work stoppage and aftermath through the eyes of two controllers and a pilot, all of whom worked during the strike.

  8. Remarkable rates of lightning strike mortality in Malawi.

    Science.gov (United States)

    Mulder, Monique Borgerhoff; Msalu, Lameck; Caro, Tim; Salerno, Jonathan

    2012-01-01

    Livingstone's second mission site on the shore of Lake Malawi suffers very high rates of consequential lightning strikes. Comprehensive interviewing of victims and their relatives in seven Traditional Authorities in Nkhata Bay District, Malawi revealed that the annual rate of consequential strikes was 419/million, more than six times higher than that in other developing countries; the rate of deaths from lightning was 84/million/year, 5.4 times greater than the highest ever recorded. These remarkable figures reveal that lightning constitutes a significant stochastic source of mortality with potential life history consequences, but it should not deflect attention away from the more prominent causes of mortality in this rural area.

  9. Using Metal Complex Ion-Molecule Reactions in a Miniature Rectilinear Ion Trap Mass Spectrometer to Detect Chemical Warfare Agents

    Science.gov (United States)

    Graichen, Adam M.; Vachet, Richard W.

    2013-06-01

    The gas-phase reactions of a series of coordinatively unsaturated [Ni(L)n]y+ complexes, where L is a nitrogen-containing ligand, with chemical warfare agent (CWA) simulants in a miniature rectilinear ion trap mass spectrometer were investigated as part of a new approach to detect CWAs. Results show that upon entering the vacuum system via a poly(dimethylsiloxane) (PDMS) membrane introduction, low concentrations of several CWA simulants, including dipropyl sulfide (simulant for mustard gas), acetonitrile (simulant for the nerve agent tabun), and diethyl phosphite (simulant for nerve agents sarin, soman, tabun, and VX), can react with metal complex ions generated by electrospray ionization (ESI), thereby providing a sensitive means of detecting these compounds. The [Ni(L)n]2+ complexes are found to be particularly reactive with the simulants of mustard gas and tabun, allowing their detection at low parts-per-billion (ppb) levels. These detection limits are well below reported exposure limits for these CWAs, which indicates the applicability of this new approach, and are about two orders of magnitude lower than electron ionization detection limits on the same mass spectrometer. The use of coordinatively unsaturated metal complexes as reagent ions offers the possibility of further tuning the ion-molecule chemistry so that desired compounds can be detected selectively or at even lower concentrations.

  10. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  11. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  12. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  13. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  14. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  15. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  16. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  17. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  18. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  19. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  20. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  1. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  2. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  3. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  4. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  5. EDITORIAL Plagiarism - time to strike at the epidemic

    African Journals Online (AJOL)

    admin

    Plagiarism - time to strike at the epidemic. Lukman Yusuf1, Abraham Aseffa2. We live in a globalized world where information is instantly shared across continents. The number of biomedical journals available for reference is quite enormous and there is a sudden huge surge of free open access journals in the last few years ...

  6. The Eastern Pacific Tropical Cyclone Strike Probability Program (EPSTRKP).

    Science.gov (United States)

    1980-08-01

    of nine preselected points of interest. Although subject to change the points currently listed within the program are: Acapulco, Mazatlan, Puerto ... Vallarta , La Paz, San Diego, Hilo, Honolulu, Johnston Island and Midway Island. The strike probabilities, computed upon receipt of each 6-hourly warning

  7. Effects of Union Organization on Strike Incidence in EU Companies

    NARCIS (Netherlands)

    Jansen, Giedo

    2014-01-01

    The author reinvestigates the relationship between the organizational power of trade unions and strikes based on data from the European Company Survey 2009 (ECS-2009) and the Institutional Characteristics of Trade Unions, Wage Setting, State Intervention and Social Pacts (ICTWSS) database, which

  8. Torts Liability for Strike Action and Third Party Rights.

    Science.gov (United States)

    Raday, Frances

    1979-01-01

    Studies the nature of the torts liability incurred in strikes and the extent of existing immunities bestowed on strikers and their organizers, and explores the principles that should govern liability and immunity. Available from Israel Law Review Association, c/o Faculty of Law, Hebrew University of Jerusalem, Mount Scopus, P.O.B. 24100, Jerusalem…

  9. Nurses need the right to strike to protect patients.

    Science.gov (United States)

    Harrison, Malcolm

    2012-04-25

    Four of your readers panellists were asked if the RCN should be affiliated to the Trades Union Congress (reflections April 4). One of them said the RCN needs to modernise and join the wider trade union movement, but 'should keep the "no strike" policy that has always served it so well'.

  10. Analysis of the effects of frequent strikes on academic performance ...

    African Journals Online (AJOL)

    The history of Academic Staff Union of Universities (ASUU)'s strike can be traced back to 1978, the period of the beginning of the decline in the oil boom, when the country faced the consequences of the failure by its rulers to use the oil wealth to generate production and a social welfare system. Military dictatorship had ...

  11. On Striking for a Bargain between Two Completely Informed Agents

    NARCIS (Netherlands)

    Houba, H.E.D.; Wen, Q.

    2007-01-01

    This paper provides a thorough equilibrium analysis of a wage contract negotiation model where the union must choose between strike and holdout between offers and counter-offers. When the union and the firm have different discount factors, delay in reaching an agreement may Pareto dominate many

  12. Assemblage of strike-slip faults and tectonic extension and ...

    Indian Academy of Sciences (India)

    12

    and its effect on the productivity of the tight reservoirs. The study will not only guide. 95 the oil-gas ..... 5 Effect of tectonic extension and compression on coal reservoir productivity. 288. 5.1 Strike-slip compression and ..... staff of all the authors that cooperated in performing the analyses. We are also. 425 grateful to the ...

  13. Assemblage of strike-slip faults and tectonic extension and ...

    Indian Academy of Sciences (India)

    12

    Assemblage of strike-slip faults and tectonic. 1 extension and compression analysis: A case. 2 study of a Lower Permian commercial coal. 3 reservoir in China. 4. 5. Shuai Yina,*, Dawei Lvb, Zhonghu Wu c .... high-quality reservoirs, and tectonic action is a leading factor for oil and gas. 70 enrichment. Therefore, it is of great ...

  14. BIRD/WILDLIFE STRIKE CONTROL FOR SAFER AIR ...

    African Journals Online (AJOL)

    Osondu

    2012-06-05

    Jun 5, 2012 ... These include staff training and retraining, developing good data bank based on .... wildlife is very important in bird control. Successful habitat ... Designated staff patrols the airside areas using chemical repellants, propane cannons, distress call. Birds/Wildlife Strikes Control for Safer Air .................Usman et ...

  15. LAW AND ETHICS OF STRIKES IN THE NIGERIAN HEALTH SYSTEM

    African Journals Online (AJOL)

    2014-10-06

    Oct 6, 2014 ... MDCN Code of ethics intends to give right for cessation of work by workers in the health sector of the economy. Thus under the Common Law, a strike, especially in the essential services is a breach of the contract of employment. The Trade. Union (amendment) Act (Federal Republic of. Nigeria, 2005) ...

  16. Growth control of kalanchoe cultivars Rako and Gold Strike by ...

    African Journals Online (AJOL)

    This study was conducted to test the potential of paclobutrazol and uniconazole used at the propagation stage as a plant growth retardant (PGR) of kalanchoe cultivars Rako and Gold Strike. Three node terminal cuttings were soaked in 500 mL of 0.05, 0.25, or 0.50 mg·L-1 paclobutrazol or uniconazole solution for 2 h.

  17. Striking Inside Angola with 32 Battalion | Scheepers | Scientia ...

    African Journals Online (AJOL)

    Scientia Militaria: South African Journal of Military Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 42, No 1 (2014) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Striking Inside Angola with 32 ...

  18. Force, reaction time, and precision of Kung Fu strikes.

    Science.gov (United States)

    Neto, Osmar Pinto; Bolander, Richard; Pacheco, Marcos Tadeu Tavares; Bir, Cynthia

    2009-08-01

    The goal was to compare values of force, precision, and reaction time of several martial arts punches and palm strikes performed by advanced and intermediate Kung Fu practitioners, both men and women. 13 Kung Fu practitioners, 10 men and three women, participated. Only the men, three advanced and seven intermediate, were considered for comparisons between levels. Reaction time values were obtained using two high speed cameras that recorded each strike at 2500 Hz. Force of impact was measured by a load cell. For comparisons of groups, force data were normalized by participant's body mass and height. Precision of the strikes was determined by a high speed pressure sensor. The results show that palm strikes were stronger than punches. Women in the study presented, on average, lower values of reaction time and force but higher values of precision than men. Advanced participants presented higher forces than intermediate participants. Significant negative correlations between the values of force and precision and the values of force and reaction time were also found.

  19. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  20. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  1. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  2. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  3. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  4. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  5. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  6. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  7. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  8. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  9. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  10. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  11. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  12. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  13. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  14. Case Report: Mass Casualty Lightning Strike at Ranger Training Camp.

    Science.gov (United States)

    Thompson, Shannon N; Wilson, Zachary W; Cole, Christopher B; Kennedy, Andrew R; Aycock, Ryan D

    2017-05-01

    Although lightning strikes are a rare occurrence, their significance cannot be ignored given military operations in the field during all types of weather. With proper medical management, patients with lightning injuries can return to duty. Information for this case report comes from eyewitness account at the 6th Ranger Training Battalion and from review of physician documentation from the 96th Medical Group, Eglin Air Force Base, Florida. A lightning strike injured 44 Ranger School participants during a training exercise on August 12, 2015, at Camp Rudder, Florida. These patients were triaged in the field and transported to emergency department of Eglin Air Force Base. Of the 44 casualties, 20 were admitted. All were returned to duty the following day. One patient had cardiac arrest. This patient, along with two others, was admitted to the intensive care unit. Seventeen other patients were admitted for observation for rhabdomyolysis and/or cardiac arrhythmias. One patient was admitted with suspected acute kidney injury indicated by an elevated creatinine. All patients, including those admitted to the intensive care unit, were released on the day following the lightning strike without restrictions and were allowed to return to duty with increased medical monitoring. This case report highlights the need for proper triage and recognition of lightning strike injury, coordination of care between field operations and emergency department personnel, and close follow-up for patients presenting with lightning injury. Symptoms, physical exam, and laboratory findings from rigorous training can be difficult to distinguish from those resulting from lightning injury. Secondary injuries resulting from blunt trauma from falls may have been prevented by the use of the lightning strike posture. Further analysis of procedures and standard operating protocols to mitigate risk during thunderstorms may be required to prevent lightning's effects on large groups of military personnel

  15. Management of patients during hunger strike and refeeding phase.

    Science.gov (United States)

    Eichelberger, M; Joray, M L; Perrig, M; Bodmer, M; Stanga, Z

    2014-01-01

    Hunger strikers resuming nutritional intake may develop a life-threatening refeeding syndrome (RFS). Consequently, hunger strikers represent a core challenge for the medical staff. The objective of the study was to test the effectiveness and safety of evidence-based recommendations for prevention and management of RFS during the refeeding phase. This was a retrospective, observational data analysis of 37 consecutive, unselected cases of prisoners on a hunger strike during a 5-y period. The sample consisted of 37 cases representing 33 individual patients. In seven cases (18.9%), the hunger strike was continued during the hospital stay, in 16 episodes (43.2%) cessation of the hunger strike occurred immediately after admission to the security ward, and in 14 episodes (37.9%) during hospital stay. In the refeed cases (n = 30), nutritional replenishment occurred orally, and in 25 (83.3%) micronutrients substitutions were made based on the recommendations. The gradual refeeding with fluid restriction occurred over 10 d. Uncomplicated dyselectrolytemia was documented in 12 cases (40%) within the refeeding phase. One case (3.3%) presented bilateral ankle edemas as a clinical manifestation of moderate RFS. Intensive medical treatment was not necessary and none of the patients died. Seven episodes of continued hunger strike were observed during the entire hospital stay without medical complications. Our data suggested that seriousness and rate of medical complications during the refeeding phase can be kept at a minimum in a hunger strike population. This study supported use of recommendations to optimize risk management and to improve treatment quality and patient safety in this vulnerable population. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Electronic Warfare Test and Evaluation (Essai et evaluation en matiere de guerre electronique)

    Science.gov (United States)

    2012-12-01

    E. MODELS (Examples) MODELLING LEVEL TYPICAL MOEs TYPICAL MOPs VALIDATION THUNDER R EF IN EM EN T O F M O D EL LI N G A SS U M PT IO N S...Example 2: EW Test Facility – (© BAE SYSTEMS 2010, All Rights Reserved). These chambers can also be used: • For IR/UV/Laser, Lightning Strike, RCS and...platform, RF interoperability analysis. The capability is also used to simulate the interaction of lightning , Electro-Static Discharge (ESD

  17. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  18. Implications of Incessant Strike Actions on the Implementation of Technical Education Programme in Nigeria

    Science.gov (United States)

    Adavbiele, J. A.

    2015-01-01

    This paper was designed to x-ray the implications of incessant strike actions on the implementation of Technical education programme in Nigeria. The paper took an exploratory view on the concept of strike actions in Nigeria with particular references on notable strike actions that have occurred in Nigeria. The types of strike were explained and…

  19. An inventory of wargaming models for special warfare: Candidate applications for the infusion of human performance data

    Energy Technology Data Exchange (ETDEWEB)

    Burton, H.D.; Banks, W.W.; Schultz, E.E.; Berghage, T.E.

    1988-11-01

    The material contained in this compendium has been drawn from many sources in an attempt to define the number and types of small group combat simulation models which currently exist. The emphasis placed on this particular effort was to identify combat simulation models which are oriented or could be oriented toward special warfare involving highly trained, light, mobile forces. These descriptions and characterizations of the different simulation models should be viewed with the goal of infusing human performance data and human performance models into candidate simulation models to enhance both fidelity and realism. We feel that this listing will be of direct benefit to military and civilian scientists who are interested in identifying candidate combat simulation models which can be targeted for enhancement with appropriate human performance data. Few existing models reviewed were found to incorporate laboratory or field data drawn from the behavioral sciences or human performance literature. Several models did incorporate human performance assumptions which were found to be incongruent with real world data about how people behave under various environmental conditions and both physical and cognitive stress.

  20. Feasibility of Observing and Characterizing Single Ion Strikes in Microelectronic Components.

    Energy Technology Data Exchange (ETDEWEB)

    Dingreville, Remi Philippe Michel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hattar, Khalid Mikhiel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Bufford, Daniel Charles [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    The transient degradation of semiconductor device performance under irradiation has long been an issue of concern. A single high-energy charged particle can degrade or permanently destroy the microelectronic component, potentially altering the course or function of the systems. Disruption of the the crystalline structure through the introduction of quasi-stable defect structures can change properties from semiconductor to conductor. Typically, the initial defect formation phase is followed by a recovery phase in which defect-defect or defect-dopant interactions modify the characteristics of the damaged structure. In this LDRD Express, in-situ ion irradiation transmission microscopy (TEM) in-situ TEM experiments combined with atomistic simulations have been conducted to determine the feasibility of imaging and characterizing the defect structure resulting from a single cascade in silicon. In-situ TEM experiments have been conducted to demonstrate that a single ion strike can be observed in Si thin films with nanometer resolution in real time using the in-situ ion irradiation transmission electron microscope (I3TEM). Parallel to this experimental effort, ion implantation has been numerically simulated using Molecular Dynamics (MD). This numerical framework provides detailed predictions of the damage and follow the evolution of the damage during the first nanoseconds. The experimental results demonstrate that single ion strike can be observed in prototypical semiconductors.

  1. Feasibility of Observing and Characterizing Single Ion Strikes in Microelectronic Components

    International Nuclear Information System (INIS)

    Dingreville, Remi Philippe Michel; Hattar, Khalid Mikhiel; Bufford, Daniel Charles

    2015-01-01

    The transient degradation of semiconductor device performance under irradiation has long been an issue of concern. A single high-energy charged particle can degrade or permanently destroy the microelectronic component, potentially altering the course or function of the systems. Disruption of the the crystalline structure through the introduction of quasi-stable defect structures can change properties from semiconductor to conductor. Typically, the initial defect formation phase is followed by a recovery phase in which defect-defect or defect-dopant interactions modify the characteristics of the damaged structure. In this LDRD Express, in-situ ion irradiation transmission microscopy (TEM) in-situ TEM experiments combined with atomistic simulations have been conducted to determine the feasibility of imaging and characterizing the defect structure resulting from a single cascade in silicon. In-situ TEM experiments have been conducted to demonstrate that a single ion strike can be observed in Si thin films with nanometer resolution in real time using the in-situ ion irradiation transmission electron microscope (I 3 TEM). Parallel to this experimental effort, ion implantation has been numerically simulated using Molecular Dynamics (MD). This numerical framework provides detailed predictions of the damage and follow the evolution of the damage during the first nanoseconds. The experimental results demonstrate that single ion strike can be observed in prototypical semiconductors.

  2. Striking Seasonality in the Secular Warming of the Northern Continents: Structure and Mechanisms

    Science.gov (United States)

    Nigam, S.; Thomas, N. P.

    2017-12-01

    The linear trend in twentieth-century surface air temperature (SAT)—a key secular warming signal— exhibits striking seasonal variations over Northern Hemisphere continents; SAT trends are pronounced in winter and spring but notably weaker in summer and fall. The SAT trends in historical twentieth-century climate simulations informing the Intergovernmental Panel for Climate Change's Fifth Assessment show varied (and often unrealistic) strength and structure, and markedly weaker seasonal variation. The large intra-ensemble spread of winter SAT trends in some historical simulations was surprising, especially in the context of century-long linear trends, with implications for the detection of the secular warming signal. The striking seasonality of observed secular warming over northern continents warrants an explanation and the representation of related processes in climate models. Here, the seasonality of SAT trends over North America is shown to result from land surface-hydroclimate interactions and, to an extent, also from the secular change in low-level atmospheric circulation and related thermal advection. It is argued that the winter dormancy and summer vigor of the hydrologic cycle over middle- to high-latitude continents permit different responses to the additional incident radiative energy from increasing greenhouse gas concentrations. The seasonal cycle of climate, despite its monotony, provides an expanded phase space for the exposition of the dynamical and thermodynamical processes generating secular warming, and an exceptional cost-effective opportunity for benchmarking climate projection models.

  3. High-Velocity Impact Behaviour of Prestressed Composite Plates under Bird Strike Loading

    Directory of Open Access Journals (Sweden)

    Sebastian Heimbs

    2012-01-01

    Full Text Available An experimental and numerical analysis of the response of laminated composite plates under high-velocity impact loads of soft body gelatine projectiles (artificial birds is presented. The plates are exposed to tensile and compressive preloads before impact in order to cover realistic loading conditions of representative aeronautic structures under foreign object impact. The modelling methodology for the composite material, delamination interfaces, impact projectile, and preload using the commercial finite element code Abaqus are presented in detail. Finally, the influence of prestress and of different delamination modelling approaches on the impact response is discussed and a comparison to experimental test data is given. Tensile and compressive preloading was found to have an influence on the damage pattern. Although this general behaviour could be predicted well by the simulations, further numerical challenges for improved bird strike simulation accuracy are highlighted.

  4. Remarkable rates of lightning strike mortality in Malawi.

    Directory of Open Access Journals (Sweden)

    Monique Borgerhoff Mulder

    Full Text Available Livingstone's second mission site on the shore of Lake Malawi suffers very high rates of consequential lightning strikes. Comprehensive interviewing of victims and their relatives in seven Traditional Authorities in Nkhata Bay District, Malawi revealed that the annual rate of consequential strikes was 419/million, more than six times higher than that in other developing countries; the rate of deaths from lightning was 84/million/year, 5.4 times greater than the highest ever recorded. These remarkable figures reveal that lightning constitutes a significant stochastic source of mortality with potential life history consequences, but it should not deflect attention away from the more prominent causes of mortality in this rural area.

  5. Legal questions surrounding hunger strikes by detainees and prisoners.

    Science.gov (United States)

    Strauss, S A

    1991-01-01

    The 'right to die' is not of an absolute character but is subject to definite qualification. There are legal and social interests reflecting profound ethical values which militate against an absolute right on the part of a prisoner to die by means of a hunger strike. The declared policy of the South African authorities is that a prisoner who resorts to a hunger strike may not be subjected to force-feeding. This is in accordance with the 1975 Tokyo Declaration. Unfortunately the Declaration is silent on the question of whether a doctor may provide medical treatment once a hunger striker has reached the point where he is no longer capable of rational thought. In this article it is submitted that a doctor would be legally entitled to do so.

  6. Single Station System and Method of Locating Lightning Strikes

    Science.gov (United States)

    Medelius, Pedro J. (Inventor); Starr, Stanley O. (Inventor)

    2003-01-01

    An embodiment of the present invention uses a single detection system to approximate a location of lightning strikes. This system is triggered by a broadband RF detector and measures a time until the arrival of a leading edge of the thunder acoustic pulse. This time difference is used to determine a slant range R from the detector to the closest approach of the lightning. The azimuth and elevation are determined by an array of acoustic sensors. The leading edge of the thunder waveform is cross-correlated between the various acoustic sensors in the array to determine the difference in time of arrival, AT. A set of AT S is used to determine the direction of arrival, AZ and EL. The three estimated variables (R, AZ, EL) are used to locate a probable point of the lightning strike.

  7. HUNGER STRIKES AND FORCE-FEEDING IN PRISONS

    Directory of Open Access Journals (Sweden)

    Radu-Florin GEAMĂNU

    2016-05-01

    Full Text Available This study will try to give an overview and assess the international and European standards regarding the management of hunger strikes. We will analyse the international and European standards regarding the force-feeding a prisoner on a hunger strike. The paper will focus on the study of the ECtHR judgements regarding the force-feeding of hunger strikers. Also, we will address the U.S. case and the force-feeding of prisoners which is considered to be, in certain cases, an act of torture based on the international human rights standards. To close with, the study will attempt to go through the recent developments in the Romanian legislation, analysing the legislation and its conformity with the European principles and recommendations, bearing in mind the prohibition, in absolute terms, of torture or inhuman or degrading treatment or punishment.

  8. Control of striking velocity by table tennis players.

    Science.gov (United States)

    Marinovic, Welber; Iizuka, Cristina Akiko; Freudenheim, Andrea Michele

    2004-12-01

    This study investigated how 7 skilled table tennis players controlled velocity of a forehand drive stroke when the ball's trajectory, velocity, and spin were modified. They hit a target in response to balls launched under four different conditions. The relative and absolute times used in the backswing phase showed no significant differences among conditions. When subjects hit fastballs, there was a significant change in the time required for them to reach the peak of velocity in the forward swing phase. In addition, players decreased the velocity of their strokes to hit fast-approaching balls. These results indicate that highly skilled table tennis players need to adjust the striking velocity and striking time (relative and absolute) required to reach the peak of velocity in the forward swing phase for these task modifications. Since they used slower movement velocities to hit faster-approaching balls, skilled table tennis players may override this speed-coupling process.

  9. Striking dynamics and kinetic properties of boxing and MMA gloves

    Directory of Open Access Journals (Sweden)

    Benjamin Lee

    2014-08-01

    Full Text Available With the growing popularity of Mixed Martial Arts (MMA as a competitive sport, questions regarding the dynamic response and properties of MMA gloves arise. High-energy impacts from punches are very similar to boxing yet MMA competition requires the use of 4 oz fingerless glove, compared to the larger full enclosure boxing glove. This work assessed the kinetic properties and strike dynamics of MMA gloves and compared findings with traditional boxing gloves. Gloves mounted on a molded fist were impacted repetitively on an instrumental anvil designed for impact, over a 5 hour period resulting in 10,000 continuous and consistent strikes. Kinetic data from impacts were sampled at the beginning of the data collection and subsequently every 30 minutes (every 1,000 strikes. MMA gloves produced 4-5 times greater peak force and 5 times faster load rate compared to the boxing glove. However, MMA gloves also showed signs of material fatigue, with peak force increasing by 35% and rate of loading increasing by 60% over the duration of the test. Boxing glove characteristics did deteriorate but to a lesser extent. In summary, the kinetic properties of MMA glove differed substantially from the boxing glove resulting in impacts characterized by higher peak forces and more rapid development of force. Material properties including stiffness and thickness play a role in the kinetic characteristics upon impact, and can be inferred to alter injury mechanisms of blunt force trauma.

  10. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  11. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  12. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  13. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  14. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  15. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  16. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  17. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  18. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  19. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  20. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  1. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  2. Recent geodynamics of major strike-slip zones

    Directory of Open Access Journals (Sweden)

    Vladimir G. Trifonov

    2015-09-01

    In all of the cases mentioned above, strike-slip deformation was expressed only or mainly during strong earthquakes. At other times, the rate of its accumulation was small and the dominant stress conditions led to transverse shortening, rarely resulting in local lengthening of the tectonic zone. These variations are caused by the tectonic peculiarities of these zones. The sinistral component of the deformation is related to the shift of the Arabian Plate relative to the African one, but also the transverse component is related to the continental slope and is expressed by the Coastal range shortening that exists in the El Ghab segment zone. There is not only a dextral deformation component, but also a transverse component, expressed by shortening of the Fergana and Talas ranges existing in the Talas-Fergana fault zone. In both zones, the shortening component became appreciable or dominant when the strike-slip deformation rate decreased. Similar, but more local, relationships were expressed in the epicentral area of the 2003 Altai earthquake and in the Western Palmyrides.

  3. Onset of aseismic creep on major strike-slip faults

    KAUST Repository

    Çakir, Ziyadin

    2012-10-02

    Time series analysis of spaceborne synthetic aperture radar (SAR) data, GPS measurements, and fi eld observations reveal that the central section of the Izmit (Turkey) fault that slipped with a supershear rupture velocity in the A.D. 1999, Mw7.4, Izmit earthquake began creeping aseismically following the earthquake. Rapid initial postseismic afterslip decayed logarithmically with time and appears to have reached a steady rate comparable to the preearthquake full fault-crossing rate, suggesting that it may continue for decades and possibly until late in the earthquake cycle. If confi rmed by future monitoring, these observations identify postseismic afterslip as a mechanism for initiating creep behavior along strike-slip faults. Long-term afterslip and/or creep has signifi cant implications for earthquake cycle models, recurrence intervals of large earthquakes, and accordingly, seismic hazard estimation along mature strike-slip faults, in particular for Istanbul which is believed to lie adjacent to a seismic gap along the North Anatolian fault in the Sea of Marmara. © 2012 Geological Society of America.

  4. Analysis of Transient Phenomena Due to a Direct Lightning Strike on a Wind Energy System

    Directory of Open Access Journals (Sweden)

    João P. S. Catalão

    2012-07-01

    Full Text Available This paper is concerned with the protection of wind energy systems against the direct effects of lightning. As wind power generation undergoes rapid growth, lightning damages involving wind turbines have come to be regarded as a serious problem. Nevertheless, very few studies exist yet in Portugal regarding lightning protection of wind energy systems using numerical codes. A new case study is presented in this paper, based on a wind turbine with an interconnecting transformer, for the analysis of transient phenomena due to a direct lightning strike to the blade. Comprehensive simulation results are provided by using models of the Restructured Version of the Electro-Magnetic Transients Program (EMTP, and conclusions are duly drawn.

  5. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  6. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  7. Mass and performance optimization of an airplane wing leading edge structure against bird strike using Taguchi-based grey relational analysis

    Directory of Open Access Journals (Sweden)

    Hassan Pahange

    2016-08-01

    Full Text Available Collisions between birds and aircraft are one of the most dangerous threats to flight safety. In this study, smoothed particles hydrodynamics (SPH method is used for simulating the bird strike to an airplane wing leading edge structure. In order to verify the model, first, experiment of bird strike to a flat aluminum plate is simulated, and then bird impact on an airplane wing leading edge structure is investigated. After that, considering dimensions of wing internal structural components like ribs, skin and spar as design variables, we try to minimize structural mass and wing skin deformation simultaneously. To do this, bird strike simulations to 18 different wing structures are made based on Taguchi’s L18 factorial design of experiment. Then grey relational analysis is used to minimize structural mass and wing skin deformation due to the bird strike. The analysis of variance (ANOVA is also applied and it is concluded that the most significant parameter for the performance of wing structure against impact is the skin thickness. Finally, a validation simulation is conducted under the optimal condition to show the improvement of performance of the wing structure.

  8. The Diffusion of Strikes: A Dyadic Analysis of Economic Sectors in the Netherlands, 1995–2007

    NARCIS (Netherlands)

    Jansen, Giedo; Sluiter, Roderick; Akkerman, Agnes

    2016-01-01

    This study examines the extent to which strikes diffuse across sectors and to what extent this diffusion of strikes can be explained by similarities and interdependencies between sectors. For this purpose, the authors examine a unique temporally disaggregated and dyadic database on strikes in Dutch

  9. The Right to Strike in Public Employment. Key Issues Series--No. 15. Second Edition, Revised.

    Science.gov (United States)

    Sterret, Grace; Aboud, Antone

    Since the 1960s, the number of strikes by public employees, especially local government employees, has increased, and the number of employees belonging to unions or associations has about tripled. Recently, attention has been focused on strikes by public employees as a result of the strike in 1981 by air traffic controllers and their subsequent…

  10. Causes of falls of hangingwall over gullies adjacent to stabilizing strike pillars

    CSIR Research Space (South Africa)

    Turner, PA

    1987-08-01

    Full Text Available This report discusses the occurrence of falls of ground in strike gullies. Falls of hangingwall over strike gullies on the up-dip side of strike stabilizing pillars in longwall mining systems were investigated. Gullies were examined in both...

  11. Strikes in France and the Netherlands; A Comparison of Labour Market Institutions

    NARCIS (Netherlands)

    Butter, den F.A.G.; Koppes, S.Y.

    2003-01-01

    Strikes as a consequence of labour conflicts occur about 28 times as much in France as in the Netherlands. This paper examines the institutional differences underlying these differences in strike activity. Our empirical analysis shows that strike activity is high in France if workers were successful

  12. Electrical Characterizations of Lightning Strike Protection Techniques for Composite Materials

    Science.gov (United States)

    Szatkowski, George N.; Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Mielnik, John J.

    2009-01-01

    The growing application of composite materials in commercial aircraft manufacturing has significantly increased the risk of aircraft damage from lightning strikes. Composite aircraft designs require new mitigation strategies and engineering practices to maintain the same level of safety and protection as achieved by conductive aluminum skinned aircraft. Researchers working under the NASA Aviation Safety Program s Integrated Vehicle Health Management (IVHM) Project are investigating lightning damage on composite materials to support the development of new mitigation, diagnosis & prognosis techniques to overcome the increased challenges associated with lightning protection on composite aircraft. This paper provides an overview of the electrical characterizations being performed to support IVHM lightning damage diagnosis research on composite materials at the NASA Langley Research Center.

  13. A Probabilistic, Facility-Centric Approach to Lightning Strike Location

    Science.gov (United States)

    Huddleston, Lisa L.; Roeder, William p.; Merceret, Francis J.

    2012-01-01

    A new probabilistic facility-centric approach to lightning strike location has been developed. This process uses the bivariate Gaussian distribution of probability density provided by the current lightning location error ellipse for the most likely location of a lightning stroke and integrates it to determine the probability that the stroke is inside any specified radius of any location, even if that location is not centered on or even with the location error ellipse. This technique is adapted from a method of calculating the probability of debris collisionith spacecraft. Such a technique is important in spaceport processing activities because it allows engineers to quantify the risk of induced current damage to critical electronics due to nearby lightning strokes. This technique was tested extensively and is now in use by space launch organizations at Kennedy Space Center and Cape Canaveral Air Force Station. Future applications could include forensic meteorology.

  14. Migraine strikes as neuronal excitability reaches a tipping point.

    Directory of Open Access Journals (Sweden)

    Marten Scheffer

    Full Text Available Self-propagating waves of cerebral neuronal firing, known as spreading depolarisations, are believed to be at the roots of migraine attacks. We propose that the start of spreading depolarisations corresponds to a critical transition that occurs when dynamic brain networks approach a tipping point. We show that this hypothesis is consistent with current pathogenetic insights and observed dynamics. Our view implies that migraine strikes when modulating factors further raise the neuronal excitability in genetically predisposed subjects to a level where even minor perturbations can trigger spreading depolarisations. A corollary is that recently discovered generic early warning indicators for critical transitions may be used to predict the onset of migraine attacks even before patients are clinically aware. This opens up new avenues for dissecting the mechanisms for the onset of migraine attacks and for identifying novel prophylactic treatment targets for the prevention of attacks.

  15. Precision Strike Training in Lean Manufacturing: A Workplace Literacy Guidebook [and] Final Report on Precision Strike Workplace Literacy Training at CertainTeed Corporation.

    Science.gov (United States)

    National Alliance of Business, Inc., Washington, DC.

    CertainTeed's Precision Strike training program was designed to close the gaps between the current status of its workplace and where that work force needed to be to compete successfully in global markets. Precision Strike included Skills and Knowledge in Lifelong Learning (SKILL) customized, computerized lessons in basic skills, one-on-one…

  16. THE EFFECTS OF HEIGHT AND DISTANCE ON THE FORCE PRODUCTION AND ACCELERATION IN MARTIAL ARTS STRIKES

    Directory of Open Access Journals (Sweden)

    Cynthia A. Bir

    2009-11-01

    Full Text Available Almost all cultures have roots in some sort of self defence system and yet there is relatively little research in this area, outside of a sports related environment. This project investigated different applications of strikes from Kung Fu practitioners that have not been addressed before in the literature. Punch and palm strikes were directly compared from different heights and distances, with the use of a load cell, accelerometers, and high speed video. The data indicated that the arm accelerations of both strikes were similar, although the force and resulting acceleration of the target were significantly greater for the palm strikes. Additionally, the relative height at which the strike was delivered was also investigated. The overall conclusion is that the palm strike is a more effective strike for transferring force to an object. It can also be concluded that an attack to the chest would be ideal for maximizing impact force and moving an opponent off balance

  17. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  18. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  19. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  20. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  1. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  2. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  3. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  4. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  5. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  6. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  7. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  8. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  9. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  10. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  11. Calculated photon spectra at several angles for 5- and 50-MeV electron beams striking solid and gas targets

    International Nuclear Information System (INIS)

    Slaughter, D.R.

    1983-01-01

    Coupled electron-photon transport calculations have been carried out to simulate the photon generation when a 5- or 50-MeV electron beam strikes a solid or gas target. Results indicate that a 5-MeV beam striking targets of tungsten wire, air, or air doped with Kr or Xe generates a photon spectrum sharply peaked in the forward direction and with approximately 1/E spectral intensity. At right angles to the beam the photon intensity is predominantly due to characteristic K x-rays. A 50-MeV beam striking the same targets generates substantially higher photon yield in the forward direction, but the yield normal to the beam is similar to that due to the 5-MeV beam. However, positron-electron annihilation radiation constitutes a significant part of the photon radiation normal to the beam, and is more intense than characteristic K x-rays when the target is more than about one-third of the electron range

  12. San Andreas-sized Strike-slip Fault on Europa

    Science.gov (United States)

    1998-01-01

    This mosaic of the south polar region of Jupiter's moon Europa shows the northern 290 kilometers (180 miles) of a strike-slip fault named Astypalaea Linea. The entire fault is about 810 kilometers (500 miles) long, about the size of the California portion of the San Andreas fault, which runs from the California-Mexico border north to the San Francisco Bay. In a strike-slip fault, two crustal blocks move horizontally past one another, similar to two opposing lanes of traffic. Overall motion along the fault seems to have followed a continuous narrow crack along the feature's entire length, with a path resembling steps on a staircase crossing zones that have been pulled apart. The images show that about 50 kilometers (30 miles) of displacement have taken place along the fault. The fault's opposite sides can be reconstructed like a puzzle, matching the shape of the sides and older, individual cracks and ridges broken by its movements. [figure removed for brevity, see original site] The red line marks the once active central crack of the fault. The black line outlines the fault zone, including material accumulated in the regions which have been pulled apart. Bends in the fault have allowed the surface to be pulled apart. This process created openings through which warmer, softer ice from below Europa's brittle ice shell surface, or frozen water from a possible subsurface ocean, could reach the surface. This upwelling of material formed large areas of new ice within the boundaries of the original fault. A similar pulling-apart phenomenon can be observed in the geological trough surrounding California's Salton Sea, in Death Valley and the Dead Sea. In those cases, the pulled-apart regions can include upwelled materials, but may be filled mostly by sedimentary and eroded material from above. One theory is that fault motion on Europa is induced by the pull of variable daily tides generated by Jupiter's gravitational tug on Europa. Tidal tension opens the fault and

  13. Effect of public transport strikes on air pollution levels in Barcelona (Spain).

    Science.gov (United States)

    Basagaña, Xavier; Triguero-Mas, Margarita; Agis, David; Pérez, Noemí; Reche, Cristina; Alastuey, Andrés; Querol, Xavier

    2018-01-01

    Public transport strikes can lead to an increase of the number of private vehicle trips, which in turn can increase air pollution levels. We aimed to estimate the change in air pollution concentrations during public transport strikes in the city of Barcelona (Spain). Data on strikes of the metro, train or bus systems were collected from government records (2005-2016). We collected daily concentrations of NOx; particulate matter with an aerodynamic diameter smaller than 10μm (PM10), 2.5μm (PM2.5), and 1μm (PM1); particle number concentration (N); black carbon (BC) and CO from research and official monitoring stations. We fitted linear regression models for each pollutant with the strike indicator as an independent variable, and models were adjusted for day of the week, month, year, and holiday periods. During the study period, there were 208days affected by a strike of the metro (28), train (106) or bus (91) systems. Half of the strikes were partial, most of them were single-day strikes, there was little overlap between strikes of the different transport systems, and all strikes had to comply with mandatory minimal services. When pooling all types of strikes, NOx and BC showed higher levels during strike days in comparison with non-strike days (increase between 4.1% and 7.7%, with higher increases for NO). The increases in these concentrations were more evident during full day and multiday metro strikes. In conclusion, alterations in public transport have consequences on air quality. This highlights the importance of public transport in reducing air pollution concentrations in cities. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Models of recurrent strike-slip earthquake cycles and the state of crustal stress

    Science.gov (United States)

    Lyzenga, Gregory A.; Raefsky, Arthur; Mulligan, Stephanie G.

    1991-01-01

    Numerical models of the strike-slip earthquake cycle, assuming a viscoelastic asthenosphere coupling model, are examined. The time-dependent simulations incorporate a stress-driven fault, which leads to tectonic stress fields and earthquake recurrence histories that are mutually consistent. Single-fault simulations with constant far-field plate motion lead to a nearly periodic earthquake cycle and a distinctive spatial distribution of crustal shear stress. The predicted stress distribution includes a local minimum in stress at depths less than typical seismogenic depths. The width of this stress 'trough' depends on the magnitude of crustal stress relative to asthenospheric drag stresses. The models further predict a local near-fault stress maximum at greater depths, sustained by the cyclic transfer of strain from the elastic crust to the ductile asthenosphere. Models incorporating both low-stress and high-stress fault strength assumptions are examined, under Newtonian and non-Newtonian rheology assumptions. Model results suggest a preference for low-stress (a shear stress level of about 10 MPa) fault models, in agreement with previous estimates based on heat flow measurements and other stress indicators.

  15. The assessment of lethal propeller strike injuries in sea mammals.

    Science.gov (United States)

    Byard, Roger W; Winskog, Calle; Machado, Aaron; Boardman, Wayne

    2012-04-01

    Assessment of injuries in marine mammals may be required to help authorities determine whether human activity was involved. Three cases of marine animal deaths involving propeller blade strikes are reported to demonstrate characteristic features of such cases and diagnostic difficulties that may occur. Case 1: A juvenile New Zealand fur seal (Arctocephalus forsteri) suffered two parallel linear incised wounds of the flank and died following small intestinal herniation. Case 2: An Indo-Pacific bottlenose dolphin neonate (Tursiops aduncus) died from a deeply incised wound of the left side of the head with shattering of the skull and laceration of the underlying brain.Case 3: An adult female Indo-Pacific bottlenose dolphin (T. aduncus) died from two parallel chop wounds to the torso with opening of the thoracic and abdominal cavities with fractures of the ribs and vertebrae. Given that some animals may recover, and that the carcasses of those that are killed may simply not be found or reported, it is impossible to provide an estimate of the incidence of this type of injury amongst wild sea mammals. In cases that do come to forensic attention accurate evaluation of the type of injury may potentially have great medicolegal significance. Post-mortem putrefaction and post-mortem feeding by other sea animals may complicate assessments. Copyright © 2012 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  16. Cellular nonlinear networks for strike-point localization at JET

    Science.gov (United States)

    Arena, P.; Fortuna, L.; Bruno, M.; Vagliasindi, G.; Murari, A.; Andrew, P.; Mazzitelli, G.

    2005-11-01

    At JET, the potential of fast image processing for real-time purposes is thoroughly investigated. Particular attention is devoted to smart sensors based on system on chip technology. The data of the infrared cameras were processed with a chip implementing a cellular nonlinear network (CNN) structure so as to support and complement the magnetic diagnostics in the real-time localization of the strike-point position in the divertor. The circuit consists of two layers of complementary metal-oxide semiconductor components, the first being the sensor and the second implementing the actual CNN. This innovative hardware has made it possible to determine the position of the maximum thermal load with a time resolution of the order of 30 ms. Good congruency has been found with the measurement from the thermocouples in the divertor, proving the potential of the infrared data in locating the region of the maximum thermal load. The results are also confirmed by JET magnetic codes, both those used for the equilibrium reconstructions and those devoted to the identification of the plasma boundary.

  17. Cellular nonlinear networks for strike-point localization at JET

    International Nuclear Information System (INIS)

    Arena, P.; Fortuna, L.; Bruno, M.; Vagliasindi, G.; Murari, A.; Andrew, P.; Mazzitelli, G.

    2005-01-01

    At JET, the potential of fast image processing for real-time purposes is thoroughly investigated. Particular attention is devoted to smart sensors based on system on chip technology. The data of the infrared cameras were processed with a chip implementing a cellular nonlinear network (CNN) structure so as to support and complement the magnetic diagnostics in the real-time localization of the strike-point position in the divertor. The circuit consists of two layers of complementary metal-oxide semiconductor components, the first being the sensor and the second implementing the actual CNN. This innovative hardware has made it possible to determine the position of the maximum thermal load with a time resolution of the order of 30 ms. Good congruency has been found with the measurement from the thermocouples in the divertor, proving the potential of the infrared data in locating the region of the maximum thermal load. The results are also confirmed by JET magnetic codes, both those used for the equilibrium reconstructions and those devoted to the identification of the plasma boundary

  18. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  19. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  20. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  1. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  2. Conventional Prompt Global Strike and Long-Range Ballistic Missiles: Background and Issues

    Science.gov (United States)

    2016-02-24

    Silver Bullet? Asking the Right Questions About Conventional Prompt Global Strike (Washington, DC: Carneige Endowment for International Peace, 2013), pp...124 James M. Acton, Silver Bullet? Asking the Right Questions About Prompt Global Strike (Washington, DC: Carnegie Endowment for International Peace, 2013), pp. 120-129. ...Conventional Prompt Global Strike and Long-Range Ballistic Missiles: Background and Issues Amy F. Woolf Specialist in Nuclear Weapons Policy

  3. Vessel Strike of Whales in Australia: The Challenges of Analysis of Historical Incident Data

    Directory of Open Access Journals (Sweden)

    David Peel

    2018-03-01

    Full Text Available Death or injury to whales from vessel strike is one of the primary threats to whale populations worldwide. However, quantifying the rate of occurrence of these collisions is difficult because many incidents are not detected (particularly from large vessels and therefore go unreported. Furthermore, varying reporting biases occur related to species identification, spatial coverage of reports and type of vessels involved. The International Whaling Commission (IWC has compiled a database of the worldwide occurrence of vessel strikes to cetaceans, within which Australia constitutes ~7% (35 reports of the reported worldwide (~471 reports vessel strike records involving large whales. Worldwide records consist largely of modern reports within the last two decades and historical evaluation of ship strike reports has mainly focused on the Northern Hemisphere. To address this we conducted a search of historical national and international print media archive databases to discover reports of vessel strikes globally, although with a focus on Australian waters. A significant number of previously unrecorded reports of vessel strikes were found for both Australia (76 and worldwide (140, resulting in a revised estimate of ~15% of global vessel strikes occurring in Australian waters. This detailed collation and analysis of vessel strike data in an Australian context has contributed to our knowledge of the worldwide occurrence of vessel strikes and challenges the notion that vessel strikes were historically rare in Australia relative to the rest of the world. The work highlights the need to examine historical records to provide context around current anthropogenic threats to marine fauna and demonstrates the importance of formalized reporting structures for effective collation of vessel strike reports. This paper examines the issues and biases in analysis of vessel strike data in general that would apply to any jurisdiction. Using the Australian data as an example

  4. Environmental Effects on Zirconium Hydroxide Nanoparticles and Chemical Warfare Agent Decomposition: Implications of Atmospheric Water and Carbon Dioxide.

    Science.gov (United States)

    Balow, Robert B; Lundin, Jeffrey G; Daniels, Grant C; Gordon, Wesley O; McEntee, Monica; Peterson, Gregory W; Wynne, James H; Pehrsson, Pehr E

    2017-11-15

    Zirconium hydroxide (Zr(OH) 4 ) has excellent sorption properties and wide-ranging reactivity toward numerous types of chemical warfare agents (CWAs) and toxic industrial chemicals. Under pristine laboratory conditions, the effectiveness of Zr(OH) 4 has been attributed to a combination of diverse surface hydroxyl species and defects; however, atmospheric components (e.g., CO 2 , H 2 O, etc.) and trace contaminants can form adsorbates with potentially detrimental impact to the chemical reactivity of Zr(OH) 4 . Here, we report the hydrolysis of a CWA simulant, dimethyl methylphosphonate (DMMP) on Zr(OH) 4 determined by gas chromatography-mass spectrometry and in situ attenuated total reflectance Fourier transform infrared spectroscopy under ambient conditions. DMMP dosing on Zr(OH) 4 formed methyl methylphosphonate and methoxy degradation products on free bridging and terminal hydroxyl sites of Zr(OH) 4 under all evaluated environmental conditions. CO 2 dosing on Zr(OH) 4 formed adsorbed (bi)carbonates and interfacial carbonate complexes with relative stability dependent on CO 2 and H 2 O partial pressures. High concentrations of CO 2 reduced DMMP decomposition kinetics by occupying Zr(OH) 4 active sites with carbonaceous adsorbates. Elevated humidity promoted hydrolysis of adsorbed DMMP on Zr(OH) 4 to produce methanol and regenerated free hydroxyl species. Hydrolysis of DMMP by Zr(OH) 4 occurred under all conditions evaluated, demonstrating promise for chemical decontamination under diverse, real-world conditions.

  5. Joint Command and Control (JC2) capability development utilising a Modelling and Simulation Framework

    CSIR Research Space (South Africa)

    Ramadeen, P

    2010-09-01

    Full Text Available The command, control and information warfare competency of Defence, Peace, Safety and Security (DPSS), an operating unit of the CSIR is using systems modelling and simulation in its Joint Command and Control (JC2) research. JC2 encompasses systems...

  6. ‘The Nairobi General Strike [1950]: from protest to insurgency’

    OpenAIRE

    Hyde, David

    2002-01-01

    The Nairobi General Strike [1950] was the culmination of Kenya’s post war strike wave and urban upheaval. An unprecedented upsurge occurred with the general strikes in Mombasa [1947] led by the African Workers Federation [A.W.F.] and in Nairobi by the East African Trades Union Congress [E.A.T.U.C.]. While this has been termed and treated as a city wide strike, there is enough evidence to suggest a movement that went some way beyond Nairobi. The extent of the cohesion and reciprocal impacts am...

  7. Operational Functions to Achieve Synergy between Special Operations and Precision Strike

    National Research Council Canada - National Science Library

    Huff, William M

    2005-01-01

    ...). The paper describes the operational functions required from the appointed operational commander and his staff to achieve synergism through the combination of special operations and precision strike...

  8. The Chinese nuclear arsenal and its second-strike capability

    International Nuclear Information System (INIS)

    Cabestan, Jean-Pierre

    2013-03-01

    It is well known that China possesses a second- strike capability, but a great deal of uncertainty persists on the subject. Over the last few years, without officially adjusting its doctrine, China has nonetheless defined its objectives. In April 2010, the People's Liberation Army Daily indicated that China needed such a capability and contended that ballistic missile submarines (SSBNs) would constitute the safest means of delivery. In the same year, the IISS estimated that the People's Liberation Army was in possession of 90 ICBMs (66 ground-based missiles and 24 SLBMs) and 400 IRBM mainly aimed at Taiwan and Japan. The Pentagon's 2012 report proposed 50-75 ICBMs and 80 -120 IRBM and MRBM. While it is established that the People's Liberation Army is developing Jin class submarines (type-094, of which there are currently two in service, which will soon rise to five) and is developing solid-propellant missiles, which could be activated more quickly, not a great deal is known about the progress of these two projects. The JL-2 (7400 km), which is mounted on SSBNs, is still being tested. In parallel, the traditional principle to which China adheres - no first use of nuclear weapons - seems to have been slightly dented. Thus, in January 2011, the Japanese press agency Kyodo (relayed by Stratfor) reported that the People's Liberation Army had lowered the threshold for use of its strategic weapons: it could henceforth envisage a preventive nuclear strike against a nuclear power that had by conventional means destroyed key strategic targets on its territory, such as a nuclear power station, a dam, or a large city, having provided prior warning to the aggressor. But what most worries the U.S. and its Asian allies, particularly the Japanese, is the quasi-total opacity of the Chinese military nuclear programme. While in April 2010, the United States and Russia signed a treaty limiting their number of strategic weapons to 1550 by 2018, China considers

  9. Report of the Defense Science Board Task Force on Future Strategic Strike Skills

    Science.gov (United States)

    2006-03-01

    by satellite programs and other projects. The attention placed on weapons effects has decidedly been reduced since the early 1990s with the number of...tenets of their long-term mission assurance strategy. Military Warfare-qualified Engineering Duty Officers ( EDOs ) are brought into the program...been dramatically reduced following the Cold War, and the NASA space launch program has encountered significant setbacks. Many commercial satellite

  10. Assessment of performing an MST strike in Tank 21H

    Energy Technology Data Exchange (ETDEWEB)

    Poirier, Michael R.

    2014-09-29

    Previous Savannah River National Laboratory (SRNL) tank mixing studies performed for the Small Column Ion Exchange (SCIX) project have shown that 3 Submersible Mixer Pumps (SMPs) installed in Tank 41 are sufficient to support actinide removal by MST sorption as well as subsequent resuspension and removal of settled solids. Savannah River Remediation (SRR) is pursuing MST addition into Tank 21 as part of the Large Tank Strike (LTS) project. The preliminary scope for LTS involves the use of three standard slurry pumps (installed in N, SE, and SW risers) in a Type IV tank. Due to the differences in tank size, internal interferences, and pump design, a separate mixing evaluation is required to determine if the proposed configuration will allow for MST suspension and strontium and actinide sorption. The author performed the analysis by reviewing drawings for Tank 21 [W231023] and determining the required cleaning radius or zone of influence for the pumps. This requirement was compared with previous pilot-scale MST suspension data collected for SCIX that determined the cleaning radius, or zone of influence, as a function of pump operating parameters. The author also reviewed a previous Tank 50 mixing analysis that examined the ability of standard slurry pumps to suspend sludge particles. Based on a review of the pilot-scale SCIX mixing tests and Tank 50 pump operating experience, three standard slurry pumps should be able to suspend sludge and MST to effectively sorb strontium and actinides onto the MST. Using the SCIX data requires an assumption about the impact of cooling coils on slurry pump mixing. The basis for this assumption is described in this report. Using the Tank 50 operating experience shows three standard slurry pumps should be able to suspend solids if the shear strength of the settled solids is less than 160 Pa. Because Tank 21 does not contain cooling coils, the shear strength could be larger.

  11. Positive Emotions Associated with "Counter-Strike" Game Playing.

    Science.gov (United States)

    Shin, Mirim; Heard, Rob; Suo, Chao; Chow, Chin Moi

    2012-10-01

    Digital game playing engages people for long periods of time. The pleasure offered by digital games may explain the players' consumption of this activity. Games may elicit both positive and negative emotions, which can be measured by encephalography (EEG). The EEG alpha asymmetry index (AI) is different in positive and negative emotions and so may be used to distinguish positive from negative emotions that occur during gaming. We hypothesized that the "Counter-Strike" (CS) game (Valve Software, Bellevue, WA) is pleasurable and demonstrable with a positive EEG AI. Twelve male participants ages 18-30 years underwent EEG recordings continuously during and postgame. EEG was also recorded pregame for control conditions of baseline (sitting on a chair staring at a blank wall), movement (moving fingers on the computer keyboard with a blank screen), sound (listening to the sound of the CS game with a blank screen), and screen (watching the CS game without playing). Self-ratings of emotional responses were completed at pre-, during, and postgame. A significant decrease in the EEG AI was observed under the screen condition compared with baseline, whereas an increase was observed postgame compared with the screen condition. The participants demonstrated a positive EEG AI following the "shoot" events (shoot opponents) and negative emotions after the "being shot" events. Subjective ratings of emotional response indicated happiness during and postgame, but anger and arousal were reported only during the game. The overall results are consistent with the hypothesis that predominantly positive emotional reactions are elicited from playing the CS game and concur with positive subjective ratings of happiness. Future studies may explore the relationship of game pleasure and obsessive game play.

  12. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    some “ owner ” parent or subsystem, and this association should be recorded. Not all data will have an associated entity, e.g. parameters pertaining...p170] that the hierarchical data model was invented after the fact of implementation; it would follow that any contemporary theory would be heavily...most closely to a relation-valued attribute (RVA) in relational database theory [Date2005 p31]). Here we delimit the contained item in parentheses

  13. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    TYPE 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK...test results provided to the Naval Aviation Center for Rotorcraft Advancement (NACRA) at the conclusion of CTI’s SBIR Project Contract No.: N68335...potentially dangerous flight regime and passes simple intuitive commands to a pilot via a lightweight vest), a cockpit control panel, a vest ( garment

  14. Asymmetric Warfare in the Simulation and Training Environment: Comprehensive Approach Wanted!

    Science.gov (United States)

    2009-10-01

    Tzu.: The Art of War. (New York: Delacorte Press, 1983). [9] Terem, P.: Globalisation and its Environmental Dimension. Siwek,T.-Baar,V.(ed... Globalisation and its Geopolitical, Cultural, Economic and Ecological Context. 8.-10. 10. 2003 University of Ostrava, 2004, ISBN 80-7368-022-X, str.304-314, AEC.

  15. Biodegradation of an Organophosphate Chemical Warfare Agent Simulant by Activated Sludge with Varying Solid Retention Times

    Science.gov (United States)

    2013-03-21

    2008; Hoening 2002). Later, in 1952, Dr. Ranajit Ghosh discovered what is now known in the military as VX while conducting research into pesticides ...nutrient content utilized in land applications such as farming . The amount of solids that gets wasted is dependent on each facility’s solid retention time...to occur, the toxic OPs may follow disposed waste sludge where it may be applied as fertilizer in agricultural areas. Furthermore, should

  16. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  17. Pre/post-strike atmospheric assessment system (PAAS)

    International Nuclear Information System (INIS)

    Peglow, S. G.; Molitoris, J. D.

    1997-01-01

    The Pre/Post-Strike Atmospheric Assessment System was proposed to show the importance of local meteorological conditions in the vicinity of a site suspected of storing or producing toxic agents and demonstrate a technology to measure these conditions, specifically wind fields. The ability to predict the collateral effects resulting from an attack on a facility containing hazardous materials is crucial to conducting effective military operations. Our study approach utilized a combination of field measurements with dispersion modeling to better understand which variables in terrain and weather were most important to collateral damage predictions. To develop the PAAS wind-sensing technology, we utilized a combination of emergent and available technology from micro-Doppler and highly coherent laser systems. The method used for wind sensing is to probe the atmosphere with a highly coherent laser beam. As the beam probes, light is back-scattered from particles entrained in the air to the lidar transceiver and detected by the instrument. Any motion of the aerosols with a component along the beam axis leads to a Doppler shift of the received light. Scanning in a conical fashion about the zenith results in a more accurate and two-dimensional measurement of the wind velocity. The major milestones in the benchtop system development were to verify the design by demonstrating the technique in the laboratory, then scale the design down to a size consistent with a demonstrator unit which could be built to take data in the field. The micro-Doppler heterodyne system we developed determines absolute motion by optically mixing a reference beam with the return signal and has shown motion sensitivity to better than 1 cm/s. This report describes the rationale, technical approach and laboratory testing undertaken to demonstrate the feasibility and utility of a system to provide local meteorological data and predict atmospheric particulate motion. The work described herein was funded by

  18. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  19. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  20. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  1. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  2. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  3. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  4. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  5. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  6. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  7. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  8. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  9. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  10. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  11. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  12. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  13. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  14. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  15. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  16. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  17. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  18. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  19. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  20. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  1. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  2. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  3. The balancing act between the constitutional right to strike and the ...

    African Journals Online (AJOL)

    While the South African Constitution enshrines both children's right to a basic education and teachers' right to strike, conflict between these two often occurs when the way in which teachers' unions conduct strike actions detracts from learners' education. This article identifies the parties affected by industrial action in the ...

  4. Expert Anticipatory Skill in Striking Sports: A Review and a Model

    Science.gov (United States)

    Muller, Sean; Abernethy, Bruce

    2012-01-01

    Expert performers in striking sports can hit objects moving at high speed with incredible precision. Exceptionally well developed anticipation skills are necessary to cope with the severe constraints on interception. In this paper, we provide a review of the empirical evidence regarding expert interception in striking sports and propose a…

  5. Factors affecting defensive strike behavior in Brown Treesnakes (Boiga irregularis) provoked by humans

    Science.gov (United States)

    Spencer, McKayka M.; Lardner, Bjorn; Mazurek, M.J.; Reed, Robert N.

    2015-01-01

    Striking is a typical antipredator defense exhibited by many species of snakes. While trapping Brown Treesnakes (Boiga irregularis) on Guam, we observed that snakes most frequently struck at an approaching person at a site where snakes had been trapped, marked, and handled in the past. Using a combination of between-sites and within-site comparisons, we assessed if the propensity to strike was correlated with capture histories (both recent and long-term), snake size, body condition (a proxy to nutritional stress), sex, or tail condition (broken or intact), while controlling for confounding variables. We confirmed that propensity to strike was higher at the site where we had been conducting capture-mark-recapture for several years. However, we were unable to demonstrate a correlation between striking tendencies and individual recent or long-term capture histories. The only morphological covariate that had an effect on strike propensity was sex, with females striking more often than males. After removing the site effect from our model, we found that snakes missing parts of their tails were more likely to strike than snakes with intact tails. We have yet to identify the factor(s) that cause the pronounced difference across sites in snake propensity to strike, and data from additional sites might help elucidate any geographical patterns.

  6. The dark side of solidarity: social norms and social relations in the aftermath of strikes

    NARCIS (Netherlands)

    Thommes, Kirsten; Akkerman, Agnes; Torenvlied, René; Born, Marieke

    2014-01-01

    This paper studies how employees anticipate change in social relations after a strike in their organisation. We hypothesise that two group norms affect employees' fear that a strike deteriorates the social relations with their colleagues. We distinguish between two different norms associated with a

  7. The dark side of solidarity. The impact of norms on the aftermath of strikes

    NARCIS (Netherlands)

    Thommes, K; Akkerman, A.; Torenvlied, R.

    2014-01-01

    This paper studies how employees anticipate change in social relations after a strike in their organisation. We hypothesise that two group norms affect employees' fear that a strike deteriorates the social relations with their colleagues. We distinguish between two different norms associated with a

  8. Variation in Foot Strike Patterns among Habitually Barefoot and Shod Runners in Kenya.

    Science.gov (United States)

    Lieberman, Daniel E; Castillo, Eric R; Otarola-Castillo, Erik; Sang, Meshack K; Sigei, Timothy K; Ojiambo, Robert; Okutoyi, Paul; Pitsiladis, Yannis

    2015-01-01

    Runners are often categorized as forefoot, midfoot or rearfoot strikers, but how much and why do individuals vary in foot strike patterns when running on level terrain? This study used general linear mixed-effects models to explore both intra- and inter-individual variations in foot strike pattern among 48 Kalenjin-speaking participants from Kenya who varied in age, sex, body mass, height, running history, and habitual use of footwear. High speed video was used to measure lower extremity kinematics at ground contact in the sagittal plane while participants ran down 13 meter-long tracks with three variables independently controlled: speed, track stiffness, and step frequency. 72% of the habitually barefoot and 32% of the habitually shod participants used multiple strike types, with significantly higher levels of foot strike variation among individuals who ran less frequently and who used lower step frequencies. There was no effect of sex, age, height or weight on foot strike angle, but individuals were more likely to midfoot or forefoot strike when they ran on a stiff surface, had a high preferred stride frequency, were habitually barefoot, and had more experience running. It is hypothesized that strike type variation during running, including a more frequent use of forefoot and midfoot strikes, used to be greater before the introduction of cushioned shoes and paved surfaces.

  9. The Balancing Act between the Constitutional Right to Strike and the Constitutional Right to Education

    Science.gov (United States)

    Deacon, H. J.

    2014-01-01

    While the South African Constitution enshrines both children's right to a basic education and teachers' right to strike, conflict between these two often occurs when the way in which teachers' unions conduct strike actions detracts from learners' education. This article identifies the parties affected by industrial action in the school context,…

  10. The Implications of Granting New Jersey Teachers the Right to Strike: A Public Policy Statement.

    Science.gov (United States)

    Lisella, Carmine; Schwartz, Patricia

    Strikes are generally accepted as legitimate prerogatives of employees bargaining with employers in the private sector. Two broad questions must be answered when considering whether the right to strike should be granted public employees, including teachers. First, what are the distinctions between the public and private sectors that can reasonably…

  11. Are physicians' strikes ever morally justifiable? A call for a return to ...

    African Journals Online (AJOL)

    Though physicians strike provides an opportunity to generate more knowledge about the process in which legitimacy of an organization can be restored, it meets with a great deal of resistance not only by the public but from within the medical profession. This paper critically examines the legitimacy of strike by medical ...

  12. Major Burn Injury From Lightning Strike: A Case Report and Review ...

    African Journals Online (AJOL)

    BACKGROUND: Lightning has been viewed as a sign of the anger of the “gods” from Greek mythology. Among Yorubas, thunderstorm is regarded as anger from the god of thunder, “Sango” who could strike anybody anywhere to vent his anger at someone who has committed some form of atrocity. When lightning strikes, it ...

  13. Batter's Choice: Lessons for Teaching Tactics in a Modified Striking/Fielding Game

    Science.gov (United States)

    Sinclair, Christina

    2004-01-01

    When played in their standard form, striking/fielding games are often a favorite among elementary students; yet they allow for only limited participation, which is contradictory to quality physical education. This article presents a sequence of lessons leading to Batter's Choice, a modified striking/fielding game, designed to maximize the…

  14. Strike type variation among Tarahumara Indians in minimal sandals versus conventional running shoes

    Directory of Open Access Journals (Sweden)

    Daniel E. Lieberman

    2014-06-01

    Conclusion: These data reinforce earlier studies that there is variation among foot strike patterns among minimally shod runners, but also support the hypothesis that foot stiffness and important aspects of running form, including foot strike, differ between runners who grow up using minimal versus modern, conventional footwear.

  15. A rapid assessment of species-specific bird strike risk at the Kotoka ...

    African Journals Online (AJOL)

    A rapid assessment of species-specific bird strike risk at the Kotoka International Airport in Accra, Ghana. ... We conclude that wildlife management to avert the risk of bird strikes could be successfully achieved by adopting both proactive and reactive measures to reduce the presence of problem species at the aerodrome.

  16. Lightning Strikes and Thunder Claps: The Strategic Bomber and Air Superiority

    Science.gov (United States)

    2012-12-01

    Views November–December 2012 Air & Space Power Journal | 137 Lightning Strikes and Thunder Claps The Strategic Bomber and Air Superiority Maj Wade S...2012 to 00-00-2012 4. TITLE AND SUBTITLE Lightning Strikes and Thunder Claps: The Strategic Bomber and Air Superiority 5a. CONTRACT NUMBER 5b

  17. Variation in Foot Strike Patterns among Habitually Barefoot and Shod Runners in Kenya.

    Directory of Open Access Journals (Sweden)

    Daniel E Lieberman

    Full Text Available Runners are often categorized as forefoot, midfoot or rearfoot strikers, but how much and why do individuals vary in foot strike patterns when running on level terrain? This study used general linear mixed-effects models to explore both intra- and inter-individual variations in foot strike pattern among 48 Kalenjin-speaking participants from Kenya who varied in age, sex, body mass, height, running history, and habitual use of footwear. High speed video was used to measure lower extremity kinematics at ground contact in the sagittal plane while participants ran down 13 meter-long tracks with three variables independently controlled: speed, track stiffness, and step frequency. 72% of the habitually barefoot and 32% of the habitually shod participants used multiple strike types, with significantly higher levels of foot strike variation among individuals who ran less frequently and who used lower step frequencies. There was no effect of sex, age, height or weight on foot strike angle, but individuals were more likely to midfoot or forefoot strike when they ran on a stiff surface, had a high preferred stride frequency, were habitually barefoot, and had more experience running. It is hypothesized that strike type variation during running, including a more frequent use of forefoot and midfoot strikes, used to be greater before the introduction of cushioned shoes and paved surfaces.

  18. Labor Conflict on the National Stage: Metaphoric Lenses in Israel's Teachers' Strike

    Science.gov (United States)

    Shenkar, Miriam; Shenkar, Oded

    2011-01-01

    Teachers often embed their labor demands within a broader context to claim high moral ground and build community support. We analyze a recent teachers' strike in Israel, looking at how the strike played out in a country where the challenges of globalization collided with a socialist legacy in the face of an existential threat. The analysis reveals…

  19. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  20. Developing personal values: trainees' attitudes toward strikes by health care providers.

    Science.gov (United States)

    Li, Su-Ting T; Srinivasan, Malathi; Der-Martirosian, Claudia; Kravitz, Richard L; Wilkes, Michael S

    2011-05-01

    Worldwide, health care providers use strikes and job actions to influence policy. For health care providers, especially physicians, strikes create an ethical tension between an obligation to care for current patients (e.g., to provide care and avoid abandonment) and an obligation to better care for future patients by seeking system improvements (e.g., improvements in safety, to access, and in the composition and strength of the health care workforce). This tension is further intensified when the potential benefit of a strike involves professional self-interest and the potential risk involves patient harm or death. By definition, trainees are still forming their professional identities and values, including their opinions on fair wages, health policy, employee benefits, professionalism, and strikes. In this article, the authors explore these ethical tensions, beginning with a discussion of reactions to a potential 2005 nursing strike at the University of California, Davis, Medical Center. The authors then propose a conceptual model describing factors that may influence health care providers' decisions to strike (including personal ethics, personal agency, and strike-related context). In particular, the authors explore the relationship between training level and attitudes toward taking a job action, such as going on strike. Because trainees' attitudes toward strikes continue to evolve during training, the authors maintain that open discussion around the ethics of health care professionals' strikes and other methods of conflict resolution should be included in medical education to enhance professionalism and systems-based practice training. The authors include sample case vignettes to help initiate these important discussions. Copyright © by the Association of American medical Colleges.

  1. Surface Acoustic Wave Detection of Chemical Warfare Agents

    Science.gov (United States)

    1988-10-01

    diisopropylamino)ethyl]- methylphosphonothioate (VX), all organophosphorous compounds, and bis(2-chloroethyl)sulfide (HD), an organosulfur compound. The...the SAW device to the presence of HD, the only organosulfur compound that was tested, is shown in Table 6. Because no organosulfur simulants had

  2. Fold-and-thrust belt evolution influenced by along and across strike thickness variations: new insights from brittle-ductile centrifuge analogue models

    Science.gov (United States)

    Santolaria Otin, Pablo; Harris, Lyal; Casas, Antonio; Soto, Ruth

    2014-05-01

    Using a new centrifuge analogue modelling approach, 38 models were performed to study the influence of along and across strike thickness variations of a ductile-brittle layered sequence on the kinematics and deformation style of fold-and-thrust belts. Four different series, changing the brittle-ductile thickness ratio in models with i) constant thickness, ii) across strike varying thickness, iii) along strike varying thickness and iv) along and across-strike varying thickness, were performed. The brittle sedimentary cover was simulated by "Moon Sand™", regular fine-grained quartz sand coated by polymer and synthetic rubber binders, allowing layers to be placed vertically in the centrifuge (impossible with normal sand). The ductile décollement (evaporites) was simulated by silicone putty (Crazy Aaron Enterprise's Thinking Putty™). Models were run step by step in a high-acceleration centrifuge attaining 900 g, what allows to drastically reduce the experimental time. In addition to surface observation and serial cross-sections at the end of the models, CT scans portray the progressive 3- and 4-dimensional evolution of several models. With constant thickness, the increase of the brittle-ductile ratio results in the decrease of the number of structures where shortening is accommodated and the development of structures does not follow a linear sequence. Across-strike thickness variations trigger the location of deformation towards the wedge front, precluding the emplacement of structures in the hinterland. Along-strike thickness changes result in the lateral variation of the number of structure and a differential displacement of the deformation front. The occurrence of oblique structures is enhanced in wedges with across and along strike thickness variations where, in addition, rotational domains are observed. Comparison with the South Pyrenean Central Unit, in the Southern Pyrenees, characterized by a west- and southward thinning of the pretectonic Mesozoic series

  3. Propagation of strike-slip faults across Holocene volcano-sedimentary deposits, Pasto, Colombia

    Science.gov (United States)

    Rovida, Andrea; Tibaldi, Alessandro

    2005-10-01

    This study contributes to the understanding of shear failure development on the basis of macroscopic field data collected in latest Pleistocene-Holocene pyroclastic and fluvio-lacustrine deposits in the Pasto Valley, SW Colombia. Here there is a pervasive system of microfaults and joints. Right-lateral strike-slip microfaults strike N065°, whereas left-lateral strike-slip microfaults strike N120°. Three main joint sets strike N, N065° and N020° in decreasing order of frequency. Stress computation gives a horizontal σ1 trending ˜N060° and a horizontal σ3 trending ˜N150°, consistent with earthquake focal mechanisms and stress inversion of main faults. Synthetic shears dominate resulting from nucleation of older cracks. In the basement cropping out northeast of Pasto, the NE- to ENE-striking Buesaco, Aranda and Pasto Faults show evidence of latest Pleistocene-Holocene right-lateral strike-slip motions. The structures in the Pasto Valley can be interpreted as a Mode III damage zone representing the up-dip propagation of the main faults across the young volcano-sedimentary deposits.

  4. Collective Labor Disputes and Strikes in Russia: The Impact of Judicial Precedents and Enforcement

    Directory of Open Access Journals (Sweden)

    Elena Gerasimova

    2017-01-01

    Full Text Available The right to strike is recognized in the Constitution and the Labor Code of the Russian Federation as a means to resolve collective labor disputes. However, in Russia labor protests come up for discussion much more frequently than strikes. In recent years the number of labor protests in Russia, including various forms of work stoppage, has increased significantly compared to previous years, but the number of legally constituted collective labor disputes and strikes has remained very low. The legislation on resolution of collective labor disputes and mounting strikes is quite restrictive in Russia, and its enforcement also encourages employees to seek alternative ways to settle collective labor conflicts. There is little empirical research on the judicial implementation of these norms and its influence on the enforcement of legislation. Therefore, this paper analyses the reasoning of courts in cases on the legality of strikes, their interpretations of the law, and the impact these decisions have on the enforcement of the legislation on resolution of collective labor disputes and strikes. Our conclusion is that the courts act as another restrictive influence on the resolution of collective labor disputes and the exercise of the right to strike in Russia.

  5. A simple field method to identify foot strike pattern during running.

    Science.gov (United States)

    Giandolini, Marlène; Poupard, Thibaut; Gimenez, Philippe; Horvais, Nicolas; Millet, Guillaume Y; Morin, Jean-Benoît; Samozino, Pierre

    2014-05-07

    Identifying foot strike patterns in running is an important issue for sport clinicians, coaches and footwear industrials. Current methods allow the monitoring of either many steps in laboratory conditions or only a few steps in the field. Because measuring running biomechanics during actual practice is critical, our purpose is to validate a method aiming at identifying foot strike patterns during continuous field measurements. Based on heel and metatarsal accelerations, this method requires two uniaxial accelerometers. The time between heel and metatarsal acceleration peaks (THM) was compared to the foot strike angle in the sagittal plane (αfoot) obtained by 2D video analysis for various conditions of speed, slope, footwear, foot strike and state of fatigue. Acceleration and kinematic measurements were performed at 1000Hz and 120Hz, respectively, during 2-min treadmill running bouts. Significant correlations were observed between THM and αfoot for 14 out of 15 conditions. The overall correlation coefficient was r=0.916 (Pfoot strike except for extreme forefoot strike during which the heel rarely or never strikes the ground, and for different footwears and states of fatigue. We proposed a classification based on THM: FFS<-5.49ms

  6. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  7. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  8. Gender frames and collective action: Configurations of masculinity in the Pittston Coal strike

    Energy Technology Data Exchange (ETDEWEB)

    Beckwith, K. [College Wooster, Wooster, OH (United States)

    2001-06-01

    This article develops the concept of gender frame for understanding major transformations in the collective action repertoires of social movements. Focusing on the United Mine Workers of America (UMWA) strike against the Pittston Coal Group (1989-90), the article discusses the UMWA's traditional collective action repertoire and its innovation of nonviolent protest, widely employed during the strike. Interviews with major activists and UMWA staff and officers illustrate how the UMWA employed a gender frame of mining masculinities to initiate the new nonviolent strike action. The article concludes by suggesting how collective action repertoires and framing are linked and encouraging future research on gender frames in social movements.

  9. EW 101 a first course in electronic warfare

    CERN Document Server

    Adamy, David L

    2000-01-01

    This popular series of tutorials, featured over a period of years in the Journal of Electronic Defense, is now available in a single volume. Organized into chapters with new introductory and supplementary material from the author, you get clear, concise and well-illustrated examinations of critical topics such as antenna parameters, receiver sensitivity, processing tasks, and search strategies, LPI signals, jamming, communication links, and simulation. The chapters define key terms and explain how and why particular technologies are relevant to electronic defense. Detailed charts, diagrams and

  10. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    Science.gov (United States)

    1947-11-01

    263 Pathogenicity 266 Defensive Research 269 IX BRUCELLOSIS 276 General 276 Selection of Strain 277 Simulant.. m ^ -78 Nutrition ; 2S0...Safety Precautions *. sg^, Production of Inactivated Bovine Tissue Vaccines... 362 Production of Inactivated Egg-Cultivated Virus 365...Serrisc M » C •« e li t\\ a .. 0LU21L. liar Research Service Project # 3 Subject for Research: Brucellosis (Code "US") Location

  11. Expeditionary Strike Group: New Label, or New Concept - for Future Naval Warriors of America's Small Wars?

    National Research Council Canada - National Science Library

    Hancock, Daryl

    2003-01-01

    ... as, emergent contingency operations, and major theater wars. In the near future they will accomplish this mission while deployed around the globe under the new concept of Expeditionary Strike Groups (ESG...

  12. Three-dimensional impact kinetics with foot-strike manipulations during running

    Directory of Open Access Journals (Sweden)

    Andrew D. Nordin

    2017-12-01

    Conclusion: Loading rate–time assessment identified contrasting impact characteristics in each direction and the 3D resultant following foot-strike manipulations, with potential implications for lower extremity structures in running.

  13. Personality Characteristics of Pre/Post-Strike Air Traffic Control Applicants

    National Research Council Canada - National Science Library

    Schroeder, David

    1997-01-01

    ...) positions within the Federal Aviation Administration for more than 3 decades. This study was designed to assess the relationship between personality characteristics of a group of post-strike applicants (1984...

  14. Counterproliferation Strategy: The Role of Preventive War, Preventive Strikes, and Interdiction

    National Research Council Canada - National Science Library

    Rak, Claire

    2003-01-01

    This thesis analyzes the potential effectiveness of preventive war, preventive strikes, and interdiction as tools for the United States to counter the proliferation of weapons of mass destruction (WMD...

  15. Wildlife strike risk assessment in several Italian airports: lessons from BRI and a new methodology implementation.

    Directory of Open Access Journals (Sweden)

    Cecilia Soldatini

    Full Text Available The presence of wildlife in airport areas poses substantial hazards to aviation. Wildlife aircraft collisions (hereafter wildlife strikes cause losses in terms of human lives and direct monetary losses for the aviation industry. In recent years, wildlife strikes have increased in parallel with air traffic increase and species habituation to anthropic areas. In this paper, we used an ecological approach to wildlife strike risk assessment to eight Italian international airports. The main achievement is a site-specific analysis that avoids flattening wildlife strike events on a large scale while maintaining comparable airport risk assessments. This second version of the Birdstrike Risk Index (BRI2 is a sensitive tool that provides different time scale results allowing appropriate management planning. The methodology applied has been developed in accordance with the Italian Civil Aviation Authority, which recognizes it as a national standard implemented in the advisory circular ENAC APT-01B.

  16. Electrically conductive carbon fibre-reinforced composite for aircraft lightning strike protection

    Science.gov (United States)

    Katunin, Andrzej; Krukiewicz, Katarzyna; Turczyn, Roman; Sul, Przemysław; Bilewicz, Marcin

    2017-05-01

    Aircraft elements, especially elements of exterior fuselage, are subjected to damage caused by lightning strikes. Due to the fact that these elements are manufactured from polymeric composites in modern aircraft, and thus, they cannot conduct electrical charges, the lightning strikes cause burnouts in composite structures. Therefore, the effective lightning strike protection for such structures is highly desired. The solution presented in this paper is based on application of organic conductive fillers in the form of intrinsically conducting polymers and carbon fabric in order to ensure electrical conductivity of whole composite and simultaneously retain superior mechanical properties. The presented studies cover synthesis and manufacturing of the electrically conductive composite as well as its characterization with respect to mechanical and electrical properties. The performed studies indicate that the proposed material can be potentially considered as a constructional material for aircraft industry, which characterizes by good operational properties and low cost of manufacturing with respect to current lightning strike protection materials solutions.

  17. Annotated Bibliography of Bird Hazards to Aircraft: Bird Strike Committee Citations 1967-1997

    National Research Council Canada - National Science Library

    Short, Jeffrey

    1998-01-01

    .... This annotated bibliography of bird hazards to aircraft, termed ABBHA, is a compilation of citations with abstracts on a wide range of related topics such as bird strike tolerance engineering, bird...

  18. Bird Strike Committee Europe (BSCE) , 13th Meeting, Bern, Switzerland 29th May to 2nd June 1978

    National Research Council Canada - National Science Library

    1979-01-01

    ...: Identification of Bird Remains as Part of the Bird Strike Reporting Procedure Birdstrikes - Helicopter in GAF Collisions with Birds of Prey in the Alps The Bird Strike Reporting System in Swiss Air...

  19. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  20. The Evolution of Preemptive Strikes in Israeli Operational Planning and Future Implications for the Cyber Domain

    Science.gov (United States)

    2013-05-23

    The strategic and operational use of preemptive strikes has transitioned from the traditional tactic of air raids to the use of covert cyber attacks like...Stuxnet, operational planners can gain an understanding of the evolution of preemption as a concept. Examining this shift from air strikes to cyber ... attacks through the lens of U.S. Army Doctrine and the tenets of Unified Land Operations (Depth, Synchronization, Integration, Adaptability, Flexibility