WorldWideScience

Sample records for surface warfare officer

  1. The Effect of the Goldwater-Nichols Department of Defense Reorganization Act on Surface Warfare Officer Career Paths.

    Science.gov (United States)

    1987-12-01

    OF THE GOLDWATER-NIaIS DEARnhmr OF DESE REOFGANIZATION ACr ON SURFACE WARFARE OFFICER CAREER PATHS 12. PERSONAL AUTHOR(S) Steward, Thomas F. 13a...at these levels. The stocks at tour 12D increase 160o by the 5 %i year of the simulation. This is depicted graphically in Figure -4.2. The stocks of...with Datj B.,e Management ,DB.MI and graphics software to provide a powerful decisIon sUpporT " for the manpower analyst. e.r5 dt r APPENDIX A FLOW

  2. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    Science.gov (United States)

    2009-08-24

    Chief of Naval Operations Surface Warfare Directorate. (2002, June 15). Navigation, seamanship and shiphandling training requirements document...unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 An Assessment of the Effectiveness of Computer-based Training...Stephen Mehay, Professor With the assistance of Carol Stoker and Robert Paynter Naval Postgraduate School Naval Postgraduate School

  3. Improving Professional Development for USAF Electronic Warfare Officers

    Science.gov (United States)

    2012-02-15

    NOTE AIR WAR COLLEGE AIR UNIVERSITY IMPROVING PROFESSIONAL DEVELOPMENT FOR USAF ELECTRONIC WARFARE OFFICERS by Gregory M. Patschke, Col...and planning. Professional development comprises both continuing education and career development. In the US Air Force, the acquisition, space...and cyberspace communities have professional development programs already in place. For the continuing education half of professional development , the

  4. The Effect of Advanced Education on the Retention and the Promotion of Surface Warfare Officers in the U.S. Navy

    Science.gov (United States)

    2012-03-01

    promoted. First Professional degrees include fields such as law, education, medicine, pharmacy, or dentistry . Officers with those degrees can find...civilian job. We didn’t have any variables that would proxy conditions in the civilian labor market . For that reason, our model is likely

  5. Transforming the Surface Warfare Officer Training Curriculum

    Science.gov (United States)

    2010-04-29

    Structures. Additionally, students were introduced to Staff Planning , Operational Security, Damage Control, Firefighting, Message Drafting, and...Union Nacional de Instituciones Para El Trabajo de Acci6n Social] UNIT AS exercise, in the darkness and fog, LA MOURE COUNTY drove ashore on a small

  6. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    choose to perform the 500- yard swim. Diving starts are not permitted, but swimmers may push off from the ends of the pool with their hands and feet at...alcohol, and caffeine [Ref. 57]. c. Skin-fold Caliper The skin-fold caliper method involves measuring the thickness of skin and underlying subcutaneous fat

  7. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    Science.gov (United States)

    2014-12-01

    Table 13.  OLS coefficients and T-stat for female data set .................................. 35  Table 14.  Summary of expected and observed...retention to the economy, SWO career pay (SWOCP), and an interaction of the economy and SWOCP. B. EXPECTED BENEFITS A better understanding of...insufficient evidence to support H2, that career pay positively affects the female SWO population. 36 (3) Female Data Set—H3 The female data set is

  8. Officer Overexecution: Analysis and Solutions (Technical Background)

    Science.gov (United States)

    2015-08-01

    Distribution unlimited Officer Overexecution: Analysis and Solutions (Technical Background ) Jared M. Huff and Ann D. Parcell...Deviation SME Subject Matter Expert SWO Surface Warfare Officer SWO(N) Surface Warfare Officer with the Nuclear Subspecialty TFMMS Total Force...affect retention behavior. Some subject matter experts ( SMEs ) have suggested that an excess of junior officers (JOs) on board surface ships may not

  9. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  10. Survey and Analysis of Surface Warfare Officer Career Path Issues

    Science.gov (United States)

    1989-09-01

    this specialization alternative are discussed in Swinger [Ref. 2:pp. 98-100]. 1. Hypothesis 1 The null hypothesis states that each specialization...Maior Career Path Change (NPRDC TN 89-5), Navy Personnel Research and Development Center, October 1988. 2. Swinger , A., "Talent at Sea," U. S. Naval

  11. Spectroscopic investigations of surface deposited biological warfare simulants

    Science.gov (United States)

    Barrington, Stephen J.; Bird, Hilary; Hurst, Daniel; McIntosh, Alastair J. S.; Spencer, Phillippa; Pelfrey, Suzanne H.; Baker, Matthew J.

    2012-06-01

    This paper reports a proof-of-principle study aimed at discriminating biological warfare (BW) simulants from common environmental bacteria in order to differentiate pathogenic endospores in situ, to aid any required response for hazard management. We used FTIR spectroscopy combined with multivariate analysis; FTIR is a versatile technique for the non-destructive analysis of a range of materials. We also report an evaluation of multiple pre-processing techniques and subsequent differences in cross-validation accuracy of two pattern recognition models (Support Vector Machines (SVM) and Principal Component - Linear Discriminant Analysis (PC-LDA)) for two classifications: a two class classification (Gram + ve spores vs. Gram -ve vegetative cells) and a six class classification (bacterial classification). Six bacterial strains Bacillus atrophaeus, Bacillus thuringiensis var. kurstaki, Bacillus thuringiensis, Escherichia coli, Pantaeoa agglomerans and Pseudomonas fluorescens were analysed.

  12. Information Warfare Officer Retention: Using a Capabilities-based Assessment to Solve Retention Issues

    Science.gov (United States)

    2009-12-01

    assisted along the way, including Dr. Quinn Kennedy, Dr. Rachel Johnson, Dr. Larry Shattuck, Dr. Nita Miller , and Dr. Ji Hyun Yang. Additionally...specialties such as nurses, anesthesiologists , radiologists, and surgeons. In order to be eligible for the HHS CSRBs, medical officers must work for three

  13. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... and the Potomac River, Dahlgren, VA; Danger Zone AGENCY: U.S. Army Corps of Engineers, DoD. ACTION... danger zone in the vicinity of Naval Surface Warfare Center, Dahlgren, in King George County, Virginia..., and expands the boundaries of a portion of the danger zone. The amendment is necessary to protect...

  14. 75 FR 3395 - Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division...

    Science.gov (United States)

    2010-01-21

    ..., and provide the opportunity for an experienced biologist to collect data on marine mammal behavior... National Oceanic and Atmospheric Administration 50 CFR Part 218 RIN 0648-AW80 Taking and Importing Marine Mammals; U.S. Naval Surface Warfare Center Panama City Division Mission Activities AGENCY: National Marine...

  15. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies.

  16. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  17. Nanowire-based surface-enhanced Raman spectroscopy (SERS) for chemical warfare simulants

    Science.gov (United States)

    Hoffmann, J. A.; Miragliotta, J. A.; Wang, J.; Tyagi, P.; Maddanimath, T.; Gracias, D. H.; Papadakis, S. J.

    2012-06-01

    Hand-held instruments capable of spectroscopic identification of chemical warfare agents (CWA) would find extensive use in the field. Because CWA can be toxic at very low concentrations compared to typical background levels of commonly-used compounds (flame retardants, pesticides) that are chemically similar, spectroscopic measurements have the potential to reduce false alarms by distinguishing between dangerous and benign compounds. Unfortunately, most true spectroscopic instruments (infrared spectrometers, mass spectrometers, and gas chromatograph-mass spectrometers) are bench-top instruments. Surface-acoustic wave (SAW) sensors are commercially available in hand-held form, but rely on a handful of functionalized surfaces to achieve specificity. Here, we consider the potential for a hand-held device based on surface enhanced Raman scattering (SERS) using templated nanowires as enhancing substrates. We examine the magnitude of enhancement generated by the nanowires and the specificity achieved in measurements of a range of CWA simulants. We predict the ultimate sensitivity of a device based on a nanowire-based SERS core to be 1-2 orders of magnitude greater than a comparable SAW system, with a detection limit of approximately 0.01 mg m-3.

  18. Associations between PBDEs in Office Air, Dust, and Surface Wipes

    OpenAIRE

    2013-01-01

    Increased use of flame-retardants in office furniture may increase exposure to PBDEs in the office environment. However, partitioning of PBDEs within the office environment is not well understood. Our objectives were to examine relationships between concurrent measures of PBDEs in office air, floor dust, and surface wipes.

  19. Surface plasmon resonance detection of biological warfare agent Staphylococcal enterotoxin B using high affinity monoclonal antibody

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Garima; Singh, Pawan K.; Boopathi, M., E-mail: mannanboopathi@yahoo.com; Kamboj, D.V.; Singh, Beer; Vijayaraghavan, R.

    2010-11-30

    A novel sensitive method was developed for the detection as well as quantification of Staphylococcal enterotoxin B (SEB) using surface plasmon resonance (SPR). It is well known that the amount of SEB needed to cause the intoxication to human beings is very less and this concentration (0.02 {mu}g/kg) is highly dangerous, hence, it is used as biological warfare agent. Thus, the need to develop a reliable and potential detection system against SEB is warranted. In the present work, SEB antibody was immobilized on carboxymethyldextran modified gold chip. The immobilization of SEB antibody and interaction of antigen with immobilized antibody were in-situ characterized by SPR and electrochemical impedance spectroscopy. A sample solution containing SEB antigen was injected in a working channel and the results revealed linearity in the concentration from 2.0 to 32.0 pM with a detection limit of 1.0 pM. By using kinetic evaluation software, K{sub D} (equilibrium constant) and Bmax (maximum binding capacity of analyte) values were calculated and found to be 13 pM and 424.23, respectively. Moreover, the thermodynamic parameter, change in Gibb's free energy was deduced and found to be -62.08 kJ/mol and this value shows the spontaneous interaction between SEB antigen and SEB antibody. In order to optimize the detection method, temperature and pH variation studies were also performed. Interference study was conducted to know the selectivity for the antigen-antibody interaction of SEB. The selectivity efficiency of SEB, SEC, SEA and SED were 100, 27.15, 20.01 and 12.05%, respectively towards SEB antibody.

  20. A Virtual Commanding Officer, Intelligent Tutor for the Underway Replenishment Ship-handling Virtual Environment Simulator

    OpenAIRE

    Tenney, Karl R.

    1999-01-01

    While developing a Virtual Environment (VE) Ship-handling simulator for the Surface Warfare Officer School (SWOS) in Newport, RI, researchers at the Naval Air Warfare Center Training Systems Division (NAWCTSD) in Orlando, FL recognized the idea of integrating an Intelligent Tutoring System (ITS) to provide feedback to the student The system, known as a Virtual Commanding Officer (VCO), would provide instructional feedback to the student to ensure that beneficial training occurs. The VCO would...

  1. Roman Warfare

    Directory of Open Access Journals (Sweden)

    D.B. Saddington

    2012-03-01

    Full Text Available

    ROTH, Jonathan P 2009. Roman Warfare. Cambridge: Cambridge University Press. Pbk. R250. ISBN 978-0-521-53726-1.

    Jonathan Roth of San Jose State University, known as an expert on military logistics, has written this attractive Cambridge Introduction to Roman Civilization volume on Roman Warfare. The series is designed for students with no prior knowledge of Roman antiquity. The book comprises an Introduction on Sources and Methods (pp. 1-6 and 15 chapters on Roman warfare from the beginnings to the fall of the Western Empire in AD 476, using a chronological approach. There are 68 illustrations and maps, a Timeline, a Glossary, a Glossary of People, a Bibliography (which includes several websites and an Index.

  2. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...

  3. An Examination of the Human Factors Attitudes and Knowledge of Surface Warfare Officers

    Science.gov (United States)

    2009-12-01

    result from a single error. This idea is captured by the most widely known model of accident causation of human error—the “Swiss Cheese ” model (Reason...London: Lloyds List Events. Booher, H. (2003). Handbook of human systems integration. New Jersey: John Wiley & Sons. Canadian Transportation

  4. Adding a Performance-Based Component to Surface Warfare Officer Bonuses: Will it Affect Retention?

    Science.gov (United States)

    2008-03-01

    2007b; Herzberg , 1987) The military is no stranger to applications of Herzberg’s Motivation -Hygiene Theory . The 2000 Military Exit Survey indicated...115 3. Agency Theory .................................................................................117 4. Herzberg’s Motivation -Hygiene...114 Figure 27. Expectancy Theory of Motivation (Adapted from McShane & Von Glinow, 2007, p. 96

  5. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    organization and capabilities. The Character Development and Training program is designed to teach first-year students ( Plebes ) about the Navy they are...inheriting. Each subsequent rank of midshipmen has a responsibility to train Plebes during regular review periods throughout the year. While the...focus of the pro-knowledge review is on the Plebes , all midshipmen (regardless of rank) must stay current on these topics to maintain and foster an

  6. An Exploratory Study: Female Surface Warfare Officers’ Decisions to Leave Their Community

    Science.gov (United States)

    2006-03-01

    want to be part of a profession that condones this type of behavior. I had problems with a lot of sexism , sexual harassment in the chain of command...the community. If you close the gates and say, “You’re not getting in because you’re going to have to fight to get into this community. We’re not

  7. The Effect of Graduate Education Timing on the Retention of Surface Warfare Officers

    Science.gov (United States)

    2016-03-01

    characteristics including gender , race/ethnicity category, marital status, dependents. Job related measures included are prior enlisted, commissioning...retention tool. Future work can address the potential selection bias associated with higher retention of those with graduate education attained after...of a strategic investment in human capital that can be used by the Navy as a retention tool. Future work can address the potential selection bias

  8. "A Change of Paradigm" in Developing Land Forces Officers' Professional Skills in Accordance with Hybrid Warfare Task-Requirements

    Directory of Open Access Journals (Sweden)

    Alexandru Rizescu

    2016-06-01

    Full Text Available In future conflicts, not only traditional or asymmetric actions will be used, but also a combination of the two in order to solve the disputes involving national and international actors, materialized today in different manifestation forms called hybrid war. The hybrid threats tell about the evolution of the contemporary and future threats, about the necessity of a national effort concerted towards providing an immediate effective response to these threats. From a different perspective, the diversity and the complexity of the issues raised by the hybrid threats prove that it is necessary to go beyond the technical or sequential nowadays answers. It results first that it is required to develop an appropriate security strategy which will make possible the efficient action against hybrid risks and threats, in an effective, operational and unitary manner. Therefore, the present article aims at sequentially highlighting the aspects supporting the need to correlate the coordinates of the national security strategy to the planning, conduct and quality assessment of the process of training officers from the “change of paradigm” perspective, in order to acquire the professional skills conforming to the task-requirements specific to the hybrid war. Nothing more natural, more necessary and at the same time more current in this perspective than modernizing the military continuous education system in accordance with the strategic norm of competence.

  9. Hydrogeologic and water-quality data for the explosive experimental area, Naval Surface Warfare Center, Dahlgren Site, Dahlgren, Virginia

    Science.gov (United States)

    Hammond, E.C.; Bell, C.F.

    1995-01-01

    Hydrogeologic and water-quality data were collected at the Explosive Experimental Area, Naval Surface Warfare Center, Dahlgren Site at Dahlgren, Virginia, as part of a hydrogeologic assessment of the shallow aquifer system begun in 1993. The U.S. Geological Survey conducted this study to provide the U.S. Navy with hydrogeologic data to aid in the evaluation of the effects from remediation of contaminated sites and to protect against additional contamination. This report describes the ground-water observation- well network, hydrogeologic, and water-quality data collected between October 1993 and April 1995. The report includes a description of the locations and construction of 28 observation wells on the Explosive Experimental Area. Hydrogeologic data include lithologic logs, geophysical logs, and vertical hydraulic conductivity measurements of selected core intervals. Hydrologic data include synoptic and hourly measurements of ground-water levels, and observation-well slug tests to determine horizontal hydraulic conductivity. Water-quality data include analyses of major dissolved constituents in ground water and surface water.

  10. Analysis of Surface Warfare Enterprise’s Implementation of Enterprise Management Practices

    Science.gov (United States)

    2010-12-01

    OMT Overall Metrics Team OPNAV Office of the Chief of Naval Operations OPTEVFOR Operational Test & Evaluation Force PAC...Charter, 10–12. 54  Overarching Metrics Team ( OMT ) – led by CNSF N8A and provides consistent, replicable, and integrated SWE performance measures in

  11. Surface with two paint strips for detection and warning of chemical warfare and radiological agents

    Science.gov (United States)

    Farmer, Joseph C.

    2013-04-02

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  12. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  13. Chemical Warfare Agent Surface Adsorption: Hydrogen Bonding of Sarin and Soman to Amorphous Silica

    Science.gov (United States)

    2014-03-17

    small transfer chamber located within the confines of a CWA-certified surety fume hood . Within the main chamber, the sample was mounted on a molybdenum...Particulate silica surface samples were prepared by dispersing silica (200 m2/g, Aerosil fumed silica with a 12 nm average particle diameter) from a

  14. Biological warfare agents.

    Science.gov (United States)

    Pohanka, Miroslav; Kuca, Kamil

    2010-01-01

    Biological warfare agents are a group of pathogens and toxins of biological origin that can be potentially misused for military or criminal purposes. The present review attempts to summarize necessary knowledge about biological warfare agents. The historical aspects, examples of applications of these agents such as anthrax letters, biological weapons impact, a summary of biological warfare agents and epidemiology of infections are described. The last section tries to estimate future trends in research on biological warfare agents.

  15. Depth vs. breadth: talent management for special warfare

    OpenAIRE

    Krebs, William K.

    2016-01-01

    Approved for public release; distribution is unlimited This thesis presents recommendations for improving officer talent management for Special Warfare units. Success in this complex human domain demands that key planners and commanders of a Special Warfare campaign operate with a long-term perspective, a depth of expertise, and a strong network of relationships. However, on any given day in a U.S. Army Special Forces Group, the preponderance of field grade officers are in their first year...

  16. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  17. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  18. Comparison of latex body paint with wetted gauze wipes for sampling the chemical warfare agents VX and sulfur mustard from common indoor surfaces.

    Science.gov (United States)

    Hernon-Kenny, Laura A; Behringer, Deborah L; Crenshaw, Michael D

    2016-05-01

    Comparison of solvent-wetted gauze with body paint, a peelable surface sampling media, for the sampling of the chemical warfare agents VX and sulfur mustard from nine surfaces was performed. The nine surfaces sampled are those typical of interior public venues and include smooth, rough, porous, and non-porous surfaces. Overall, solvent-wetted gauze (wipes) performed better for the recovery of VX from non-porous surfaces while body paint (BP) performed better for the porous surfaces. The average percent VX recoveries using wipes and BP, respectively, are: finished wood flooring, 86.2%, 71.4%; escalator handrail, 47.3%, 26.7%; stainless steel, 80.5%, 56.1%; glazed ceramic tile, 81.8%, 44.9%; ceiling tile, 1.77%, 13.1%; painted drywall 7.83%, 21.1%; smooth cement, 0.64%, 10.3%; upholstery fabric, 24.6%, 23.1%; unfinished wood flooring, 9.37%, 13.1%. Solvent-wetted gauze performed better for the recovery of sulfur mustard from three of the relatively non-porous surfaces while body paint performed better for the more porous surfaces. The average percent sulfur mustard recoveries using wipes and BP, respectively, are: finished wood flooring, 30.2%, 2.97%; escalator handrail, 4.40%, 4.09%; stainless steel, 21.2%, 3.30%; glazed ceramic tile, 49.7%, 16.7%; ceiling tile, 0.33%, 11.1%; painted drywall 2.05%, 10.6%; smooth cement, 1.20%, 35.2%; upholstery fabric, 7.63%, 6.03%; unfinished wood flooring, 0.90%, 1.74%.

  19. Naval Special Warfare Injury Prevention and Human Performance Initiative

    Science.gov (United States)

    2012-06-30

    3. DATES COVERED (From - To) 01 JUL 10-30 JUN 12 4. TITLE AND SUBTITLE Naval Special Warfare Group 4 Injury Prevention and Human Performance...from suboptimal biomechanical, musculoskeletal, and physiological characteristics and is further compounded with poor or inadequate nutrition . The...Prescribed by ANSI Std. Z39.18 OFFICE OF NAVAL RESEARCH FINAL TECHNICAL REPORT Naval Special Warfare Injury Prevention and Human Performance

  20. Framework of Shipboard UAV Coordinated Surface to Sea Attack Based on Target-Centric Warfare Theory%基于目标中心战的舰载UAV协同对海突击作战构想

    Institute of Scientific and Technical Information of China (English)

    韩玉龙; 严建钢; 陈榕

    2016-01-01

    Aiming at the characteristics of shipboard UAV formationcoordinated surface to sea attack,absorbing target-centric warfare theory,a framework of shipboard UAV formationcoordinated surface to sea attack is put forward and the application feasibility of the theory is demonstrated. Then the conception and characteristics of shipboard UAV formationcoordinated surface to sea attack based on target-centric warfare theory are advanced. Moreover,this paper reconstructs the’Reconnaissance-Regulation-Attack-Evaluation’operation flow of target-centric warfare theory and establishes five steps for shipboard UAV coordinated surface to sea attack based on target-centric warfare theory, including situation evaluation, target selection and allocation, path planning and effectiveness evaluation.%针对舰载无人机编队协同对海突击作战的特点,在充分吸收目标中心战理论的基础上,提出了基于目标中心战的舰载无人机编队协同对海突击作战构想,论证了目标中心战应用于舰载无人机编队协同对海突击作战的可行性,并对其概念和特征进行了界定和分析,着重对目标中心战理论中的“侦-控-打-评”作战过程进行适应性改造,提出了基于目标中心战的舰载无人机编队协同对海突击作战的主要环节,包括态势评估,目标选择与分配,航路规划,协同打击和效能评估等。

  1. Wipe selection for the analysis of surface materials containing chemical warfare agent nitrogen mustard degradation products by ultra-high pressure liquid chromatography-tandem mass spectrometry.

    Science.gov (United States)

    Willison, Stuart A

    2012-12-28

    Degradation products arising from nitrogen mustard chemical warfare agent were deposited on common urban surfaces and determined via surface wiping, wipe extraction, and liquid chromatography–tandem mass spectrometry detection. Wipes investigated included cotton gauze, glass fiber filter, non-woven polyester fiber and filter paper, and surfaces included several porous (vinyl tile, painted drywall, wood) and mostly non-porous (laminate, galvanized steel, glass) surfaces. Wipe extracts were analyzed by ultra-high pressure liquid chromatography–tandem mass spectrometry (UPLC–MS/MS) and compared with high performance liquid chromatography–tandem mass spectrometry (HPLC–MS/MS) results. An evaluation of both techniques suggests UPLC–MS/MS provides a quick and sensitive analysis of targeted degradation products in addition to being nearly four times faster than a single HPLC run, allowing for greater throughput during a wide-spread release concerning large-scale contamination and subsequent remediation events. Based on the overall performance of all tested wipes, filter paper wipes were selected over other wipes because they did not contain interferences or native species (TEA and DEA) associated with the target analytes, resulting in high percent recoveries and low background levels during sample analysis. Other wipes, including cotton gauze, would require a pre-cleaning step due to the presence of large quantities of native species or interferences of the targeted analytes. Percent recoveries obtained from a laminate surface were 47–99% for all nitrogen mustard degradation products. The resulting detection limits achieved from wipes were 0.2 ng/cm(2) for triethanolamine (TEA), 0.03 ng/cm(2) for N-ethyldiethanolamine (EDEA), 0.1 ng/cm(2) for N-methyldiethanolamine (MDEA), and 0.1 ng/cm(2) for diethanolamine (DEA).

  2. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  3. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  4. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  5. You Only Get One Chance to Make a First Impression: A Quantitative Analysis of Division Officer Fleet Experiences on Surface Warfare Officer Retention

    Science.gov (United States)

    2007-03-01

    to remain in the Navy because they have a higher “taste” for the military lifestyle. Otherwise, they would not have matriculated at the Naval...physical sciences or mathematics , 149 (4.6%) majored in the biological sciences, 653 (20.4%) majored in the social sciences, 299 (9.3%) majored in...leave the Navy prior to the O-4 board than were engineering majors. Science and mathematics majors, however, were more likely to remain in the Navy

  6. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available to cyber warfare. This article aims to provide evidence towards the probability of predicting and mapping traditional warfare measurements to the cyber warfare domain. Currently the only way of cyber warfare measurement is located in traditional information...

  7. Multifunctional Ultra-High Vacuum Apparatus for Studies of the Interactions of Chemical Warfare Agents on Complex Surfaces

    Science.gov (United States)

    2014-01-02

    on gamma alumina surfaces. This work was followed by other investigations of organophosphate CWA decomposition on alumina.35 In addition, Wagner and...nm particle di- ameter) was chosen as the first surface to study because the adsorption of many organophosphate molecules (simu- lants) to silica has...Kondratyuk, and J. T. Yates, “Photooxidation of a mus- tard gas simulant over TiO2-SiO2 mixed-oxide photocatalyst: Site poison - ing by oxidation products

  8. HIGHLY SELECTIVE SENSORS FOR CHEMICAL AND BIOLOGICAL WARFARE AGENTS, INSECTICIDES AND VOCS BASED ON A MOLECULAR SURFACE IMPRINTING TECHNIQUE

    Science.gov (United States)

    Abstract was given as an oral platform presentation at the Pittsburgh Conference, Orlando FL (March 5-9, 2006). Research described is the development of sensors based on molecular surface imprinting. Applications include the monitoring of chemical and biological agents and inse...

  9. Operational assimilation of ASCAT surface soil wetness at the Met Office

    Directory of Open Access Journals (Sweden)

    I. Dharssi

    2011-04-01

    Full Text Available Currently, no extensive global soil moisture observation network exists. Therefore, the Met Office global soil moisture analysis scheme has instead used observations of screen temperature and humidity. A number of new space-borne remote sensing systems, operating at microwave frequencies, have been developed that provide a more direct retrieval of surface soil moisture. These systems are attractive since they provide global data coverage and the horizontal resolution is similar to weather forecasting models. Several studies show that measurements of normalised backscatter (surface soil wetness from the Advanced Scatterometer (ASCAT on the meteorological operational (MetOp satellite contain good quality information about surface soil moisture. This note describes methods to convert ASCAT surface soil wetness measurements to volumetric surface soil moisture together with bias correction and quality control. A computationally efficient nudging scheme is used to assimilate the ASCAT volumetric surface soil moisture data into the Met Office global soil moisture analysis. This ASCAT nudging scheme works alongside a soil moisture nudging scheme that uses observations of screen temperature and humidity. Trials, using the Met Office global Unified Model, of the ASCAT nudging scheme show a positive impact on forecasts of screen temperature and humidity for the tropics, North America and Australia. A comparison with in-situ soil moisture measurements from the US also indicates that assimilation of ASCAT surface soil wetness improves the soil moisture analysis. Assimilation of ASCAT surface soil wetness measurements became operational during July 2010.

  10. Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Dev Vrat Kamboj

    2006-10-01

    Full Text Available There is a long historic record of use of biological warfare (BW agents by warring countriesagainst their enemies. However, the frequency of their use has increased since the beginningof the twentieth century. World war I witnessed the use of anthrax agent against human beingsand animals by Germans, followed by large-scale field trials by Japanese against war prisonersand Chinese population during world war II. Ironically, research and development in biologicalwarfare agents increased tremendously after the Geneva Protocol, signed in 1925, because ofits drawbacks which were overcome by Biological and Toxin Weapons Convention (BTWC in1972. Biological warfare programme took back seat after the 1972 convention but biologicalagents regained their importance after the bioterrorist attacks of anthrax powder in 2001. In thelight of these attacks, many of which turned out to be hoax, general awareness is required aboutbiological warfare agents that can be used against them. This review has been written highlightingimportant biological warfare agents, diseases caused by them, possible therapies and otherprotection measures.

  11. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  12. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    social, military, information, and diplomatic means. Russian information operations are a critical component of their hybrid theory of warfare and...in which NATO discontinues encroaching on Russia’s sphere of influence and in which Russia ascends to regional hegemony .2 Although unsuccessful, this...Russian model of hybrid warfare illuminates several critical innovations to warfare that transpired while the United States was committed to operations

  13. New dimensions of the modern warfare

    Directory of Open Access Journals (Sweden)

    CĂLIN HENTEA

    2008-02-01

    Full Text Available The huge scientific and technologic progress made by mankind during the last century has had an obvious impact on the military phenomenon. It is a common place to say that the present day wars do not look like the previous ones at all. The military are not the same as the one in former days either, whatever their national insignia on various uniforms. Hence, some questions require a clear and imperative answer. How has the contemporary war been changed? How has the 21 Century military prophile evolved? Which is the trigger of all these changes? What are the new concepts of the modern warfare? To all those questions we are trying to get an answer based on our personal experience gained during a couple of NATO missions and on the respective military doctrines and policies. Why both the military and the politicians are trying to avoid the term „war" by placing instead the much more innofensive syntagm of „military operations" and what are the main characteristics of the 3rd Millenium officer? These are some of the topics of this essay. Quite new military concepts experimented by the most powefull armed forces of the world, such as Effect Based Operations Approach, Network Based Warfare, Information Operations and Psychologiocal Operations will be also examined as pillars of the modern warfare.

  14. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  15. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  16. USMC Electronic Warfare 2025: Trading Expertise for Advanced Technology

    Science.gov (United States)

    2011-04-15

    airborne electronic warlare during the transition period away from legacy equipment. EA-6B pilots and Electroilic Countermeasures Officers ( ECMOs ...Electronic Warfare (EW) capability. As an EA-6B Electronic Countenneasures Officer ( ECMO ), I anticipate that both the United States Marine Corps and all... ECMOs . An increased workload for Radio Battalion will have the same effect that the assumption of an additional function of Marine aviation will have on

  17. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    through gamma radiation (at the short-wavelength end). It covers wavelengths from thousands of kilometers to a fraction of the size of an atom...INFORMATION FUSION EXCHANGE F-13. The Knowledge and Information Fusion Exchange (sometimes called KnIFE ) is a program sponsored by U.S. Joint Forces...Warfare Analysis Center, 7-9 K–L–M Knowledge and Information Fusion Exchange ( KnIFE ), F-13 lasers, directed energy and, A-7 leadership (element

  18. Modern Maritime Trade Warfare

    Science.gov (United States)

    2013-05-20

    historically established method for conducting maritime trade warfare is Maritime Interdiction Operations ( MIO ). In the context of this paper, the...operating far from friendly shores. Accordingly, this tool would be most useful against nations with less capable navies. An advantage of MIO in...or collateral damage. 6 Large-scale MIO can be resource intensive and time consuming, and the U.S. Navy and Coast Guard have limited ships and

  19. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  20. Graphene oxide as sensitive layer in Love-wave surface acoustic wave sensors for the detection of chemical warfare agent simulants.

    Science.gov (United States)

    Sayago, Isabel; Matatagui, Daniel; Fernández, María Jesús; Fontecha, José Luis; Jurewicz, Izabela; Garriga, Rosa; Muñoz, Edgar

    2016-02-01

    A Love-wave device with graphene oxide (GO) as sensitive layer has been developed for the detection of chemical warfare agent (CWA) simulants. Sensitive films were fabricated by airbrushing GO dispersions onto Love-wave devices. The resulting Love-wave sensors detected very low CWA simulant concentrations in synthetic air at room temperature (as low as 0.2 ppm for dimethyl-methylphosphonate, DMMP, a simulant of sarin nerve gas, and 0.75 ppm for dipropylene glycol monomethyl ether, DPGME, a simulant of nitrogen mustard). High responses to DMMP and DPGME were obtained with sensitivities of 3087 and 760 Hz/ppm respectively. Very low limit of detection (LOD) values (9 and 40 ppb for DMMP and DPGME, respectively) were calculated from the achieved experimental data. The sensor exhibited outstanding sensitivity, good linearity and repeatability to all simulants tested. The detection mechanism is here explained in terms of hydrogen bonding formation between the tested CWA simulants and GO.

  1. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  2. Airpower Support to Unconventional Warfare

    Science.gov (United States)

    2009-12-11

    supplies to isolated mountain outposts (Trest 2000, 109). The Helio Couriers operated out of small dirt strips, referred to as lima sites, usually... rosa : The O.S.S. and American espionage. New York: Reynal and Hitchcock. AF Special Operations Command white paper. 2007. USAF irregular warfare...Symposium on the role of airpower in counterinsurgency and unconventional warfare: A brief summary of viewpoints. Santa Monica, CA: The RAND

  3. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  4. An Analysis of the Effect of Commissioning Sources on the Retention and Promotion of Surface Warfare Officers (SWOs) in the U.S. Navy

    Science.gov (United States)

    2011-03-01

    performance are also expected. Since USNA provides longer military training and acculturation , academy graduates are expected to stay longer. E. OUTLINE...training and education in both civilian and military organizations and they cause stress and pressure on employees. Since SWOs generally receive...same operational stress as wartime assignments, deployments during peacetime tend to have a positive effect while hostile deployments have a negative

  5. How is the United States Naval Academy Developing and Preparing Surface Warfare Officers: A Needs Analysis of the SWO Leadership Capstone Course

    Science.gov (United States)

    2007-06-01

    mandatory academic courses associated with the PRODEV Division that are taught during Plebe , Third Class, and Second Class years. They are...Leadership Continuum Plebe Year Third Class Year Second Class Year First Class Year Plebe Summer Plebe Year → Fleet Cruise/ Open Ocean Sail 3/c

  6. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  7. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  8. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Ringsmose, Jens; Pedersen, Kenneth

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  9. Evolutionary Models of Irregular Warfare

    Science.gov (United States)

    2013-03-01

    G. (2010) Decentralize, adapt and cooperate. Nature 465:292-293. Sagarin, R. (2012) Learning From the Octopus : How Secrets from Nature Can Help Us...because the concepts map on to important features of modern irregular warfare. For example, small-scale behaviors are increasingly thought to

  10. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    severe distrust between the locals and U.S. troops in the area. To rebuild trust, Bell promulgated a new policy for his officers that opposed carte ...and resulted in the assassination of the Indian Prime Minister, Indira Gandhi , in retaliation for Operation Blue Star. The shift in tactics

  11. Detachment 101 in the CBI: An Unconventional Warfare Paradigm for Contemporary Special Operations

    Science.gov (United States)

    2010-05-13

    American Espionage. NY: Reynal and Hitchcock , 1946. Barrett, Neil H. Chingpaw. NY: Vantage, 1962. Bartholomew-Feis, Dixee R. The O.S.S. and Ho Chi...United States Army. Washington, D.C.: U.S. Government Printing Office, 1990. Paddock, Alfred H. U.S. Army Special Warfare; Its Origins. Lawrence, KS

  12. Effect of Er,Cr:YSGG laser on the surface of composite restoratives during in-office tooth bleaching.

    Science.gov (United States)

    Dionysopoulos, Dimitrios; Strakas, Dimitrios; Tsitrou, Effrosyni; Tolidis, Kosmas; Koumpia, Effimia

    2016-07-01

    The aim of this in vitro study was to investigate the effect of Er,Cr:YSGG laser on the surface roughness and microhardness of various composite restoratives during in-office tooth bleaching. Five highly viscous composite restoratives and three flowable composite restoratives were investigated. Thirty cylindrical specimens of each material were made using Teflon molds. The specimens of each composite were randomly divided into three groups (n = 10). Group 1 specimens did not receive bleaching treatment, group 2 received a conventional in-office bleaching treatment, and group 3 received a laser-assisted in-office bleaching treatment using an Er,Cr:YSGG laser. Two-way ANOVA was used to determine significant interactions between materials and bleaching methods. One-way ANOVA and Tukey's post hoc test were used to compare the mean surface microhardness and roughness between materials for each treatment group (a = 0.05). Τhere were no significant differences in surface microhardness between the two bleached experimental groups for all the tested composites (p > 0.05). The reduction of surface microhardness after bleaching procedures ranged from 0.72 to 16.93 % for the specimens received conventional treatment and from 1.30 to 11.51 % for those received laser-assisted treatment. Moreover, there were no significant differences in Ra values between the experimental groups (p > 0.05) in all cases. The increase of surface roughness after the bleaching treatments was negligible and was between 0.43 and 4.78 %. The use of Er,Cr:YSGG laser during in-office tooth bleaching treatment did not affect the surface microhardness and roughness of the tested composite restorative materials.

  13. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  14. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  15. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    concluded that the United States has a national policy gap in our own ability to wage “unconventional warfare in the gray zone.”3 That statement...advancing army—few have studied the irregular nature of the campaign waged against Napoleon. Napoleon’s overstretched logistics and the elusiveness of...94 Karl E. Meyer and Shareen Blair Brysac, Tournament of Shadows: The Great Game and the Race for Empire in Central Asia (Washington, DC: Basic

  16. Rethinking Cultural Influences on Warfare

    Science.gov (United States)

    2012-05-17

    militaries turn toward understanding culture as an important corrective action to naive ethnocentrism , but warns about the dangers of... Ethnocentrism (Holmes and Meier, 1979); Robert E. Harkavy and Stephanie G. Neuman, Warfare in the Third World (Palgrave, 2001); more recently, Mary...influence of ethnocentrism and the mirror imaging of our cultural values on to another culture with its own history. Scholars according to John Ferris

  17. Air Power in Irregular Warfare

    Science.gov (United States)

    2012-12-01

    Intelligence, Surveillance, and Reconnaisance IW Irregular Warfare JFC Joint Force Commander JP Joint Publication xii MCP Malayan Communist Party...being or acting in accord with laws , rules, or established custom.”5 Combined with the Clausewitzian definition of war as “an act of violence meant...Quarterly and Defence Journal , October, 1920), accessed March 21, 2012, http://usacac.army.mil/cac2/cgsc/carl/download/csipubs/lawrence.pdf, 17. 22 Bruce

  18. Electronic warfare target location methods

    CERN Document Server

    Poisel, Richard

    2012-01-01

    Describing the mathematical development underlying current and classical methods of geolocating electronic systems that are emitting, this newly revised and greatly expanded edition of a classic Artech House book offers practical guidance in electronic warfare target location. The Second Edition features a wealth of additional material including new chapters on time delay estimation, direction finding techniques, and the MUSIC algorithm. This practical resource provides you with critical design information on geolocation algorithms, and establishes the fundamentals of existing algorithms as a

  19. Advanced Undersea Warfare Systems

    Science.gov (United States)

    2011-06-01

    122 hours188 187 Rowinski, Lech . “Submersible propulsion and energy.” 18 Mar. 2002. underwater.pg.gda.pl. 23 Apr. 2011. <http...per hour 8 Detect-to-Engage 5 mins 9 Transportability Air delivery from fixed wing assets (P-8) Surface delivery and recovery from any surface...interest? 8 Employment Are the tactics developed for AUWS for deter and engage targets scenarios effective? 9 Transportability Can AUWS be deployed and

  20. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    Spain. Int. J. Climatol. 2001, 21, 1385–1400. Rothamsted Research. Pesticide Chemistry . http://www.rothamsted.ac.uk/bch/PCGroup...translocation.html (accessed April 2013). Sanyal, D.; Bhowmil, P.C.; Reddy, K.N. Influence of Leaf Surface Micromorphology, Wax Content, and Surfactant on

  1. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    psychological operations, and information operations. • In keeping with traditional Soviet notions of battling constant threats from abroad and within...theorists, is a holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.3...that “in the ongoing revolution in information technologies, information and psychological warfare will largely lay the groundwork for victory.”10

  2. Effectiveness and reaction networks of H2O2 vapor with NH3 gas for decontamination of the toxic warfare nerve agent, VX on a solid surface.

    Science.gov (United States)

    Gon Ryu, Sam; Wan Lee, Hae

    2015-01-01

    The nerve agent, O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothioate (VX) must be promptly eliminated following its release into the environment because it is extremely toxic, can cause death within a few minutes after exposure, acts through direct skin contact as well as inhalation, and persists in the environment for several weeks after release. A mixture of hydrogen peroxide vapor and ammonia gas was examined as a decontaminant for the removal of VX on solid surfaces at ambient temperature, and the reaction products were analyzed by gas chromatography-mass spectrometry (GC-MS) and nuclear magnetic resonance spectrometry (NMR). All the VX on glass wool filter disks was found to be eliminated after 2 h of exposure to the decontaminant mixtures, and the primary decomposition product was determined to be non-toxic ethyl methylphosphonic acid (EMPA); no toxic S-[2-(diisopropylamino)ethyl] methylphosphonothioic acid (EA-2192), which is usually produced in traditional basic hydrolysis systems, was found to be formed. However, other by-products, such as toxic O-ethyl S-vinyl methylphosphonothioate and (2-diisopropylaminoethyl) vinyl disulfide, were detected up to 150 min of exposure to the decontaminant mixture; these by-products disappeared after 3 h. The two detected vinyl byproducts were identified first in this study with the decontamination system of liquid VX on solid surfaces using a mixture of hydrogen peroxide vapor and ammonia gas. The detailed decontamination reaction networks of VX on solid surfaces produced by the mixture of hydrogen peroxide vapor and ammonia gas were suggested based on the reaction products. These findings suggest that the mixture of hydrogen peroxide vapor and ammonia gas investigated in this study is an efficient decontaminant mixture for the removal of VX on solid surfaces at ambient temperature despite the formation of a toxic by-product in the reaction process.

  3. The Art of Aerial Warfare

    Science.gov (United States)

    2005-03-01

    the  Strait  of  Gibraltar   from  North  Africa  during  the Spanish Civil War. 11 FAIRCHILD PAPER A Comparison of Aerial Warfare to Land... Hitler , for example, the United States cannot assume that Nazi aggression would have  evaporated  instantly. Although  Hitler himself profoundly affected

  4. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  5. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  6. Grid architecture model of network centric warfare

    Institute of Scientific and Technical Information of China (English)

    Yan Tihua; Wang Baoshu

    2006-01-01

    NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward, which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer, based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.

  7. A Taxonomy of Network Centric Warfare Architectures

    Science.gov (United States)

    2008-01-01

    Distributed Database Theory, an area of Computer Science that has studied information flow in networks extensively ( Ceri & Pelagatti 1984, Mullender 1993...Australian Department of Defence, 2003, Australian Defence Force Network Centric Warfare Roadmap (First Draft), September. Ceri , S. & Pelagatti

  8. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  9. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Giffin, 2003; Borgu , 2003; Kaufman, 2004). For example, from a standpoint of Popperian methodological falsificationism (Popper, 1934), Reid and...focused term network-centric warfare has common favor ( Borgu , 2003) despite the organisational decree to use the term ‘network centric warfare...Commonwealth Department of Defence, June. Borgu , A., (2003), “The Challenges and Limitations of Network Centric Warfare”, Presented at NCW: Improving ADF

  10. Finding Lawrence recruiting talent for unconventional warfare

    OpenAIRE

    Mourouzis, Michael G.

    2011-01-01

    Approved for public release; distribution is unlimited. From Francis Marion's guerrilla war against the British to advising the resistance against the Nazis and Japanese, the United States has depended on unconventional warfare (UW) as a component of national defense. Today, the U.S. Army Special Forces (SF) is the premiere unconventional warfare unit in the U.S. military. With a smaller Army and increasing missions, SF must expand its recruiting efforts. This thesis analyzes the recruitme...

  11. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    defense ( CND ).”7 Thus cyber warfare is distinguished from cyber criminal acts based upon its coercive nature to attain a strategic end, whereas...CNA and CND . Conceptually, CNA effects “range from disrupting the adversary’s electronic systems and what operations they enable (communications...or self-destruct.”10 The second component of cyber warfare seeks to eliminate or minimize the risk of the first. The role of CND is to defend

  12. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available , Analysis, Development and Maintenance [6] [12] [13]. Furthermore, Baker and Harris also discuss techniques like Intrusion Prevention, Personnel Security and Security Awareness as part of information security [14] [12]. Moreover, when considering... techniques that are core to information security and to Network Warfare were thus identified. The following summary of the techniques found in Network Warfare is given: Risk Analysis, Intrusion Prevention, Physical Security, Personnel Security, Cyber...

  13. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    also McCulloh and Johnson who demonstrate throughout their study that context is critical . Indeed, their summary statement for “hybrid warfare theory ...Muhr, eds., Hybrid and Cyber War as Consequences of the Asymmetry, Frankfurt : Peter Lang, 2011, p.95. Interestingly, the CFD Hybrid Warfare Concept...the highest political and military levels. The study of hybrid-type case studies yields the critical lesson that: “leadership is essential to victory

  14. Intrafamily and intragenomic conflicts in human warfare

    Science.gov (United States)

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  15. Aerospace Power in Urban Warfare: Beware the Hornet’s Nest

    Science.gov (United States)

    2001-05-01

    Board Task Force on Military Operations in Built-Up Areas ( MOBA )," (Washington, DC: Office of the Undersecretary of Defense for Acquisition and...Smithsonian Institute Press, 1999), 130. 45 Vick, et al., 120. 46 Rebecca A. Grant, "The Radar Game ," Air Force Magazine, February 1999, 52-60. Grant...University Press, 1962. Grant, Rebecca A. "The Radar Game ." Air Force Magazine, February 1999, 52-60. Hawkins, William R. Putting Urban Warfare in

  16. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    Science.gov (United States)

    2016-07-14

    the Department of the Navy. Signature: _____________________ 14 July 2016 ii Contents Page...World War II ,” (U.S. Navy, Office of the Chief of Naval Operations, Submarine Warfare Division, 1999). 2 Geoffrey Till, “A Changing Focus for the...escalation to nuclear war or a major conventional war such as the forcible reunification of Taiwan via a cross-strait invasion. If U.S. national strategic

  17. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    of Additives and Impurities from Polymeric Materials; EPA 560/5-85-015; U.S. Environmental Protection Agency, Office of Pesticides and Toxic...performance, a penetrating decontaminant may cause damage to the material, such as the swelling of polymers caused by solvents or any active...Chemical Warfare Agent Degradation Products. Environ . Health Perspect. 1999, 107 (12), 933–974. 5. Kim, K.; Tsay, O.G.; Atwood, D.A.; Churchill, D.G

  18. General George Crook’s development as a practitioner of irregular warfare during the Indian wars.

    Science.gov (United States)

    2017-06-09

    continue to prepare, train, and equip for large-scale peer or near-peer conventional warfare, the breadth of the republic’s history teaches that Irregular...considered many of the officers he encountered to be selfish, self- important, and worse yet, out of touch with the realities facing them. They limited...of Cottonwood generally, thereby virtually acknowledging himself whipped by a small party of Indians and leaving our citizens and their property

  19. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  20. Operations analysis for lunar surface construction: Results of two office of exploration case studies

    Science.gov (United States)

    Bell, Lisa Y.; Boles, Walter; Smith, Alvin

    1991-08-01

    In an environment of intense competition for Federal funding, the U.S. space research community is responsible for developing a feasible, cost-effective approach to establishing a surface base on the moon to fulfill long-term Government objectives. This report presents the results of a construction operations analysis of two lunar scenarios provided by the National Aeronautics and Space Administration (NASA). Activities necessary to install the lunar base surface elements are defined and scheduled, based on the productivities and availability of the base resources allocated to the projects depicted in each scenario. The only construction project in which the required project milestones were not completed within the nominal timeframe was the initial startup phase of NASA's FY89 Lunar Evolution Case Study (LECS), primarily because this scenario did not include any Earth-based telerobotic site preparation before the arrival of the first crew. The other scenario analyzed. Reference Mission A from NASA's 90-Day Study of the Human Exploration of the Moon and Mars, did use telerobotic site preparation before the manned phase of the base construction. Details of the analysis for LECS are provided, including spreadsheets indicating quantities of work and Gantt charts depicting the general schedule for the work. This level of detail is not presented for the scenario based on the 90-Day Study because many of the projects include the same (or similar) surface elements and facilities.

  1. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  2. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available aspects to its network enabled capabilities and functionality (network warfare). Various computer and information security practices form part of network warfare techniques. Whilst various information and security practices are well-known and applied...

  3. Hybrid Warfare: A Military Revolution or Revolution in Military Affairs?

    Science.gov (United States)

    2012-12-14

    warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of Military...irregular warfare intersect and blend to create a new form of warfare. This thesis uses the Williamson Murray and McGregor Knox definitions of...understand new concepts. Douglas C Lovelace. Director Strategic Studies Institute has this insight to offer regarding the importance of

  4. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available to prevent misconceptions, as well as to ensure that the necessary input data is incorporated. They include the following: • The involved parties must grasp the difference between auditing and determining a Network Warfare Capability. It is encouraged... to incorporate the use of auditing in the technique set underlying Network Warfare. • To determine a Network Warfare Capability, assessments of the various techniques that contribute to Network Warfare are necessary. This will incorporate expert opinion...

  5. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks.

  6. [The history of biological warfare].

    Science.gov (United States)

    Cohen, Amir; Robenshtok, Eyal; Rotman, Eran; Sagi, Rami

    2002-05-01

    Selected events in the history of biological weapons are highlighted to increase the physician's awareness of this crucial threat. The deliberate use of biological substances originated in antiquity and has pervaded the history of human wars throughout time until the 21th century. The history of biological warfare is difficult to assess because of a number of confounding factors. These include the difficulty in verification of allegation, the use of the threat of this weapon for propaganda purposes, the lack of microbiological or epidemiological data, and the incidence of natural occurring endemic or epidemic diseases during hostilities. Although it may be problematic to verify at times, the use of such weapons has not been limited to national armies or militia. Frustrated civilians, terrorists and even physicians have used biological substances to promote their interests. Today, the biological threat has become more serious. It's potency, cost-effectiveness, and the ability to manufacture and deploy it with little sophistication, or under the semblance of legitimate commercial endeavors, will ensure that biological weapons remain a constant threat to human health.

  7. The influence of a novel in-office tooth whitening procedure using an Er,Cr:YSGG laser on enamel surface morphology.

    Science.gov (United States)

    Dionysopoulos, Dimitrios; Strakas, Dimitrios; Koliniotou-Koumpia, Eugenia

    2015-08-01

    The purpose of this in vitro study was to evaluate the influence of a novel in-office tooth whitening procedure using Er,Cr:YSGG laser radiation on bovine enamel. Forty-eight enamel specimens were prepared from bovine canines and divided into four groups: Group 1 specimens (control) received no whitening treatment; Group 2 received whitening treatment with an at-home whitening agent (22% carbamide peroxide) for 7 days; Group 3 received whitening treatment with a novel in-office whitening agent (35% H(2)O(2)); Group 4 received the same in-office whitening therapy with Group 3 using Er,Cr:YSGG laser in order to accelerate the whitening procedure. The specimens were stored for 10 days after the whitening treatment in artificial saliva. Vickers hardness was determined using a microhardness tester and surface roughness was evaluated using a VSI microscope. Three specimens of each experimental group were examined under SEM and the mineral composition of the specimens was evaluated using EDS. Data were statistically analyzed using one-way ANOVA, Tukey's post-hoc test, Wilcoxon signed rank and Kruskal-Wallis tests (a = 0.05). The surface microhardness of the enamel was reduced after the in-office whitening treatments (Ptreatment (P> 0.05). Moreover, the surface roughness was not significantly changed after tooth whitening. EDS analysis did not show alterations in the enamel mineral composition, while SEM observations indicated changes in the surface morphology, especially after in-office tooth whitening (Plaser-assisted whitening treatment with Er,Cr:YSGG laser did not affect the alterations in enamel surface compared with the conventional in-office whitening technique. © 2015 Wiley Periodicals, Inc.

  8. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  9. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    sug- F P _ _ 6 PSYCHOLOGICAL WARFARE IN WORLD WAR I! gestion of a single agency which would serve as a clearinghouse for all intelligence, as well as...organizations, communications, demoli- tions, organization and training of civilians for guerrilla warfare, para- chute jumping, and amphibious...General Bolte, Director, P&O, was reluctant to endorse this latter sug- gestion , indicating, "as he had indicated from time to time at other points

  10. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo...

  11. Agricultural Warfare and Bioterrorism using Invasive Species

    Science.gov (United States)

    The chapter on Agricultural Warfare and Bioterrorism using Invasive Species is part of the book titled Pest Management and Phytosanitary Trade Barriers authored by Neil Heather (Australia) and Guy Hallman. The chapter attempts to briefly put the topic into context with phytosanitation. It presents...

  12. Information Warfare Arms Control: Risks and Costs

    Science.gov (United States)

    2006-03-01

    legal system and the modern concept of arms control were able to provide for national and international collective security during the Cold War...information warfare presents many challenges that question their viability. The most significant challenges are to the international legal system , which

  13. Compound Warfare: That Fatal Knot

    Science.gov (United States)

    2002-08-01

    office, to be replaced by the new president, Gerald R. Ford. Meanwhile, the DRV planned a final offensive for the coming dry season.166 In January 1975...July 1987, 150-54; Aaron Karp , “Blowpipes and Stingers in Afghanistan: One Year Later,” Armed Forces Journal International (September 1987): 37-38; John

  14. Integrated Assessment Systems for Chemical Warfare Material

    Energy Technology Data Exchange (ETDEWEB)

    A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

    1999-05-27

    The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and

  15. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  16. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  17. Violence and Warfare in Precontact Melanesia

    Directory of Open Access Journals (Sweden)

    Stephen M. Younger

    2014-01-01

    Full Text Available Levels of interpersonal violence and warfare for 30 Melanesian societies at the time of contact with Europeans are estimated based on ethnographic and historical records. While violence was common in indigenous Melanesia, it was not ubiquitous and some societies experienced extended periods of internal and external peace. Interpersonal violence and warfare were correlated-when one occurred there was a high probability of finding the other. Violence was not dependent on total population. It was, however, higher for population density greater than 50 persons per square kilometer. Violence in Melanesia may have been stimulated by the large number of relatively small polities, many of which competed with one another for prestige and, in some cases, land.

  18. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  19. Recommended Architecture for a Knowledge Management System for the Undersea Launchers Division at the Naval Undersea Warfare Center

    Science.gov (United States)

    2010-09-01

    suggested using a systematic approach to the development of a KM system through understanding of the organization’s core competencies. One of the benefits...Kaistha, V. (2007). NAVSEA 05D ship design and certification network knowledge mangement project. West Bethesda, MD: Naval Surface Warfare Center

  20. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...

  1. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard, sa

  2. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and...to Counter Total Warfare Mentality Approved by: , Thesis Committee Chair LTC Sandra J. Sanchez, MBA , Member Marlyn R. Pierce...

  3. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    Science.gov (United States)

    2007-12-01

    Glenn, Russell, John Gordon, Tom Herbert, John Matsumura, Randall Steeb, and Paul Steinberg. Lightning Over Water: Sharpening America’s Light...conventional and unconventional warfare.” Special Warfare Journal, March-April (2007). Hersey , John. A Bell for Adano. New York: Vintage Books

  4. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    second evolutionary generation of warfare incorporating political, economic, social, and technical changes, and maneuver warfare. Much of this concept is...aligns itself with the emerging understanding of the world through nonlinear sciences, epistemological and ontological foundations.308 In this, Unified

  5. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Options ‘Off the Table’ for US Response to Cyber Attacks,” Stars and Stripes, May 8, 2009. 34 Scott Shackelford , “From Nuclear War to Net War...whitepapers/warfare/redefining-role- information-warfare-chinese-strategy_896 (accessed February 18, 2012). Shackelford , Scott. “From Nuclear War to

  6. Combat Simulation Modeling in Naval Special Warfare Mission Planning.

    Science.gov (United States)

    1995-12-01

    This thesis explores the potential role of combat simulation modeling in the Naval Special Warfare mission planning cycle. It discusses methods for...at the tactical level. The thesis concludes by discussing additional applications of combat simulation modeling within the Naval Special Warfare community and makes recommendations for its effective and efficient implementation.

  7. Officer Training

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset shows the time spent by currently active Pittsburgh Police Officers in professional development training. Officers who are no longer employed in the...

  8. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    Fukuyama , Francis . “At the ‘End of History’ Still Stands Democracy.” The Wall Street Journal, 6 June 2014. http://www.wsj.com/articles/at-the-end-of...warfare is cultural instead of political (in the traditional Clausewitzian sense). 15 Hoffman is referring to Francis Fukuyama’s idea of “the end of...history,” as argued in his 1989 essay and subsequent book. Fukuyama first published an essay titled “The End of History” in the National Interest in

  9. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  10. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  11. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  12. Back office to box office

    DEFF Research Database (Denmark)

    Haigh, Matthew

    sees a mounting unsecured debt where its members see practical value. Between the two, a steward who may not profit from its office delegates it to back-office agents whose fiduciary management is engendered by box office-sized bonuses. Standard theorisation has foundered. The architecture...

  13. A war psychiatry approach to warfare in the Middle Byzantine period.

    Science.gov (United States)

    Ntafoulis, Pavlos

    2016-12-01

    Combat stress cases were traced in historical texts and military manuals on warfare from the Middle Byzantine period; they were mainly labelled as cowardice. Soldiers suffered from nostalgia or exhaustion; officers looked stunned, or could not speak during the battle. Cruel punishments were often enforced. Suicide and alcohol abuse were rarely mentioned. The Byzantines' evacuation system for battle casualties was well organized. Psychological operations were conducted and prisoners-of-war were usually part of them. The Byzantine army had 'parakletores', officers assigned to encourage soldiers before combat. The leaders dealt with combat stress by using their rhetoric skills and emphasizing religious faith in eternal life. The treatment of the 'cowards' was rather similar to modern war psychiatry principles of treatment. No description of PTSD was found. © The Author(s) 2016.

  14. Environmental chemistry of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    MacNaughton, M.G.; Brewer, J.H.; Ledbetter-Ferrill, J. [Southwest Research Inst., San Antonio, TX (United States)

    1995-06-01

    This paper summarizes the approach used in the preparation of a Handbook for the Corps of Engineers, Huntsville Division, on the environmental chemistry of chemical warfare agents. The agents GB and HD will be used to illustrate the type of information in the report. Those readers interested in the full report should contact Mr. Arkie Fanning, Huntsville Corps of Engineers at (505) 955-5256. The U.S. Army Corps of Engineers (ACE) has identified approximately 7,200 formerly used defense sites (FUDS) in the United States, some of which are suspected to be contaminated with chemical warfare agents (CWA). The ACE has responsibility for environmental clean-up of FUDS, including site characterization, evaluation and remediation of the site. Thirty-four FUDS and 48 active DOD installations that may contain CWA were identified in an Interim Survey and Analysis Report by the USACMDA Program Manager for Non-Stockpile Chemical Material (NSCM). The chemical agents listed include sulfur mustard (H), lewisite (L), tabun (GA), sarin (GB), VX, hydrogen cyanide (AC), cyanogen chloride (CK), phosgene (CG), BZ, and CS.

  15. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  16. Helicopters in Irregular Warfare: Algeria, Vietnam, and Afghanistan

    Science.gov (United States)

    2013-06-13

    the political group associated with the Algerian nationalist independence movement GALAT Groupement d’ Aviation Légère de l’Armée de Terre ...unique from most conflicts because the expeditionary forces’ parent country rarely perceives an existential threat.19 The lack of perceived threat...dominance rarely guarantees success in irregular warfare.22 Instead, success in irregular warfare requires synergy between government and military efforts

  17. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    COVERED Capstone 4. TITLE AND SUBTITLE LITTORAL COMBAT SHIP OPEN OCEAN ANTI-SUBMARINE WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) 311-124O/Team LCS...Life cycle cost LCCE Life cycle cost estimate LCS Littoral combat ship LHA Landing ship, helicopter assault LHD Landing ship, helicopter...is unlimited LITTORAL COMBAT SHIP OPEN OCEAN ANTI- SUBMARINE WARFARE by Team LCS 311-124O June 2014 Capstone Advisors: John Green Dan

  18. Fourth Generation Warfare and Its Impact on the Army

    Science.gov (United States)

    2007-11-02

    In 1989, the authors of an article entitled, "The Changing Face of War: Into the Fourth Generation ," offered a glimpse of the future rooted in the...decline of the West in a world rife with cultural conflicts and the powerful influences of a form of cultural Marxism known as political correctness...were combining in America to create conditions for a new generation of warfare. Their vision included a form of warfare that bypassed the military

  19. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information confrontation operations across the elec- tromagnetic spectrum. In doing so, as Dr. Wortzel’s monograph explains, the PLA used innovative means...and in- formation confrontation operations across the electro- magnetic spectrum. As this monograph explains, the PLA used innovative means to...information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare

  20. Surface Warfare Center Contributions for Addressing Warfare System Development Challenges and Goals

    Science.gov (United States)

    2011-04-30

    during IOT &E"." "there was a loss of a large number of the most experienced management and technical personnel ...without an adequate replacement...Project Management IPT Lead Government Leadership and Development Oversight: Technical Direction Activity Dev Team Management IPT Dev Org’s Project

  1. Passive front-ends for wideband millimeter wave electronic warfare

    Science.gov (United States)

    Jastram, Nathan Joseph

    This thesis presents the analysis, design and measurements of novel passive front ends of interest to millimeter wave electronic warfare systems. However, emerging threats in the millimeter waves (18 GHz and above) has led to a push for new systems capable of addressing these threats. At these frequencies, traditional techniques of design and fabrication are challenging due to small size, limited bandwidth and losses. The use of surface micromachining technology for wideband direction finding with multiple element antenna arrays for electronic support is demonstrated. A wideband tapered slot antenna is first designed and measured as an array element for the subsequent arrays. Both 18--36 GHz and 75--110 GHz amplitude only and amplitude/phase two element direction finding front ends are designed and measured. The design of arrays using Butler matrix and Rotman lens beamformers for greater than two element direction finding over W band and beyond using is also presented. The design of a dual polarized high power capable front end for electronic attack over an 18--45 GHz band is presented. To combine two polarizations into the same radiating aperture, an orthomode transducer (OMT) based upon a new double ridge waveguide cross section is developed. To provide greater flexibility in needed performance characteristics, several different turnstile junction matching sections are tested. A modular horn section is proposed to address flexible and ever changing operational requirements, and is designed for performance criteria such as constant gain, beamwidth, etc. A multi-section branch guide coupler and low loss Rotman lens based upon the proposed cross section are also developed. Prototyping methods for the herein designed millimeter wave electronic warfare front ends are investigated. Specifically, both printed circuit board (PCB) prototyping of micromachined systems and 3D printing of conventionally machined horns are presented. A 4--8 GHz two element array with

  2. Mail office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 6 April. Only specifically addressed mail will be re-delivered.

  3. Mail Office

    CERN Multimedia

    2006-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on 1st June. Only specifically addressed mail will be re-delivered.

  4. The World War Two Allied Economic Warfare: The Case of Turkish Chrome Sales

    OpenAIRE

    ÖNSOY, Murat

    2009-01-01

    Economic character of "modern warfare" is too important to be underestimated. In the Economic Warfare belligerents attempt to reduce the war capacity of the enemy through various methods. In World War II crushing down the German war production and economy was the main target of the British Ministry of Economic Warfare. For Germany, one of the many ways of overcoming the British Economic Warfare was to trade with the neutral countries that had land connection to the Third Reich. Turkey was one...

  5. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  6. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  7. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.

  8. Mail Office

    CERN Document Server

    2012-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and re-sorted by Mail Office staff on Wednesday 31st of October. Only specifically addressed mail will be re-delivered.

  9. Mail Office

    CERN Multimedia

    GS Department

    2009-01-01

    Members of the personnel are kindly requested to empty their mail boxes. Any mail remaining in mail boxes will be collected and resorted by Mail Office staff on Thursday 8 October 2009. Only specifically addressed mail will be re-delivered.

  10. Ge{sup 4+} doped TiO{sub 2} for stoichiometric degradation of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@iic.cas.cz [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Grygar, Tomas Matys [Department of Solid State Chemistry, Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2012-08-15

    Highlights: Black-Right-Pointing-Pointer We prepared nanodisperse Ge{sup 4+} doped titania by a novel synthesis method. Black-Right-Pointing-Pointer Synthesis does not involve organic solvents, organometallics nor thermal processes. Black-Right-Pointing-Pointer The prepared materials are efficient in removal of chemical warfare agents. Black-Right-Pointing-Pointer Ge{sup 4+} doping improves rate of removal of soman and agent VX by TiO{sub 2}. - Abstract: Germanium doped TiO{sub 2} was prepared by homogeneous hydrolysis of aqueous solutions of GeCl{sub 4} and TiOSO{sub 4} with urea. The synthesized samples were characterized by X-ray diffraction, scanning electron microscopy, EDS analysis, specific surface area (BET) and porosity determination (BJH). Ge{sup 4+} doping increases surface area and content of amorphous phase in prepared samples. These oxides were used in an experimental evaluation of their reactivity with chemical warfare agent, sulphur mustard, soman and agent VX. Ge{sup 4+} doping worsens sulphur mustard degradation and improves soman and agent VX degradation. The best degree of removal (degradation), 100% of soman, 99% of agent VX and 95% of sulphur mustard, is achieved with sample with 2 wt.% of germanium.

  11. Concepto y fuentes para el estudio de la Information Warfare

    OpenAIRE

    Tramullas Saz, Jesús

    1998-01-01

    En este trabajo se aborda el concepto de Información Warfare, así como las principales definiciones que se han propuesto para el mismo. Se establecen los diferentes tipos de acciones que se inscriben en este ámbito, y se delinean algunas implicaciones para el especialista en información. Como punto de partida para su estudio, se incluyen una selección de fuentes de información sobre el tema objeto de estudio. ABSTRACT: This paper broaches the concept of Information Warfare, as ...

  12. Rapid Ultrasensitive Chemical-Fingerprint Detection of Chemical and Biochemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    ASHBY, CAROL I.; SHEPODD, TIMOTHY J.; YELTON, WILLIAM G.; MURON, DAVID J.

    2002-12-01

    Vibrational spectra can serve as chemical fingerprints for positive identification of chemical and biological warfare molecules. The required speed and sensitivity might be achieved with surface-enhanced Raman spectroscopy (SERS) using nanotextured metal surfaces. Systematic and reproducible methods for preparing metallic surfaces that maximize sensitivity have not been previously developed. This work sought to develop methods for forming high-efficiency metallic nanostructures that can be integrated with either gas or liquid-phase chem-lab-on-a-chip separation columns to provide a highly sensitive, highly selective microanalytical system for detecting current and future chem/bio agents. In addition, improved protein microchromatographic systems have been made by the creation of acrylate-based porous polymer monoliths that can serve as protein preconcentrators to reduce the optical system sensitivity required to detect and identify a particular protein, such as a bacterial toxin.

  13. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  14. Evaluation of the Marine Game Simple Surface Warfare Model

    Science.gov (United States)

    2011-06-01

    in other research (e.g. Garris, Ahlers, & Driskel, 2002; Wiese , Freeman, Salter, Stelzer, & Jackson, 2008; Witmer & Singer, 1998). The...Ergonomics Society. Wiese , E. E., Freeman, J., Salter, W. J., Stelzer, E. M. & Jackson, C. (2008). Distributed after-action review for simulation-based...Ahlers, & Driskel, 2002; Wiese , Freeman, Salter, Stelzer, & Jackson, 2008; Witmer & Singer, 1998). Results • Analysis of variance to see differences

  15. Software Architecture for Anti-Submarine Warfare Unmanned Surface Vehicles

    Science.gov (United States)

    2016-09-01

    autonomous vehicles,” M.S.C. thesis, Dept. Elect. and Comput. Eng., Instituto Superior Tecnico , Lisbon, Portugal, 2009. [6] V. Berzins and Luqi...TOC.htm. [Accessed: 18 July 2016]. [9] Naval Meteorology and Oceanography Command, Fleet Oceanographic and Acoustic Reference Manual . Stennis Space

  16. Naval Surface Warfare Center Domestic Technology Transfer Report (FY89)

    Science.gov (United States)

    1989-10-01

    disciplines as well as programming. 10 Main Advantages. Present methods would require manual extraction of data by desk checking and software audit reports...Tnvsrj,. Tmpnor~p,. ni;orm nftI-u lF0rrtg, Pni Crr rzermi! rsrrn TrS~nr’r,,u 1 r, PP ’l’rqan~sr rtonn~ wn pfe Vol. 25. No 3, May 1989. pp 2639-2645 1

  17. Naval Surface Warfare Center Carderock Division, Technical Digest

    Science.gov (United States)

    2001-12-01

    two vehi- cles. CUTTHROAT will be delivered to the Navy early in FY02. The vehicle names are taken from species of fish indigenous to Lake Pend Oreille...on the use of an active magnetic regenerator to produce chilled water efficiently. • Thermoacoustic Cooling - This employs sound waves to produce...fire main loop system, a copper nickel pipe test section, segregation gate valve to configure the system for Zebra (battle) condition, isolation

  18. Mail Office

    CERN Document Server

    GS Department

    2009-01-01

    The Mail Office wishes to remind users that the CERN mail service is exclusively reserved for official CERN mail. All external official mail must be sent to the Mail Office in an unstamped envelope on which your name and Department must be clearly indicated below the official CERN address (see example) to help us to find you in the event that it cannot be delivered. If you wish to send private mail from the CERN site you must use the post offices at Meyrin (63-R-011) or Prévessin (866-R-C02). Please use "PRIORITY" envelopes only in the case of urgent mail. Any mail containing merchandise (i.e. anything other than documents) must be sent using an EDH shipping request form. INTERNAL MAIL Please remember to include the recipient’s MAILBOX number on the internal mail envelopes, either in the relevant box (new envelopes) or next to the name (old envelopes). This information, which can be found in the CERN PHONEBOOK, simplifies our t...

  19. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    activities” ( CEMA ), which is a combination of Cyber and Electronic Warfare.115 However, the relationship between cyber and EW must be carefully considered...generating effects by themselves, as well as serving as a delivery means for MISO. The focus of CEMA may be as much to support combat operations

  20. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  1. Trends in underwater warfare : From an underwater acoustics perspective

    NARCIS (Netherlands)

    Ort, C.M.; Driessen, F.P.G.

    2002-01-01

    Technological developments concerning underwater systems for Anti Submarine Warfare (ASW) and Mine Counter Measures (MCM) are directed at optimally countering the underwater threat in the near future. Countering the existing underwater threat is already extremely difficult, but there are several tre

  2. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  3. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    decrease the logistical burden associated with transport and storage of decontaminants. The experiments in this study were focused on evaluating...propanediammonium dichloride, isopropanol, inert ingredients/water, hydrogen peroxide, diacetin Decontaminant formulated for chemical warfare agents F...potassium bisulfate, potassium sulfate, dipotassium peroxodisulfate, magnesium carbonate Acidic oxidative chemistry, used for VX laboratory waste

  4. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  5. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    Germany’s cognitive dissonance about the importance of military force and counter-insurgency operations in Afghanistan is an uphill battle they are still...1 Summary of Walzer’s Contemporary Just War Theory : ……............................................................2 Summary of...Postmodern Warfare Theory : .......................................................................................5 German Foreign Policy and Military

  6. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  7. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  8. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  9. Evaluating the Claims of Network Centric Warfare

    Science.gov (United States)

    2005-12-01

    three factors – Psychoticism, Neuroticism, and Extroversion/Introversion ( Eysenck , 1960) and as many as 16 factors (i.e., Cattell’s Sixteen...Version 1.0, prepared for John Garstka, Office of Force Transformation. Eysenck , H.J. (1960). The structure of human personality. Methuen: Wiley

  10. FOA Information from the Research Institute of Swedish National Defence on Electronic Warfare (FOA Orientar om Electronic Warfare),

    Science.gov (United States)

    1967-01-01

    modified. If it is appears as if the psychological It is hardly likely. however. known that the opponent has a warfare element involved there- that the most...34 . -roadeatla - ".-Rhdar Raa -* * - cldignsl Toi~loieey aft u comunication , ntavigation -ctionl Examples of applications Radar bands FroquaP" UMI 0.1

  11. Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower - A Case Study in Innovation

    Science.gov (United States)

    2016-06-10

    EVOLUTION OF UNMANNED AERIAL WARFARE: A HISTORICAL LOOK AT REMOTE AIRPOWER—A CASE STUDY IN INNOVATION A thesis presented to...JUN 2016 4. TITLE AND SUBTITLE Evolution of Unmanned Aerial Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation 5a...Warfare: A Historical Look at Remote Airpower—A Case Study in Innovation Approved by: , Thesis Committee Chair John T. Kuehn, Ph.D

  12. Electronic Warfare M-on-N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis

    Science.gov (United States)

    2017-04-12

    E. Jarvis Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Advanced Techniques Branch Tactical...12-04-2017 NRL Memorandum Report Electronic Warfare M-on- N Digital Simulation Logging Requirements and HDF5: A Preliminary Analysis Donald E...ELECTRONIC WARFARE M-ON- N DIGITAL SIMULATION LOGGING REQUIREMENTS AND HDF5: A PRELIMINARY ANALYSIS 1. INTRODUCTION HDF5 technology [Folk] has been

  13. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Care Partnerships. Review the profiles. > What is the Office of Child Care (OCC)? The Office of Child ...

  14. Office of Child Care

    Science.gov (United States)

    ... for Children & Families Office of Child Care By Office Administration for Native Americans (ANA) Administration on Children, ... Learn more about this project > What is the Office of Child Care (OCC)? The Office of Child ...

  15. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  16. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  17. Encircled Forces: The Neglected Phenomenon of Warfare.

    Science.gov (United States)

    1985-05-01

    reported that he could not get through to the pocket. Manstein had reached the conclusion earlier that day. He told Wohler that Stemmermann would...hen fla 1-11 R Al) INSTRUCTI[ONSREPORT DOCUMENTATION PAGE IWOR (OMjP’LETINCG FOCRM I REPORT NUMBER 2.GOVT ACC1$5,ION N, C PFN-. -AT A-j,!, NUMBiER 4 TI...WORK UNIT NUMBE 1 School of Advanced Military Studies * Fort Leavenworth, Kansas 66027 I I, CON~TROLLING OFFICE NAME AND ADIDRESS 12. REPORT DATE US Army

  18. Stuxnet and Cyber-Warfare (1/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  19. Stuxnet and Cyber-Warfare (2/2)

    CERN Document Server

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  20. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  1. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  2. Transition Support of Meteorology and Oceanography (METOC) Technology to the Naval Oceanographic Office Warfare Support Center

    Science.gov (United States)

    2016-06-07

    with significant wind -driven or tidal currents, or in strong boundary currents or associated eddies, accurate navigation of gliders may not be...this future work will be a full evolution of the proof of concept beginning with the Glider(s) flying in from well offshore , perhaps where it was...deployed by a submarine, to a specific location or set of locations where it would acoustically receive ACOMMS data, fly back offshore , and

  3. Fitness Reports of Naval Warfare Officers: A Search for Gender Differences.

    Science.gov (United States)

    1994-05-01

    validated on all-male samples and focused on leadership in combat. Rice, Yoder, Adams, Priest, & Prince (1984) examined ratings of leadership ability...01 and for the latter test was .85. 5 Stadistical Analyds The number of times each descriptor was used in the fitness reports of women and men was

  4. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    OpenAIRE

    2011-01-01

    This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United St...

  5. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military...comprehension (also explicitly included in Figure 3). The entire spectrum of deception, psychological operations, and all means to impact human-centered...with the same input data (other than ground truth) via different channels and that data must be consistent within itself. The belief in empiricism to

  6. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    integrity. Essentially, Russia - and more directly- Vladimir Putin perceive that Russia is in an ideological struggle with the US and Europe. 1 Carl Von...conducted in a hybrid manner, though all the instruments of national power. 31 Though the nearly continuous strategic leadership of Vladimir Putin , Russia ...with a sharp focus on Vladimir Putin ’s strategic leadership, highlights the evolution ofthe Russian brand of hybrid warfare (HW). The analysis also

  7. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    Science.gov (United States)

    2015-05-18

    elements with maneuver warfare, mission command’s decentralization of execution through the use of mission-type orders is a more centralized form... decentralized command and control organization will instill an innovative organizational culture. Innovation will be able to freely prosper in an...warfare’s decentralized command and control doctrine to maximize military cyberspace operations. Since the establishment of U.S. Cyber Command in 2009

  8. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    can endanger the lives of U.S. forces and render mechanical breaching tools inoperable. Air blowers can be used as a hasty means to ventilate a... Penguin Books, 1996). 179 Tom Mangold, The Tunnels of Cu Chi (New York, NY: Random House, 1985). 147 6. A Historical Analysis of Tunnel Warfare and... Penguin Group, 1996. 157 Lester, W. G., & Ali, A. J. “Underground Combat: Stereophonic Blasting, tunnel Rats, and the Soviet-Afghan War.” Engineer

  9. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  10. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    states to take note. Cyber issues such as these should be seen in light of the ancient dictum that “a victorious army first wins and then seeks...Examples from ancient Greece, Prussia, and World War II are illustrated to present cases where innovative leaders adapted and modified their methods to...conduct warfare and integrated them into their strategic approach to achieve their desired end states. Alexander the Great conquered Persia in three

  11. Constitution aims to bring an end to health economy warfare.

    Science.gov (United States)

    Harding, Mary-Louise; Martin, Daniel

    2005-02-10

    A rough new constitution is being drawn up for the NHS in a bid to prevent health economies sliding into bitter 'Bradford-style' warfare in the era of foundations trusts and payment by results. The rules of engagement are part of a package of measures designed to rescue some of the government's flagship reforms amid warnings from audit chiefs on the impact of PbR.

  12. Echo chamber and trench warfare dynamics in online debates.

    Science.gov (United States)

    Karlsen, Rune; Steen-Johnsen, Kari; Wollebæk, Dag; Enjolras, Bernard

    2017-06-01

    In this article, we take issue with the claim by Sunstein and others that online discussion takes place in echo chambers, and suggest that the dynamics of online debates could be more aptly described by the logic of 'trench warfare', in which opinions are reinforced through contradiction as well as confirmation. We use a unique online survey and an experimental approach to investigate and test echo chamber and trench warfare dynamics in online debates. The results show that people do indeed claim to discuss with those who hold opposite views from themselves. Furthermore, our survey experiments suggest that both confirming and contradicting arguments have similar effects on attitude reinforcement. Together, this indicates that both echo chamber and trench warfare dynamics - a situation where attitudes are reinforced through both confirmation and disconfirmation biases - characterize online debates. However, we also find that two-sided neutral arguments have weaker effects on reinforcement than one-sided confirming and contradicting arguments, suggesting that online debates could contribute to collective learning and qualification of arguments.

  13. Electronic Warfare:Issues and Challenges for Emitter Classification

    Directory of Open Access Journals (Sweden)

    Manish Gupta

    2011-04-01

    Full Text Available Electronic warfare (EW is an important capability that provides advantage to defence forces over their adversaries. Defence forces gather tactical intelligence through EW sensors, which provide the means to counter hostile actions of enemy forces. Functions of an EW system is threat detection and the area surveillance so as to determine the identity of surrounding emitters. Emitter classification system identifies possible threats by analysing intercepted signals. Problem of identifying emitters based on its intercepted signal characteristics is a challenging problem in electronic warfare studies. Major issues and challenges for emitter classification such as drifting of emitter parameters due to aging, operational characteristic of an emitter, i.e., same emitter can operate on multiple bands and multiple pulse repetition frequencies (PRFs are highlighted. A novel approach based on some well-known statistical methods, e.g., regression analysis, hypothesis testing, and discriminent analysis is proposed. The effectiveness of the proposed approach has been tested over ELINT (Electronic Intelligence data and illustrated using simulation data. The proposed approach can play a solution for wide variety of problems in emitter classification in electronic warfare studies.Defence Science Journal, 2011, 61(3, pp.228-234, DOI:http://dx.doi.org/10.14429/dsj.61.529

  14. 26 April 2012 - Extraordinary and plenipotentiary Ambassador A. Dékány, Permanent Representative of the Republic of Hungary to the United Nations Office and other international organisations at Geneva, signing the guest book with CERN Director-General R. Heuer; visiting the LHC tunnel at Point 5 and CMS experimental area and surface building with Collaboration Deputy Spokespersom T. Camporesi; accompanied by M. Bajko, Technology Department. International Relations Office Adviser R. Voss also present.

    CERN Multimedia

    Jean-claude Gadmer

    2012-01-01

    26 April 2012 - Extraordinary and plenipotentiary Ambassador A. Dékány, Permanent Representative of the Republic of Hungary to the United Nations Office and other international organisations at Geneva, signing the guest book with CERN Director-General R. Heuer; visiting the LHC tunnel at Point 5 and CMS experimental area and surface building with Collaboration Deputy Spokespersom T. Camporesi; accompanied by M. Bajko, Technology Department. International Relations Office Adviser R. Voss also present.

  15. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  16. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Energy Technology Data Exchange (ETDEWEB)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  17. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  18. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    Science.gov (United States)

    2011-06-10

    Revolution.‖ 64Jason Fritz, ―How China will use cyber warfare to leapfrog in military competitiveness,‖ Culture Mandala : The Bulletin of the Centre for East...cyber warfare to leapfrog in military competitiveness.‖ Culture Mandala : The Bulletin of the Centre for East-West Culture and Economic Studies 8 no. 1

  19. Irregular Warfare Centric Foreign Internal Defense

    Science.gov (United States)

    2013-06-01

    B Specials85) and in response to the marauding mobs , Catholics barricaded themselves into ―no-go‖ areas to keep the security forces out, allowing...ransacking homes, humiliating automobile occupants during searches and harassment of pedestrians on the streets.87 The Commission of Human Rights ruled...the surface often appears reactive and inconsistent, both Labour and Conservative governments have consistently adhered to a set of basic principles

  20. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  1. Carbon Nanotubes: Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Om Kumar

    2008-09-01

    Full Text Available Discovery of carbon nanotubes has great impact on the development of newer methodologies and devicesuseful for the analysis of various types of chemicals. The functionalisation of CNTs with biomolecules relatedto chemical and biological warfare agents makes these useful for the detection of these agents. The detectionsensitivity can be increased manyfold. Various types of chemical and biological sensors were developed usingvarious type of carbon nanotubes as well as nano particles of different metals.Defence Science Journal, 2008, 58(5, pp.617-625, DOI:http://dx.doi.org/10.14429/dsj.58.1684

  2. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  3. Office 365 For Dummies

    CERN Document Server

    Withee, Ken

    2012-01-01

    The information you need to create a virtual office that can be accessed anywhere Microsoft Office 365 is a revolutionary technology that allows individuals and companies of all sizes to create and maintain a virtual office in the cloud. Featuring familiar Office Professional applications, web apps, Exchange Online, and Lync Online, Office 365 offers business professionals added flexibility and an easy way to work on the go. This friendly guide explains the cloud, how Office 365 takes advantage of it, how to use the various components, and the many possibilities offered by Office 365. It provi

  4. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    With the advent of enzyme linked immunoabsorbant assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were reported as capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detecting soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition, these antibodies were highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies reported an extension of the level of sensitivity to -80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These antibodies offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances.

  5. Evanescent planar waveguide detection of biological warfare simulants

    Science.gov (United States)

    Sipe, David M.; Schoonmaker, Kenneth P.; Herron, James N.; Mostert, Michael J.

    2000-04-01

    An evanescent planar waveguide Mark 1.5 instrument was used to detect simulants of biological warfare agents; ovalbumin (OV), MS2 bacteriophage, BG, and Erwinia herbicola (EH). Polyclonal tracer antibodies were labeled with the fluorescent dye, Cy5. Discrete bands of polyclonal capture antibodies were immobilized to a polystyrene planar waveguide with molded integral lenses. An ST-6 CCD camera was used for detection. OV. MS2 and BG were detected in a simultaneous 3 by 3 array; with a total of nine measurements within 6 minutes. EH was analyzed in a separate array. Results were evaluate dat the US Army Joint Field Trials V, at the Dugway Proving Grounds. Over a 10 day period, 32 unknown samples were analyzed daily for each simulant. Detection limits: OV 10 ng/ml, MS2 107 pfu/ml, BG 105 cfu/ml. EH was detectable at 5 X 105 cfu/ml. Overall false positives were 3.0 percent. Therefore, the Mark 1.5 instrument, with a parallel array of detectors, evanescent flourescent excitation, and CCD imaging provides for rapid, sensitive, and specific detection of biological warfare agent simulants.

  6. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  7. Measurements of Raman scattering in the middle ultraviolet band from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Landström, Lars; Lundén, Hampus; Mohammed, Abdesalam; Olofsson, Göran; Wästerby, Pär.

    2014-05-01

    The very low Raman scattering cross section and the fluorescence background limit the measuring range of Raman based instruments operating in the visible or infrared band. We are exploring if laser excitation in the middle ultraviolet (UV) band between 200 and 300 nm is useful and advantageous for detection of persistent chemical warfare agents (CWA) on various kinds of surfaces. The UV Raman scattering from tabun, mustard gas, VX and relevant simulants in the form of liquid surface contaminations has been measured using a laboratory experimental setup with a short standoff distance around 1 meter. Droplets having a volume of 1 μl were irradiated with a tunable pulsed laser swept within the middle UV band. A general trend is that the signal strength moves through an optimum when the laser excitation wavelength is swept between 240 and 300 nm. The signal from tabun reaches a maximum around 265 nm, the signal from mustard gas around 275 nm. The Raman signal from VX is comparably weak. Raman imaging by the use of a narrow bandpass UV filter is also demonstrated.

  8. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  9. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  10. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available of the Government, as well as cyber security and cyber warfare acts and the command and control aspects thereof. The research presented is largely theoretical in nature, focusing on recent events in the public international domain....

  11. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    Science.gov (United States)

    2014-06-01

    Unlike landmines, for example, that litter historical battlefields to this day, cyber weapons offer a more hygienic approach to warfare. In...institutions have protected civilians from harm through established regulations and norms ranging from merchant shipping protection under the law of...targeted the Laconia, a merchant vessel, in 1942.80 Citizens engaged in cyber warfare, however, may be targeted with commensurate cyber weapons

  12. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    EW mindset changes. 15. SUBJECT TERMS Electronic Warfare, Vulnerability, Military, Threat , Technology, Technological 16. SECURITY...Signature: Kevin nernen, C USAF Corn i e Signatu P er e, , C Directo JointA ancedWarfighting Signature: 10 June 2016 Thesis Advisor: Approved by: School...Electronic warfare support actions taken to identify, locate sources of energy emitted by enemy systems for the purpose of providing threat warning

  13. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available framework. 5.1 Constrains and Implications Several factors can constrain network warfare and have associated consequences. These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical... the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers and network are powerful tools and great harm can be caused with them. Motive, attitude, values, upbringing, experience...

  14. ‘Lest we forget’*: a veteran and son share a ‘warfare tourism’ experience

    OpenAIRE

    Fallon, Paul; Robinson, Peter

    2016-01-01

    Warfare tourism’ represents an increasingly significant dimension of contemporary tourism. This paper provides a fresh perspective on participation in ‘warfare tourism’ by investigating the behaviour and experiences of a living veteran and his son returning to two theatres of war in which the veteran had served in the Royal Navy during the Second World War. Active interviews with the two family members were used to gather rich data regarding the two extended trips, which had been funded by ‘H...

  15. Human Services Offices

    Data.gov (United States)

    Fairfax County, Virginia — This data contains point features representing the human services offices within Fairfax County.“HS_Region” is the office for each human services region, “DFS_Area”...

  16. Interactive Office user's manual

    Science.gov (United States)

    Montgomery, Edward E.; Lowers, Benjamin; Nabors, Terri L.

    1990-01-01

    Given here is a user's manual for Interactive Office (IO), an executive office tool for organization and planning, written specifically for Macintosh. IO is a paperless management tool to automate a related group of individuals into one productive system.

  17. HUD's Local Office Directory

    Data.gov (United States)

    Department of Housing and Urban Development — HUD is organized in 10 Regions. Each Region is managed by a Regional Administrator, who also oversees the Regional Office. Each Field Office within a Region is...

  18. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  19. Methodology and biological monitoring of exposure to chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Shih, M.L.; Smith, J.R.; McMonagle, J.D. [Army Medical Research Inst. of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1995-06-01

    In the past few years, our institute has developed several GC/MS methods for the detection of the breakdown products of toxic organophosphonates (soman, sarin, GF) and vesicant sulfur mustard in biological samples. Recently we developed a modified GC/MS method for VX and are continually working on the methodology for lewisite and tabun. The purpose is to have an analytical tool to verify the exposure of chemical warfare agents in humans. Analytical procedures for quantitating the hydrolyzed phosphonic acids from nerve agents in environmental samples have been reported by many analysts. For more complex matrices such as biological samples, there is not yet a method reported. To make these polar acids amenable to gas chromatographic analysis a prior derivatization is needed. We found the pentafluorobenzyl ester derivatives of the phosphonates are suitable for verification and pharmacokinetic studies in biological samples. This method may also serve as an alternative method for confirmation purposes in environmental samples.

  20. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  1. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  2. Respiratory Protection Against Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    G.K. Prasad

    2008-09-01

    Full Text Available Chemical and biological warfare (CBW agents pose unavoidable threat, both to soldiers and civilians.Exposure to such deadly agents amidst the CBW agents contaminated environment can be avoided bytaking proper protective measures. Respiratory protection is indispensable when the soldiers or civiliansare surrounded by such deadly environment as contamination-free air is needed for respiration purposes.In this context, an attempt has been made to review the literature for the past five decades on developmentof various protective devices for respiratory protection against aerosols, gases, and vapours of CBWagents. This review covers structural, textural, and adsorption properties of materials used in gas filtersand mechanical filters for the removal of CBW agents.Defence Science Journal, 2008, 58(5, pp.686-697, DOI:http://dx.doi.org/10.14429/dsj.58.1692

  3. Technological, military and social causes for the application of cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-01-01

    Full Text Available Cyber warfare is a specific new form of military conflicts the use of which is growing rapidly in the international community. However, its nature is specific and differs from all previously known forms of warfare. For the purpose of clear understanding of the nature of cyber warfare, this paper covers the basic groups of preconditions for its broad application and fast development from technological, military and social aspects. Understanding the true nature of cyber warfare is a necessary condition for building national capacities for its application that are military justified and harmonized with the international law. The paper explores the characteristic instances of cyber warfare, ranging from information propaganda to physical destruction, with the goal to determine guidelines for the possible development of cyber capacities at the national level. Based on the analysis of previous cyber warfare cases, a prediction of future development directions is made and the necessity to apply suitable methods and techniques for defense against them is analyzed.

  4. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  5. Platform-level Distributed Warfare Model-based on Multi-Agent System Framework

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2012-05-01

    Full Text Available The multi-agent paradigm has become a useful tool in solving military problems. However, one of key challenges in multi-agent model for distributed warfare could be how to describe the microcosmic  tactical warfare platforms actions. In this paper, a platform-level distributed warfare model based on multi-agent system framework is designed to tackle this challenge. The basic ideas include:  Establishing multi-agent model by mapping from tactical warfare system’s members, i.e., warfare platforms, to respective agents; performing task decomposition and task allocation by using task-tree decomposition method and improved contract net protocol model technique; and implementing simulation by presenting battlefield terrain environment analysis algorithm based on grid approach. The  simulation demonstration results show that our model provides a feasible and effective approach to supporting the abstraction and representation of microcosmic tactical actions for complex warfare system.Defence Science Journal, 2012, 62(1, pp.180-186, DOI:http://dx.doi.org/10.14429/dsj.62.964

  6. LIDAR for Detection of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    S Veerabuthiran

    2011-04-01

    Full Text Available Remote detection of chemical and biological warfare agents and toxic gases in the atmosphere is of current interest to both the military and civilian agencies. Out of all currently available techniques, no single technique provides efficient detection against such threats at significant standoff distances. Light detection and ranging (LIDAR technologies, based on the transmission of laser pulses and analysis of the return signals, have demonstrated impressive capabilities in remote detection of such toxic chemicals. LIDAR is a highly sensitive tool to detect the extremely low concentrations of various toxic agents present in the form of thin clouds at distances of few kilometer. The detection of these toxic clouds is based on the approach of first detecting and measuring the range of the clouds using the scattering phenomena and subsequently identifying the composition of toxic clouds using absorption and fluorescence phenomena. Laser Science and Technology Centre (LASTEC, Delhi has been working on the design and development of LIDAR systems for detection of chemical and biological warfare (CBW agents. In this paper, theoretical analysis of differential absorption LIDAR (DIAL for detection of chemical agents and fluorescence LIDAR for detection of biological agents has been discussed. For some typical parametric conditions, the received power levels from different ranges to detect specific concentrations of chemical or biological clouds have been computed and discussed. The technical details of the indigenously developed backscattering LIDAR, which detects and measures the distance of cloud layers up to 5 km is also presented.Defence Science Journal, 2011, 61(3, pp.241-250, DOI:http://dx.doi.org/10.14429/dsj.61.556

  7. The development of immunoassays for detection of chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lenz, D.E.; Brimfield, A.A.; Cook, L. [Army Medical Research Institute of Chemical Defense, Aberdeen Proving Ground, MD (United States)

    1996-10-01

    With the advent of enzyme linked immunoabsorbent assays (ELISA) and monoclonal antibodies in the last two decades, there has been considerable effort devoted to the development of antibodies to detect and quantify low molecular weight toxic substances in environmental or biological fluids. Polyclonal antibodies against paraoxon (the toxic metabolite of parathion) were capable of detecting paraoxon in body fluids at a level of 10{sup -9} M ({approximately}260 pg/mL) when used in a competitive inhibition enzyme immunoassay (CIEIA). Monoclonal antibodies developed against a structural analogue of the chemical warfare agent soman were capable of detection soman in buffer solutions at a level of 10{sup -6} M ({approximately}180 ng/mL). In addition these antibodies were found to be highly specific for soman even in the presence of its major hydrolysis product. Subsequent studies with antisoman monoclonal antibodies extended the level of sensitivity to {approximately}80 ng/mL. Furthermore these antibodies did not cross react with other chemical warfare nerve agents such as sarin or tabun. In all cases, the time for a confirmatory test was two hours or less. Immunoassays for T-2 micotoxins have also been reported with a minimal detection range of 2 pg/assay to 50 ng/assay for the polyclonal and monoclonal T-2 antibodies respectively. These reagents offer a sensitive, rapid and low cost approach to the diagnosis or detection of the presence of toxic chemical substances. More recent efforts have focussed on developing antibodies specific for sulfur mustard a highly reactive vesicating agent.

  8. Editorial: Discovery from Lake Turkana and History of Human Warfare

    Directory of Open Access Journals (Sweden)

    Professor S. P. Singh, Ph.D.

    2016-02-01

    Full Text Available Very interesting finds have come to light of violently killed humans from Lake Turkana in the Kenyan Rift Valley around 10000 years ago. A stunning discovery of skeletons of 27 persons who are believed to have been killed at the same time and are supposed to have suffered violent wounds has been reported recently (Nature 529, 394–398, 21 January 2016. These finds belong to a period of late Pleistocene/early Holocene of the hunter-gatherer societies from Nataruk. Among the victims were men, women and children. The individuals were killed with projectiles and blunt weapons. These skeletons were found in the lagoon and were preserved very nicely. Such type of mass killing probably could never happen as a consequence of intra-group conflict. The evidence seems to be towards warfare and aggression in ancient societies. The experts ruled out the possibility of a cemetery and ceremonial burial. This discovery of 27 skeletons points to the fact that there may have been more causalities and many individuals might have escaped death at that time. According to one of the co-authors of this research Dr. R.A. Foley, the groups were elatively more densely packed populations than the hunter gatherers and had more chances of having inter-group conflicts because of sharing the resources which would have been plentiful near the lagoons and water bodies. Violence probably has been in the instinct of early humans and that the warfare among humans has a history of 10000 years or even earlier.

  9. Looming Threat of Chemical and Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    A.K. Goel

    2016-09-01

    Full Text Available In the recent past, a dramatic shift has been observed in the strategies of warfare from conventional to non-conventional. Now-a-days, traditional power is of less importance than it used to be earlier. Weapons of mass destruction, which comprise of nuclear weapons, and chemical and biological warfare agents, are posing a great peril to the world due to their devastating potential. Though, there are several bilateral as well as multilateral treaties to control the use and proliferation of these weapons, yet the risk of use of such agents by non-state actors cannot be overlooked. Chances of use of chemical and biological agents are more likely than the nuclear weapons. A comparison of nuclear, chemical and biological weapons in terms of technology, cost, signature, effectiveness on protected and un-protected troops shows that chemical and biological weapon programmes require much lower level of technology and cost than the nuclear weapon programme. Further, there is no or least distinctive and readily observable signature in biological weapon programme in comparison to nuclear and chemical weapon facilities. There can be two possibilities of use of these agents in terrorist attacks. First, there is a risk of transfer of material or know-how of these weapons to terrorists for using against the adversaries and second, the risk of these agents being pilfered due to poor security, thereby sabotaging the national security. The International Committee of Red Cross in February 1918 reckoned these agents as ‘barbarous inventions’ that can ‘only be called criminal’.

  10. A Square Peg in a Round Hole: A Case Study of Center Gravity Application in Counter Insurgency Warfare

    Science.gov (United States)

    2011-06-01

    D.C.: Potomac Books, 2010. Griffith, Samuel B. The Illustrated Art of War. New York: Oxford University Press, 2005. Guevara , Ernesto Che, Brian... Guevara provided another approach to insurgency, encapsulated in the concept of the foco, which he described in his 1960 work Guerrilla Warfare. The... Guevara , Guerrilla Warfare, edited by Brian Loveman and Thomas Davies, (Oxford: SR Books, 1997), 7. 21 Guevara , Guerrilla Warfare, 256. 22 Guevara

  11. Office 2013 simplified

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    A basic introduction to learn Office 2013 quickly, easily, and in full color Office 2013 has new features and tools to master, and whether you're upgrading from an earlier version or using the Office applications for the first time, you'll appreciate this simplified approach. Offering a clear, visual style of learning, this book provides you with concise, step-by-step instructions and full-color screen shots that walk you through the applications in the Microsoft Office 2013 suite: Word, Excel, PowerPoint, Outlook, and Publisher.Shows you how to tackle dozens of Office 2013

  12. Office 2013 for dummies

    CERN Document Server

    Wang, Wallace

    2013-01-01

    Office 2013 For Dummies is the key to your brand new Office! Packed with straightforward, friendly instruction, this update to one of the bestselling Office books of all time gets you thoroughly up to speed and helps you learn how to take full advantage of the new features in Office 2013. After coverage of the fundamentals, you'll discover how to spice up your Word documents, edit Excel spreadsheets and create formulas, add pizazz to your PowerPoint presentation, and much more.Helps you harness the power of all five Office 2013 applications: Word, Excel, PowerPoint,

  13. Impressions of psychotherapists' offices.

    Science.gov (United States)

    Nasar, Jack L; Devlin, Ann Sloan

    2011-07-01

    For counseling settings, research suggests that softness, personalization, and order might affect the experience and the perceived expertness, trustworthiness, and social attractiveness of the therapist. This article discusses exploratory studies on college students' perception of the counseling office environment and whether the likely client experience was associated with the softness/personalization and order of the office. As stimuli, the studies used 30 color photographs of psychotherapists' offices viewed from the client's perspective. After obtaining ratings of the characteristics of each office, we obtained ratings from different groups of students of the quality of care and comfort expected in each office (Study 1) and how qualified, bold, and friendly the therapist in the office would be (Study 2). Additional studies examined the likelihood of choosing a therapist based on the office, and the first thought or feeling that came to mind about the office, the therapist, and the patient experience. There were strong correlations in response between groups (by whether they had experienced therapy; their level in school; their gender; and their major, location, and school size). The quality of care, comfort, therapist boldness, qualifications of the therapist, and the likelihood that one would choose a therapist based on the office improved with increases in the office's softness/personalization and order. Friendliness improved with increases in softness/personalization. The office choices, open-ended responses, and reported reasons for the ratings confirmed the importance of softness (comfort) and order. Research should test longer term exposure and behavior.

  14. Plastic antibody for the recognition of chemical warfare agent sulphur mustard.

    Science.gov (United States)

    Boopathi, M; Suryanarayana, M V S; Nigam, Anil Kumar; Pandey, Pratibha; Ganesan, K; Singh, Beer; Sekhar, K

    2006-06-15

    Molecularly imprinted polymers (MIPs) known as plastic antibodies (PAs) represent a new class of materials possessing high selectivity and affinity for the target molecule. Since their discovery, PAs have attracted considerable interest from bio- and chemical laboratories to pharmaceutical institutes. PAs are becoming an important class of synthetic materials mimicking molecular recognition by natural receptors. In addition, they have been utilized as catalysts, sorbents for solid-phase extraction, stationary phase for liquid chromatography and mimics of enzymes. In this paper, first time we report the preparation and characterization of a PA for the recognition of blistering chemical warfare agent sulphur mustard (SM). The SM imprinted PA exhibited more surface area when compared to the control non-imprinted polymer (NIP). In addition, SEM image showed an ordered nano-pattern for the PA of SM that is entirely different from the image of NIP. The imprinting also enhanced SM rebinding ability to the PA when compared to the NIP with an imprinting efficiency (alpha) of 1.3.

  15. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  16. Wearable Atmospheric Pressure Plasma Fabrics Produced by Knitting Flexible Wire Electrodes for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    Jung, Heesoo; Seo, Jin Ah; Choi, Seungki

    2017-01-01

    One of the key reasons for the limited use of atmospheric pressure plasma (APP) is its inability to treat non-flat, three-dimensional (3D) surface structures, such as electronic devices and the human body, because of the rigid electrode structure required. In this study, a new APP system design—wearable APP (WAPP)—that utilizes a knitting technique to assemble flexible co-axial wire electrodes into a large-area plasma fabric is presented. The WAPP device operates in ambient air with a fully enclosed power electrode and grounded outer electrode. The plasma fabric is flexible and lightweight, and it can be scaled up for larger areas, making it attractive for wearable APP applications. Here, we report the various plasma properties of the WAPP device and successful test results showing the decontamination of toxic chemical warfare agents, namely, mustard (HD), soman (GD), and nerve (VX) agents.

  17. The Navy’s Moral Compass: Commanding Officers and Personal Misconduct

    Science.gov (United States)

    2016-07-01

    surface, aviation, submarine, and other (including special warfare, Medical or Supply Corps, human resources , etc.). Each case is categorized by the...THE NAVY’S MORAL COMPASS Captain Light is a member of the faculty in the De- partment of Command, Leadership and Manage - ment at the U.S. Army War...caring, and citizenship.33 Closely related to character is ethics, the set of “standards of behavior that tell us how human beings ought to act in

  18. Development of the Nontechnical Skills for Officers of the Deck (NTSOD) Rating Form

    Science.gov (United States)

    2010-12-01

    contribute to safe and efficient task performance” (Flin, O’Connor, & Crichton , 2008, p. 1). These skills are not mysterious or new to the surface warfare...effective operation. Flin, O’Connor, and Crichton (2008) describe non-technical skills as “the cognitive, social, and personal resource skills that... Crichton , M. (2008). Safety at the sharp end: A guide to non- technical skills. Burlington, VT: Ashgate Publishing Company. Flin, R., Yule, S., Paterson

  19. Report to Congress on the Activities of the DoD Office of Technology Transition

    Science.gov (United States)

    2000-01-01

    the Naval Surface Warfare Center, Carderock Division, for the application of chaos control techniques to human biological systems—cardiac fibrilation...may open new lines. Chaos Control Applied to Cardiac Fibrillation and Epileptiform Behavior in the Brain Dr. Mark L. Spano and Dr. Visarath In, Naval...life-saving work on the application of chaos control to cardiac fibrillation and epileptiform behavior in the brain. The doctors investigated

  20. The teaching house officer.

    OpenAIRE

    Schiffman, F. J.

    1986-01-01

    Although medical students on clinical ward rotations receive a large part of their education from house officers, very often house officers themselves have had little formal preparation as teachers. Because students and teachers work closely together under special conditions, unique educational situations are created where much more than factual information is conveyed. Although some house officers are "natural" teachers, others find such activities uncomfortable or burdensome. Most people, h...

  1. OfficeVISION; OfficeVISION

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    OfficeVISION is a wide range of projects with the same goal: development of technology meeting future demands for good working conditions, health, environment- and energy conservation, the increased productivity. This project shows if it in few years will be possible to build with an energy producing building envelope in high-insulated glass. The officeVISION project is however so visionary that the Technological Institute will have to wait wait some years to build the house until the necessary building components has gone into production. Though the construction is deferred a number of interesting results have come out of the project. By designing a wide range of solutions to the energy producing glass building envelope, we have gradually gotten a good grasp of arrangement possibilities and use of glass buildings. There are many possibilities in this type of construction especially as regards to daylight. But there is also limitations as regards to acoustic and the possibility to use IT presentation screens. Thus the conclusion is that glass buildings are suitable as frames around informal meetings and thought fulness, but hardly the answer to all challenges in the future office. The main objects are: Good daylight conditions; Minimal energy consumption and maximal solar-electricity; Optimum conditions for high productivity in the office function; Good healthy indoor climate and good comfort; Export design high productive building technology; Minimal environmental impact; and A landmark for Technological Institute's technological spearheads. (EHS)

  2. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  3. Treatability study report for remediation of chemical warfare agent contaminated soils using peroxysulfate ex-situ treatment. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pugh, J.R.; Grinstead, J.H.; Farley, J.A.; Enlow, P.D.; Kelly, D.A.

    1996-07-01

    This laboratory scale study examines the feasibility of using peroxysulfate based oxidants to remediate soils contaminated with GB, Hi, and VX. The project was conducted with chemical warfare agent simulants. The study concludes that peroxysulfates, and particularly peroxydisulfate, can degrade chemical warfare agent simulants in soil and recommends continuing research.

  4. Research on performance of ethernet interface in network centric warfare

    Institute of Scientific and Technical Information of China (English)

    梁永生; 张乃通

    2004-01-01

    The concept of network centric warfare (NCW) and its character, high requirement of real-time synchronization are introduced. The distributed equal-node network architecture in NCW is presented. Based on theoretical analysis on ethernet interface performance, this paper presents that forwarding latency between ethernet interface devices is a key influence factor of real-time synchronization in NCW. Ethernet fundamental is briefly introduced. The model between a switch under test (SUT) and a smartbits card is presented and used for two interconnecting switches in NCW. On condition that ignoring the latency of connecting fiber or twisted pairs and processing latency of the smartbits test system, this paper presents that clock frequency tolerance (CFT) between a SUT and a smartbits card is a leading influence factor of forwarding latency of an ethernet switch. The formulae to calculate internal forwarding latency and forwarding latency caused by its CFT are deduced. Theoretical calculation on forwarding latency of an ethernet switch based on the given CFT and test time is implemented. Experimental study on primary forwarding latency and secondary forwarding latency is implemented and forwarding latency between the SUT and the smartbits card is measured, thus testifying the accuracy of the above theoretical analysis that the CFT is a key influence factor of forwarding latency. The measures to satisfy the needs of forwarding latency in NCW are presented.

  5. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  6. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  7. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  8. Human scalp permeability to the chemical warfare agent VX.

    Science.gov (United States)

    Rolland, P; Bolzinger, M-A; Cruz, C; Briançon, S; Josse, D

    2011-12-01

    The use of chemical warfare agents such as VX in terrorism act might lead to contamination of the civilian population. Human scalp decontamination may require appropriate products and procedures. Due to ethical reasons, skin decontamination studies usually involve in vitro skin models, but human scalp skin samples are uncommon and expensive. The purpose of this study was to characterize the in vitro permeability to VX of human scalp, and to compare it with (a) human abdominal skin, and (b) pig skin from two different anatomic sites: ear and skull roof, in order to design a relevant model. Based on the VX skin permeation kinetics and distribution, we demonstrated that (a) human scalp was significantly more permeable to VX than abdominal skin and (b) pig-ear skin was the most relevant model to predict the in vitro human scalp permeability. Our results indicated that the follicular pathway significantly contributed to the skin absorption of VX through human scalp. In addition, the hair follicles and the stratum corneum significantly contributed to the formation of a skin reservoir for VX.

  9. Office of Minority Health

    Science.gov (United States)

    Skip Navigation Office of Minority Health A A A En Español Newsroom Contact Us Search: About OMH What We Do Resource ... History Leadership Regional Staff State Minority Health Contacts Offices of Minority Health at HHS Advisory Committee Committees ...

  10. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  11. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  12. Fear as a medium of communication in asymmetric forms of warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    2011-01-01

    Fear is defined as the distinction between risk and danger, a distinction that operates in communicative forms. War is always also warfare about the form of war. The article describes how fear in warfare becomes a symbolically generalized medium of communication, mainly focusing on how the form...... of fear evolves in asymmetric warfare. Asymmetric war induces fear in both parties, but in a communicative form that leads to very different experiences of fear. Fear is observed and analysed with Niklas Luhmann’s theory of self-referential systems of communication and well as his theory of risk....... Following Luhmann and in continuation of Clausewitz’ conceptual tools, yet with other means, the article proposes to observe war as a system that can de-ontologize itself and thereby concern moving centres of gravity such as communication lines, motivation, public fear as well as perceptions of risk...

  13. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  14. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  15. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized.

  16. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  17. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  18. Office 2013 digital classroom

    CERN Document Server

    Holland, Walter

    2013-01-01

    This complete training package makes learning the new Office 2013 even easier! Featuring both a video training DVD and a full-color book, this training package is like having your own personal instructor guiding you through each lesson of learning Office 2013, all while you work at your own pace. The self-paced lessons allow you to discover the new features and capabilities of the new Office suite. Each lesson includes step-by-step instructions and lesson files, and provides valuable video tutorials that complement what you're learning and clearly demonstrate how to do tasks. This essential

  19. 30 January 2012 - Ecuadorian Ambassador Gallegos Chiriboga, Permanent Representative to the United Nations Office and other International Organisations at Geneva and San Francisco de Quito University Vice Chancellor C. Montùfar visiting CMS surface facilities and underground experimental area with CMS Collaboration L. Sulak and Collaboration Deputy Spokesperson T. Camporesi, throughout accompanied by Head of International Relations F. Pauss.

    CERN Multimedia

    Michael Hoch

    2012-01-01

    30 January 2012 - Ecuadorian Ambassador Gallegos Chiriboga, Permanent Representative to the United Nations Office and other International Organisations at Geneva and San Francisco de Quito University Vice Chancellor C. Montùfar visiting CMS surface facilities and underground experimental area with CMS Collaboration L. Sulak and Collaboration Deputy Spokesperson T. Camporesi, throughout accompanied by Head of International Relations F. Pauss.

  20. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  1. Multiple functional UV devices based on III-Nitride quantum wells for biological warfare agent detection

    Science.gov (United States)

    Wang, Qin; Savage, Susan; Persson, Sirpa; Noharet, Bertrand; Junique, Stéphane; Andersson, Jan Y.; Liuolia, Vytautas; Marcinkevicius, Saulius

    2009-02-01

    We have demonstrated surface normal detecting/filtering/emitting multiple functional ultraviolet (UV) optoelectronic devices based on InGaN/GaN, InGaN/AlGaN and AlxGa1-xN/AlyGa1-yN multiple quantum well (MQW) structures with operation wavelengths ranging from 270 nm to 450 nm. Utilizing MQW structure as device active layer offers a flexibility to tune its long cut-off wavelength in a wide UV range from solar-blind to visible by adjusting the well width, well composition and barrier height. Similarly, its short cut-off wavelength can be adjusted by using a GaN or AlGaN block layer on a sapphire substrate when the device is illuminated from its backside, which further provides an optical filtering effect. When a current injects into the device under forward bias the device acts as an UV light emitter, whereas the device performs as a typical photodetector under reverse biases. With applying an alternating external bias the device might be used as electroabsorption modulator due to quantum confined Stark effect. In present work fabricated devices have been characterized by transmission/absorption spectra, photoresponsivity, electroluminescence, and photoluminescence measurements under various forward and reverse biases. The piezoelectric effect, alloy broadening and Stokes shift between the emission and absorption spectra in different InGaN- and AlGaN-based QW structures have been investigated and compared. Possibilities of monolithic or hybrid integration using such multiple functional devices for biological warfare agents sensing application have also be discussed.

  2. Office of the Chief Financial Officer Annual Report 2009

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez, Jeffrey

    2009-12-15

    Presented is the 2009 Chief Financial Officer's Annual Report. The data included in this report has been compiled from the Budget Office, the Controller, Procurement and Property Management and the Sponsored Projects Office.

  3. NCEP Internal Office Notes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The National Centers for Environmental Prediction (NCEP) and its predecessors have produced internal publications, known as Office Notes, since the mid-1950's. In...

  4. Ecocitizen at the office

    CERN Multimedia

    Staff Association

    2014-01-01

    At the office, I do as I would at home At the office, just as at home, we need to stay warm, have light, be equipped (with office material, furniture). We thus need energy and raw materials. This consumption is not without consequences for our environment. How to reduce our consumption? In everyday life, we already have behaviours that allow us to save energy and resources, to sort our waste. At the office it is important to act in the same way as at home, as we spend a lot of time at our workplace. How to act more responsibly at the office, to reduce the environmental impact, and how to stay motivated? Computer, printer, copy machine… or coffee machine. There are quite a few electrical appliances which are indispensable in our office. Always turned on, or almost, they are also often inactive, and it is during these phases of inactivity that two thirds of their consumption occurs. The way one uses the computer is important in order to limit its consumption. Use the sleep mode with care. A c...

  5. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and s

  6. Sandals and Robes to Business Suits and Gulf Streams: Warfare in the 21st Century

    Science.gov (United States)

    2011-04-20

    cartels, or simply shooting an American for the price of a loaf of bread to feed their families, we need to better understand what we’re facing. From...our goals, but as warfare becomes more untenable in the age of social media, as the unacceptable killing of civilians on any battlefield could lose

  7. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  8. Ion mobility spectrometry and its applications in detection of chemical warfare agents.

    Science.gov (United States)

    Mäkinen, Marko A; Anttalainen, Osmo A; Sillanpää, Mika E T

    2010-12-01

    When fast detection of chemical warfare agents in the field is required, the ion mobility spectrometer may be the only suitable option. This article provides an essential survey of the different ion mobility spectrometry detection technologies. (To listen to a podcast about this feature, please go to the Analytical Chemistry multimedia page at pubs.acs.org/page/ancham/audio/index.html.).

  9. Analysis of Urinary Metabolites of Nerve and Blister Chemical Warfare Agents

    Science.gov (United States)

    2014-08-01

    Warfare Agents GA Tabun , ethyl dimethylphosphoramidate GB Sarin, isopropyl methylphosphonofluoridate GD Soman, pinacolyl methylphosphonofluoridate...and their metabolites Agent Metabolite GA, Tabun O P O N CN Ethyl Dimethylphosphoroamidate, EDMAP, GA Acid HO P O N CN GB, Sarin P O

  10. THE PECULIARITIES OF SOCIAL PERCEPTION IN THE CONTEXT OF INFORMATION-PSYCHOLOGICAL WARFARE

    Directory of Open Access Journals (Sweden)

    Nane Zeynalyan

    2016-09-01

    Full Text Available In the recent decades, war fields have moved into the information sphere. Today’s person has reason to “be informed”; as having information provides a sense of security. In the modern world, great effort is invested in expanding information sources, because it serves to articulate both international policies and the context of wars. The exchange of information in domestic and international platforms influences the quality of public debate and ideology, which affects social attitudes and decision-making processes. This article presents the role of information-psychological warfare as a factor in forming public opinion. It discusses the peculiarities of organizing an information-psychological warfare during military conflicts. The goal of our research is to explore how social groups might perceive peculiarities in the information-psychological warfare. The research involves methods of survey, content analysis, and free associations. The effectiveness of psychological warfare significantly depends on how people perceive information. Consequently, in the contemporary world, it is necessary to not only protect or fight on the battlefield, but also to use information weapons. This imposes requirements on psychological scientists to explore peculiarities around the perception of information to help find mechanisms that safeguard people’s lives by way of contributing to the formation of necessary attitudes and stereotypes.

  11. Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers

    Science.gov (United States)

    2007-11-02

    in converting electric energy to thermal energy for the decon applications. Other conductive materials, such as polythiophenes , polypyrroles, carbon...Development of Novel Alternative Technologies for Decontamination of Warfare Agents: Electric Heating with Intrinsically Conductive Polymers...Joule)-heating with conducting polymers. The basic concept is that electrically conducting polymers, such as polyaniline, can be used as coatings or

  12. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    chemical scenario involving the release of a blister agent (mustard lewisite) would result in a waste that the State of Colorado would regulate as... Waste Management ................................................................. 24 4.3 Key Planning Factors: Recovery Planning...Planning Factors, this document presents a chemical warfare agent scenario featuring Agent Yellow, a blister agent. Agent Yellow is a mixture of

  13. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modelling is a useful method to better characterize the field due to the rich ideas that can be generated...

  14. Disruption of a binary organogel by the chemical warfare agent soman (GD) and common organophosphorus simulants

    OpenAIRE

    Hiscock, Jennifer R.; Sambrook, Mark R; Ede, Jayne A.; Wells, Neil J.; Philip A. Gale

    2014-01-01

    The chemical warfare agent (CWA) soman (GD) acts as a molecular stimulus for the disruption of an anthracene-based binary organogel prepared in cyclohexane. The CWA simulants dimethyl methylphosphonate (DMMP) and diethyl chlorophosphate (DCP) were also found to disrupt the binary organogel through changes in solvent polarity and reactions with the gelator.\\ud \\ud

  15. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused b

  16. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives o

  17. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    air warfare (AAW), weapon selection, unmanned aerial vehicle, simulation, design of experiments, combat systems 15. NUMBER OF PAGES 81 16. PRICE ...Explanation of a Cookie-Cutter Sensor. ........................ 19 Figure 12. Stop Conditions Menu in MANA...companies sell these deadly missiles at affordable prices to allow many countries to easily employ them onboard their warships. Missiles also offer

  18. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    NPRST department conducted analysis on factors influencing morale within the SEAL community;3 the Navy FAP department conducted phone interviews of...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias...Analytic Hierarch/Network Process.” In Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron, Volume 102 (2), 251–318. Real

  19. 20 CFR 422.5 - District offices and branch offices.

    Science.gov (United States)

    2010-04-01

    ... Section 422.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Organization and Functions of the Social Security Administration § 422.5 District offices and branch offices. There are over 700 social security district offices and branch offices located in the principal cities...

  20. The automated medical office.

    Science.gov (United States)

    Petreman, M

    1990-08-01

    With shock and surprise many physicians learned in the 1980s that they must change the way they do business. Competition for patients, increasing government regulation, and the rapidly escalating risk of litigation forces physicians to seek modern remedies in office management. The author describes a medical clinic that strives to be paperless using electronic innovation to solve the problems of medical practice management. A computer software program to automate information management in a clinic shows that practical thinking linked to advanced technology can greatly improve office efficiency.

  1. Irregular Warfare and Future War: Strategy and Defense Planning; Strategic Insights, v. 10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation

    OpenAIRE

    Russell, James A.

    2011-01-01

    This article appeared in Strategic Insights, v.10, Special issue (October 2011), 92-98. Topic: Global Trends and Future Warfare ; Part II: Technological and Doctrinal Innovation Approved for public display, distribution unlimited The purpose of this paper is threefold: to speculate on the role and prominence of irregular warfare in the strategic environment over the next quarter century, to comment on the impact that phenomenon may have on shaping the postulated scenarios addressed in t...

  2. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are dis

  3. Impressions of Psychotherapists' Offices

    Science.gov (United States)

    Nasar, Jack L.; Devlin, Ann Sloan

    2011-01-01

    For counseling settings, research suggests that softness, personalization, and order might affect the experience and the perceived expertness, trustworthiness, and social attractiveness of the therapist. This article discusses exploratory studies on college students' perception of the counseling office environment and whether the likely client…

  4. Users Office - Removal

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    As of 8 December 2010 and until the end of February 2011, the Users Office will move from Bldg. 60. New Location : Bldg. 510-R-033 Opening Hours: Monday, Tuesday, Thursday, Friday : 08.30 – 12.30 Monday to Friday: 14.00 – 16.00 Closed Wednesday mornings.

  5. Yintai Office Tower

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ The Release Conference of Yintai's office leasing agents was hosted in Nov. 10th 2006 at Beijing Yintai Centre. More than ten top international real estate agents were present at the conference, including CB Richard Ellis, Colliers International, Savills, DTZ and Jones Lang LaSalle and Cushman & Wakefield.

  6. Teamwork Improves Office Climate.

    Science.gov (United States)

    Winck, Susan K.

    1993-01-01

    The Smeal College of Business Administration at the Pennsylvania State University selected its advising center as the pilot unit for a continuous quality improvement project using Total Quality Management principles. It was found that a quality improvement culture evolves when team practices are carried into the everyday office environment.…

  7. The paperless business office.

    Science.gov (United States)

    McCormack, J

    1997-06-01

    Many providers are launching a variety of initiatives with the intent of eliminating paper in the business offices, thus streamlining operations and cutting costs. While there are some encouraging signs of progress, plenty of roadblocks still exist that will make such a transition difficult. Key technologies involved include EDI, the Internet, document imaging, COLD technology and automated dialers.

  8. BGCI China office opens

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The official opening ceremony of the China Office of Botanic Gardens Conservation International (BGCI) was held in the CAS South China Botanical Garden (SCBG) in Guangzhou, capital of south China's Guangdong Province, on 26 February. The event brought together more than 100 high-caliber scholars and officials, including Secretary General of BGCI Mme.

  9. Officer Computer Utilization Report

    Science.gov (United States)

    1992-03-01

    SIGNIFV11ANT @ YES PREVIOUSLY 0 00" for 0 months.)0 EXRML INFCN DYES BO0TH CURRENTLY AND PREVIOUSLY __________ -5- s- -js ! EC O : PESO A A JO BA K RO N INO...U SECO F: M This section asks questions about issues related to microcomputers, to include office automation and Information management. A

  10. Autonomous-agent based simulation of anti-submarine warfare operations with the goal of protecting a high value unit

    OpenAIRE

    Akbori, Fahrettin

    2004-01-01

    Approved for public release, distribution unlimited The Anti-Submarine Warfare screen design simulation is a program that provides a model for operations in anti-submarine warfare (ASW). The purpose of the program is to aid ASW commanders, allowing them to configure an ASW screen, including the sonar policy, convoy speed, and the number of ships, to gain insight into how these and other factors beyond their control, such as water conditions, impact ASW effectiveness. It is also designed to...

  11. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    OpenAIRE

    Abedi, A.; HR Koohestani; Z Roosta

    2008-01-01

    ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical ...

  12. Unconventional Warfare and Counterinsurgency in Pakistan: A Brief History

    Science.gov (United States)

    2012-11-01

    for the Mujahideen were being sold in the open market , leading to rising violence across the country. There were also allegations of ISI officers...convoys inflicted heavy casualties. There was also a wave of suicide bombings in major cities – especially Lahore, Peshawar , and Karachi – many of...Pakistan,” Asia Times, January 30, 2008. 75 Lalwani, 2009. 76 “Jailed TNSM chief admitted to Peshawar hospital,” Daily Times, November 17, 2007

  13. 76 FR 5391 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director

    Science.gov (United States)

    2011-01-31

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science Policy, Office of the Director Amended Notice of Meeting Notice is hereby given of a change in the...

  14. 75 FR 15713 - Office of Biotechnology Activities; Office of Science Policy; Office of the Director; Notice of a...

    Science.gov (United States)

    2010-03-30

    ... HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities; Office of Science..., Advisory Committee Coordinator, Office of Biotechnology Activities, Office of Science Policy, Office of the... of Biotechnology Activities, National Institutes of Health. BILLING CODE 4140-01-P ...

  15. The Users Office turns 20

    CERN Multimedia

    2009-01-01

    20 years ago, in the summer of 1989, an office was created to assist the thousands of users who come to CERN each year, working over the broad range of projects and collaborations. Chris Onions (right), head of the Users’ Office, with Bryan Pattison (left), the Office’s founder.Before the inception of the Users Office, it was common for users to spend at least an entire day moving from office to office in search of necessary documentation and information in order to make their stay official. "Though the Office has undergone various changes throughout its lifetime, it has persisted in being a welcoming bridge to facilitate the installation of visitors coming from all over the world", says Chris Onions, head of the Users Office. This September, the Office will celebrate its 20-year anniversary with a drink offered to representatives of the User community, the CERN management and staff members from the services with whom the Office is involved. &...

  16. Office managers' forum.

    Science.gov (United States)

    Lam, Samuel M; Hankins, Launa; Dieter, Andrea; Garcia, Sandie; Hepp, Delphine; Jordan, Janet L; Silver, William E; Shorr, Jay Alan; Sullivan, Susan E; Whatcott, Pam; Williams, Edwin F; Waldman, S Randolph

    2010-11-01

    This article is a summary of the key elements presented during the conference held as part of the Practice Management and Development course sponsored by the Multi-Specialty Foundation in Las Vegas, Nevada in 2009. This article represents an amalgam of perspectives from practices across the United States. The Office Managers' Forum brought together the office managers and surgeons from practices across the United States as panelists. The panelists answered a multitude of practice management questions that included wide-ranging topics such as accounting and financing, staff well being, working with a spouse, hiring and firing, staff meetings, accreditation, motivation, and problems and perks specifically associated with a facial plastic surgery practice.

  17. Office Web Applications

    Institute of Scientific and Technical Information of China (English)

    涂曙光

    2009-01-01

    在7月份的微软全球合作伙伴大会上,微软正式宣布了Office 2010的第一个“半公开”测试版本:Office 2010 Technical Preview和SharePoint 2010 Technical Preview。前者是“传统”的Office客户端程序,后者则定位成“Business Collaboration Platform for the Enteprise and the Web”的下一代Office服务器产品。之所以说它是“半公开”,是因为这个测试版本并非提供给所有用户下载试用,而是通过注册和邀请的方式,只提供给部分特定的测试用户使用。

  18. The Automated Medical Office

    OpenAIRE

    Petreman, Mel

    1990-01-01

    With shock and surprise many physicians learned in the 1980s that they must change the way they do business. Competition for patients, increasing government regulation, and the rapidly escalating risk of litigation forces physicians to seek modern remedies in office management. The author describes a medical clinic that strives to be paperless using electronic innovation to solve the problems of medical practice management. A computer software program to automate information management in a c...

  19. Swedish Officer Selection

    Science.gov (United States)

    2000-08-01

    1940’ s . The psychological examinations at that time were heavily influenced by German methods developed in the 1930’ s with an emphasis on personality...crystallization (Gc) in tasks that demand ogics (Bloom, 1956), and moral standards ( Kohlberg , 1971). Selection instruments for the acquired knowledge...unsuit- Jung’s (1971) theory of psychological types as a ability for the officer profession, mainly for ethical source of inspiration, and moral reasons

  20. The Automated Medical Office

    OpenAIRE

    1990-01-01

    With shock and surprise many physicians learned in the 1980s that they must change the way they do business. Competition for patients, increasing government regulation, and the rapidly escalating risk of litigation forces physicians to seek modern remedies in office management. The author describes a medical clinic that strives to be paperless using electronic innovation to solve the problems of medical practice management. A computer software program to automate information management in a c...

  1. Office software Individual coaching

    CERN Multimedia

    HR Department

    2010-01-01

    If one or several particular topics cause you sleepless nights, you can get the help of our trainer who will come to your workplace for a multiple of 1-hour slots . All fields in which our trainer can help are detailed in the course description in our training catalogue (Microsoft Office software, Adobe applications, i-applications etc.). Please discover these new courses in our catalogue! Tel. 74924

  2. Microsoft Office 2010

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    作为Microsoft新一代旗舰办公软件,Office 2010中加入了众多强大的创新功能,并提供PC、手机、浏览器的无缝体验;图片“美画师”、视频“剪刀手”、Excel迷你图、

  3. MAIL OFFICE Outgoing mail

    CERN Multimedia

    1999-01-01

    The Mail Office once again wishes to remind users that the Organisation's mail service is exclusively reserved for official mail._\tAll outgoing official mail must arrive at the Mail Office unfranked and with the sender's name and Division clearly marked under the Organsation's address (see example below).Private mail must be taken to the Post Offices at Meyrin (63-R-011) or Prévessin (866-R-C02)._\tPlease only use 'PRIORITY' envelopes for mail requiring priority handling. Internal mail_\tPlease do not forget to indicate your correspondent's 'MAILBOX' number on the internal mail envelopes either in the specific box provided (new envelopes) or next to his or her name (old envelopes). This will facilitate and accelerate the handling of your mail. Mailbox numbers can be found on: Macintosh\tin the 'Mailbox' field in 'VIPER'PC\tin the 'Mailbox' field of 'Phone book'Web: http://www.cern.ch/CERN/Phone.htmlin the 'MailBox' fieldonce you have selected your correspondent's name...

  4. The Military-Entertainment Complex: A New Facet of Information Warfare

    Directory of Open Access Journals (Sweden)

    Adam Muir

    2003-01-01

    Full Text Available The second Gulf War will become synonymous with the emergence of fully-fledged information warfare where the military-entertainment complex has so influenced strategic and logistic possibilities that it becomes apparent that the war was waged as entertainment. This is entertainment not as an amusement or diversion but utilising the techniques and tropes of the burgeoning entertainment industry as a means to achieve military objectives. This paper offers a short history of the military-entertainment complex as reality and simulation become fused in the practices of the US military machine. The paper then briefly explores three central aspects of this phenomenon evident in recent developments: the military function of computer games; the role of the Hollywood scenario and the blurring between news and reality TV. Finally the suggestion is made that subverting, co-opting and reconstructing the military-entertainment complex provides new possibilities for alternative strategies of information warfare.

  5. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  6. New studies disputing allegations of bacteriological warfare during the Korean War.

    Science.gov (United States)

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  7. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  8. Integrated electronic warfare framework for infrared self-protection of transport aircraft

    CSIR Research Space (South Africa)

    Annamalai, L

    2007-09-01

    Full Text Available Warfare Framework for Infrared Self-protection of Transport Aircraft L. Annamalai Council for Scientific and Industrial Research (CSIR) Abstract - In the African scenario, slow-moving airborne platforms such as transport aircraft have in recent... predetermined baseline were considered the best method of optimising aircraft operating procedures against threats. L. Annamalai, Defence Peace, Safety and Security (DPSS), Council for Scientific and Industrial Research (CSIR), PO Box 395, 0001...

  9. Diagnosing Guerilla Warfare: Was William Clarke Quantrill Missouri’s Francis Marion?

    Science.gov (United States)

    2010-04-28

    frightful epoch when priests, women, and children throughout Spain plotted the murder of isolated soldiers." -Antoine-Henri J omini Jomini2...there are setbacks at any stage there sequences can be reversed to a previous phase.29 FRANCIS MARION AND GUERILLA WARFARE One of the most famous...Militia under General 28 D.M. Frost to stage his forces near the St. Louis Arsenal, as a "training camp," at what became known as Camp Jackson. 148

  10. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    manage DoD personnel with skills , training, education, and experience related to IW and SFA. DoDI 3000.11, May 3, 2016 TABLE OF CONTENTS 2...DOD INSTRUCTION 3000.11 MANAGEMENT OF DOD IRREGULAR WARFARE (IW) AND SECURITY FORCE ASSISTANCE (SFA) CAPABILITIES Originating Component...well as building the security capacity and capability of U.S. partners and allies. c. IW and SFA skills , training, education, and experience must be

  11. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    OpenAIRE

    Kathryn Merrick; Medria Hardhienata; Kamran Shafi; Jiankun Hu

    2016-01-01

    Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and ...

  12. Investigating Iraq’s Chemical Warfare Program: Updated and Expanded Research Plan

    Science.gov (United States)

    2012-07-01

    chemical warfare, chemical weapons, Conflict Records Research Center, Tabun , Sarin, UN Sepcial Commission, UN UN Monitoring, Verification and Inspection...7 for tabun and sarin; and Ahmed 2 & 3 for production of precursors for tabun and sarin. The general contractor is Al Fao General Establishment that... tabun , and sarin. “mid- 1970s” Al Hazen Institute has by this time set up contacts with “30 major foreign organizations and companies” for securing

  13. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    USAARL Report No. 2016-07 Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test By...pilot evaluation of The Tactile Situation Awareness System (TSAS) during simulated flight . The objective was to evaluate the ability of TSAS to improve...summarizes recent findings obtained during a simulated helicopter flight employing TSAS. The objective was to evaluate the ability of TSAS to improve a

  14. Landmine Warfare in Support of Multi-domain Battle: Balancing Discrimination and Military Effectiveness

    Science.gov (United States)

    2017-05-25

    military personnel, obstruct economic development and reconstruction following a conflict, inhibit the repatriation of refugees and internally displaced...Basing themselves on the principle of international law that the right of the parties to an armed conflict to choose methods or means of warfare is...Conflict in the Gulf (London: Atlantic Books, 2006), 120-21. 30 Human Rights Watch, “Back in Business? US Landmine Production and Exports,” briefing

  15. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    D.C.: U.S. Army Center of Military History, 2002), 304–308. 66Walter Laqueur , Guerrilla Warfare: A Historical & Critical Study (New Brunswick, NJ...Strategy in Guerrilla War Against Japan, 15–16. 72Peter L. Berger and Thomas Luckmann, The Social Construction of Reality (New York: Anchor Books...each other, undermining each other’s positions, or making a separate peace. The Some authors, such as Thomas Hammes, have argued that the

  16. Guerrilla Operations in the Civil War: Assessing Compound Warfare During Price’s Raid

    Science.gov (United States)

    2007-11-02

    hand, Three Years with Quantrill by O. S. Barton and Noted Guerrillas, or the Warfare on the Border by John Edwards provide alternate views of...events described in other sources. For example, Barton relates John McCorkle’s account of the story about guerrillas who Price’s army before the Battle of...Jay Monaghan provided excellent accounts of the major operations in the Trans-Mississippi Department during the Civil War. Finally, the framework for

  17. China’s Development of Asymmetric Warfare and the Security of Taiwan, Republic of China

    Science.gov (United States)

    2004-12-01

    thanks to my loving and devoted wife, Anita . Her patience, understanding, and remarkable ability to maintain a pleasant, comforting home during this...should arise (Bolt, Brenner , 2004, p.130). Information warfare technology can delay a United States response and commitment in the Taiwan Strait in...destruction of C4 systems by missiles, airpower, and high-energy weapons (Bolt & Brenner , 2004, p.133). Perhaps the most astonishing view of the PRC’s IW

  18. Molecular modeling toward selective inhibitors of dihydrofolate reductase from the biological warfare agent Bacillus anthracis.

    Science.gov (United States)

    Giacoppo, Juliana O S; Mancini, Daiana T; Guimarães, Ana P; Gonçalves, Arlan S; da Cunha, Elaine F F; França, Tanos C C; Ramalho, Teodorico C

    2015-02-16

    In the present work, we applied docking and molecular dynamics techniques to study 11 compounds inside the enzymes dihydrofolate reductase (DHFR) from the biological warfare agent Bacillus anthracis (BaDHFR) and Homo sapiens sapiens (HssDHFR). Six of these compounds were selected for a study with the mutant BaF96IDHFR. Our results corroborated with experimental data and allowed the proposition of a new molecule with potential activity and better selectivity for BaDHFR.

  19. Challenges in Coalition Unconventional Warfare: The Allied Campaign in Yugoslavia, 1941-1945

    Science.gov (United States)

    2014-01-01

    JFQ 75, 4th Quarter 2014 Duke, Phil lips, and Conover 129 Challenges in Coalition Unconventional Warfare The Allied Campaign in Yugoslavia , 1941...resistance elements in Yugoslavia . The resistance movement effectively fixed in place 35 German and Italian divisions, consisting of roughly 660,000...mountain headquarters in Yugoslavia on May 14, 1944 (Imperial War Museum) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting

  20. Hungary’s alternative to counter hybrid warfare small state’s weaponized citizenry.

    Science.gov (United States)

    2017-06-09

    Wales and Warsaw emphasized the importance of cyber defense as a crucial capability of the international security environment against hybrid threats ...and “raising public awareness on cyber threats and cyber security .”214 In other words, the Cyber Defence Unit promotes the connection between the...from asymmetric threats , and has to cover all domains–including cyber . Former studies on countering hybrid warfare have identified these

  1. A Need for Systems Architecture Approach for Next Generation Mine Warfare Capability

    Science.gov (United States)

    2006-09-01

    uncontrolled mining ultimately led to the first Hague convention where 10 Henry Petroski (1992). To Engineer is...Littoral and Mine Warfare, without which I would not have been able to participate in this program. Jon, Henry and Capt. “J” juggling between work, home...Palmer, M. (1992). Guardians of the Gulf. [Photograph], Free Press, New York. Petroski , H (1992). To Engineer is Human: The Role of Failure in

  2. Courses of Action for Enhancing USAF ’Irregular Warfare’ Capabilities: A Functional Solutions Analysis

    Science.gov (United States)

    2010-01-01

    Warfare Center to ensure that technological opportunities for novel IW appli- cations were explored, developed, and fielded. (See pp. 38–40...activities; transnational criminal activities, including narco -trafficking, illicit arms dealing, and illegal financial transactions, that support or...opportunities for novel IW applications are explored, devel- oped, and fielded. In fact, over time, it might be appropriate for the USAF to create a

  3. No Compromise: Establishing Balance in the US Army’s Approach to Full-Spectrum Warfare

    Science.gov (United States)

    2011-04-04

    also needlessly prolongs corporate acceptance for a leadership culture that appreciates the ’ fluid character of warfare in the modern era. Beyond the...of Iraq, reveals that a numl?er of tactical leaders exhibited superb situational awareness and thoughtful response to extremely dynamic security...Paul D. Batchelor , Fixing Intel: · . A B lneprint for Making Intelligence Relevant in Afghanistan, Center for a New American Security, Washington

  4. Mountain Warfare and Other Lofty Problems: Foreign Perspectives on High-Altitude Combat

    Science.gov (United States)

    2011-01-01

    rope. The two primary ropes should be thoroughly tested when crossing along a rope with a climbing harness and pulley or carabiner. Gear should be...consequently, the Russian Army has a long history of mountain troops, production of specialized mountain warfare gear , and mountain training centers...The mountain units of foreign armies have spent years developing a well-worked-out technique for training Jägers. What gear should you to take to the

  5. Working on warfare-related sites. Review after 15 years and perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, U. [Umweltberatung und Planung, Kassel (Germany)

    2003-07-01

    Fifteen years ago, in 1988, in connection with the Second International TNO/BMFT-Congress for the first time sites contaminated due to armaments production were mentioned, caused by the results of the first systematic investigation of a former explosives production plant in Hessisch Lichtenau. The authors referred to another 72 large chemical armament production plants in the FRG and 39 in the GDR. At the Third International TNO/BMFT-Congress in 1990 the complex of problems were substantiated and at the same time more topics were added. The Federal Government of Germany named the following areas suspected of being warfare-related contaminated sites: former production plants, ammunition depots, defusing sites, demolition areas and firing ranges, disassembly plants and intermediate and final storage plants for conventional and chemical combat agents. Soil, water and air pollution could be caused by the following products: explosives, chemical warfare agents, incendiaries, smoke agents, propellants, additives, primary and waste products and residues from the destruction of combat agents. In 1995 the Federal Environmental Agency (UBA) presented the results of the national survey showing that there are 3240 suspected contaminated sites. In 1995 also began the soil clean-up at the warfare-related contaminated sites Stadtallendorf and Hessisch Lichtenau. 8 respectively 10 years after the beginning of the systematic investigations the first contaminated soil was removed and treated in a thermal plant. In the run-up several R and D projects funded by the Federal Government were carried out (Stadtallendorf: MOSAL = Model Remediation of Contaminated Sites, Hessisch Lichtenau: Joint project Biological Remediation of Warfare-Related Contamination). At these sites basics were worked out and technologies were put to the test which can be used for the remediation of other sites. (orig.)

  6. Chemical Warfare in World War 1: The American Experience, 1917-1918 (Leavenworth Papers, Number 10)

    Science.gov (United States)

    1984-09-01

    before they reached the front. While moving forward one night toward Chauteau Thierry , the men stopped to rest in shallow shell holes near the road. A...20-23; Curt Wachtel, Chemical Warfare (Brooklyn, NY: Chemical Publishing Co., 1941), 66. 8. Hogg, Gas, 23. 9. Augustin Mitchell Prentiss...Magazine, 10 March 1980:28. Powell, E. Alexander. The Army Behind the Army. New York: Charles Scribner’s Sons, 1919. Prentiss, Augustin Mitchell

  7. Annual Report 2008 -- Office of the Chief Financial Officer (OCFO)

    Energy Technology Data Exchange (ETDEWEB)

    Fernandez, Jeffrey

    2008-12-22

    It is with great pleasure that I present to you the 2008 Chief Financial Officer's Annual Report. The data included in this report has been compiled from the Budget Office, the Controller, Procurement and Property Management and the Sponsored Projects Office. Also included are some financial comparisons with other DOE Laboratories and a glossary of commonly used acronyms.

  8. Effects of office innovation on office workers' health and performance

    NARCIS (Netherlands)

    E.M. Meijer; M.H.W. Frings-Dresen; J.K. Sluiter

    2009-01-01

    The implementation of an innovative office concept (e.g. open-plan, flexible workplaces and a paperless office concept) on health and productivity among office workers was evaluated with questionnaires of 138 workers at baseline and 6 and 15 months afterwards. Work-related fatigue, general health, c

  9. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  10. [Glanders--a potential disease for biological warfare in humans and animals].

    Science.gov (United States)

    Lehavi, Ofer; Aizenstien, Orna; Katz, Lior H; Hourvitz, Ariel

    2002-05-01

    Infection with Burkholderia mallei (formerly Pseudomonas mallei) can cause a subcutaneous infection known as "farcy" or can disseminate to condition known as Glanders. It is primarily a disease affecting horses, donkeys and mules. In humans, Glanders can produce four types of disease: localized form, pulmonary form, septicemia, and chronic form. Necrosis of the tracheobronchial tree and pustular skin lesions characterize acute infection with B. mallei. Other symptoms include febrile pneumonia, if the organism was inhaled, or signs of sepsis and multiple abscesses, if the skin was the port of entry. Glanders is endemic in Africa, Asia, the Middle East, and Central and South America. Glanders has low contiguous potential, but because of the efficacy of aerosolized dissemination and the lethal nature of the disease, B. mallei was considered a candidate for biological warfare. During World War I, Glanders was believed to have been spread to infect large numbers of Russian horses and mules on the Eastern front. The Japanese infected horses, civilians and prisoners of war during World War II. The USA and the Soviet Union have shown interest in B. mallei in their biological warfare program. The treatment is empiric and includes mono or poly-therapy with Ceftazidime, Sulfadiazine, Trimethoprim + Sulfamethoxazol, Gentamicin, Imipenem etc. Aggressive control measures essentially eliminated Glanders from the west. However, with the resurgent concern about biological warfare, B. mallei is now being studied in a few laboratories worldwide. This review provides an overview of the disease and presents the only case reported in the western world since 1949.

  11. Virtuelt skrivebord med open office

    DEFF Research Database (Denmark)

    Nielsen, Kurt Gammelgaard

    2009-01-01

    SDUs erfaringer med projektet Port 22: en virtuel platform med Open Office som kontorpakke til studerende.......SDUs erfaringer med projektet Port 22: en virtuel platform med Open Office som kontorpakke til studerende....

  12. Virtuelt skrivebord med open office

    DEFF Research Database (Denmark)

    Nielsen, Kurt Gammelgaard

    2009-01-01

    SDUs erfaringer med projektet Port 22: en virtuel platform med Open Office som kontorpakke til studerende.......SDUs erfaringer med projektet Port 22: en virtuel platform med Open Office som kontorpakke til studerende....

  13. The Mechanization of Office Work.

    Science.gov (United States)

    Giuliano, Vincent E.

    1982-01-01

    Discusses how technology is changing the nature of office work by introducing new information-processing machines, programs for operating them, and communications systems for interconnecting them. Includes diagrams of preindustrial, industrial, and information-age offices. (Author/JN)

  14. Ergonomics in the office environment

    Science.gov (United States)

    Courtney, Theodore K.

    1993-01-01

    Perhaps the four most popular 'ergonomic' office culprits are: (1) the computer or visual display terminal (VDT); (2) the office chair; (3) the workstation; and (4) other automated equipment such as the facsimile machine, photocopier, etc. Among the ergonomics issues in the office environment are visual fatigue, musculoskeletal disorders, and radiation/electromagnetic (VLF,ELF) field exposure from VDT's. We address each of these in turn and then review some regulatory considerations regarding such stressors in the office and general industrial environment.

  15. Military Officer Appraisal, An Examination

    Science.gov (United States)

    1999-04-01

    propose of the OER support form is to promote a top down emphasis on leadership communication , integrating rated officer (the officer to be reported on...better ways to accomplish the mission. Using performance objectives as the basis for leadership communication enables the rater and rated officer to

  16. Leasing physician office space.

    Science.gov (United States)

    Murray, Charles

    2009-01-01

    When leasing office space, physicians should determine the effective lease rate (ELR) for each building they are considering before making a selection. The ELR is based on a number of factors, including building quality, building location, basic form of lease agreement, rent escalators and add-on factors in the lease, tenant improvement allowance, method of square footage measurement, quality of building management, and other variables. The ELR enables prospective physician tenants to accurately compare lease rates being quoted by building owners and to make leasing decisions based on objective criteria.

  17. Aviation Officer Requirements Study.

    Science.gov (United States)

    1982-08-31

    In the dynamics of the planning process, when potential force level changes are fre- quent, these computations are tedious and subject to error . Since...was tedious and subject to both computational and entry errors . The current ver- sion of the model corrects this deficiency. The Aviation Officer...k.N )) ,iFY(Fr\\) ,NniALT c nTn ,TIVP.W £-430 PROJ3 = POS-:(PRn1 Z=m4m) f-440 PROC, = Pnr3(PrOnf2="-) E.4! - INI T (1-F(20) )TR(PrOFL,. 137> C,460 = TIPO

  18. Office software Individual coaching

    CERN Multimedia

    HR Department

    2010-01-01

    If one or several particular topics cause you sleepless nights, you can get help from our trainer who will come to your workplace for a multiple of 1-hour slots . All fields in which our trainer can help are detailed in the course description in our training catalogue (Microsoft Office software, Adobe applications, i-applications etc.) Discover these new courses in our catalogue! http://cta.cern.ch/cta2/f?p=110:9 Technical Training Service Technical.Training@cern.ch Tel 74924

  19. General Urban Warfare Amphibious Logistics Applications. Volume 3. Operational Plans.

    Science.gov (United States)

    1983-06-23

    fictitious metropolitan development. These locales are: Casablanca, Morocco Canton, China Charleston, South Carolina, USA Bremerhaven, Germany Leningrad...Communications: Garbage, sewage, water, electricity, telephones, radio/television. * Transportation: Geomorphology , terrain characteristics, surface

  20. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ..., Dahlgren, VA; Danger Zone AGENCY: United States Army Corps of Engineers, Department of Defense. ACTION... amend an existing permanent danger zone in the waters of the Upper Machodoc Creek and the Potomac River... River Test Range. Many of the tests are hazardous operations presenting a danger to persons or...

  1. Range Condition Assessment Report for Naval Surface Warfare Center, Dahlgren Laboratory Ranges, Dahlgren, Virginia

    Science.gov (United States)

    2010-09-01

    base like a small reef where organisms such as oysters, invertebrates, and algae colonize (NSWC 2005a). Other projectiles include sophisticated...primary game species for RSEPA RCA Report September 2010 Final 5-47 hunting includes white- tailed deer, wild turkey, quail, rabbit, dove, and...have dislodged many benthic organisms from the sampled material, thereby artificially depressing the number of collected organisms. It was

  2. Naval Surface Warfare Center Dahlgren Division Technical Digest. Advanced Materials Technology

    Science.gov (United States)

    1993-09-01

    Commander) (STS-8) shuttle missions. The results of the Andrew M. Allen (Pilot) EOIM investigations provide much of the cur- Claude Nicollier 119 rent...34 Corrosion. Marine Biofourling - A Review." 1. 1). Cristlowv. anid R. Vol. 49. 19)93. pp. 63-73. c.. ’ripper. Eds.. Morine ’ Riodetei ’r’i-ationi: An, 131. Pope

  3. Naval Surface Warfare Center, Dahlgren Division Technical Digest. Detection Systems and Technology, September 1992

    Science.gov (United States)

    1992-09-01

    ECM) are used, the exponent wide-angle retroreflectors . Aircraft require cock- in Equation (1) changes. For a self-screening pits, cruise missiles and...into the inlet duct, a notorious retroreflector . more sophisticated signal-processing tech- The use of radar-absorbing material to line the niques...parameters it contains. Such models provide N(D/He) - 1/2 or 0.577. The probability of dam - simple first estimates that cant be used in many age. P

  4. Surface Warfare: A Total Force. Volume 19. Number 4, July/August 1994

    Science.gov (United States)

    1994-08-01

    William D. Daniels COMDESRON 8, CAPT Oliver K. Spears III relieved relieved CDR Stephen D. Gilmore in May. CAPT Stephen A. Jarecdi in April. USS...CAPT Stephen H. Ries in June. USS Yellowtone (AD 41), CAPT Ronald C. Bogle USS Anirkn (FFG 20), CDR Daniel D. Sloss relieved relieved CAPT Ronald C...36), CDR Paul C. Cassani relieved LCDR Peter R. Kendrick in May. relieved CDR Thomas J. Brown in May. USS MAehemey (FFG 8), CDR Ronald Y. Heath USS

  5. Revitalization of Naval Surface Warfare Center Excellence in Early Stage Combat System Engineering

    Science.gov (United States)

    2012-04-30

    central tenet of the DoD’s Better Buying Power initiatives, and budget projections indicate it will continue to be important as the nation works its way...éêçÖê~ãW= `êÉ~íáåÖ=póåÉêÖó=Ñçê=fåÑçêãÉÇ=ÅÜ~åÖÉ= -=379 - = developed system architecture products for the Air and Missile Defense Radar, Railgun , and...CBR Defense Systems Science and Engineering  Directed Energy Science and Engineering  Electromagnetic Environmental Effects  Electro

  6. Naval Surface Warfare Center Technical Digest. Research and Technology - Shaping Future Naval Systems

    Science.gov (United States)

    1991-09-01

    on the three-trillion- and to foster cooperation. dollar national debt, it is very likely that the 0 There will be an increased requirement todefense...sophisticated multimode guidance, and "smart" countermeasures are but a few of the weapon features which technology advances are already foster - ing...meet costo . sthedule, and rapid obsolescence due to technological ad- c ho i:al perto~rnman2e objectives. ’ vances. All these factors, along with

  7. Mastering VBA for Office 2010

    CERN Document Server

    Mansfield, Richard

    2010-01-01

    A comprehensive guide to the language used to customize Microsoft Office. Visual Basic for Applications (VBA) is the language used for writing macros, automating Office applications, and creating custom applications in Word, Excel, PowerPoint, Outlook, and Access. This complete guide shows both IT professionals and novice developers how to master VBA in order to customize the entire Office suite for specific business needs.: Office 2010 is the leading productivity suite, and the VBA language enables customizations of all the Office programs; this complete guide gives both novice and experience

  8. Teach yourself visually Office 2013

    CERN Document Server

    Marmel, Elaine

    2013-01-01

    Learn the new Microsoft Office suite the easy, visual way Microsoft Office 2013 is a power-packed suite of office productivity tools including Word, Excel, PowerPoint, Outlook, Access, and Publisher. This easy-to-use visual guide covers the basics of all six programs, with step-by-step instructions and full-color screen shots showing what you should see at each step. You'll also learn about using Office Internet and graphics tools, while the additional examples and advice scattered through the book give you tips on maximizing the Office suite. If you learn best when you can see how

  9. Returning to an Apolitical Officer Corps

    Science.gov (United States)

    2010-02-17

    24 Ibid., 355. 25 Ibid., 335-337. 26 Bacevich, “Clinton’s Military Problem,” 36. 9 on homosexuals serving in the military...avoid it. What neither theorist predicted was a conservative officer corps now fully embracing a single political party. Perhaps today’s most...my father was a democrat, my mother a republican, and I am an Episcopalian.” His humor disappeared when the inevitable suggestions surfaced that he

  10. An office chair to influence the sitting behavior of office workers.

    Science.gov (United States)

    Goossens, R H M; Netten, M P; Van der Doelen, B

    2012-01-01

    Since the introduction of ergonomic guidelines in the design of office chairs, a lot of effort has been put in designing these office chairs accordingly. Because these features all have to be adjusted in different ways (mostly a knob underneath the seat surface), and because every office chair offers different solutions, often users do not use all of the adjustments, and thus do not use the office chair an the optimal ergonomic way. The aim of this paper is to study the influence of feedback on sitting habits of office workers in a field test during 4 weeks. 40 office workers were selected for this test (13 male, 27 female). They were divided in three groups. A control group, a group that received a sitting instruction and a group that received sitting instruction and feedback on their posture every hour that they sit. The results show that there is an effect in average increase in basic posture on both the group that received instruction and the group that received feedback. This effect decreases over time. There was no effect in the control group.

  11. Configuration Control Office

    CERN Multimedia

    Beltramello, O

    In order to enable Technical Coordination to manage the detector configuration and to be aware of all changes in this configuration, a baseline of the envelopes has been created in April 2001. Fifteen system and multi-system envelope drawings have been approved and baselined. An EDMS file is associated with each approved envelope, which provides a list of the current known unsolved conflicts related to the envelope and a list of remaining drawing inconsistencies to be corrected. The envelope status with the associated drawings and EDMS file can be found on the web at this adress: http://atlasinfo.cern.ch/Atlas/TCOORD/Activities/Installation/Configuration/ Any modification in the baseline has to be requested via the Engineering Change Requests. The procedure can be found under: http://atlasinfo.cern.ch/Atlas/TCOORD/Activities/TcOffice/Quality/ECR/ TC will review all the systems envelopes in the near future and manage conflict resolution with the collaboration of the systems.

  12. FIELD FOUR DESIGN OFFICE

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ Field Four Design Office(以下简称F4)是从(株式会社)清水建设设计本部设计中心部门独立出来的事务所,成立于1989年11月.其业务范围包括室内设计、景观设计、管理业务等,项目涉及办公室、研究所、疗养院、学校、医院、宾馆、高级公寓、商业设施、娱乐设施和生产设施等.

  13. Badge Office Process Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Haurykiewicz, John Paul [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dinehart, Timothy Grant [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Parker, Robert Young [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-12

    The purpose of this process analysis was to analyze the Badge Offices’ current processes from a systems perspective and consider ways of pursuing objectives set forth by SEC-PS, namely increased customer flow (throughput) and reduced customer wait times. Information for the analysis was gathered for the project primarily through Badge Office Subject Matter Experts (SMEs), and in-person observation of prevailing processes. Using the information gathered, a process simulation model was constructed to represent current operations and allow assessment of potential process changes relative to factors mentioned previously. The overall purpose of the analysis was to provide SEC-PS management with information and recommendations to serve as a basis for additional focused study and areas for potential process improvements in the future.

  14. The office based CHIVA

    Directory of Open Access Journals (Sweden)

    Passariello F

    2013-09-01

    Full Text Available Fausto Passariello,1 Stefano Ermini,2 Massimo Cappelli,3 Roberto Delfrate,4 Claude Franceschi5 1Centro Diagnostico Aquarius, Napoli, Italy; 2Private Practice, Grassina, Italy; 3Private Practice, Firenze, Italy; 4Casa di Cure Figlie di Maria, Cremona, Italy; 5Hospital St Joseph, Service d'Explorations Vasculaires, Paris, France Abstract: The cure Conservatrice Hémodynamique de l'Insuffisance Veineuse en Ambulatoire (CHIVA can be office based (OB. The OB-CHIVA protocol is aimed at transferring CHIVA procedures to specialists rooms. The protocol will check the feasibility of OB-CHIVA, data pertaining to recurrence, and will offer the opportunity to study saphenous femoral junction (SFJ stump evolution, the role of the washing vessels and the arch recanalization rate, and gather new data about the effect of the length of the treated saphenous vein. A simplified diagnostic procedure will allow an essential ultrasound examination of the venous net while a schematic and easily readable algorithm guides therapeutic choices. The Riobamba draining crossotomy (RDC tactic is composed of a set of OB procedures. While some of these procedures are, at the moment, only proposals, others are already applied. Devices generally used in ablative procedures such as Light Amplification by Stimulated Emission of Radiation (LASER, radio frequency, steam, and mechanical devices are used in this context to serve to conservative interventions for CHIVA. New techniques have also been proposed for devalvulation and tributary disconnection. Detailed follow-up is necessary in order to determine the effects of therapy and possible disease evolution. Finally, information is added about the informed consent and the ethical considerations of OB-CHIVA research. Keywords: CHIVA, office based procedures, LASER, RF, steam

  15. The chief strategy officer.

    Science.gov (United States)

    Breene, R Timothy S; Nunes, Paul F; Shill, Walter E

    2007-10-01

    They're nominally and ultimately responsible for strategy, but today's CEOs have less and less time to devote to it. As a result, CEOs are appointing "chief strategy officers"--executives specifically tasked with creating, communicating, executing, and sustaining a company's strategic initiatives. In this article, three authors from Accenture share the results of their research on this emerging organizational role. The typical CSO or top strategy executive is not a pure strategist, conducting long-range planning in relative isolation. Most CSOs consider themselves doers first, with the mandate, credentials, and desire to act as well as advise. They are seasoned executives with a strong strategy orientation who have usually worn many operations hats before taking on the role. Strategy executives are charged with three critical jobs that together form the very definition of strategy execution. First, they must clarify the company's strategy for themselves and for every business unit and function, ensuring that all employees understand the details of the strategic plan and how their work connects to corporate goals. Second, CSOs must drive immediate change. The focus of the job almost always quickly evolves from creating shared alignment around a vision to riding herd on the ensuing change effort. Finally, a CSO must drive decision making that sustains organizational change. He or she must be that person who, in the CEO's stead, can walk into any office and test whether the decisions being made are aligned with the strategy and are creating the desired results. When decisions below the executive suite aren't being made in accordance with strategy, much of the CSO's job involves learning why and quickly determining whether to stay the course or change tack.

  16. Physician offices marketing: assessing patients' views of office visits.

    Science.gov (United States)

    Emmett, Dennis; Chandra, Ashish

    2010-01-01

    Physician offices often lack the sense of incorporating appropriate strategies to make their facilities as marketer of their services. The patient experience at a physician's office not only incorporates the care they receive from the physician but also the other non-healthcare related aspects, such as the behavior of non-health professionals as well as the appearance of the facility itself. This paper is based on a primary research conducted to assess what patients assess from a physician office visit.

  17. 75 FR 2549 - Office of Biotechnology Activities; Office of Science Policy; Office of the Director; Notice of a...

    Science.gov (United States)

    2010-01-15

    ... HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities; Office of Science... concerning this meeting, contact Ms. Laurie Lewallen, Advisory Committee Coordinator, Office of Biotechnology...: January 11, 2010. Kelly R. Fennington, Special Assistant to the Director, Office of Biotechnology...

  18. 76 FR 77240 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director; Notice of...

    Science.gov (United States)

    2011-12-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science..., NIH Office of Biotechnology Activities, 6705 Rockledge Drive, Suite 750, Bethesda, Maryland 20892...

  19. Why UW: Factoring in the Decision Point for Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    Entrenamiento Militar, or CREM) that would be home to the DoD’s semi-permanent presence in the region the Joint Task Force-Bravo (JTF-Bravo), were all...missile system and the HAWK is an all-weather, surface-to-air, medium-range/medium- altitude missile system. 105 3. Analysis The following sections

  20. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety start

  1. Multi-platform operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    More than a decade ago, the long-term NATO scientific study “Maritime Operations in 2015” (MO 2015) identified the so-called multi-platform and co-operative multi-static Low Frequency Active Sonar (LFAS) concept, involving co-operative sonar data exchange between surface ships and submarines. Severa

  2. 75 FR 10293 - Office of Biotechnology Activities; Office of Science Policy; Office of the Director; Notice of a...

    Science.gov (United States)

    2010-03-05

    ... Biotechnology Activities; Office of Science Policy; Office of the Director; Notice of a Meeting of the NIH Blue..., Office of Biotechnology Activities, Office of Science Policy, Office of the Director, National Institutes... lewallenl@od.nih.gov . Dated: March 1, 2010. Amy P. Patterson, Director, Office of Biotechnology Activities...

  3. Night ventilation control strategies in office buildings

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Zhaojun; Yi, Lingli; Gao, Fusheng [School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090 (China)

    2009-10-15

    In moderate climates night ventilation is an effective and energy-efficient approach to improve the indoor thermal environment for office buildings during the summer months, especially for heavyweight construction. However, is night ventilation a suitable strategy for office buildings with lightweight construction located in cold climates? In order to answer this question, the whole energy-consumption analysis software EnergyPlus was used to simulate the indoor thermal environment and energy consumption in typical office buildings with night mechanical ventilation in three cities in northern China. The summer outdoor climate data was analyzed, and three typical design days were chosen. The most important factors influencing night ventilation performance such as ventilation rates, ventilation duration, building mass and climatic conditions were evaluated. When night ventilation operation time is closer to active cooling time, the efficiency of night ventilation is higher. With night ventilation rate of 10 ach, the mean radiant temperature of the indoor surface decreased by up to 3.9 C. The longer the duration of operation, the more efficient the night ventilation strategy becomes. The control strategies for three locations are given in the paper. Based on the optimized strategies, the operation consumption and fees are calculated. The results show that more energy is saved in office buildings cooled by a night ventilation system in northern China than ones that do not employ this strategy. (author)

  4. Implementation of Project Management office

    OpenAIRE

    Malegová, Emília

    2012-01-01

    The goal of my thesis is to describe Project management office, its functions; a structure and its place in an organization as well as assumptions for its right implementation in an orgnanization. A first and a second section of the thesis introduce project management and project management office as such. Basic functions and models are described. A third section deals with each stages of implementatation of the office with a particular focus on main analysis and documents. Trends in implemen...

  5. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  6. Mass Spectrometry Applications for the Identification and Quantitation of Biomarkers Resulting from Human Exposure to Chemical Warfare Agents

    Science.gov (United States)

    Smith, J. Richard; Capacio, Benedict R.

    In recent years, a number of analytical methods using biomedical samples such as blood and urine have been developed for the verification of exposure to chemical warfare agents. The majority of methods utilize gas or liquid chromatography in conjunction with mass spectrometry. In a small number of cases of suspected human exposure to chemical warfare agents, biomedical specimens have been made available for testing. This chapter provides an overview of biomarkers that have been verified in human biomedical samples, details of the exposure incidents, the methods utilized for analysis, and the biomarker concentration levels determined in the blood and/or urine.

  7. Battlefield Electromagnetic Environments Office (BEEO)

    Data.gov (United States)

    Federal Laboratory Consortium — The Battlefield Electromagnetic Environments Office (BEEO) develops, maintains, and operates the Army Materiel Command (AMC) databases for spectrum management, per...

  8. Office 2010 Visual Quick Tips

    CERN Document Server

    Gunter, Sherry Kinkoph

    2010-01-01

    Get more done in Office 2010 in less time with these Quick Tips!. Whether you're new to Microsoft Office or updating from older versions, this is the perfect resource to get you quickly up to speed on Office 2010. Every application is covered, including Word, Excel, PowerPoint, Outlook, and Publisher. Full-color screenshots and numbered steps clearly explain dozens of features and functions-while quick shortcuts, tips, and tricks help you save time and boost productivity. You'll also find great new ways to access and use some Office apps right from the Web.: Walks you through dozens of new fea

  9. Leaving Office: Position Changes of Chief Academic Officers.

    Science.gov (United States)

    Cejda, Brent D.; McKenney, Cynthia B.; Fuller, Catherine W.

    2001-01-01

    Using responses from a national survey of chief academic officers in public community colleges, identifies previous position holders and the positions to which they moved. Presents findings, which indicated that the greatest percentage of former chief academic officers became president (30 percent), whereas the next largest percentage retired (27…

  10. Office Space: How Will Technology Affect the Education Office Environment?

    Science.gov (United States)

    Day, C. William

    2009-01-01

    The office environment 10 years from now will be different from the one today. More office personnel will be organized around processes rather than functions. More work activities will be done by teams rather than individuals, and those teams will change over time, as will the nature of the work projects and the people who constitute the team. The…

  11. Office Space: How Will Technology Affect the Education Office Environment?

    Science.gov (United States)

    Day, C. William

    2009-01-01

    The office environment 10 years from now will be different from the one today. More office personnel will be organized around processes rather than functions. More work activities will be done by teams rather than individuals, and those teams will change over time, as will the nature of the work projects and the people who constitute the team. The…

  12. [Radioprotection in dentistry offices].

    Science.gov (United States)

    de Melo, Maria de Fátima Batista; Melo, Saulo Leonardo Sousa

    2008-12-01

    In 1998, the Brazilian Ministry of Health established the Guidelines for Protection in Medical and Odontological Radiography, aimed at ensuring the quality of radiological procedures provided to the population as well as radiological protection for the health professionals. The purpose of this study was to verify the current situation in the dental offices with regard to the technical specifications and the adopted protective measures, using a questionnaire including questions about equipments, techniques and radiological protection. The investigated universe consisted of the surgeon dentists of the city of Aracaju using radiographic examination as a routine, resulting in a final sample of 103 professionals. The results showed that a high percentage of these professionals ignore the current norms (64.1%) as well as the technical specifications of their equipment (51.5% ignored the peak kilovoltage and 57.3% the milliamperage of their equipment), besides examining the radiographs visually (67%) As positive behaviors, the paralleling technique was preferred by 62.1% and the lead apron was used by 98.1%. We conclude that, despite the limited knowledge about the Guidelines, some measures are being correctly adopted but that the dentists have to be more aware of the necessary protective measures.

  13. Stakeholder Relations Office

    CERN Multimedia

    2013-01-01

    Scientists, politicians, the public, school children, our neighbours, you. All of these groups of people have a stake in CERN, and all are important to us.   The list of stakeholders in an organisation as large and complex as CERN is a long and ever lengthening one. Each group has its own specific interests and needs in terms of what kind of information it requires from CERN and how we should engage. It’s important, therefore, for us to ensure that we’re communicating optimally with everyone we care about and who cares about us. This is something that CERN has always taken seriously. The CERN Courier, for example, was first published in 1959 and we had a pro-active public information office right from the start. Today, our stakeholder relations are spread between several groups and teams, reflecting the nature of CERN today. But while we’re already doing a good job, I think we can do better by exploiting the synergies between these teams, and that’s wh...

  14. Programming Coup D’Oeil: The Impact of Decision Making Technology in Operational Warfare

    Science.gov (United States)

    2010-05-03

    that it is time consuming and it requires a high degree of good information to yield accurate options for success. In warfare, tempo is vital and...influence decision makers and planners is ethnocentrism . Dong, Day, and Collaço defined ethnocentrism as the “belief that 6 one‟s ethnic or cultural...group is the center of everything, and all other things are related to or dependent on it.” 12 Ethnocentrism plays a role in shaping stereotypes

  15. THE CONTRIBUTION MADE BY T.E. LAWRENCE TO THE THEORY OF REVOLUTIONARY WARFARE

    Directory of Open Access Journals (Sweden)

    G.K.B. Barron

    2012-02-01

    Full Text Available Lawrence was basically an academic thrown into the hurly-burly of leading an Arab revolt against Turkish domination. It could be said that the war in the Middle East was a sideshow of the First World War and Lawrence's part was a ' ... sideshow to the sideshow'l Why then has Lawrence been remembered when greater military men have been forgotten? The romanticism of his exploits are surely the reason, and yet the fact that he is the first modern theorist and possibly the "father" of modern revolutionary warfare, tends to be forgotten.

  16. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    Science.gov (United States)

    2006-06-30

    Peroxide (HOO-) 7.8 29 26.7 ± 0.2 t-Butyl hydroperoxide ((CH3)3COO-) 7.8 9.7 39 Cumene hydroperoxide ((C6H6)C(CH3)2OO-) 7.8 9.3 22 All reactions run with...peroxymonocarbonate ion (HCO4-) as the oxidant in the catalytic oxidation reactions . For perhydrolytic cleavage of organophosphates the peroxycarbonate dianion...solubility and reaction rates for applications in chemical warfare agent decontamination. -O *C O O OH -O *C OH O HO *C OH O *CO2 HO2 - H2OHO *C O O OH pKa

  17. New concepts and their applications in underwater acoustic warfare simulation system

    Institute of Scientific and Technical Information of China (English)

    DONG Yangze; YAO Lan

    2004-01-01

    An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.

  18. A Wolfram in Sheep's Clothing: Economic Warfare in Spain and Portugal, 1940-1944

    OpenAIRE

    Rockoff, Hugh; Caruana, Leonard

    2000-01-01

    One of the most sustained uses of economic warfare by the United States, at least judged by the variety of means used and the issue at stake, occurred in Spain and Portugal during WWII. We provide an overview of this episode by weaving together findings from the secondary literature and from new research in the Spanish archives. The war evolved through several distinct phases. (1) An oil embargo against Spain, although launched when Germany appeared to be winning the war (July 27 to September...

  19. Handheld and mobile hyperspectral imaging sensors for wide-area standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Gardner, Charles W.; Nelson, Matthew P.

    2016-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the investigation and analysis of targets in complex background with a high degree of autonomy. HSI is beneficial for the detection of threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Two HSI techniques that have proven to be valuable are Raman and shortwave infrared (SWIR) HSI. Unfortunately, current generation HSI systems have numerous size, weight, and power (SWaP) limitations that make their potential integration onto a handheld or field portable platform difficult. The systems that are field-portable do so by sacrificing system performance, typically by providing an inefficient area search rate, requiring close proximity to the target for screening, and/or eliminating the potential to conduct real-time measurements. To address these shortcomings, ChemImage Sensor Systems (CISS) is developing a variety of wide-field hyperspectral imaging systems. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focused on sensor design and detection results.

  20. Real-time, wide-area hyperspectral imaging sensors for standoff detection of explosives and chemical warfare agents

    Science.gov (United States)

    Gomer, Nathaniel R.; Tazik, Shawna; Gardner, Charles W.; Nelson, Matthew P.

    2017-05-01

    Hyperspectral imaging (HSI) is a valuable tool for the detection and analysis of targets located within complex backgrounds. HSI can detect threat materials on environmental surfaces, where the concentration of the target of interest is often very low and is typically found within complex scenery. Unfortunately, current generation HSI systems have size, weight, and power limitations that prohibit their use for field-portable and/or real-time applications. Current generation systems commonly provide an inefficient area search rate, require close proximity to the target for screening, and/or are not capable of making real-time measurements. ChemImage Sensor Systems (CISS) is developing a variety of real-time, wide-field hyperspectral imaging systems that utilize shortwave infrared (SWIR) absorption and Raman spectroscopy. SWIR HSI sensors provide wide-area imagery with at or near real time detection speeds. Raman HSI sensors are being developed to overcome two obstacles present in standard Raman detection systems: slow area search rate (due to small laser spot sizes) and lack of eye-safety. SWIR HSI sensors have been integrated into mobile, robot based platforms and handheld variants for the detection of explosives and chemical warfare agents (CWAs). In addition, the fusion of these two technologies into a single system has shown the feasibility of using both techniques concurrently to provide higher probability of detection and lower false alarm rates. This paper will provide background on Raman and SWIR HSI, discuss the applications for these techniques, and provide an overview of novel CISS HSI sensors focusing on sensor design and detection results.

  1. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    Science.gov (United States)

    1991-01-01

    submunitions are becoming increasingly common in projection that resembles a butterfly’s wings combat (Figure 1-50). around the detonation site (Figure 1...T.; Phillips, Y. Y III. 1988. Computer modelir.g -. thoracic response to blast. J. Trauma 28:S149-$152. 240 Wing , Chapter 7 THE PHYSICS AND...or postmortem sphenoid , and lacrimal bones on the medial surface of examination unless a retrobulbar hemorrhage has re- the orbital wall. In studies

  2. 76 FR 37983 - Family Offices

    Science.gov (United States)

    2011-06-29

    ... or entities with no family relations to nevertheless receive investment advice from the family office... throughout this Release and rule 202(a)(11)(G)-1 has the same meaning as in section 202(a)(5) of the Advisers... is an individual or couple.\\18\\ They noted that in many cases, however, family offices are...

  3. Richland Operations Office technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-05-01

    This document has been prepared by the Department of Energy`s Environmental Management Office of Technology Development to highlight its research, development, demonstration, testing, and evaluation activities funded through the Richland Operations Office. Technologies and processes described have the potential to enhance cleanup and waste management efforts.

  4. 76 FR 13272 - Branch Offices

    Science.gov (United States)

    2011-03-10

    ... information collection, unless the information collection displays a currently valid OMB control number. As... information collection, unless the information collection displays a currently valid OMB control number. As...: 153 hours. Dated: March 4, 2011. Ira L. Mills, Paperwork Clearance Officer, Office of Chief...

  5. Athena Community Office

    Science.gov (United States)

    Martínez-Núnez, S.; Barcons, X.; Barret, D.; Bozzo, E.; Carrera, F. J.; Ceballos, M. T.; Gómez, S.; Monterde, M. P.; Rau, A.

    2017-03-01

    The Athena Community Office (ACO) has been established by ESA's Athena Science Study Team (ASST) in order to obtain support in performing its tasks assigned by ESA, and most specially in the ASST role as "focal point for the interests of the broad scientific community". The ACO is led by the Instituto de Física de Cantabria (CSIC-UC), and its activities are funded by CSIC and UC. Further ACO contributors are the University of Geneva, MPE and IRAP. In this poster, we present ACO to the Spanish Astronomical Community, informing about its main responsibilities, which are: assist the ASST in organising and collecting support from the Athena Working Groups and Topical Panels; organise and maintain the documentation generated by the Athena Working Groups and Topical Panels; manage the Working Group and Topical Panel membership lists; assist the ASST in promoting Athena science capabilities in the research world, through conferences and workshops; keep a record of all papers and presentations related to Athena; support the production of ASST documents; produce and distribute regularly an Athena Newsletter, informing the community about all mission and science developments; create and maintain the Athena Community web portal; maintain an active communication activity; promote, organise and support Athena science-related public outreach, in coordination with ESA and other agencies involved when appropriate; and, design, produce materials and provide pointers to available materials produced by other parties. In summary, ACO is meant to become a focal point to facilitate the scientific exchange between the Athena activities and the scientific community at large, and to disseminate the Athena science objectives to the general public.

  6. Assessing the Operational Effectiveness of a Small Surface Combat Ship in an Anti-Surface Warfare Environment

    Science.gov (United States)

    2013-06-01

    Marine Protected Areas for CETACEANS , 93. Bonabeau, E. (2002). Agent-based modeling: Methods and techniques for simulating human systems...61 5. Interaction of the Factors ...................................................... 63 6...stepwise regression model to include the main effects, two-way interactions , and polynomials. ....... 48 Figure 23. Sorted parameter estimates of

  7. Microsoft Office 2007 rinnakkain Microsoft Office 2003:n kanssa.

    OpenAIRE

    Kanerva, Juha

    2010-01-01

    Microsoft Office 2007 on uusin versio Microsoftin Office toimisto-ohjelmapaketeista. Uutta versiota varten on uusittu käyttöliittymä, joka on aikaisempiin verrattuna virtaviivaisempi ja helppokäyttöisempi. Käyttöliittymän lisäksi uuden Officen tiedostot noudattavat OOXML formaatin standardeja, jonka takia ovat muun muassa yhteensopivampia muiden ohjelmistojen kanssa. Opinnäytetyön tehtävä oli saada Etelä-Savon tietohallinto Oy:n koulutusluokkien tietokoneisiin Microsoft Office 2007 toimim...

  8. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  9. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  10. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  11. A decade of major vascular trauma: Lessons learned from gang and civilian warfare.

    Science.gov (United States)

    Ramdass, M J; Harnarayan, P

    2017-01-01

    INTRODUCTION Trinidad and Tobago is a trans-shipment point for the illegal trade of drugs, arms and ammunition and, as such, has a high incidence of gang-related warfare and drug-related crimes. This has led to a high incidence of gunshot and stab wounds, with associated major vascular injuries. We describe our management strategies learned from a decade of vascular trauma experience. METHODS A retrospective analysis of age, gender, type of trauma, vessel injured, procedure and outcome for all cases of vascular trauma between 2006 and 2015 at two surgical units in Trinidad and Tobago. RESULTS There were 198 vascular trauma cases (232 procedures), involving 159 (80%) males at a mean age of 33 years. Gunshots accounted for 103 (52%) cases, followed by stabs/chops (n=50; 25%) and lacerations (n=15; 8%). The most commonly injured vessels were the radial/ulnar arteries (n=39; 20%) and the superficial femoral artery (n=37; 19%). There were seven pseudoaneurysms and three traumatic arteriovenous fistulae. Repair techniques included primary (n=82; 35%), reversed vein (n=63; 27%), polytetrafluoroethylene (n=58; 25%), oversew (n=24; 10%) and endovascular (n=5; 2%) techniques. There were eight (4%) secondary amputations and eight (4%) deaths. CONCLUSIONS Major vascular trauma causes significant morbidity and mortality in Trinidad and Tobago, with the majority of cases due to gunshot injuries secondary to gang-related warfare and civilian violence. We compare our experience with that in the literature on the epidemiology and management of vascular trauma.

  12. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  13. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  14. APSTNG: neutron interrogation for detection of explosives, drugs, and nuclear and chemical warfare materials

    Science.gov (United States)

    Rhodes, Edgar A.; Peters, Charles W.

    1993-02-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14- MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma-rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators.

  15. Three-dimensional visualization and control of electronic warfare (EW) payloads

    Science.gov (United States)

    Kirsch, Patricia; Tremper, David; Cortesi, Roger

    2008-04-01

    The proliferation of unmanned vehicles carrying tactical payloads in the battle-space has accelerated the need for user-friendly visualization with graphical interfaces to provide remote command and control. Often these platforms and payloads receive their control functions from command centers located half a world away via satellite communications. Operators require situational awareness tools capable of graphically presenting the remote battlefield asset positions and collected sensor data. Often these systems use 2D software mapping tools in conjunction with video for real time situational awareness. The Special Projects Group (SPG) in the Tactical Electronic Warfare Division of the U.S. Naval Research Laboratory has been developing an operator control interface called the Jammer Control Station (JCS) to provide 3D battle-space visualization with built-in, remote EW payload command and control (C2) capabilities. The JCS interface presents the operator with graphic depictions of both the platforms' states and the RF environment. Text based messaging between the JCS and the EW payload reduces the impact of the system on the available bandwidth. This paper will discuss the use of the SIMDIS 3-D visualization tool as a real-time command and control interface for electronic warfare (EW) payloads.

  16. Implications for studying team cognition and team performance in network-centric warfare paradigms.

    Science.gov (United States)

    Krueger, Gerald P; Banderet, Louis E

    2007-05-01

    Network-centric warfare's (NCW) information-rich systems involving sophisticated sensors, tracking systems, smart weapons, and enhanced digital communications threaten to overload combatants with voluminous amounts of data. It is unclear whether warfighters will perceive such extensive data as actionable information to which they will respond accurately in a timely enough manner. Members of small teams in command and control centers, operating in crew-served vehicles, or simply "grunting it out" as ground-pounding infantrymen, may be disparately separated by space, but will communicate and be connected by electronic linkages, e.g., radio, text messages, situation displays, or global positioning data. However, team members will also have to remember shared mental models of tasks at hand, pay attention to and share common situation awareness in complex operational environments, perform team cognition and team coordination, and integrate both lower and higher cognitive processes with those of team behaviors. Such exceptional capabilities are required more now than ever before; such capabilities today are far from assured. After two workshops to establish performance metrics for assessing cognitive performance of military personnel in NCW, this preface introduces five manuscripts addressing team cognition and team performance from both a theoretical and a practical perspective. The authors of this preface question if NCW, and perhaps the politico-social ramifications of modern warfare, have already outstripped behavioral scientists' approach to researching team cognition and team performance-expertise that is so crucially needed for combatants on the rapidly changing 21st-century battlegrounds.

  17. Chemical and biological warfare: Detection and warning systems. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the detection, identification, verification, and warning systems of chemical and biological warfare agents. Citations discuss agents sampling, monitoring, and assessment. Techniques include chromotography, biosensing, chemical analysis, and DNA probes. Land pollution, soil tests, and skin protection are examined. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  18. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  19. Chemical and biological warfare: Biology, chemistry, and toxicology. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the physiological effects, physicochemical effects, and toxicology of chemical and biological warfare agents. Citations discuss toxic chemicals, chemical agent simulants, detoxification and decontamination, environmental toxicity, and land pollution. Detection techniques and warning systems are examined in a separate bibliography. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  20. Global Survey of Research and Capabilities in Genetically Engineered Organisms That Could be Used in Biological Warfare or Bioterrorism

    Science.gov (United States)

    2008-12-01

    advances (summarized in Section 4) that could facilitate or at least inspire the pursuit of biological warfare capabilities. We share the opinion that...a)bccdc.ca Infectious Diseases Control Unit of the Direction de la sante publique , Montreal Chest Institute, Montreal Division of Infectious and

  1. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  2. Multi Service Tactics, Techniques, and Procedures for Treatment of Chemical Warfare Agent Casualties and Conventional Military Chemical Injuries

    Science.gov (United States)

    2016-08-02

    Carbon Monoxide 1 B Phosgene 3 B Hydrogen Cyanide 3 B Chlorine 4 A Cyanogen Chloride 4 A Ethylene Oxide 2 C Formaldehyde 2 B Methyl Bromide 3 B...10-7 Chlorine ............................................................................................................ 10-8...especially vulnerable and may be targeted as part of a plan to defeat U.S. force projection. Chemical warfare agents and TICs (such as chlorine , phosgene

  3. Groundwater geochemical and selected volatile organic compound data, Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington, July 2015

    Science.gov (United States)

    Huffman, Raegan L.

    2016-05-18

    Previous investigations indicate that concentrations of chlorinated volatile organic compounds (CVOCs) are substantial in groundwater beneath the 9-acre former landfill at Operable Unit 1, Naval Undersea Warfare Center, Division Keyport, Washington. The U.S. Geological Survey has continued to monitor groundwater geochemistry to ensure that conditions remain favorable for contaminant biodegradation as specified in the Record of Decision for the site.

  4. Speed of adaptation and genomic footprints of host-parasite coevolution under arms race and trench warfare dynamics.

    Science.gov (United States)

    Tellier, Aurélien; Moreno-Gámez, Stefany; Stephan, Wolfgang

    2014-08-01

    Coevolution between hosts and their parasites is expected to follow a range of possible dynamics, the two extreme cases being called trench warfare (or Red Queen) and arms races. Long-term stable polymorphism at the host and parasite coevolving loci is characteristic of trench warfare, and is expected to promote molecular signatures of balancing selection, while the recurrent allele fixation in arms races should generate selective sweeps. We compare these two scenarios using a finite size haploid gene-for-gene model that includes both mutation and genetic drift. We first show that trench warfare do not necessarily display larger numbers of coevolutionary cycles per unit of time than arms races. We subsequently perform coalescent simulations under these dynamics to generate sequences at both host and parasite loci. Genomic footprints of recurrent selective sweeps are often found, whereas trench warfare yield signatures of balancing selection only in parasite sequences, and only in a limited parameter space. Our results suggest that deterministic models of coevolution with infinite population sizes do not predict reliably the observed genomic signatures, and it may be best to study parasite rather than host populations to find genomic signatures of coevolution, such as selective sweeps or balancing selection.

  5. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’ targe

  6. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  7. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Notice of proposed rulemaking. SUMMARY: The Coast Guard proposes extending a portion of an existing San Diego Bay security zone... security zone modifications are intended to restrict vessels from a portion of the San Diego Bay in order...

  8. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA AGENCY: Coast Guard, DHS. ACTION: Final rule. SUMMARY: The Coast Guard is increasing a portion of an existing San Diego Bay security zone at Naval Base... Diego Bay in order to ensure the safety and security of Naval assets. Both security zones will safeguard...

  9. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  10. Chemiluminescence assay for the detection of biological warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Langry, K; Horn, J

    1999-11-05

    A chemiluminescent homogeneous immunoassay and a hand-size multiassay reader are described that could be used for detecting biological materials. The special feature of the assay is that it employs two different antibodies that each bind to a unique epitope on the same antigen. Each group of epitope-specific antibodies has linked to it an enzyme of a proximal-enzyme pair. One enzyme of the pair utilizes a substrate in high concentration to produce a second substrate required by the second enzyme. This new substrate enables the second enzyme to function. The reaction of the second enzyme is configured to produce light. This chemiluminescence is detected with a charge-coupled device (CCD) camera. The proximal pair enzymes must be in close proximity to one another to allow the second enzyme to react with the product of the first enzyme. This only occurs when the enzyme-linked antibodies are attached to the antigen, whether antigen is a single protein with multiple epitopes or the surface of a cell with a variety of different antigens. As a result of their juxtaposition, the enzymes produce light only in the presence of the biological material. A brief description is given as to how this assay could be utilized in a personal bio-agent detector system.

  11. Atmospheric Pressure Plasma Jet for Chem/Bio Warfare Decontamination

    Science.gov (United States)

    Herrmann, Hans W.; Henins, Ivars; Park, Jaeyoung; Selwyn, Gary S.

    1999-11-01

    Atmospheric Pressure Plasma Jet (APPJ) technology may provide a much needed method of CBW decontamination which, unlike traditional decon methods, is dry and nondestructive to sensitive equipment and materials. The APPJ discharge uses a high-flow feedgas consisting primarily of an inert carrier gas, such as He, and a small amount of a reactive additive, such as O2, which flows between capacitively-coupled electrodes powered at 13.56 MHz. The plasma generates highly reactive metastable and atomic species of oxygen which are then directed onto a contaminated surface. The reactive effluent of the APPJ has been shown to effectively neutralize VX nerve agent as well as simulants for anthrax and mustard blister agent. Research efforts are now being directed towards reducing He consumption and increasing the allowable stand-off distance. Recent results demonstrate that by replacing the O2 reactive additive with CO2, ozone formation is greatly reduced. This has the result of extending the lifetime of atomic oxygen by an order of magnitude or more. A recirculating APP Decon Chamber which combines heat, vacuum, forced convection and reactivity is currently being developed for enhanced decontamination of sensitive equipment. Several techniques are also being evaluated for use in an APP Decon Jet for decontamination of items which cannot be placed inside a chamber.

  12. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    Science.gov (United States)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  13. 75 FR 65491 - Agency Information Collection Activities; Submission for Office of Management and Budget Review...

    Science.gov (United States)

    2010-10-25

    ... in storage areas; and audits of ingredients, food contact surfaces, and equipment for microbiological... processing runs); and 3 microbiological audits (ingredients, food contact surfaces, and equipment... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND...

  14. Office of Equal Opportunity Programs

    Science.gov (United States)

    Chin, Jennifer L.

    2004-01-01

    The NASA Glenn Office of Equal Opportunity Programs works to provide quality service for all programs and/or to assist the Center in becoming a model workplace. During the summer of 2004, I worked with Deborah Cotleur along with other staff members to create and modify customer satisfaction surveys. This office aims to assist in developing a model workplace by providing functions as a change agent to the center by serving as an advisor to management to ensure equity throughout the Center. In addition, the office serves as a mediator for the Center in addressing issues and concerns. Lastly, the office provides assistance to employees to enable attainment of personal and organizational goals. The Office of Equal Opportunities is a staff office which reports and provides advice to the Center Director and Executive Leadership, implements laws, regulations, and presidential executive orders, and provides center wide leadership and assistance to NASA GRC employees. Some of the major responsibilities of the office include working with the discrimination complaints program, special emphasis programs (advisory groups), management support, monitoring and evaluation, contract compliance, and community outreach. During my internship in this office, my main objective was to create four customer satisfaction surveys based on EO retreats, EO observances, EO advisory boards, and EO mediation/counseling. I created these surveys after conducting research on past events and surveys as well as similar survey research created and conducted by other NASA centers, program for EO Advisory group members, leadership training sessions for supervisors, preventing sexual harassment training sessions, and observance events. I also conducted research on the style and format from feedback surveys from the Marshall Equal Opportunity website, the Goddard website, and the main NASA website. Using the material from the Office of Equal Opportunity Programs at Glenn Research Center along with my

  15. Office of Equal Opportunity Programs

    Science.gov (United States)

    Chin, Jennifer L.

    2004-01-01

    The NASA Glenn Office of Equal Opportunity Programs works to provide quality service for all programs and/or to assist the Center in becoming a model workplace. During the summer of 2004, I worked with Deborah Cotleur along with other staff members to create and modify customer satisfaction surveys. This office aims to assist in developing a model workplace by providing functions as a change agent to the center by serving as an advisor to management to ensure equity throughout the Center. In addition, the office serves as a mediator for the Center in addressing issues and concerns. Lastly, the office provides assistance to employees to enable attainment of personal and organizational goals. The Office of Equal Opportunities is a staff office which reports and provides advice to the Center Director and Executive Leadership, implements laws, regulations, and presidential executive orders, and provides center wide leadership and assistance to NASA GRC employees. Some of the major responsibilities of the office include working with the discrimination complaints program, special emphasis programs (advisory groups), management support, monitoring and evaluation, contract compliance, and community outreach. During my internship in this office, my main objective was to create four customer satisfaction surveys based on EO retreats, EO observances, EO advisory boards, and EO mediation/counseling. I created these surveys after conducting research on past events and surveys as well as similar survey research created and conducted by other NASA centers, program for EO Advisory group members, leadership training sessions for supervisors, preventing sexual harassment training sessions, and observance events. I also conducted research on the style and format from feedback surveys from the Marshall Equal Opportunity website, the Goddard website, and the main NASA website. Using the material from the Office of Equal Opportunity Programs at Glenn Research Center along with my

  16. 76 FR 67472 - Order of Succession for the Office of the Chief Information Officer

    Science.gov (United States)

    2011-11-01

    ... Cyber Security and Privacy, Office of the Chief Information Officer, Department of Housing and Urban... Operations; (3) Deputy Chief Information Officer, for Cyber Security and Privacy; (4) Deputy...

  17. 12 CFR 619.9310 - Senior officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Senior officer. 619.9310 Section 619.9310 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9310 Senior officer. The Chief Executive Officer, the Chief Operations Officer, the Chief Financial Officer, the Chief...

  18. 29 CFR 401.18 - Office.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Office. 401.18 Section 401.18 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.18 Office. Office means the Office of Labor-Management...

  19. 12 CFR 583.13 - Office.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Office. 583.13 Section 583.13 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING SAVINGS AND LOAN HOLDING COMPANIES § 583.13 Office. The term Office means the Office of Thrift Supervision....

  20. 12 CFR 4.4 - Washington office.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Washington office. 4.4 Section 4.4 Banks and... EXAMINERS Organization and Functions § 4.4 Washington office. The Washington office of the OCC is the main office and headquarters of the OCC. The Washington office directs OCC policy, oversees OCC...

  1. 49 CFR 1325.3 - Federal office.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Federal office. 1325.3 Section 1325.3... FEDERAL OFFICE OR THEIR REPRESENTATIVES § 1325.3 Federal office. For the purposes of this section, Federal office means the office of President or Vice President of the United States; or of Senator...

  2. 12 CFR 561.34 - Office.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Office. 561.34 Section 561.34 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING ALL SAVINGS ASSOCIATIONS § 561.34 Office. The term Office means the Office as established in section 3 of...

  3. Office of Personnel Management (OPM)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for the Office of Personnel Management. OPM will use the SSN verifications in its investigative...

  4. Office of Disability Employment Policy

    Science.gov (United States)

    ... OF LABOR Facebook Twitter RSS Email Office of Disability Employment Policy (ODEP) Menu About ODEP About ODEP ... Youth in Transition Publications for Order and Download Disability Statistics September 2017 Disability Employment Statistics Ages 16 ...

  5. Census Bureau Regional Office Boundaries

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The Census Bureau has six regional offices to facilitate data collection, data dissemination and geographic operations within their boundary. The surveys these...

  6. Office Operative Hysteroscopy - an Update.

    Science.gov (United States)

    Salazar, Christina Alicia; Isaacson, Keith

    2017-08-10

    Hysteroscopy is considered the gold standard for evaluation of intracavitary pathology associated with both pre- and postmenopausal patients with abnormal uterine bleeding as well as part of the evaluation of infertility patients with suspected cavity abnormalities. Office-based operative hysteroscopy allows patients to resume activities immediately and successfully integrates clinical practice into a "see and treat" modality, avoiding the added risks of undergoing anesthesia and the inconvenience of going to the operating room. For 2017, the Center for Medicare and Medical Services has incorporated a substantial increase in the reimbursement for a select number of office-based hysteroscopic procedures. This review provides an update on office hysteroscopy indications, equipment, and procedures as well as reviews management of complications that may arise within an office-based practice. Copyright © 2017. Published by Elsevier Inc.

  7. Office of Aviation Safety Infrastructure -

    Data.gov (United States)

    Department of Transportation — The Office of Aviation Safety Infrastructure (AVS INF) provides authentication and access control to AVS network resources for users. This is done via a distributed...

  8. Collaborators | Office of Cancer Genomics

    Science.gov (United States)

    The TARGET initiative is jointly managed within the National Cancer Institute (NCI) by the Office of Cancer Genomics (OCG)Opens in a New Tab and the Cancer Therapy Evaluation Program (CTEP)Opens in a New Tab.

  9. Office Market Shows Biggest Potential

    Institute of Scientific and Technical Information of China (English)

    LIU BO

    2006-01-01

    @@ As Beijing's residential apartment real estate market slackens thanks to a series of policies proposed by the central government in recent years intended to curb overheated growth, the market for office buildings seems to be upbeat.

  10. 75 FR 58410 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director; Notice of...

    Science.gov (United States)

    2010-09-24

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science... of Biotechnology Activities, 6705 Rockledge Drive, Suite 750, Bethesda, Maryland 20892, (301) 496...

  11. OPENING HOURS FOR CARDS OFFICE

    CERN Multimedia

    Human Resources Division

    2001-01-01

    Due to the extra workload generated by the global renewal of French cards and in order to preserve the level of service offered by the cards office, please note that this office will in future be open every morning from 8.30 a.m. to 12.30 p.m. until further notice. The service can be contacted by telephone during the same hours. Thank you for your understanding.

  12. Office 2007 The Missing Manual

    CERN Document Server

    Grover, Chris; Vander Veer, E A

    2009-01-01

    Quickly learn the most useful features of Microsoft Office 2007 with our easy to read four-in-one guide. This fast-paced book gives you the basics of Word, Excel, PowerPoint and Access so you can start using the new versions of these major Office applications right away. It's a great way to master all 4 programs without having to stock up on a shelf-load of different books.

  13. Contact | Office of Cancer Genomics

    Science.gov (United States)

    For more information about the Office of Cancer Genomics, please contact: Office of Cancer Genomics National Cancer Institute 31 Center Drive, 10A07 Bethesda, Maryland 20892-2580 Phone: (301) 451-8027 Fax: (301) 480-4368 Email: ocg@mail.nih.gov *Please note that this site will not function properly in Internet Explorer unless you completely turn off the Compatibility View*

  14. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    2009-04-24

    President and Chief Executive Officer Broadcast Music Incorporated ( BMI ) Mr. Bert C. Roberts, Jr., Chairman and Chief Executive Officer MCI...Telecommunications advisory committees, establishment, composition (See also Executive Order Number 12046) 47 305 Construction and operation of foreign government...System EO Executive Order EOP Executive Office of the President EPA Environmental Protection Agency ESC Electronics Systems Center ESNet Energy

  15. Office space bacterial abundance and diversity in three metropolitan areas.

    Directory of Open Access Journals (Sweden)

    Krissi M Hewitt

    Full Text Available People in developed countries spend approximately 90% of their lives indoors, yet we know little about the source and diversity of microbes in built environments. In this study, we combined culture-based cell counting and multiplexed pyrosequencing of environmental ribosomal RNA (rRNA gene sequences to investigate office space bacterial diversity in three metropolitan areas. Five surfaces common to all offices were sampled using sterile double-tipped swabs, one tip for culturing and one for DNA extraction, in 30 different offices per city (90 offices, 450 total samples. 16S rRNA gene sequences were PCR amplified using bar-coded "universal" bacterial primers from 54 of the surfaces (18 per city and pooled for pyrosequencing. A three-factorial Analysis of Variance (ANOVA found significant differences in viable bacterial abundance between offices inhabited by men or women, among the various surface types, and among cities. Multiplex pyrosequencing identified more than 500 bacterial genera from 20 different bacterial divisions. The most abundant of these genera tended to be common inhabitants of human skin, nasal, oral or intestinal cavities. Other commonly occurring genera appeared to have environmental origins (e.g., soils. There were no significant differences in the bacterial diversity between offices inhabited by men or women or among surfaces, but the bacterial community diversity of the Tucson samples was clearly distinguishable from that of New York and San Francisco, which were indistinguishable. Overall, our comprehensive molecular analysis of office building microbial diversity shows the potential of these methods for studying patterns and origins of indoor bacterial contamination. "[H]umans move through a sea of microbial life that is seldom perceived except in the context of potential disease and decay." - Feazel et al. (2009.

  16. 75 FR 55786 - Office of Special Education Programs, Office of Special Education and Rehabilitative Services...

    Science.gov (United States)

    2010-09-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Office of Special Education Programs, Office of Special Education and Rehabilitative Services, Department... Transition Technical Assistance Center (NSTTAC). Currently, the Office of Special Education Programs (OSEP...

  17. Effects of office innovation on office workers' health and performance.

    Science.gov (United States)

    Meijer, Eline M; Frings-Dresen, Monique H W; Sluiter, Judith K

    2009-09-01

    The implementation of an innovative office concept (e.g. open-plan, flexible workplaces and a paperless office concept) on health and productivity among office workers was evaluated with questionnaires of 138 workers at baseline and 6 and 15 months afterwards. Work-related fatigue, general health, change in health status, upper extremity complaints and perceived productivity were outcomes. No short-term significant differences were found in most outcomes except for quantity of performed work (decrease from 96% to 92%, p = 0.008). In the long-term, no significant differences were found in most outcomes except for an increase in general health (p = 0.011) and a decrease in prevalences of upper extremity complaints (33% to 22%, p = 0.021). Perceived productivity increased significantly 15 months after the implementation. It is concluded that innovative office concepts had no or limited effects on work-related fatigue, health changes and productivity but some positive effects on workers' general health and upper extremity complaints in the long term. Office innovation is being administered often but up to now seldom evaluated on workers' health and productivity.

  18. Research on the Interaction of Hydrogen-Bond Acidic Polymer Sensitive Sensor Materials with Chemical Warfare Agents Simulants by Inverse Gas Chromatography

    OpenAIRE

    Liu Yang; Qiang Han; Shuya Cao; Feng Huang; Molin Qin; Chenghai Guo; Mingyu Ding

    2015-01-01

    Hydrogen-bond acidic polymers are important high affinity materials sensitive to organophosphates in the chemical warfare agent sensor detection process. Interactions between the sensor sensitive materials and chemical warfare agent simulants were studied by inverse gas chromatography. Hydrogen bonded acidic polymers, i.e., BSP3, were prepared for micro-packed columns to examine the interaction. DMMP (a nerve gas simulant) and 2-CEES (a blister agent simulant) were used as probes. Chemical an...

  19. Office of the Chief Financial Officer 2012 Annual Report

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Kim [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-31

    Fiscal Year 2012 was a year of progress and change in the Office of the Chief Financial Officer (OCFO) organization. The notable accomplishments outlined below strengthened the quality of the OCFO’s stewardship and services in support of the scientific mission of Lawrence Berkeley National Laboratory (LBNL). Three strategies were key to this progress: organizational transformation aligned with our goals; process redesign and effective use of technology to improve efficiency, and innovative solutions to meet new challenges. Over the next year we will continue to apply these strategies to further enhance our contributions to the Lab’s scientific mission. What follows is the budget, funding and costs for the office for FY 2012.

  20. Possible Long Term Effects of Chemical Warfare Using Visual Evoked Potentials

    Directory of Open Access Journals (Sweden)

    Abbas Riazi

    2014-09-01

    Full Text Available Some studies have already addressed the effects of occupational organic solvent exposure on the visually evoked potentials (VEPs. Visual system is an important target for Sulphur Mustard (SM toxicity. A number of Iranian victims of Sulphur Mustard (SM agent were apprehensive about the delay effect of SM on their vision and a possible delay effect of SM on their visual cortex. This investigation was performed on 34 individuals with a history of chemical exposure and a control group of 15 normal people. The Toennies electro-diagnosis device was used and its signals were saved as the latencies. The mean of N75, N140 and P100 of victims of chemical warfare (VCWs and control group indicated no significant results (P>0.05. The VCWs did not show any visual symptoms and there was no clear deficit in their VEPs.

  1. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  2. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  3. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  4. The art of antibacterial warfare: Deception through interference with quorum sensing-mediated communication.

    Science.gov (United States)

    Rampioni, Giordano; Leoni, Livia; Williams, Paul

    2014-08-01

    Almost a century on from the discovery of penicillin, the war against bacterial infection still rages compounded by the emergence of strains resistant to virtually every clinically approved antibiotic and the dearth of new antibacterial agents entering the clinic. Consequently there is renewed interest in drugs which attenuate virulence rather than bacterial growth. Since the metaphors of warfare are often used to describe the battle between pathogen and host, we will describe in such a context, the molecular communication (quorum sensing) mechanisms used by bacteria to co-ordinate virulence at the population level. Recent progress in exploiting this information through the design of anti-virulence deception strategies that disrupt quorum sensing through signal molecule inactivation, inhibition of signal molecule biosynthesis or the blockade of signal transduction and their advantages and disadvantages are considered.

  5. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-01-01

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved. PMID:25029282

  6. Approximation and Filtering Techniques for Navigation Data in Time-critical Electronic Warfare Systems

    Directory of Open Access Journals (Sweden)

    Vanitha D.

    2013-03-01

    Full Text Available This paper presents a holistic solution to the navigation requirements in a time critical electronic warfare systems like missile warning systems (MWS. In a passive MWS using IR sensors the efficiency of the system is determined by attributes such as low false alarm rate, minimal response time and ability to track different IR radiating objects by association and correlation of consecutive detections through time. Such a system is required to be supported by a navigation system capable of accurate estimation of the aircraft position, attitude angles and altitude. In this paper, estimation techniques used to accurately calculate aircraft navigation data at the time of capture of IR frames are discussed. The paper discusses about synchronization of INGPS, IR sensors & Processor on to same timeline. The paper also intends to evaluate the performance of wavelet transform filter in effective elimination of noise in navigation parameters like acceleration and attitude angle rates for a better estimation of position and attitude.

  7. High-temperature superconductivity for avionic electronic warfare and radar systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryan, P.A. [Wright Lab., Wright-Patterson AFB, OH (United States). Avionics Directorate

    1994-12-31

    The electronic warfare (EW) and radar communities expect to be major beneficiaries of the performance advantages high-temperature superconductivity (HTS) has to offer over conventional technology. Near term upgrades to system hardware can be envisioned using extremely small, high Q, microwave filters and resonators; compact, wideband, low loss, microwave delay and transmission lines; as well as, wideband, low loss, monolithic microwave integrated circuit phase shifters. The most dramatic impact will be in the far term, using HTS to develop new, real time threat identification and response strategy receiver/processing systems designed to utilize the unique high frequency properties of microwave and ultimately digital HTS. To make superconductivity practical for operational systems, however, technological obstacles need to be overcome. Compact cryogenically cooled subsystems with exceptional performance able to withstand rugged operational environments for long periods of time need to be developed.

  8. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  9. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  10. Office of Disease Prevention and Health Promotion

    Science.gov (United States)

    ... Patient Safety Healthy People healthfinder The Office of Disease Prevention and Health Promotion Our Work The Office of Disease Prevention and Health Promotion (ODPHP) leads efforts to improve ...

  11. Office 2010 Web Apps For Dummies

    CERN Document Server

    Weverka, Peter

    2010-01-01

    Enhance your Microsoft Office 2010 experience with Office 2010 Web Apps!. Office Web Apps complement Office, making it easy to access and edit files from anywhere. It also simplifies collaboration with those who don't have Microsoft Office on their computers. This helpful book shows you the optimum ways you can use Office Web Apps to save time and streamline your work. Veteran For Dummies author Peter Weverka begins with an introduction to Office Web Apps and then goes on to clearly explain how Office Web Apps provide you with easier, faster, more flexible ways to get things done.: Walks you t

  12. Selected Regional Judicial Officer Cases, 2005 - Present

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset contains selected cases involving EPA's Regional Judicial Officers (RJOs) from 2005 to present. EPA's Regional Judicial Officers (RJOs) perform...

  13. Research on Electronic Warfare Operational Simulation Experiment Design%电子对抗作战仿真实验设计研究

    Institute of Scientific and Technical Information of China (English)

    陶玉; 耿松涛; 王枭犇

    2013-01-01

      针对目前电子对抗作战仿真实验设计中存在的突出问题,对电子对抗作战仿真实验设计进行研究。介绍我军电子对抗作战仿真实验设计的发展现状,分析电子对抗作战仿真实验设计中存在的问题,提出结合实验目的规范电子对抗作战仿真实验设计的思路。该研究为实现电子对抗作战仿真实验设计的规范化、标准化做出了有益探索。%Aiming at the problems existed in designing electronic warfare operational simulation experiment, electronic warfare operational simulation experiment design is researched. It introduces the development situation of PLA’s electronic warfare operational simulation experiment firstly, analyses the problems in designing electronic warfare operational simulation experiment, and brings a design idea that combines it with experiment goals for electronic warfare operational simulation experiment. The research can offer reference for realize the normalization and standardization of electronic warfare campaign simulation experimental design.

  14. 10 CFR 1.31 - Office of the Chief Financial Officer.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Office of the Chief Financial Officer. 1.31 Section 1.31 Energy NUCLEAR REGULATORY COMMISSION STATEMENT OF ORGANIZATION AND GENERAL INFORMATION Headquarters Chief Financial Officer § 1.31 Office of the Chief Financial Officer. The Office of the Chief Financial...

  15. 76 FR 69031 - Order of Succession for the Office of the Chief Human Capital Officer

    Science.gov (United States)

    2011-11-07

    ... Succession for the Office of the Chief Human Capital Officer AGENCY: Office of the Chief Human Capital Officer, HUD. ACTION: Notice of order of succession. SUMMARY: In this notice, the Chief Human Capital... Office of the Chief Human Capital Officer. DATES: Effective Date: October 20, 2011. FOR...

  16. 微软Office 365%Microsoft Office 365

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    微软2010年10月20日宣布了0f_rice365,可以说是Google Apps最强劲的竞争对手。Office 365是微软新一代云计算产品,其融合了Ottice Share Point Online、Exchange Online和Lync Online组件,这些组件可以实时进行升级,Office365兼容大多数浏览器和智能手机等。

  17. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  18. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  19. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  20. 16 CFR 1000.18 - Office of Executive Director.

    Science.gov (United States)

    2010-01-01

    ... Operations, the Office of Human Resources Management, the Office of Information and Technology Services, and the Office of International Programs and Intergovernmental Affairs. ... offices: the Office of Financial Management, Planning and Evaluation, the Office of Hazard...

  1. Mobile Warfare

    Institute of Scientific and Technical Information of China (English)

    SEBASTIAN COHEN

    2008-01-01

    @@ In 1984, US computer manufacturer Apple spent almost USD 1.5 million on a lavish, Ridley Scott-directed commercial for its new Macintosh 128k personal computer. A year later, Microsoft released Microsoft Windows for IBM PC, signaling the start of the battle for domi-nation of the personal computer market which has waged ever since.

  2. Toxic Warfare

    Science.gov (United States)

    2002-02-01

    suicide squad from the LTTE sea ______________ 34See “FARC Allegedly Using Acid, Tar, Feces to Make Bombs,” El Tiempo , September 6, 2001, accessed from...Program and ser - vices provided by the University of Texas A&M Emergency Re- sponder Training Program. Three interactive training CD-ROMs for the emergency...Bombs,” El Tiempo , September 6, 2001, accessed from FBIS-LAP-20010906000034. “FBI Starts Nationwide Records Check on HAZMAT Truckers,” CNN Online

  3. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  4. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    processes of segmentation and fragmentation, and sovereignty. Segmentation is accomplished through dividing the terrain into zones of monopolistic...discussed idea of segmentation , and form the foundation for Kalyvas’ idea of zones. He breaks down the area of operations into fives zones, each with...dataset may have been motivated by frustration over failure to achieve expected success in the job market following their education.54 This analysis

  5. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Air and Space Studies, Air University and JSOU Associate Fellow William W. Mendel Colonel, U.S. Army, Ret. JSOU Senior Fellow Alvaro de Souza... Gregor , “Military Planning Systems and Stability Operations,” Prism 1, no. 3 (June 2010). Gregor’s analysis is an even account regarding the role of

  6. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    2) The use of the EMS is essential to control the OE during all military operations. The transfer of information from the collectors to the...frequencies used for satellite communications (SATCOM); the effects of solar activities such as sunspots, solar flares, and atmospheric fluctuations on...re-radiation, alteration, suppression, absorption , denial, enhancement, or reflection of EM energy in a manner intended to convey misleading

  7. Air Warfare

    Science.gov (United States)

    2002-03-01

    advanced waves of friendly troops, have already been described. It was noted also that the airplane finally came to be relied on for the performance of...vivid imagination to conjure up one, where it would be justifiable to use all bom- bardment units against the very advanced waves of infantry. Another

  8. 76 FR 28793 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director; Notice of...

    Science.gov (United States)

    2011-05-18

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science... Assistant, NIH Office of Biotechnology Activities, 6705 Rockledge Drive, Suite 750, Bethesda, Maryland 20892...

  9. 76 FR 3918 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director; Notice of...

    Science.gov (United States)

    2011-01-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science..., Bethesda, Maryland 20892. Contact Person: Ronna Hill, NSABB Program Assistant NIH Office of Biotechnology...

  10. 77 FR 66624 - Office of Biotechnology Activities, Office of Science Policy, Office of the Director; Notice of...

    Science.gov (United States)

    2012-11-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health Office of Biotechnology Activities, Office of Science... 20892. Contact Person: Ronna Hill, NSABB Program Assistant, NIH Office of Biotechnology Activities, 6705...

  11. WAT Office building, Karlsruhe, Germany

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, H.

    1999-07-01

    In 1994, the WAT (Wasser-und Abfalltechnik GmbH) office building, with various energy-saving features, was erected in Karlsruhe, Germany. The office building, net area 1,500 m{sup 2}, incorporates: facade-integrated solar air collectors preheating the ventilation air; exhaust air extraction through a solar chimney; heat recovery from ventilation air; concrete floors with integrated air ducts and no suspended ceilings. During the design phase, TRNSYS was used to determine the performance of the building and the solar system. (author)

  12. Identification of water-bearing fractures by the use of geophysical logs, May to July 1998, former Naval Air Warfare Center, Bucks County, Pennsylvania

    Science.gov (United States)

    Conger, Randall W.; Bird, Philip H.

    1999-01-01

    Between May and July 1998, 10 monitor wells were drilled near the site of the former Naval Air Warfare Center (NAWC), Warminster, Bucks County, Pa., to monitor water levels and sample ground water in shallow and intermediate water-bearing fractures. The sampling will determine the horizontal and vertical distribution of contaminated ground water migrating from known or suspected sources. Three boreholes were drilled on the property at 960 Jacksonville Road, at the northwestern side of NAWC, along strike from Area A; seven boreholes were drilled in Area B in the southeastern corner of NAWC. Depths range from 40.5 to 150 feet below land surface. Borehole geophysical logging and video surveys were used to identify water-bearing fractures so that appropriate intervals could be screened in each monitor well. Geophysical logs were obtained at the 10 monitor wells. Video surveys were obtained at three monitor wells in the southeastern corner of the NAWC property. Caliper logs and video surveys were used to locate fractures. Inflections on fluid-temperature and fluid-resistivity logs were used to locate possible water-bearing fractures. Heatpulse-flowmeter measurements verified these locations. Natural-gamma logs provided information on stratigraphy. After interpretation of geophysical logs, video surveys, and driller?s logs, all wells were screened such that water-level fluctuations could be monitored and water samples collected from discrete water-bearing fractures in each monitor well.

  13. Toward Strategic Human Resource Management in the Central Office

    Science.gov (United States)

    Mosley Linhardt, Heather LeAnn

    2011-01-01

    The purpose of this study was to identify and explore how human resources are managed, what human resource management can look like, and what organizational issues, tensions, and ambiguities are likely to surface as a district central office moves toward being more strategic with their human resources. The research design was an exploratory case…

  14. Toward Strategic Human Resource Management in the Central Office

    Science.gov (United States)

    Mosley Linhardt, Heather LeAnn

    2011-01-01

    The purpose of this study was to identify and explore how human resources are managed, what human resource management can look like, and what organizational issues, tensions, and ambiguities are likely to surface as a district central office moves toward being more strategic with their human resources. The research design was an exploratory case…

  15. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-11-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents.(Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  16. Chemical and biological warfare: Protection, decontamination, and disposal. (Latest citations from the NTIS bibliographic database). Published Search

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    The bibliography contains citations concerning the means to defend against chemical and biological agents used in military operations, and to eliminate the effects of such agents on personnel, equipment, and grounds. Protection is accomplished through protective clothing and masks, and in buildings and shelters through filtration. Elimination of effects includes decontamination and removal of the agents from clothing, equipment, buildings, grounds, and water, using chemical deactivation, incineration, and controlled disposal of material in injection wells and ocean dumping. Other Published Searches in this series cover chemical warfare detection; defoliants; general studies; biochemistry and therapy; and biology, chemistry, and toxicology associated with chemical warfare agents. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  17. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  18. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Energy Technology Data Exchange (ETDEWEB)

    E.H. Seabury; D.L. Chichester; C.J. Wharton; A.J. Caffrey

    2008-08-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory’s PINS Chemical Assay System has traditionally used a Cf-252 isotopic neutron source, but recently a Deuterium-Tritium (DT) Electronic Neutron Generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  19. 12 CFR 561.39 - Principal office.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Principal office. 561.39 Section 561.39 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY DEFINITIONS FOR REGULATIONS AFFECTING ALL SAVINGS ASSOCIATIONS § 561.39 Principal office. The term principal office means the...

  20. 7 CFR 7.17 - Dual office.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Dual office. 7.17 Section 7.17 Agriculture Office of... STATE, COUNTY AND COMMUNITY COMMITTEES § 7.17 Dual office. (a) County committee membership. A member of... any other county office employee. (b) Community committee membership. A member of the...

  1. 31 CFR 50.2 - Responsible office.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Responsible office. 50.2 Section 50.2 Money and Finance: Treasury Office of the Secretary of the Treasury TERRORISM RISK INSURANCE PROGRAM General Provisions § 50.2 Responsible office. The office responsible for the administration of...

  2. 20 CFR 320.6 - Adjudicating office.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Adjudicating office. 320.6 Section 320.6... DETERMINATIONS § 320.6 Adjudicating office. (a) The term “adjudicating office” means any subordinate office of... respect to claims for benefits. The following paragraphs state which offices of the Board are...

  3. 28 CFR 90.19 - State office.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false State office. 90.19 Section 90.19...¢ Training ⢠Officers ⢠Prosecutors) Violence Against Women Formula Grant Program § 90.19 State office. (a... office for the purposes of: (1) Certifying qualifications for funding under this subpart B;...

  4. 75 FR 59799 - Office of Thrift Supervision

    Science.gov (United States)

    2010-09-28

    ... Office of Thrift Supervision Purchase of Branch Office(s) and/or Transfer of Assets/Liabilities AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and request for comment. SUMMARY: The... Supervision within the Department of the Treasury will submit the proposed information collection...

  5. The Feasibility of Instituting a Department Head Screen in the Naval Special Warfare Community.

    Science.gov (United States)

    1985-12-01

    regretable situatior was unavoidable. It is hoped the concerned commands understand this. Every effort was made to present an accurate picture of the...size of the zone may be greater or less than the year group size as the zone size is determined by number of personnel in the year group, lineal ...number, and billets available. The lineal number is a URL officers seniority position relative to all other URL officer-s. Also note that STRAP-0 used the

  6. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  7. Enterprise Resource Planning (ERP) : a case study of Space and Naval Warfare Systems Center San Diego's Project Cabrillo

    OpenAIRE

    Hoffman, Dean M.; Oxendine, Eric

    2002-01-01

    Approved for public release; distribution unlimited This thesis examines the Enterprise Resource Planning (ERP) pilot implementation conducted at the Space and Naval Warfare Systems Center San Diego (SSC-SD), the first of four Department of the Navy (DON) pilot implementations. Specifically, comparisons are drawn between both successful and unsuccessful ERP implementations within private sector organizations and that of SSC-SD. Any commonalities in implementation challenges could be...

  8. An Irony of War: Human Development as Warfare in Afghanistan (Colloquium, Volume 3, Number 3, October 2010)

    Science.gov (United States)

    2010-10-01

    other type of warfare, do not associate human development with counterinsurgency (COIN). In fact, " Human development " is not a standard term in the...34 Human development is a process of enlarging people’s choices. The most critical of these wide-ranging choices are to live a long and healthy life, to...public administration, health system, communications, education, and, sometimes, the rule of law and security, they are trying to build human

  9. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  10. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    Science.gov (United States)

    1998-05-26

    government agency. STRATEGY RESEARCH PROJECT THE SOLDIER- CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE...UNCLASSIFIED USAWC STRATEGY RESEARCH PROJECT THE SOLDIER- CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE...P) Donald A. Gagliano, M.D. TITLE: THE SOLDIER CYBORG TRANSFORMATION: A FRAMEWORK FOR ANALYSIS OF SOCIAL AND ETHICAL ISSUES OF FUTURE WARFARE

  11. 75 FR 63753 - Family Offices

    Science.gov (United States)

    2010-10-18

    ... family, provides advice to a broader group of clients and much more resembles the business model common... investment advisory business, and not a family managing its own wealth. 2. Ownership and Control We propose... feature helped distinguish these family offices from the family-run investment advisory businesses...

  12. Paperless Office: Fact or Fiction?

    Science.gov (United States)

    Logan, Andrew

    1991-01-01

    Examines why the "paperless office" has failed to materialize despite the availability of appropriate information technology. Conceptual limits are discussed, including the continued reliance on relational database management systems; the use of free-text retrieval software is considered; and social limits are described, including access to…

  13. Change of Computer Security Officer

    CERN Multimedia

    IT Department

    2008-01-01

    After many years of successfully protecting the CERN site in her role as Computer Security Officer (CSO), Denise Heagerty is being assigned to a new role within the IT Department. David Myers has been appointed to the position of CSO for one year from 1st September. W. von Rüden, IT Department Head

  14. Paperless Office: Fact or Fiction?

    Science.gov (United States)

    Logan, Andrew

    1991-01-01

    Examines why the "paperless office" has failed to materialize despite the availability of appropriate information technology. Conceptual limits are discussed, including the continued reliance on relational database management systems; the use of free-text retrieval software is considered; and social limits are described, including access…

  15. Limited Duty Officer and Chief Warrant Officer Professional Guidebook. 1994 Edition

    Science.gov (United States)

    1993-11-22

    INSTRUCTOR FLTCOMBATRACEN - TECHNICAL INST 4 CV - ASST ELECT WARFARE FLTCOMBATRACEN - NTDS/CICLTJG LHA - CIC FLTCOMBATRACEN - CIC MOCKUP CG - ASST...WEPSTA - SECURITY OFFNAVBASE - ORD OFF NUCWEPSTA - INSPECTOR SERVGRU - STAFF ORD 10 CG - STO SIMA - R-5 DIV OFF LT CVN - WEPS DIV WEPSTA - FACILITIES...MGRMOMAG - OIC 4 CV - F/C DIV FLTACTS - AMO MATL OFFLTJG CVN - POINT DEFENSE FLTRAGRU - STAFF READINESS WEPS CGN - F/C GEN WEPSTA - SPECIAL WEPS ASST

  16. Energy use in office buildings

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-10-01

    This is the report on Task IB, Familiarization with Additional Data Collection Plans of Annual Survey of BOMA Member and Non-Member Buildings in 20 Cities, of the Energy Use in Office Buildings project. The purpose of the work was to monitor and understand the efforts of the Building Owners and Managers Association International (BOMA) in gathering an energy-use-oriented data base. In order to obtain an improved data base encompassing a broad spectrum of office space and with information suitable for energy analysis in greater detail than is currently available, BOMA undertook a major data-collection effort. Based on a consideration of geographic area, climate, population, and availability of data, BOMA selected twenty cities for data collection. BOMA listed all of the major office space - buildings in excess of 40,000 square feet - in each of the cities. Tax-assessment records, local maps, Chamber of Commerce data, recent industrial-development programs, results of related studies, and local-realtor input were used in an effort to assemble a comprehensive office-building inventory. In order to verify the accuracy and completeness of the building lists, BOMA assembled an Ad-Hoc Review Committee in each city to review the assembled inventory of space. A questionnaire on office-building energy use and building characteristics was developed. In each city BOMA assembled a data collection team operating under the supervision of its regional affiliate to gather the data. For each city a random sample of buildings was selected, and data were gathered. Responses for over 1000 buildings were obtained.

  17. A task analysis of underway replenishment for virtual environment ship-handling simulator scenario development

    OpenAIRE

    Norris, Steven D.

    1998-01-01

    Approved for public release; distribution is unlimited While developing a Virtual Reality (VR) Ship handling simulator for the Surface Warfare Officer School (SWOS) in Newport, RI, researchers at the Naval Air Warfare Center Training Systems Division (NAWCTSD) in Orlando, FL discovered a need for a task analysis of a Conning Officer during an Underway Replenishment (UNREP). The purpose of this task analysis was to document the tasks the Conning Officer performs and cues used to accomplish ...

  18. GAO: Government Accountability Office and General Accounting Office

    Science.gov (United States)

    2007-06-22

    years, these have included the power to bring suit to require the release of impounded funds (2 U.S.C. 687); a duty to impose civil penalties under the...offices; imposed a 5-year hiring freeze; eliminated performance rewards; curtailed technology investments; and reduced travel, training, supplies, and...Washington: GPO, 1979), p. 2. 18 Ibid. 19 An article on changes at GAO at the time is by Susannah Zak Figura , “The Human Touch,” Government

  19. 75 FR 25282 - Office of the Director, Office of Biotechnology Activities; Notice of a Safety Symposium

    Science.gov (United States)

    2010-05-07

    ... HUMAN SERVICES National Institutes of Health Office of the Director, Office of Biotechnology Activities.... Chezelle George, Administrative Assistant, Office of Biotechnology Activities, Office of the Director... a.m. to 5:30 p.m. Agenda: The Office of Biotechnology Activities (OBA) and NIH Recombinant...

  20. 78 FR 16857 - Office of the Assistant Secretary for Financial Resources, Office of Grants and Acquisition...

    Science.gov (United States)

    2013-03-19

    ... HUMAN SERVICES Office of the Assistant Secretary for Financial Resources, Office of Grants and... published in the February 28, 2013 Federal Register entitled ``Office of the Assistant Secretary for... 2012--In the ``TITLE'' section--Office of the Assistant Secretary for Financial Resources, Office of...