WorldWideScience

Sample records for undersea warfare engineering

  1. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev. 2–89) Prescribed by ANSI...Convergence Zone DP Direct Path HVU High Value Unit MCM Mine Sweeper MIW Mine Warfare NMP Navy Mission Planner NOP Navy Operational Planner NOP–USW...Illustrated in Figure 1 is a piecewise linear from of the equation 1 tAchievement e   , where Achievement is the probability that a mine field

  2. Analysis of Acoustic Effects on Marine Mammals for the Proposed Undersea Warfare Training Range

    National Research Council Canada - National Science Library

    Jette, Steven D; Cembrola, Joan M; Mitchell, Glenn H; Fetherston, Thomas N

    2005-01-01

    ...) for the proposed Undersea Warfare Training Range (USWTR). The DEIS includes an assessment of the effects of Navy sonars on marine mammals during exercises to occur on the range as required by the Marine Mammal Protection Act (MMPA...

  3. Summary of Research 1995, Interdisciplinary Academic Groups (Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group)

    OpenAIRE

    Faculty of the Academic Groups

    1995-01-01

    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government. This report contains information of research projects in the four interdisciplinary groups, Command, Control & Communications Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group and Undersea Warfare Academic Group, which were carried out under funding of the Naval Postgraduate School Research...

  4. Advanced Undersea Warfare Systems

    Science.gov (United States)

    2011-06-01

    search mode, software modifications may be needed to give the LD- UUV weapon a line-of- bearing search capability. ◦ Max Range: 8 NM69 ◦ Warhead Size: 45...Glider can self-destruct or enter a hibernation state to be retrieved at a future time. Figure 4.19: Glider Recovery Assisted by Helicopter Retrieval 97...functions of the system. It does not have any bearing on the weighting of the remaining six functions. 127 between desires and capabilities using

  5. 2024 Unmanned Undersea Warfare Concept

    Science.gov (United States)

    2013-06-01

    the cheaper option. The 242 second method, improving sensor quality, has the disadvantage of higher cost, but the advantage of being able to... Auckland , New Zealand: Operation Analysis Section, Defense Technology Agency. Michaels, Jack, and William Wood. 1989. Design to Cost. New York: Wiley

  6. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  7. Human productivity experience and undersea habitat design

    Science.gov (United States)

    Taylor, T. C.; Spencer, J. S.

    1985-01-01

    Lessons learned from the Alaskan North Slope construction camps and the Western Regional Undersea Laboratory are analyzed with respect to possible improvements for space station interior space utilization and living areas. The human factors engineering aspects have a direct bearing on the condition of crew and occupants.

  8. Viral Computer Warfare via Activation Engine Employing Steganography

    National Research Council Canada - National Science Library

    Lathrop, Dale

    2000-01-01

    ... as a deployment system for cyber-attacks. The results of this research indicate that the use of a separate engine followed by an HTML-based electronic mail message containing a photographic image with a steganographically...

  9. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    .... Advances in guidance and control, communications, sensors, and other technologies for undersea vehicles can provide an opportunity to understand the oceans' influence on the energy and chemical...

  10. NEEMO 7 undersea mission

    Science.gov (United States)

    Thirsk, Robert; Williams, David; Anvari, Mehran

    2007-02-01

    The NEEMO 7 mission was the seventh in a series of NASA-coordinated missions utilizing the Aquarius undersea habitat in Florida as a human space mission analog. The primary research focus of this mission was to evaluate telementoring and telerobotic surgery technologies as potential means to deliver medical care to astronauts during spaceflight. The NEEMO 7 crewmembers received minimal pre-mission training to perform selected medical and surgical procedures. These procedures included: (1) use of a portable ultrasound to locate and measure abdominal organs and structures in a crewmember subject; (2) use of a portable ultrasound to insert a small needle and drain into a fluid-filled cystic cavity in a simulated patient; (3) surgical repair of two arteries in a simulated patient; (4) cystoscopy and use of a ureteral basket to remove a renal stone in a simulated patient; and (5) laparoscopic cholecystectomy in a simulated patient. During the actual mission, the crewmembers performed the procedures without or with telementoring and telerobotic assistance from experts located in Hamilton, Ontario. The results of the NEEMO 7 medical experiments demonstrated that telehealth interventions rely heavily on a robust broadband, high data rate telecommunication link; that certain interventional procedures can be performed adequately by minimally trained individuals with telementoring assistance; and that prior clinical experience does not always correlate with better procedural performance. As space missions become longer in duration and take place further from Earth, enhancement of medical care capability and expertise will be required. The kinds of medical technologies demonstrated during the NEEMO 7 mission may play a significant role in enabling the human exploration of space beyond low earth orbit, particularly to destinations such as the Moon and Mars.

  11. Undersea Laser Communications Field Test at the Naval Undersea Warfare Center (NUWC)

    Science.gov (United States)

    2016-08-30

    The water transmissivity and volume scattering function were measured throughout the experiment to calibrate the results. The field test data for...through the challenging medium of natural waters with relatively low loss (compared to most electromagnetic frequencies). With terahertz (THz) of...communication impact of transmitter and receiver design elements. In- water characterization data is vital to guide lasercom terminal design. The

  12. Fourth Generation Undersea Warfare: Getting C2 for Undersea Connectivity Right

    Science.gov (United States)

    2013-06-01

    butter ” debate has brought into sharper focus the consistent theme that the U.S. military may not have the strategic assets needed to deter, and if...exploit valuable fisheries and seabed resources, 11 including oil , gas and minerals. The three seas contain the vast majority of China’s...evolving to fit the unique characteristics of information age power, competition and conflict. Information technology and advanced warfighting

  13. Multi-core fiber undersea transmission systems

    DEFF Research Database (Denmark)

    Nooruzzaman, Md; Morioka, Toshio

    2017-01-01

    Various potential architectures of branching units for multi-core fiber undersea transmission systems are presented. It is also investigated how different architectures of branching unit influence the number of fibers and those of inline components....

  14. Can undersea voltage measurements detect tsunamis?

    Digital Repository Service at National Institute of Oceanography (India)

    Manoj, C.; Kuvshinov, A.; Neetu, S.; Harinarayana, T.

    The movement of electrically conducting ocean water in the ambient geomagnetic field induces secondary electric and magnetic fields in the oceans. Ocean water transport is now routinely inferred from undersea cable voltage data. We try to answer...

  15. Aluminum-Water Energy System for Autonomous Undersea Vehicles

    Science.gov (United States)

    2015-04-10

    between the Department of Mechanical Engineering at MIT and Lincoln Laboratory to address the problems inherent in powering autonomous undersea vehicles...Many fuel sources have been considered to power AUVs. Combustible organic fuels, such as gasoline or jet propellant, are energy dense but have not...refuel Safe Low noise Power on demand Eco-friendly Battery       Wave energy N/A N/A    Solar N/A    Docking N/A

  16. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  17. Information Warfare

    OpenAIRE

    Darczewska, Jolanta; Żochowski, Piotr; Orttung, Robert W.; Laruelle, Marlene; Pörzgen, Gemma

    2017-01-01

    This edition addresses information warfare. Firstly, Jolanta Darczewska and Piotr Żochowski examine the use of “active measures” by Russian special services in support of Russian foreign policy. Secondly, Robert W. Orttung argues that Russia has sought to use various information warfare techniques to sow division and chaos in the U.S., but it remains unclear to what extent Russian actions had an impact on the thinking or behavior of American citizens. Thirdly, Marlene Laruelle considers the t...

  18. Undersea Laser Communication with Narrow Beams

    Science.gov (United States)

    2015-09-29

    Underwater Wireless Optical Communications ...Gbit/s underwater wireless optical communications using directly modulated 520 nm laser diode," Optics Express, vol. 23, no. 16, pp. 20743-20748, 2015. ... wireless communication with narrow optical beams. The undersea systems analysis herein is inspired by lessons learned in the last few

  19. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    The United States faces decisions requiring information about the oceans in vastly expanded scales of time and space and from oceanic sectors not accessible with the suite of tools now used by scientists and engineers...

  20. Air Warfare

    Science.gov (United States)

    2002-03-01

    genus as its predecessor of pre-war days. It would, however, be erroneous to conclude from this that the military value of each new development was...marked by periods of crescendo, air warfare will consist of a succession of actions of great violence , with periods of almost complete calm between...influence of time, if it should require fif- teen seconds for each airplane to take off, and one minute to land, the commander of a group of 100 airplanes

  1. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    Office, Title 10, U.S. Code ; Act of 5 May 1960. 3. 2010 Quadrennial Defense Review Report, February 2010, 8. 4. Hybrid Warfare, Global Accountability...Rise of Hybrid Wars.” Proceedings 132 (November 2005); William J. Nemeth , Future War and Chechnya: A Case for Hybrid War- fare (master’s thesis, U.S...William J. Nemeth which represents the earliest scholarly work on the subject, in which the emergence of devolved hybrid societies gives rise to hybrid

  2. Undersea vehicles and national needs

    National Research Council Canada - National Science Library

    National Research Council Staff; Commission on Engineering and Technical Systems; Division on Engineering and Physical Sciences; National Research Council; National Academy of Sciences

    ... on Engineering and Technical Systems National Research Council NATIONAL ACADEMY PRESS Washington, D.C. 1996 i Copyrighttrue Please breaks inserted. are Page files. accidentally typesetting been have may original from the errors not typographic original retained, and from the created cannot be files XML from however, formatting, recomposed typesetting...

  3. Application of Model-Based Systems Engineering (MBSE) to Compare Legacy and Future Forces in Mine Warfare (MIW) Missions

    Science.gov (United States)

    2014-12-01

    airborne mine neutralization system AoA analysis of alternatives API application programming interface ASuW anti-surface warfare ASW...upon stakeholder feedback, an operational scenario was developed and ACRS was selected as the primary MOE for comparison. Lifecycle cost and risks...MIW Team was unfamiliar with some of the more advanced features of ExtendSim, such as 3-D animation, application programming inter- faces ( APIs ) to

  4. Recommended Architecture for a Knowledge Management System for the Undersea Launchers Division at the Naval Undersea Warfare Center

    Science.gov (United States)

    2010-09-01

    driven knowledge managment initiative. Master’s thesis. Naval Postgraduate School, Monterey, CA. Cong, X., & Pandya, K. V. (2003). Issues of...Department of Defense Instruction 8520.2 . Wennergren, D. M. (2005, October 20). Memorandum, Department of the Navy Knowledge Managment Strategy

  5. Undersea Feature Place Names as of June 2014

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — There are approximately 5100 undersea features with names approved by the United States Board on Geographic Names (BGN) currently in the Geographic Names Data Base...

  6. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  7. Multi-core Fibers in Submarine Networks for High-Capacity Undersea Transmission Systems

    DEFF Research Database (Denmark)

    Nooruzzaman, Md; Morioka, Toshio

    2017-01-01

    Application of multi-core fibers in undersea networks for high-capacity submarine transmission systems is studied. It is demonstrated how different architectures of submerged branching unit affect network component counts in long-haul undersea transmission systems......Application of multi-core fibers in undersea networks for high-capacity submarine transmission systems is studied. It is demonstrated how different architectures of submerged branching unit affect network component counts in long-haul undersea transmission systems...

  8. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks, specifically...

  9. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  10. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  11. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  12. Experimental Studies of Welding Effects on Damping for Undersea Warfare Applications

    National Research Council Canada - National Science Library

    Carey, Agustin

    2002-01-01

    .... The purpose of this research is to study the effects that welding has on damping. Measurements and comparisons of the damping ratios of two welded stiffened plates, two flat plates and one machined stiffened plate are undertaken...

  13. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  14. Living in contained environments: Research implications from undersea habitats. [undersea habitats

    Science.gov (United States)

    Helmreich, Robert L.

    1986-01-01

    A cost-reward model is used to frame a discussion of differences in observed behavior of individuals and groups in confined environments. It has been observed that the high cost of functioning in a stressful environment is likely to produce poor performance when anticipated rewards are low but that participants can manage the stress and achieve high performance if they anticipate high rewards. The high-reward environment is exemplified by early undersea habitats such as Sealab and Tektite and by early space missions. Other aspects of behavior occur in all confined environments and point to an important area for future research. Of particular interest are intergroup conflicts arising between the confined group and its external control. Also, individual differences in personality seem always to have an impact in confined environments. Recent research has focused on: (1) predicting performance and adjustment based on instrumental and expressive aspects of the self; (2) the differential predictive power of achievement striving and irritation/irritability in Type A personalities; and (3) the nature and role of leadership in small, isolated groups.

  15. Trace Explosives Signatures from World War II Unexploded Undersea Ordnance

    Science.gov (United States)

    Darrach, M. R.; Chutjian, A.; Plett, G. A.

    1998-01-01

    Trace explosives signatures of TNT and DNT have been extracted from multiple sediment samples adjacent to unexploded undersea ordnance at Halifax Harbor, Canada. The ordnance was hurled into the harbor during a massive explosion some 50 years earlier, in 1945 after World War II had ended. Laboratory sediment extractions were made using the solid-phase microextraction (SPME) method in seawater and detection using the Reversal Electron Attachment Detection (READ) technique and, in the case of DNT, a commercial gas chromatograph/mass spectrometer (GC/MS). Results show that, after more than 50 years in the environment, ordnance that appeared to be physically intact gave good explosives signatures at the parts per billion level, whereas ordnance that had been cracked open during the explosion gave no signatures at the 10 parts per trillion sensitivity level. These measurements appear to provide the first reported data of explosives signatures from undersea unexploded ordnance.

  16. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  17. The Hawaii Undersea Research Laboratory's 25th Anniversary Expedition to the South Pacific

    Science.gov (United States)

    Smith, J. R.; Wiltshire, J. C.; Malahoff, A.

    2005-12-01

    The Hawaii Undersea Research Laboratory (HURL) was established by NOAA at the University of Hawaii 25 years ago as part of its National Undersea Research Program. HURL's mission is to study deep water marine processes in the Pacific Ocean through a competitive proposal and review process. The dual Pisces IV and Pisces V 2000-meter manned submersibles, an RCV-150 1000-meter ROV, and multibeam equipped support ship R/V Ka'imikai-o-Kanaloa ( KoK) were largely acquired from the petroleum industry then adapted and upgraded to carry out cutting edge scientific expeditions. These studies range from active submarine volcanoes, delicate precious coral gardens, endangered marine mammal and fisheries management, to engineering surveys and deployment of observatory systems. HURL successfully completed a major 5-month expedition to the South Pacific during March-August 2005, working in the waters of New Zealand, Tonga, American Samoa, and the U.S. Line Islands covering a distance of nearly 14,500 nautical miles. This mission was significant in both the scientific merit and scope of operations, consisting of 8 different cruise legs at 21 study sites, with 12 chief and co-chief scientists, 58 total science team participants, and completing 61 out of 56 scheduled Pisces science dives, 17 ROV dives, 5 multibeam survey areas, 6 CTD rosette deployments, and 7 instrument mooring recoveries. The $3.5 million expedition was funded by an international partnership with New Zealand agencies (GNS & NIWA) and the University of Kiel in Germany along with the NOAA Office of Exploration and National Undersea Research Program. While most of the individual cruise legs focused on active submarine volcanoes of the Tonga-Kermadec Islands Arc and the Samoan hot spot chain with their hydrothermal systems and associated biological communities, others concentrated on marine protected areas including those of American Samoa and the remote atolls of the Line Islands of the Central Pacific. These studies

  18. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  19. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    separated periods. 15. SUBJECT TERMS Political Warfare, Psychological Warfare, Unconventional Warfare, Hybrid Warfare, Asymmetrical Warfare, Gray Zone...Russia ............................................................................................................................ 56 Psychological ...the waging of psychological and economic warfare to the furtherance of war aims and the organization of the fighting strength of the nation to the

  20. Biological and Chemical Warfare

    African Journals Online (AJOL)

    and entrails over the walls to induce a plaque and defecate into wells and water supplies. The. Romans tilted ... modern military weapons, discussions of their characteristics and potential threat have to draw heavily upon .... poisoning of water in desert warfare is his- torical, having continued through the time of. World War II.

  1. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  2. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... of a larger hybrid campaign...

  3. Refocusing Cyber Warfare Thought

    Science.gov (United States)

    2013-02-01

    the service placed two vastly different career fields into a single training pipeline? Does radar jamming belong to the same class of warfare as...patch newly discovered flaws, and private antivirus companies that develop signatures to inoculate systems to new mal- ware.21 Meanwhile, highly

  4. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  5. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  6. Obstacle Avoidance for Unmanned Undersea Vehicle in Unknown Unstructured Environment

    Directory of Open Access Journals (Sweden)

    Zheping Yan

    2013-01-01

    Full Text Available To avoid obstacle in the unknown environment for unmanned undersea vehicle (UUV, an obstacle avoiding system based on improved vector field histogram (VFH is designed. Forward looking sonar is used to detect the environment, and the divisional sonar modal is applied to deal with the measure uncertainty. To adapt to the VFH, rolling occupancy grids are used for the map building, and high accuracy details of local environment are obtained. The threshold is adaptively adjusted by the statistic of obstacles to solve the problem that VFH is sensitive to threshold. To improve the environment adaptability, the hybrid-behaviors strategy is proposed, which selects the optimal avoidance command according to the motion status and environment character. The simulation shows that UUV could avoid the obstacles fast and escape from the U shape obstacles.

  7. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  8. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  9. The evolution of human warfare.

    Science.gov (United States)

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  10. Submersible Combatant Concept for Improved Littoral Warfare

    National Research Council Canada - National Science Library

    Leadmon, John

    2004-01-01

    .... power projection in many areas of the world. This problem is especially evident in the littoral environment, where enemy forces may employ a host of access denial methods including submarines, mines, small boats, and undersea sensor systems...

  11. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  12. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  13. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  14. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    way to integrate air power on the one hand with maneuver warfare on the other. While American commanders such as Robert E. Lee and George S. Patton...MANEUVER WARFARE years .’ Nevertheless, it should not be forgotten that few commanders of any time or place have fought as many great battles- batailles ...the process to a boxer who uses one arm to parry his opponent’s punches and draw his attention while striking with the other. Gen George S. Patton

  15. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  16. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  17. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  18. Bio-Optical and Hydrographic Characteristics of the Western Pacific Ocean for Undersea Warfare Using Seaglider Data

    Science.gov (United States)

    2014-12-01

    Oceanography, and T. James Osse, Russell D. Light, Timothy Wen, Thomas W. Lehman, and Peter L. Sabin of the University of Washington Applied Physics...Salkind, J.M. Sinnett, and G.E. Whistler , Jr., 2000: “Naval Research Advisory Committee Report Unmanned Vehicles (UV) In Mine Countermeasures(U

  19. Combating the ASW Threat with Operational Art: Ensuring Efficiency through Unity of Effort with the Theater Undersea Warfare Commander

    Science.gov (United States)

    2012-05-04

    accessed 24 February 2012, JSTOR . 6 modern technology to penetrate the oceans depths with any consistency provides submarines a distinct advantage in...2012. JSTOR . Luck, Gary GEN (ret) and Col (ret) Mike Findley. “Joint Operations Insights and Best Practices 2 nd Edition.” Norfolk, VA: Joint

  20. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  1. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  2. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues, tha...

  3. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    Digest, Vol. 18, January 1963, pp. 36-41. 313. Van de Velde , R. W. "the Neglected Deterrent (Guerrilla Warfare)." Military Review, Vol. 38, August...34Principles of Modern Chinese Strategy." NATO’s Fifteen Nations, Vol. 8, June-July 1963, pp. 44-49. 255. Purcell, Henry . "Night Patrolling and District...September 1970, pp. 2-8. 331. Whittier, Henry S. "Soviet Special Operations/Partisan Warfare: Implications for Today." Military Review, Vol. 59, January 1979

  4. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  5. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  6. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  7. Case Study: A Measurement Program for Product Lines

    National Research Council Canada - National Science Library

    Cohen, Sholom; Zubrow, Dave; Dunn, Ed

    2004-01-01

    The Naval Undersea Warfare Center (NUWC) Division Newport Ranges, Engineering, and Analysis Department applied product line practices in the development of systems for the Navy test ranges it supports...

  8. Information and Knowledge Centric Warfare: The Next Steps in the Evolution of Warfare

    National Research Council Canada - National Science Library

    Phister, Jr., Paul W; Plonisch, Igor G

    2004-01-01

    ...: transitioning from network-centric/information-centric to knowledge-centric warfare. Network-centric warfare is built around human and organizational behavior a new way of thinking in terms of linkages...

  9. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available will be determined by arguing their application to Network Warfare A. Consideration of Network Warfare Attributes Network Warfare can be seen as taking place over Information and Communication Technology (ICT) networks to affect information processing... the works of Theohandou, Tipton and Sowa, the following information security techniques emerge: Risk Analysis, Physical Security, Incident Response, Disaster Recovery Planning, Security Awareness, Legal, Regulations and Compliance [15] [16] [17...

  10. Electronic Warfare and Radar Systems Engineering Handbook

    Science.gov (United States)

    2012-06-01

    aircraft or motor vehicle being fueled or on an adjacent aircraft or vehicle. • Do not make or break any electrical, ground wire, or tie down...typically are of the Stirling cycle design and utilize the expansion of a gas (helium) to cool a cold finger attached to the detector. These generally...10-1.20 NUTATOR - A motor -driven rotating antenna feed used to produce a conical scan for a tracking radar. See also Antenna, Nutating. Also

  11. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  12. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  13. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  14. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  15. Defense Science Board Task Force Report on Next-Generation Unmanned Undersea Systems

    Science.gov (United States)

    2016-10-01

    of Special Projects & Underwater Robotics, The Applied Research Laboratory -Penn State Other attendees: VADM Paul Sullivan (USN retired), Director ARL...systems, and the Advanced ProcessorBuild/ Acoustic Rapid Commercial-off-the-Shelf (COTS) Insertion (APB/ARCI) programs for sonarsignal processing. Each...Communications – The limited range and bandwidth of undersea acoustic links restrict thecommand and control, and manned and unmanned teaming options for

  16. NASA 14 Day Undersea Missions: A Short-Duration Spaceflight Analog for Immune System Dysregulation?

    Science.gov (United States)

    Crucian, B. E.; Stowe, R. P.; Mehta, S. K.; Chouker, A.; Feuerecker, M.; Quiriarte, H.; Pierson, D. L.; Sams, C. F.

    2011-01-01

    This poster paper reviews the use of 14 day undersea missions as a possible analog for short duration spaceflight for the study of immune system dysregulation. Sixteen subjects from the the NASA Extreme Enviro nment Mission Operations (NEEMO) 12, 13 and 14 missions were studied for immune system dysregulation. The assays that are presented in this poster are the Virleukocyte subsets, the T Cell functions, and the intracellular/secreted cytokine profiles. Other assays were performed, but are not included in this presntation.

  17. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  18. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  19. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  20. Analytic tools for information warfare

    Energy Technology Data Exchange (ETDEWEB)

    Vandewart, R.L.; Craft, R.L.

    1996-05-01

    Information warfare and system surety (tradeoffs between system functionality, security, safety, reliability, cost, usability) have many mechanisms in common. Sandia`s experience has shown that an information system must be assessed from a {ital system} perspective in order to adequately identify and mitigate the risks present in the system. While some tools are available to help in this work, the process is largely manual. An integrated, extensible set of assessment tools would help the surety analyst. This paper describes one approach to surety assessment used at Sandia, identifies the difficulties in this process, and proposes a set of features desirable in an automated environment to support this process.

  1. Towards a large scale high energy cosmic neutrino undersea detector

    Energy Technology Data Exchange (ETDEWEB)

    Azoulay, R.; Berthier, R. [CEA Centre d`Etudes de Cadarache, 13 - Saint-Paul-lez-Durance (France). Direction des Sciences de la Matiere; Arpesella, C. [Centre National de la Recherche Scientifique (CNRS), 13 - Marseille (France). Centre de Physique Theorique] [and others

    1997-06-01

    ANTARES collaboration proposes to study high energy cosmic neutrinos by using a deep sea Cherenkov detector. The potential interest of such a study for astrophysicists and particle physicists is developed. The different origins of cosmic neutrinos are reviewed. In order to observe with relevant statistic the flux of neutrinos from extra-galactic sources, a km-scale detector is necessary. The feasibility of such a detector is studied. A variety of technical problems have been solved. Some of them are standard for particle physicists: choice of photo-multipliers, monitoring, trigger, electronics, data acquisition, detector optimization. Others are more specific of sea science engineering particularly: detector deployment in deep sea, data transmission through optical cables, bio-fouling, effect of sea current. The solutions are presented and the sea engineering part involving detector installation will be tested near French coasts. It is scheduled to build a reduced-scale demonstrator within the next 2 years. (A.C.) 50 refs.

  2. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  3. Object-based classification of global undersea topography and geomorphological features from the SRTM30_PLUS data

    Science.gov (United States)

    Dekavalla, Maria; Argialas, Demetre

    2017-07-01

    The analysis of undersea topography and geomorphological features provides necessary information to related disciplines and many applications. The development of an automated knowledge-based classification approach of undersea topography and geomorphological features is challenging due to their multi-scale nature. The aim of the study is to develop and evaluate an automated knowledge-based OBIA approach to: i) decompose the global undersea topography to multi-scale regions of distinct morphometric properties, and ii) assign the derived regions to characteristic geomorphological features. First, the global undersea topography was decomposed through the SRTM30_PLUS bathymetry data to the so-called morphometric objects of discrete morphometric properties and spatial scales defined by data-driven methods (local variance graphs and nested means) and multi-scale analysis. The derived morphometric objects were combined with additional relative topographic position information computed with a self-adaptive pattern recognition method (geomorphons), and auxiliary data and were assigned to characteristic undersea geomorphological feature classes through a knowledge base, developed from standard definitions. The decomposition of the SRTM30_PLUS data to morphometric objects was considered successful for the requirements of maximizing intra-object and inter-object heterogeneity, based on the near zero values of the Moran's I and the low values of the weighted variance index. The knowledge-based classification approach was tested for its transferability in six case studies of various tectonic settings and achieved the efficient extraction of 11 undersea geomorphological feature classes. The classification results for the six case studies were compared with the digital global seafloor geomorphic features map (GSFM). The 11 undersea feature classes and their producer's accuracies in respect to the GSFM relevant areas were Basin (95%), Continental Shelf (94.9%), Trough (88

  4. The Acme of Skill: Nonkinetic Warfare

    National Research Council Canada - National Science Library

    Teo, Cheng H

    2008-01-01

    .... The insurgency attributes that have characterized many wars since World War II suggest that the objective of warfare has shifted from the kinetic destruction of military forces to the nonkinetic...

  5. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De Waal, A

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  6. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  7. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  8. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  9. Annual Expeditionary Warfare Conference (22nd)

    Science.gov (United States)

    2017-10-24

    Session: Expeditionary Logistics Integration & Expeditionary Medicine Session Co-Chair: Mr. Tom Wetherald, Director Business Development and Strategic...Forces Special Operations Component Command. Mr. thomas Dee, Performing the Duties of the Under secretary of the navy On Feb. 17, 2017, Mr. Tom Dee was...1990) • Col Chip Gregson, “Keeping Up With Navy Doctrine.” MC Gazette, (December 1990) • Maj Tom Waldhauser, “Composite Warfare/Amphibious Warfare

  10. Special Warfare: Restructuring for the Future

    Science.gov (United States)

    2016-06-01

    Boston, MA: Albert Einstein Institution, 2002, 1-9. Hoffman , Frank. “Hybrid Warfare and Challenges.” Joint Forces Quarterly, Issue 52, 1st Quarter...20 Robert Helvey. On Strategic Nonviolence Conflict: Thinking About the Fundamentals. Boston, MA: Albert Einstein Institution, 2002, 2-3...important as the future of warfare becomes increasingly “characterized by uncertainty.”28 As Frank Hoffman has commented, success in hybrid wars will

  11. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  12. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  13. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  14. Manning and Maintainability of a Submarine Unmanned Undersea Vehicle (UUV) Program: A Systems Engineering Case Study

    Science.gov (United States)

    2010-09-01

    14 Figure 6. Slocum electric glider high-level mission CONOPS (From: Teledyne Webb Research, 2010...feet 21 inches Unknown 30 hours @ 2 knots HUGIN 3000 17 feet 3.3 feet 10000 feet 50 hours @ 4 knots Slocum Glider 5 feet 8.5 inches 3000 feet > 30...Kleiner, 2004) e. Slocum Glider , Webb Research Corporation Propeller-less glider technology varies from traditional UUV technology. Often referred

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. Undersea archeology

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, S.R.

    stream_size 5 stream_content_type text/plain stream_name Curr_Trends_Coastal_Mar_Sci_1990_106.pdf.txt stream_source_info Curr_Trends_Coastal_Mar_Sci_1990_106.pdf.txt Content-Encoding ISO-8859-1 Content-Type text/plain; charset...

  17. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  18. The undersea location of the Swedish Final Repository for reactor waste, SFR - human intrusion aspects

    International Nuclear Information System (INIS)

    Eng, T.

    1989-01-01

    The Swedish Final Repository for reactor waste, SFR, is built under the Baltic sea close to the Forsmark nuclear power plant. Sixty metres of rock cover the repository caverns under the seabed. The depth of the Baltic sea is about 5-6 m at this location. A human intrusion scenario that in normal inland locations has shown to be of great importance, is a well that is drilled through or in the close vicinity of the repository. Since the land uplift in the SFR area is about 6 mm/year the undersea location of SFR ensures that no well will be drilled at this location for a considerable time while the area is covered by the Baltic sea

  19. System modeling of an air-independent solid oxide fuel cell system for unmanned undersea vehicles

    Science.gov (United States)

    Burke, A. Alan; Carreiro, Louis G.

    To examine the feasibility of a solid oxide fuel cell (SOFC)-powered unmanned undersea vehicle (UUV), a system level analysis is presented that projects a possible integration of the SOFC stack, fuel steam reformer, fuel/oxidant storage and balance of plant components into a 21-in. diameter UUV platform. Heavy hydrocarbon fuel (dodecane) and liquid oxygen (LOX) are chosen as the preferred reactants. A maximum efficiency of 45% based on the lower heating value of dodecane was calculated for a system that provides 2.5 kW for 40 h. Heat sources and sinks have been coupled to show viable means of thermal management. The critical design issues involve proper recycling of exhaust steam from the fuel cell back into the reformer and effective use of the SOFC stack radiant heat for steam reformation of the hydrocarbon fuel.

  20. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  1. Memory and metacognition in dangerous situations: investigating cognitive impairment from gas narcosis in undersea divers.

    Science.gov (United States)

    Hobbs, Malcolm; Higham, Philip A; Kneller, Wendy

    2014-06-01

    The current study tested whether undersea divers are able to accurately judge their level of memory impairment from inert gas narcosis. Inert gas narcosis causes a number of cognitive impairments, including a decrement in memory ability. Undersea divers may be unable to accurately judge their level of impairment, affecting safety and work performance. In two underwater field experiments, performance decrements on tests of memory at 33 to 42 m were compared with self-ratings of impairment and resolution. The effect of depth (shallow [I-II m] vs. deep [33-42 m]) was measured on free-recall (Experiment I; n = 41) and cued-recall (Experiment 2; n = 39) performance, a visual-analogue self-assessment rating of narcotic impairment, and the accuracy of judgements-of-learning JOLs). Both free- and cued-recall were significantly reduced in deep, compared to shallow, conditions. This decrement was accompanied by an increase in self-assessed impairment. In contrast, resolution (based on JOLs) remained unaffected by depth. The dissociation of memory accuracy and resolution, coupled with a shift in a self-assessment of impairment, indicated that divers were able to accurately judge their decrease in memory performance at depth. These findings suggest that impaired self-assessment and resolution may not actually be a symptom of narcosis in the depth range of 33 to 42 m underwater and that the divers in this study were better equipped to manage narcosis than prior literature suggested. The results are discussed in relation to implications for diver safety and work performance.

  2. Physical Readiness Testing of Surface Warfare Officers

    Science.gov (United States)

    1991-06-01

    NA% I PHISICAL READIiESS TEST (PRT QUEST1OthAIRE I. hE ARE CONDUCTI NG THESIS RESEAR H 0N HO- ELL THE PRT SUPPORT5 TNE R 0 T i E 0F St RF AC E ’ARAR...AD-A245 519 NAVAL POSTGRADUATE SCHOOL Monterey, California DTIC CTE.EC a% FEB071992 CI THESIS Physical Readiness Testing of Surface Warfare Officers...READINESS TESTING OF SURFACE WARFARE OFFICERS 12. PERSONAL AUTHOR(S) Hatch, William D. II and Swinney, Lori D. 13a. TYPE OF REPORT 13b. TIME COVERED 14

  3. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  4. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  5. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  6. Mesoporous manganese oxide for warfare agents degradation

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Králová, Daniela; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 156, JULY (2012), s. 224-232 ISSN 1387-1811 R&D Projects: GA MPO FI-IM5/231 Institutional research plan: CEZ:AV0Z40320502; CEZ:AV0Z40500505 Keywords : homogeneous hydrolysis * chloroacetamide * manganese(IV) oxide * warfare agents Subject RIV: CA - Inorganic Chemistry Impact factor: 3.365, year: 2012

  7. NASA 14 Day Undersea Missions: A Short-Duration Spaceflight Analog for Immune System Dysregulation

    Science.gov (United States)

    Crucian, B. E.; Stowe, R. P.; Mehta, S. K.; Quiriarte, H.; Pierson, D. L.; Sams, C. F.

    2010-01-01

    BACKGROUND Spaceflight-associated immune dysregulation (SAID) occurs during spaceflight and may represent specific clinical risks for exploration-class missions. An appropriate ground analog for spaceflight-associated immune dysregulation would offer a platform for ground-evaluation of various potential countermeasures. This study evaluated the NASA Undersea Mission Operations ( NEEMO ), consisting of 14 day undersea deployment at the Aquarius station, as an analog for SAID. Sixteen Aquanauts from missions NEEMO-12, 13 and 14 participated in the study. RESULTS Mid-mission alterations leukocyte distribution occurred, including granulocytosis and elevations in central-memory CD8+ T-cells. General T cell function was reduced during NEEMO missions in roughly 50% of subjects. Secreted cytokines profiles were evaluated following whole blood stimulation with CD3/CD28 (T cells) or LPS (monocytes). T cell production of IFNg, IL-5, IL-10, IL-2, TNFa and IL-6 were all reduced before and during the mission. Conversely, monocyte production of TNFa, IL-10, IL-6, IL-1b and IL-8 were elevated during mission, moreso at the MD-14 timepoint. Antibodies to Epstein-Barr virus (EBV) viral capsid antigen and early antigen were increased in approximately 40% of the subjects. Changes in EBV tetramer-positive CD8+ T-cells exhibited a variable pattern. Antibodies against Cytomegalovirus (CMV) were marginally increased during the mission. Herpesvirus reactivation was determined by PCR. EBV viral load was generally elevated at L-6. Higher levels of salivary EBV were found during the NEEMO mission than before and after as well as than the healthy controls. No VZV or CMV was found in any pre, during and after NEEMO mission or control samples. Plasma cortisol was elevated at L-6. CONCLUSION Unfortunately, L-6 may be too near to mission start to be an appropriate baseline measurement. The general immune changes in leukocyte distribution, T cell function, cytokine production, virus specific

  8. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  9. Containment 2.0: U.S. political warfare

    OpenAIRE

    Alexander, Nicole M.

    2016-01-01

    Approved for public release; distribution is unlimited Contemporary Russia has shown an increasing preference for using Cold War–era political warfare techniques, which are deeply rooted in its doctrine and foreign policies. To date, the U.S. response comprises the conventional military aspects of the Cold War–era deterrence and containment rather than political warfare strategies. Exploring previous U.S. experience in political warfare activities—under the broad categories of strategic in...

  10. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  11. An Undersea Mining Microseism Source Location Algorithm Considering Wave Velocity Probability Distribution

    Directory of Open Access Journals (Sweden)

    Furui Du

    2014-01-01

    Full Text Available The traditional mine microseism locating methods are mainly based on the assumption that the wave velocity is uniform through the space, which leads to some errors for the assumption goes against the laws of nature. In this paper, the wave velocity is regarded as a random variable, and the probability distribution information of the wave velocity is fused into the traditional locating method. This paper puts forwards the microseism source location method for the undersea mining on condition of the probability distribution of the wave velocity and comes up with the solving process of Monte Carlo. In addition, based on the simulated results of the Monte Carlo method, the space is divided into three areas: the most possible area (area I, the possible area (area II, and the small probability area (area III. Attached to corresponding mathematical formulations, spherical models and cylindrical models in different areas are, respectively, built according to whether the source is in the sensor arrays. Both the examples and the actual applications show that (1 the method of microseism source location in this paper can highly improve the accuracy of the microseism monitoring, especially for the source beyond the sensor arrays, and (2 the space-dividing method based on occurrence possibilities of the source can recognize and sweep the hidden dangers for it predicts the probable location range of the source efficiently, while the traditional method cannot.

  12. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  13. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  14. Cyber Warfare: New Character with Strategic Results

    Science.gov (United States)

    2013-03-01

    government property.”12 Applying these standards to cyberspace is contentious in the international community since millions of cyber attacks transpire daily...forces and creating additional hostility. At its very nature cyber warfare can be both coercive and destructive. “At the strategic level, cyber attacks could...in the state is an armed attack.”42 Other interpretations require a higher threshold for invoking Article 51. “[O]nly large scale cyber attacks on

  15. Electronic Warfare in Army Models - A Survey.

    Science.gov (United States)

    1980-08-01

    CCM) PROVING GROUND TENIAS SAMJAM EIEM SPREAD SPECTRUM US ARMY ELECTRONIC FOREIGN SCIENCE & OFFICE OF MISSILE WARFARE LAB (EWL) TECHNOLOGY CENTER...IPAR MULTIRADAR SPREAD SPECTRUM ECMFUZ IRSS OTOALOC TAC ZINGERS EIEM ITF PATCOM TAM EOCM SIM FAC MGM-H4D RFSS TENIAS GTSF MG(-H4H ROLJAM ZAP I HMSM MSL...USAFAS TRASANA USAPAS TCF ASD WPAFU TENIAS ______ ___ ECAC _________ WAR EAGLE _________CATRADA WARRANT am________ 3DBDM ZAP 1 ____________ MEW EWL ZAP 2

  16. Russia’s Approach to Cyber Warfare

    Science.gov (United States)

    2016-09-01

    warfare domain in its own right. Ideally, it is to be employed as part of a whole of government effort, along with other, more traditional, weapons of...4 even days, be transformed into an arena of fierce armed conflict, become a victim of foreign intervention, and sink into a web of chaos...Russian military is a relative latecomer to the cyber arena. For many years, cyber was the exclusive domain of the state’s security services. The

  17. Recent Trends in Thinking about Warfare

    Science.gov (United States)

    2006-09-01

    as a pikeman), the flintlock, the iron ramrod, and mechanical production, coupled with the discovery of cheap sources of nitrates (which radically...to technologies that provide cheap WMD-like capabilities, and the vulnerabilities offered by physical, cultural, social, economic, and political...context in Peter P. Perla, Albert A. Nofi, and Michael C. Markowitz, Wargaming Fourth-Generation Warfare, Sep 2006 ( CRM D0014752.A2/Final). 83 Aryan

  18. Training Practices for Surface Warfare Junior Officers

    Science.gov (United States)

    2011-12-01

    What some saw as spoon feeding , others saw as a lack of standards and goals. The issue is also worth considering in light of the changing values of the...NPS-GSBPP-12-004 NAVAL POSTGRADATE SCHOOL MONTEREY, CALIFORNIA Approved for public release; distribution is...unlimited Prepared for Naval Postgraduate School , Monterey, California 93943 TRAINING PRACTICES FOR SURFACE WARFARE JUNIOR OFFICERS by William R

  19. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    www.vox.com/a/barack-obama-interview-vox- conversation/obama-foreign-policy-transcript. Zedong , Mao . On Protracted War. Honolulu: University...warfare in Ukraine represents a threat to state sovereignty in Eastern Europe, where, like Ukraine, many states have large Russian minority populations ...adjust as well. Conventional and unconventional military actions, such as targeting military supply routes and protecting the population , must occur at

  20. Soviet Partisan Warfare: Integral to the Whole,

    Science.gov (United States)

    1988-04-20

    partisan forces. They also saw partisan warfare as more than a military tool. Its influence was potent for propaganda use and for assuring continued...corefully selected for political reliability and partisan bands themselves were subjected to intense pro-Soviet propaganda . The risks involved in...John Erickson. The Soviet High Command. A_____________________ Military- Politica ~l History. 1918-1941. Boulder, Colorado: * Westview Press, 1962, p. 6.i

  1. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    objective,” p.603 in Peter Paret and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976...and Michael Howard , eds., trans., Carl von Clausewitz, On War. Princeton NJ: Princeton University Press, 1976. Royal Canadian Navy, Horizon 2050: A...The Winograd Commission) (Government of Israel), Final Report, January 2008. Thornton, Rod, Asymmetric Warfare, Malden MA: 2007. Tse- Tung , Mao, On

  2. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    groups to endure great hardship and work toward a common goal of driving out the infidel to defend their faith. Insights for special warfare Nuclear... financing , and the International Military Education and Training program (IMET). These programs are typically authorized and funded by DoS and executed...Organizations at U.S. embassies. In par- allel, the Security Assistance Organizations also submit requests through the foreign military financing /IMET

  3. Torpedoes and Their Impact on Naval Warfare

    Science.gov (United States)

    2017-01-01

    torpedo shell, and, as it pumped the water out through a hole in the rear, thrust was produced. This was surely the first jet -propelled torpedo...reduced from 46 to 2 kilograms per torpedo. The amounts of copper and tin used were substantially reduced. The cost and labor hours were cut in...unrestricted warfare against merchant shipping to cut sea lines of communications forcefully demonstrated the strategic significance of the torpedo as

  4. The Surface Warfare Test Ship

    Science.gov (United States)

    2000-01-26

    reactivated, resulting in algae in the tanks and tank seepage. This has led to degraded fuel quality and fuel leakage into ship’s storerooms. The inherent...The cosmetic bulkhead is smooth like line 1; only 1 % of the reflected power is reflected along the sea surface. 4. Angled Bulkhead around Fantail... algae present and require continuous treatment to prevent fouling of the main engines and generators. The ship s tank system was not properly

  5. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  6. The critical role of personality and organizational factors as determinants of reactions to restricted and stressful environments. [undersea habitats

    Science.gov (United States)

    Helmreich, Robert L.

    1987-01-01

    Research into the impact of personality factors on groups in various settings is reviewed as an introduction to a brief discussion of personality and group behavior research needs relevant to the space program. Significant findings of some earlier research are summarized, and methodological problems are touched on. The study of intergroup and intragroup conflict in a stressful environment, as exemplified particularly by undersea habitats, is seen as being of consequence for long-term space missions. It is concluded that adequate research can only be conducted as an adjunct to data collection from operational stressful environments, and not from laboratory experiments.

  7. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  8. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  9. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  10. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  11. Design and Modeling of High Power Density Acoustic Transducer Materials for Autonomous Undersea Vehicles

    Science.gov (United States)

    Heitmann, Adam Arthur

    Advances in piezocrystal transducer materials technology has opened new avenues to impact the size, weight, and power consumption of sonar systems for deployment in autonomous undersea vehicles (AUVs). Although piezocrystals exhibit exceptional electromechanical properties, they have low ferroelectric Curie temperatures, small electrical coercivities, and exhibit temperature, electrical field, and/or stress induced phase transitions between ferroelectric phases with differing electromechanical properties. New piezocrystal materials are required that can provide the compositional tailoring capability needed to increase the Curie temperature and coercive field, ameliorate the deleterious effects of ferroelectric-ferroelectric phase transitions, and enable property optimization for specific transducer applications. Currently, new piezocrystal systems and compositions are selected almost exclusively by empirical 'make and measure' approaches guided by past experiences. These empirical processes can be time and labor intensive and as a result there exists only limited predictive capability for finding new piezocrystal compositions even in known piezocrystal systems. In this study we seek to develop a comprehensive phenomenological theory and a unified parameterization scheme applicable to binary and ternary ferroelectric solid solution systems in order to enable the accelerated development and characterization of new piezocrystal systems for optimized transducer performance. A modified form of the classical Ginzburg-Landau-Devonshire theory of weak first-order transitions is applied to perovskite-structured ferroelectric systems based on the ternary oxide compounds, barium titanate and lead titanate, which places special emphasis on the role played by the crystallographic anisotropy of polarization. It is shown that the theory produces excellent qualitative agreement with the experimentally measured phase diagram topologies, crystal lattice parameters, and

  12. Electronic Warfare and Radar Systems Engineering Handbook. 4th Edition

    Science.gov (United States)

    2013-10-01

    include: Do not energize a transmitter (radar/comm) on an aircraft or motor vehicle being fueled or on an adjacent aircraft or vehicle. Do not...down to below 200ºK. Closed-cycle coolers typically are of the Stirling cycle design and utilize the expansion of a gas (helium) to cool a cold finger...scan. NUTATOR - A motor -driven rotating antenna feed used to produce a conical scan for a tracking radar. See also Antenna, Nutating. Also, the

  13. Scenario-Based Systems Engineering Application to Mine Warfare

    Science.gov (United States)

    2015-12-01

    hunter- killer capabilities to find, classify, and destroy moored and bottom mines with sonar and video systems, cable cutting devices, and mine...even after this reduction in scope. With these limitations in mind a modification to the forward path was developed and proposed to project leadership...Method: Serial 3 LCS MH-60s LCS: RMS with AN/AQS-20, MH-60s: Archerfish Hunt Method: Serial 1M MK18 MH-60s LCS: MK18 Mod 2, MH-60s

  14. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  15. Mine Warfare - The Joint Force Commander's Achilles Heel

    National Research Council Canada - National Science Library

    Cochran, Bryan

    2004-01-01

    ... Countermeasures systems resident within Strike Groups to counter enemy mine laying activities. Additionally, the Navy needs to transform its culture and mainstream the full spectrum of MIW to include naval mining and countermine warfare capabilities...

  16. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  17. Organizing for Irregular Warfare: Implications for the Brigade Combat Team

    National Research Council Canada - National Science Library

    Burgess, Kenneth J

    2007-01-01

    ... operations in 21st-century irregular environments. The author argues that Infantry Brigade Combat Teams would be better optimized for the challenges of irregular warfare through structural changes that decentralize resources...

  18. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  19. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  20. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  1. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  2. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  3. State of the Art Report on Drone-Based Warfare

    OpenAIRE

    Lee-Morrison, Lila

    2014-01-01

    State of the art report on the latest cultural discourse and debate over contemporary forms of drone based warfare. primarily resulting from the disciplines of Law, Political Science, and Geography. 2014.

  4. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    ... to defeat its enemies in the Long War on Terrorism. The method used to resolve this issue was to frame the scope of the current operating environment in the context of Fourth Generation Warfare...

  5. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  6. A Proposed Framework for Network-Centric Maritime Warfare Analysis

    National Research Council Canada - National Science Library

    Klingbeil, Ralph

    2003-01-01

    .... In addition, this report demonstrates how the functions of many of the independent and dependent variables and associated warfare metrics can be translated into the characteristics and metrics of queues.

  7. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available , whereas in the latter, an assessment is given of the current state of Network Warfare skills. This assessment can involve expert opinion, controls and guidelines. According to Bragg et al, an assessment is not an audit, which is used to test compliance... approach to ensure conformance to established guidelines. The difference between network security auditing and determining a Network Warfare Capability is that network security auditing evaluates compliance with controls in a very detailed manner...

  8. The theory of unconventional warfare win, lose, and draw

    OpenAIRE

    DeFeyter, Bruce E.

    2008-01-01

    Clausewitz states that "The defensive form of warfare is intrinsically stronger than the offense" and to defeat 'the stronger form of warfare' "an army's best weapon is superior numbers." Given these two facts, how do special operations forces defeat numerically superior forces fighting in the defense? William H. McRaven's book, Spec Ops, lays out a theory of special operations and six principles that are "applicable across the spectrum of special operations" (McRaven, 1995, p. 3). McRav...

  9. Cyberspace Warfare: A New DoD Core Mission Area

    Science.gov (United States)

    2013-05-01

    7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Joint Forces Staff College REPORT NUMBER Joint Advanced Warfighting...According to Andrew F. Krepinevich cyberspace warfare is defined as: The actions by nation-states and non-state actors to penetrate computers or... actors conducting cyberspace operations in, through, and from cyberspace as a 1 Andrew F. Krepinevich, “Cyber Warfare: A Nuclear Option,” Center for

  10. Dirty Fighting: How to Counter Total Warfare Mentality

    Science.gov (United States)

    2015-06-12

    sustained British security discipline, support for the main PIRA dirty fighting weapon (unannounced bombings) began to turn against them. This was... DIRTY FIGHTING: HOW TO COUNTER TOTAL WARFARE MENTALITY A thesis presented to the Faculty of the U.S. Army Command and... Dirty Fighting: How to Counter Total Warfare Mentality 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Major

  11. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  12. The Fate of Chemical Warfare Agents in the Environment

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Munro, Nancy B [ORNL; Watson, Annetta Paule [ORNL; King, J. [U.S. Army Environmental Center; Hauschild, Veronique [U.S. Environmental Protection Agency (EPA)

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricin and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.

  13. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    National Research Council Canada - National Science Library

    Hill, Martin; Galameau, Mike; Pang, Gerry; Konoske, Paula

    2003-01-01

    ... to treat victims of biochemical agents on the battlefield. This study reviewed Marine Corps medical supply blocks for biological and chemical warfare casualties - Authorized Medical Allowance Lists (AMALs) 687 and 688...

  14. SEACAT CTD data of the Hawaii Undersea Research Program from 593 dives of the remotely operated vehicle and the submersibles Pisces IV and V during 1995-2012 in the North and South Pacific (NODC Accession 0116373)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Hawaii Undersea Research Laboratory (HURL) was established by the National Oceanic and Atmospheric Administration (NOAA) and the University of Hawaii. Its...

  15. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available by many, there is a need for a more structured approach to understanding the various techniques required for a network warfare capability. A conceptual framework describing the most important network warfare techniques and considerations is proposed...

  16. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  17. The 2006 Lebanon Campaign and the Future of Warfare: Implications for Army and Defense Policy

    Science.gov (United States)

    2008-09-01

    ground, see, e.g., Mao Tse-Tung, On Guerrilla Warfare, Samuel B. Griffith, trans., Mineola, NY: Dover, 2005, pp. 52, 97, 102; Ernesto Guevara...Guerrilla Warfare, Old Chelsea, NY: Ocean Press, 2006, pp. 20, 22, 26; Ian F.W. Beckett , Modern Insurgencies and Counter-Insurgencies, New York...Clodfelter, Warfare and Armed Conflicts, pp. 689-690, 696, 712, 757-759). 15. See, e.g., Mao, On Guerrilla Warfare, pp. 55-57, 113; Beckett , Modern

  18. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  19. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  20. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  1. Land and Undersea Field Testing of Very Low Frequency RF Antennas and Loop Transceivers

    Science.gov (United States)

    2017-12-01

    and extrapolated range. Similar capabilities of the SSC Pacific-built loop transceiver system were also determined. The report presents the mechanical ... shot of the Engineering tab. Test Commands sends command codes to the unit under control. Test Data sends text to other WFS units. The Text History...tab. Figure 3. Screen shot of the Engineering tab. Test Commands sends command codes to the unit under control. Test Data sends text to other WFS

  2. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  3. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  4. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  5. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  6. Media Technologies and Their Role in the Information Warfare

    Directory of Open Access Journals (Sweden)

    Владимир Александрович Федоров

    2016-12-01

    Full Text Available The article analyzes the new role of the mass media in the modern information space, the basic techniques and technologies of focused preparation, semantic distortion and emotional coloring of the transmitted information. The value of the mass media is estimated as the main weapon of the information warfare in the modern geopolitical space. Specific examples and techniques for manipulating information.

  7. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  8. Influence Operations in Insurgencies: Identifying Framing Strategies for Special Warfare

    Science.gov (United States)

    2014-12-01

    Military Information Support Operations MAR Minorities at Risk MAROB Minorities at Risk Organizational Behavior POQC Psychological Operations...and others use religious violence as a form of cleansing to eradicate “ infidels .”16 While individuals who are motivated by visions of the...indigenous personnel for Special Warfare through psychological and cognitive means. The Military Information Support Operations Command (MISOC) mission

  9. Anti-submarine warfare with continuously active sonar

    NARCIS (Netherlands)

    Vossen, R. van; Beerens, S.P.; Spek, E. van der

    2011-01-01

    Existing surveillance sonar systems for anti-submarine warfare (ASW) use a pulsed sonar deployed at a low duty cycle. Continuously active sonar (CAS) is of special interest since the technique could provide better detection performance than conventional pulsed sonar, and it will provide the operator

  10. The Ottawa Treaty and Coalition Warfare: An Unholy Alliance?

    National Research Council Canada - National Science Library

    Weddle, Kevin

    1999-01-01

    ...) on our ability to execute successful coalition warfare. This paper describes the serious implications for NATO and Coalition operations in view of the bulk of our Allies signing the Ottawa Treaty banning the use of all anti-personnel landmines (APLs...

  11. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  12. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  13. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface-chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  14. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    not be applicable to every possible scenario; however, the intention is to illustrate their relevance in many .... digital communications system, where the vehicles are analogous to bits or packets, intersections for routers or ..... wireless channel, and negatively impact on the systems that rely on that channel. Electronic warfare.

  15. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  16. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  17. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  18. Analysis of Biota to Evaluate the Risks Associated with Chemical Warfare Materiel Present in Sea-Disposed Military Munitions to Human Health and the Environment

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Thousands of 100-lb M47A series bombs containing sulfur mustard were disposed in the ocean following World War II yet few studies have been conducted at sites in excess of 250 m, the depth where most discarded military munitions (DMM) were disposed. The Hawai`i Undersea Military Munitions Assessment (HUMMA) project was conducted to evaluate the risk from chemical warfare materiel (CWM) in DMM to human health, measuring ecological differences between the disposal area and nearby but otherwise similar areas, and evaluating the most efficient platforms for surveying DMM sea-disposal sites located at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect data. Shrimp were collected and analyzed to assess the potential for bioaccumulation of CWM, energetics and metals from munitions. No CWM was detected in H. ensifer tissue samples, indicating bioaccumulation is not occurring. Low levels of 2,4,6-trinitrotoluene, 4-amino-2,6-­dinitrotoluene, 1,3,5-trinitrobenzene, nitrobenzene, arsenic, copper, and lead were detected and the concentrations were not significantly different at DMM and control sites. No visible deformities, eroded fins, lesions, or tumors were observed on the shrimp living in the vicinity of M47A bombs. Given these results and under current and potential future uses of the HUMMA study area, health risks to likely receptors are within EPA acceptable levels. Photographic data and benthic infauna analysis were used to study benthic organisms that lived on or near munitions. There was no statistically distinguishable difference between organism distributions in dense and sparse munitions fields. Conventional munitions were found to have the greatest number of benthic infauna individuals, with control sites generally having the least number of individuals. This is consistent with the benthic macro-fauna analysis, which shows that munitions provide habitat.

  19. The Battle for Hue: Casualty and Disease Rates during Urban Warfare

    Science.gov (United States)

    1993-08-01

    NAVAL HEALTH RESEARCH CENTER AD-A271 748 THE BATTLE FOR HUE: CASUALTY AND DISEASE RATES DURING URBAN WARFARE C. G. Blood M. E. Anderson DTIC...prior to the first casualties being sustained. 2 The Battle for Flue: Casualty and Disease Rates During Urban Warfare Renewed nationalism with the ending...TITLE AND SUBTITLE 5. FUNDING NUMBERS The Battle for Hue: Casualty and Disease Rates Program Element: 63706N During Urban Warfare Work Unit Number: 6

  20. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  1. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  2. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  3. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    and was intended to ensure the heritage , culture , and languages of ethnic minorities in the Soviet Union were maintained. The secondary objective was...http://ndupress.ndu.edu/Media/News/News-Article-View/Article/643108/unconventional- warfare-in-the-gray-zone/. 4 radio messaging, and cultural ...staging a communist coup in Czechoslovakia in early 1948.28 Furthermore, each of these events started with the sponsorship of pro-communist movements

  4. Handbook on Ground Forces Attrition in Modern Warfare

    Science.gov (United States)

    1986-09-01

    Dupuy d ELECTE John R. Brinkerhoff 0 APR 2 81994 C. Curtiss Johnson Peter J. Clark A Division of: DATA MEMORY SYSTEMS, INC. 10332 Democracy Lane Thi...Evaluation and Fe.earch Organization A Division of Data Memory Systems.. Inc. 10392 Democracy Lcne * Fairfax, Virginia 22030 Tel,: (703) 591-36ඒ The...data base touching a variety of aspects of warfare and analyzed it using techniques of the social and behavioral sciences. The work considers

  5. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    non-lethal in equal measure. In many ways, Germany’s Bundeswehr (military) construct and participation in various conflicts mirror contemporary just...war theory and postmodern warfare, while its military concept lacks the necessary postmodern balance. The Bundeswehr stands in stark contrast to...the United States. The Bundeswehr is only employed for the purposes of defending German citizens where the United States military can be employed to

  6. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    19b. TELEPHONE NUMBER (Include area code ) USAWC STRATEGY RESEARCH PROJECT Employing U.S. Information Operations Against...hostile computer code through internet infrastructure in multiple countries en route to the target) have enormous legal ramifications. Even within the...59 145 William J. Nemeth , Future War And Chechnya: A Case For Hybrid Warfare, (Monterey CA: Naval Postgraduate School, June 2002), 74. 146 U.S

  7. Information Warfare and Information Operations: Protecting The Global Information Environment.

    Science.gov (United States)

    1998-03-06

    findings in a November 1996 report described by the Wall Street Journal as "unusually strident.൮ It made 13 recommendations, including one for...Funds Moved Around World", The Wall Street Journal , September 12, 1995, p 1. 21 Data Provided By Member of the President’s Commission on Critical...U.S. Department of Defense, April 1997, 230. 38 Thomas E. Ricks, "Information Warfare Defense is Urged", Wall Street Journal , 6 January 1997, Section

  8. Wrestling the Bear: The Rise of Russian Hybrid Warfare

    Science.gov (United States)

    2015-04-13

    search.proguest.com.nduezproxy.idm.oclc.orgldocview/1 545535275?accountid.:: J2686. (accessed on 4 December 2014). 14 Reuters, " Malaysia : Dutch...with subversive efforts. The aggressor often resorts to clandestine actions, to avoid attribution or retribution. Without a credible smoking gun, NATO...2015. Accessed December 27, 2014. http://www .nato.int/docu/review/20 14/ Also-in-20 14/Deterring-hybrid- warfare/EN/index .htm. Reuters,. ’ Malaysia

  9. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    that spin highly toxic, corrosive , and radioactive uranium gas (Uranium Hexafluoride) at over 100,000...Policy for Information Warfare,” Intellibriefs, http://intellibriefs.blogspot.com/2009_03_22_archive.html (accessed February 11, 2012). 81 Marina ...commentary_battlefield_on_your_desktop/2345202.html (accessed December 13, 2011). Myakisheva, Marina . “What is Russia’s Answer to Cyber Threats?” CNews.ru

  10. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    applying C. West Churchman’s characterization of Western epistemology , which was born in the tradition of the philosophy of science, in the business... epistemology they most closely resemble. 2.1 Lockian Model The Lockian model bases reasoning on experiment and consensus. Empirical information is gathered...defined as the “integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military

  11. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  12. The NEEMO Project: A Report on how NASA Utilizes the "Aquarius" Undersea Habitat as an Analog for Long-Duration Space Flight

    Science.gov (United States)

    Reagan, Marc; Todd, William

    2003-01-01

    NEEMO is the NASA Extreme Environment Mission Operations, a cooperative project between NASA and the National Oceanic and Atmospheric Administration (NOAA). NEEMO was created and is managed by the Mission Operations Directorate at the Johnson Space Center in Houston, Texas. On the NOAA side, the National Undersea Research Center (NURC) in Key Largo, FL, with the help of the University of North Carolina at Wilmington, manages and operates the Aquarius Program. NEEMO was developed by astronaut training specialists to utilize an undersea research habitat as a multi-objective mission analog for long-duration space flight. Each mission was designed to expose astronauts to extreme environments for training purposes and to research crew behavior, habitability, and space analog life sciences. All of this was done much in the model of a space mission utilizing specific crew procedures, mission rules and timelines. Objectives of the missions were very diverse and contained many of the typical space mission type activities such as EV As (also known as extra vehicular activities), in-habitat science and research, and educational, public outreach, and media events. Five missions, dubbed NEEMO 1-5, were conducted between October 2001 and July 2003, the longest of which (NEEMO 5) lasted 14 days.

  13. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  14. 78 FR 29699 - Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center...

    Science.gov (United States)

    2013-05-21

    ... Forest Service Transfer of Administrative Jurisdiction: Marine Corps Mountain Warfare Training Center... order authorizing the transfer of administrative jurisdiction from the Department of Agriculture to the..., lying within the Marine Corps Mountain Warfare Training Center and the Humboldt-Toiyabe National Forest...

  15. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  16. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion...Fighting The US military gains a disproportionate advantage over potential adversaries by exploiting space capabilities. Satellites provide an

  17. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  18. Application of non-quantitative modelling in the analysis of a network warfare environment

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy...

  19. 2007 Disruptive Technologies Conference - Disruptive Technologies: Turning Lists into Capabilities

    Science.gov (United States)

    2007-09-05

    Privilege management • Health care, benefits, finance , time and attendance, etc. • Military operations – “Combat Identification” • Friend, Foe, Neutral...Logistics Influence Force Support Corporate Mgt & Support N o im pl ie d pr io ri ti za ti on Movement & Maneuver Surface Warfare Joint Fires Undersea...Starter Generator MEMS Actuators / Valves Atomizer Nozzles Reclaimed Electrical Heat Engine UC Berkely Wankel Engine Exhaust Thermo Electric/Others

  20. Zone Defense -- Anti-Submarine Warfare Strategy in the age of Littoral Warfare

    Science.gov (United States)

    2008-12-01

    Stirling engines, and extended life batteries are all contributing to the changing of diesel submarine operating patterns. Specifically, diesel... Stirling engine that uses liquid oxygen to enable the diesel to run, such as in the Swedish GOTLAND class SSK.10 AIP systems enhance the capability...kept hearing on the sonar had been from the outboard motor , which was buzzing around Sheffield helping to fight the blaze. Yarmouth’s commander

  1. Women and Warfare in Pre-Colonial Akokoland

    Directory of Open Access Journals (Sweden)

    Olusanya Faboyede

    2013-06-01

    Full Text Available In pre-colonial Akokoland, the most conspicuous fact about its political economy and peace was security challenges and mismanagement through internal and external manipulation. This paper analyses the role of women in warfare in pre-colonial Akokoland as a potential to integrate Akokoland, a multi-cultural community for productive and sustained effort to promote economic development in the region. Thus, the paper is conceptualised on historical objectivity. The paper argues that one of the ways of dealing with the scale of insecurity in the society is to assimilate historical thinking into the intention of the security agents (women warriors.

  2. Russian Military Thinking – A New Generation of Warfare

    Directory of Open Access Journals (Sweden)

    Mattsson Peter A.

    2015-06-01

    Full Text Available This article deals with how Russian warfighting is described and discussed in contemporary Russian military theory. The approach has been studies, analyses and interpretations of primarily Russian sources as prominent Russian journals, but also Western analyses and interpretations of contemporary Russian warfighting discussions. Theoretical considerations are limited to the period from the 1980s to the present day - 2014. Mainly Russian experts on military theory (Bogdanov, Chekinov, Gareev, Kiselyov, Kuralenko, Morozov, Slipchenko, Vinogradov, Vladimirov, Vorobyov have been studied, but also sources from some prominent Western experts on Russian warfare (FitzGerald, Gileotti, Kipp, McDermott.

  3. Lawfare in Hybrid Wars: The 21st Century Warfare

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2016-01-01

    In the context of ‘Hybrid Warfare’ as 21st Century’s threat to peace and security, this paper intends to address the role of Lawfare. The use of law as a weapon, Lawfare,1can have a tangible impact on democratic States when their adversaries use it in an exploitative way. Lawfare can be used in the context of Hybrid War.2 Examples of Hybrid Warfare as witnessed in the Russian/Ukrainian conflict of 2014/2015 and the ongoing conflict with Daesh are particularly sensitive to Lawfare due to an ap...

  4. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  5. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    PAGE 19b. PHONE NUMBER (include area code ) (U) (U) (U) (U) 100 (913)758-3300 Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std. Z39.18 i...William J. Nemeth , Future War and Chechnya: A Case for Hybrid Warfare (master’s thesis, US Naval Postgraduate School, 2002); Erin M. Simpson...2005). Unpublished papers pre-dating Hoffman’s effort include a 2002 Master’s thesis by William J. Nemeth which represents the earliest scholarly work

  6. Venezuela’s Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare

    Science.gov (United States)

    2005-10-01

    lead to a better life for all. Finally, taken all together, this is “war as a whole,” or what Chávez calls “ Guerra de todo el pueblo...VENEZUELA’S HUGO CHÁVEZ, BOLIVARIAN SOCIALISM, AND ASYMMETRIC WARFARE Beginning with the election of Lieutenant Colonel Hugo Chávez Frias as President...financial, material, and political-military support of people’s movements.31 This takes us to the notion of “ Guerra de todo el pueblo” (war of all

  7. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  8. Destruction of chemical warfare agents using metal-organic frameworks

    Science.gov (United States)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  9. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  10. Challenges of Military Health Service Support in Mountain Warfare.

    Science.gov (United States)

    Lechner, Raimund; Küpper, Thomas; Tannheimer, Markus

    2018-03-16

    History is full of examples of the influence of the mountain environment on warfare. The aim of this article is to identify the main environmental hazards and summarize countermeasures to mitigate the impact of this unique environment. A selective PubMed and Internet search was conducted. Additionally, we searched bibliographies for useful supplemental literature and included the recommendations of the leading mountain medicine and wilderness medicine societies. A definition of mountain warfare mainly derived from environmental influences on body functions is introduced to help identify the main environmental hazards. Cold, rugged terrain, hypoxic exposure, and often a combination and mutual aggravation of these factors are the most important environmental factors of mountain environment. Underestimating this environmental influence has decreased combat strength and caused thousands of casualties during past conflicts. Some marked differences between military and civilian mountaineering further complicate mission planning and operational sustainability. To overcome the restrictions of mountain environments, proper planning and preparation, including sustained mountain mobility training, in-depth mountain medicine training with a special emphasize on prolonged field care, knowledge of acclimatization strategies, adapted time calculations, mountain-specific equipment, air rescue strategies and makeshift evacuation strategies, and thorough personnel selection, are vital to guarantee the best possible medical support. The specifics of managing risks in mountain environments are also critical for civilian rescue missions and humanitarian aid. Copyright © 2018 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  11. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  12. Department of Defense Systems Engineering FY 2012 Annual Report

    Science.gov (United States)

    2013-03-01

    enable trend analysis and benchmarking across warfare domains. DoD Systems Engineering FY 2012 Annual Report 15 DASD(SE) ACTIVITIES Through...reliability has trended below the radar reliability growth curve and was not on track to meet the reliability performance measures entering IOT&E...Oracle eBusiness Suite. The Life Cycle Sustainment Plan was last updated March 2012. FY 2012 Systems Engineering Assessments • DASD(SE

  13. Engineering from the Sea: Establishing How Australian Army Engineers Fit into Australia’s Amphibious Concept

    Science.gov (United States)

    2011-03-16

    LF CONEMP) 10 provide more definition than to state that engineers will be part of the Battle Group (BG), around which the Amphibious Task Force...this has resulted in what is termed ’Complex War’ or asymmetrical warfare. While globalisation has seen growing interdependence between states, the...likely affect Australia’s security interests, both directly and indirectly. Compounding these threats will be factors such as globalisation

  14. Integrated Swarming Operations for Air Base Defense: Applications in Irregular Warfare

    National Research Council Canada - National Science Library

    Gray, Ron

    2006-01-01

    .... However, in low-intensity conflicts (LICs) or irregular warfare (IW) campaigns, U.S. forces are faced with an irregular enemy, one that does not choose to fight its forces directly, but rather through unconventional or indirect methods...

  15. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  16. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  17. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  18. Interoperability and Network-Centric Warfare: US Army Future Force and German Army in 2015

    National Research Council Canada - National Science Library

    Alme, Thorsten

    2005-01-01

    .... Special consideration is given to technical and behavioral interoperability. The monograph also assesses the projected capabilities of the German Bundeswehr in the year 2015 with regard to Network-Centric Warfare (NCW...

  19. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  20. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  1. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  2. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  3. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  4. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  5. Damn! The Torpedoes: Coping with Mine Warfare in the Joint Maritime Environment

    National Research Council Canada - National Science Library

    Bahr, James D

    2007-01-01

    ... and the attainment of joint operational maneuver. The potential exists for non-state actors to acquire sea mines and subsequently employ mine warfare as a means of crippling the Navy throughout its range of military operations...

  6. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  7. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  8. Evaluation Report on Management Controls at the Disbursing Office, Naval Surface Warfare Center, Dahlgren, Virginia

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    On September 19, 1996, the Defense Criminal Investigative Service requested assistance from the Assistant Inspector General for Auditing, DoD, in an investigation at the Naval Surface Warfare Center, Dahlgren, Virginia...

  9. Guerrilla Warfare: Cause and Conflict (A 21st Century Success Story?),

    Science.gov (United States)

    1981-01-01

    and low intensity warfare is the means, both qualitative and quantitative, employed to achieve the intended goal. Both types of war require analysis ...administration.’ 9 If despair and aggravation become the mortar and pestle of future guerrilla warfare, then weapons availability and population growth might be... Thailand , and the Philippines. 55 Every time you ask, "Where are they going to get the money to pay," everybody falls silent. Brazil alone owes $55

  10. Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility

    Science.gov (United States)

    2015-10-01

    September–October 2015 | 85 Views Twenty-First-Century Air Warfare and the Invisible War Strategic Agility Maj Michael W. Benitez, USAF America’s... gap between the dynamic 21st-century environment and our 20th-century bureaucracy. Their initiative and perse- verance allow us to succeed in our...SUBTITLE Twenty-First-Century Air Warfare and the Invisible War: Strategic Agility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  11. Detachment 101 and North Burma: Historical Conditions for Future Unconventional Warfare Operations

    Science.gov (United States)

    2016-05-26

    of 1941 (1990; repr., Washington, DC: Government Printing Office, 2011), 42. 24 Maurice Matloff and Edwin M. Snell, Strategic Planning for Coalition...Warfare: 1941­ 1942 (1953 repr., Washington, DC: Government Printing Office, 1999), 120. 25 Maurice Matloff, Strategic Planning for Coalition Warfare...opportunity for DET 101 to improve its relationships with the Kachin people. 99War Report: OSS, Volume 2, 383. 100 Richard Dunlop, Behind Japanese Lines with

  12. Irregular Warfare as a National Military Strategy Approach for Small States

    Science.gov (United States)

    2013-12-01

    of these “pods”: the question of homogeneity or heterogeneity. There 216 Oliker, Russia´s Chechen Wars...Ronfeldt regarding the degree of homogeneity of the teams should also be evaluated. In some cases, there might be a higher degree of specialization in...prerequisites. A. IRREGULAR WARFARE – A DIRTY WAR? Based on the last decades of conflicts, the tactics used in irregular warfare have left a bad taste in the

  13. Key Planning Factors for Recovery from a Chemical Warfare Agent Incident

    Science.gov (United States)

    2012-07-01

    GB], Franke, S., Manual of Military Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967... Chemistry , Volume 1. Chemistry of Chemical Warfare Agents, Deutscher Militîrverlag: Berlin (East), 1967. Translated from German by U.S. Department of...Response and Recovery Phases A common misconception is that recovery begins after the response phase. Recovery, however, actually begins during

  14. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    Energy Technology Data Exchange (ETDEWEB)

    Dolislager, Frederick [University of Tennessee, Knoxville (UTK); Bansleben, Dr. Donald [U.S. Department of Homeland Security; Watson, Annetta Paule [ORNL

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  15. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    Science.gov (United States)

    2016-09-01

    Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b...called cllMotorBasic. This module can be used separately if one is developing other software that needs to control the motors . The front panel of this

  16. Welcome to the Naval Postgraduate School Center on Terrorism and Irregular Warfare, Webpage

    OpenAIRE

    Center on Terrorism and Irregular Warfare

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. Established in 1998, The Center on Terrorism and Irregular Warfare produces timely, innovative, interdisciplinary analysis relevant to policy and operations. In studying terrorism and irregular warfare, the Center focuses the research capabilities of its staff and the Naval Postgraduate School on an area of critical importance to the national security of the United States.

  17. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  18. The impact of warfare on the soil environment

    Science.gov (United States)

    Certini, Giacomo; Scalenghe, Riccardo; Woods, William I.

    2013-12-01

    One of the most dramatic ways humans can affect soil properties is through the performance of military activities. Warfare-induced disturbances to soil are basically of three types - physical, chemical, and biological - and are aimed at causing direct problems to enemies or, more often, are indirect, undesired ramifications. Physical disturbances to soil include sealing due to building of defensive infrastructures, excavation of trenches or tunnels, compaction by traffic of machinery and troops, or cratering by bombs. Chemical disturbances consist of the input of pollutants such as oil, heavy metals, nitroaromatic explosives, organophosphorus nerve agents, dioxins from herbicides, or radioactive elements. Biological disturbances occur as unintentional consequences of the impact on the physical and chemical properties of soil or the deliberate introduction of microorganisms lethal to higher animals and humans such as botulin or anthrax. Soil represents a secure niche where such pathogens can perpetuate their virulence for decades.

  19. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  20. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  1. Agroterrorism, Biological Crimes, and Biological Warfare Targeting Animal Agriculture

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Terry M.; Logan-Henfrey, Linda; Weller, Richard E.; Kellman, Brian

    2000-04-12

    There is a rising level of concern that agriculture might be targeted for economic sabotage by terrorists. Knowledge gathered about the Soviet Union biological weapons program and Iraq following the Gulf War, confirmed that animals and agricultural crops were targets of bioweapon development. These revelations are particularly disturbing in light of the fact that both countries are States Parties to the Biological and Toxin Weapons Convention that entered into force in 1975. The potential for misusing biotechnology to create more virulent pathogens and the lack of international means to detect unethical uses of new technologies to create destructive bioweapons is of increasing concern. Disease outbreaks, whether naturally occurring or intentionally, involving agricultural pathogens that destroy livestock and crops would have a profound impact on a country's infrastructure, economy and export markets. This chapter deals with the history of agroterrorism, biological crimes and biological warfare directed toward animal agriculture, specifically, horses, cattle, swine, sheep, goats, and poultry.

  2. RELATIONAL APPROACHES REGARDING FOCUSED LOGISTICS IN MODERN WARFARE JOINT OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe MINCULETE

    2015-10-01

    Full Text Available The military joint operations of the future are characterized by large concentrations of forces and conventional means on the directions that permit the exploitation of the technological superiority and the manifestation of the offensive spirit of the commanders of the joint operation force groups. Having in mind the fact that the relation between the combatant forces and the logistic ones will shift more and more in favour of the latter, the aforementioned operations will be usually supported by modern flexible logistic structures. The constituted force groups will have a significant joint force character, ensuring superior quality of the troops’ combat training, both at individual level and collective level of units and large units. The current article presents innovative aspects of focused logistics, adapted for the modern warfare, which should be designed and achieved in order to increase the operational potential of the joint force groups.

  3. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  4. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  5. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  6. The Hawai'i Undersea Research Laboratory: Applying Innovative Deep-sea Technologies Toward Research, Service, and Stewardship in Marine Protected Areas of the Pacific Region

    Science.gov (United States)

    Smith, J. R.

    2012-12-01

    The Hawai'i Undersea Research Laboratory (HURL) is the only U.S. deep submergence facility in the Pacific Rim tasked with supporting undersea research necessary to fulfill the mission, goals, and objectives of the National Oceanic and Atmospheric Administration (NOAA), along with other national interests of importance. Over 30 years of submersible operations have resulted in nearly 1900 dives representing 9300 hours underwater, and a benthic ecology database derived from in-house video record logging of over 125,000 entries based on 1100 unique deep-sea animal identifications in the Hawaiian Archipelago. As a Regional Center within the Office of Ocean Exploration and Research (OER), HURL conducts undersea research in offshore and nearshore waters of the main and Northwestern Hawaiian Islands and waters of the central, southern, and western Pacific. HURL facilities primarily support marine research projects that require data acquisition at depths greater than wet diving methods. These consist of the research vessel Ka'imikai-o-Kanaloa (KOK), human occupied submersibles Pisces IV and Pisces V (2000 m), a new remotely operated vehicle (6000 m), and a multibeam bathymetric sonar system (11,000 m). In addition, HURL has also supported AAUS compliant wet diving since 2003, including technical mixed gas/rebreather work. While ecosystem studies of island, atoll, and seamount flanks are the largest component of the HURL science program, many other thematic research areas have been targeted including extreme and unique environments, new resources from the sea, episodic events to long term changes, and the development of innovative technologies. Several examples of HURL's contributions to marine protected areas (MPAs) include: (a) A long term presence in the pristine ecosystems of the Papahānaumokuākea Marine National Monument in the Northwestern Hawaiian Islands. Researchers from National Marine Fisheries have used HURL assets to study endangered Hawaiian Monk Seal habitat

  7. ENGINEER: The Professional Bulletin of Army Engineers. Volume 38, April-June 2008

    Science.gov (United States)

    2008-06-01

    are being converted to biofuels . “That’s the context in which we’re running this race,” he said. “But on the other side, there are plusses that make...accession protocol should not be misconceived as a onetime “talent grab ” by the Engineer Regiment, but rather as a permanent engineer accessions...is no history of a bureaucracy ever creating the expert knowledge and practice of modern warfare. If America is to have effecive land forces, the

  8. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  9. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Science.gov (United States)

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... the Port, The Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine...

  10. Eye injuries in twentieth century warfare: a historical perspective.

    Science.gov (United States)

    Wong, T Y; Seet, M B; Ang, C L

    1997-01-01

    With successive wars in the twentieth century, there has been a relative increase in injuries to the eye compared to injuries of other parts of the body. The main causes of eye injury have changed with advances in techniques and weaponry of warfare, with blast fragmentation injuries accounting for 50-80% of cases. Penetrating and perforating injuries are most common, and injuries associated with intraocular foreign bodies pose special diagnostic and management problems. Injuries are bilateral in 15-25% of cases. Injuries associated with chemical, nuclear, and laser weapons have distinct characteristics and epidemiology. Enucleation was commonly performed at the turn of the century, but incidence has declined with better understanding of the pathophysiology of ocular trauma, improved surgical techniques and sepsis control with antibiotics. Sympathetic ophthalmia appears to be uncommon and earlier fears of this complication seem to have been exaggerated. Timely evacuation to a surgical facility is important for a good visual prognosis and preservation of the globe. However, prevention of injuries with eye armor is ultimately the best management, and the need for a comprehensive eye protection program in the military cannot be overemphasized, especially since eye injuries pose important socioeconomic, as well as medical, problems.

  11. The enemy as animal: Symmetric dehumanization during asymmetric warfare.

    Science.gov (United States)

    Bruneau, Emile; Kteily, Nour

    2017-01-01

    Historically, dehumanization has enabled members of advantaged groups to 'morally disengage' from disadvantaged group suffering, thereby facilitating acts of intergroup aggression such as colonization, slavery and genocide. But is blatant dehumanization exclusive to those at the top 'looking down', or might disadvantaged groups similarly dehumanize those who dominate them? We examined this question in the context of intergroup warfare in which the disadvantaged group shoulders a disproportionate share of casualties and may be especially likely to question the humanity of the advantaged group. Specifically, we assessed blatant dehumanization in the context of stark asymmetric conflict between Israelis (Study 1; N = 521) and Palestinians (Study 2; N = 354) during the 2014 Gaza war. We observed that (a) community samples of Israelis and Palestinians expressed extreme (and comparable) levels of blatant dehumanization, (b) blatant dehumanization was uniquely associated with outcomes related to outgroup hostility for both groups, even after accounting for political ideologies known to strongly predict outgroup aggression, and (c) the strength of association between blatant dehumanization and outcomes was similar across both groups. This study illuminates the striking potency and symmetry of blatant dehumanization among those on both sides of an active asymmetric conflict.

  12. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  13. Unconventional Nuclear Warfare Defense (UNWD) containment and mitigation subtask.

    Energy Technology Data Exchange (ETDEWEB)

    Wente, William Baker

    2005-06-01

    The objective of this subtask of the Unconventional Nuclear Warfare Design project was to demonstrate mitigation technologies for radiological material dispersal and to assist planners with incorporation of the technologies into a concept of operations. The High Consequence Assessment and Technology department at Sandia National Laboratories (SNL) has studied aqueous foam's ability to mitigate the effects of an explosively disseminated radiological dispersal device (RDD). These benefits include particle capture of respirable radiological particles, attenuation of blast overpressure, and reduction of plume buoyancy. To better convey the aqueous foam attributes, SNL conducted a study using the Explosive Release Atmospheric Dispersion model, comparing the effects of a mitigated and unmitigated explosive RDD release. Results from this study compared health effects and land contamination between the two scenarios in terms of distances of effect, population exposure, and remediation costs. Incorporating aqueous foam technology, SNL created a conceptual design for a stationary containment area to be located at a facility entrance with equipment that could minimize the effects from the detonation of a vehicle transported RDD. The containment design was evaluated against several criteria, including mitigation ability (both respirable and large fragment particle capture as well as blast overpressure suppression), speed of implementation, cost, simplicity, and required space. A mock-up of the conceptual idea was constructed at SNL's 9920 explosive test site to demonstrate the containment design.

  14. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  15. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  16. Annual Science and Engineering Technology Conference Presentations (8th)

    Science.gov (United States)

    2007-04-19

    Engine of Transformation Coalition Partners Adaptation to Globalisation - A Perspective - Dr A.C. (Tony) Lindsay Counsellor, Defence Science Embassy of...Australia April 19th 2007 A DIFFERENT PERSPECTIVE… A LOCAL PERSPECTIVE… GLOBALISATION OF TECHNOLOGY… From: Task Force on the Future of American...Ethical challenges • Inequality UK’s DCDC STRATEGIC TRENDS 2007-2036 (3) Defence Implications: • Information warfare; • Encryption – reduction in

  17. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  18. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  19. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  20. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  1. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  2. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    Energy Technology Data Exchange (ETDEWEB)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-02-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator.

  3. NONDESTRUCTIVE IDENTIFICATION OF CHEMICAL WARFARE AGENTS AND EXPLOSIVES BY NEUTRON GENERATOR-DRIVEN PGNAA

    International Nuclear Information System (INIS)

    T. R. Twomey; A. J. Caffrey; D. L. Chichester

    2007-01-01

    Prompt gamma-ray neutron activation analysis (PGNAA) is now a proven method for the identification of chemical warfare agents and explosives in military projectiles and storage containers. Idaho National Laboratory is developing a next-generation PGNAA instrument based on the new Ortec Detective mechanically-cooled HPGe detector and a neutron generator. In this paper we review PGNAA analysis of suspect chemical warfare munitions, and we discuss the advantages and disadvantages of replacing the californium-252 radioisotopic neutron source with a compact accelerator neutron generator

  4. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  5. A statistical analysis of the effect of warfare on the human secondary sex ratio

    NARCIS (Netherlands)

    Graffelman, J.; Hoekstra, R.F.

    2000-01-01

    Many factors have been hypothesized to affect the human secondary sex ratio (the annual percentage of males among all live births), among them race, parental ages, and birth order. Some authors have even proposed warfare as a factor influencing live birth sex ratios. The hypothesis that during and

  6. A Proficiency-Based Cost Estimate of Surface Warfare Officer On-the-Job Training

    Science.gov (United States)

    2011-12-01

    for “better schooling, and a surface warfare pin equivalent to the dolphins worn by submariners or the wings by the aviators” (Robinson, 2008...Historical Perspective from World War II to 2008. Fort Leavenworth: U.S. Army Command and General Staff College. Rocci, R. (2003). A Cognitive and

  7. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... energy technology, and manned or unmanned water craft operations; (2) change the latitude and longitude... shoreline for commercial fishing and waterfowl hunting blinds under existing Navy and state regulations. The...

  8. The Evolution of Naval Warfare Technology and the Impact of Space Systems

    Science.gov (United States)

    1987-09-01

    or Greek fire. Larger missile devices such as the trebuchet were commonly used in land warfare, particularly in siege operations. However, the...were being used more widely in the Mediterranean. Mangonels and trebuchets were used to heave a variety of projectiles. Their adaptation for use on

  9. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    Science.gov (United States)

    1996-07-04

    2-19 2-2-1 State Com puter Crim e Statutes ....................................................................... 2-44...2-2-2 Com puter Crim e Jurisdiction .......................................................................... 2-45 2-4-1 Information Warfare Policy...infrastructures from physical and cyber threats. * Propose statutory and regulatory changes. The Infrastructure Protection Task Force (IPTF): * Increase

  10. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    using the methods of Mao Zedong , working at the individual village level to subvert central government authority, which effectively stopped at the...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse-Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray...outposts, 63 General (Ret.) William W. Momyer, Airpower in Three Wars ( WWII , Korea, Vietnam

  11. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  12. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...

  13. Urban Warfare at the Operational Level: Identifying Centers of Gravity and Key Nodes

    National Research Council Canada - National Science Library

    McCleskey, Edward

    1999-01-01

    .... The intent of this paper is to focus the reader on the operational level of urban warfare. A key task for the Joint Force Commander and his staff will be to identify the targets against which he will employ his component forces...

  14. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  15. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    Science.gov (United States)

    2007-10-01

    1991. Protection by butyrylcholinesterase against organophosphorus poisoning in nonhuman primates. J. Pharmacol. Exp. Ther. 259(2): 633-638. Costa...Employee Health), Stephen McCurdy (UCD Epidemiology ), Stephanie Padilla (US EPA), Matthew Keifer (U. Washington) and CA and Utah clinical laboratories...the cholinergic function of the nervous system (Wilson, 2001). Organophosphorus ester pesticides and chem- ical warfare agents disrupt cholinergic

  16. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  17. A comparison of 252Cf and 14-MeV neutron excitation to identify chemical warfare agents by PGNAA

    International Nuclear Information System (INIS)

    Caffrey, A.J.; Harlow, B.D.; Edwards, A.J.; Krebs, K.M.; Jones, J.L.; Yoon, W.; Zabriskie, J.M.; Dougan, A.D.

    2000-01-01

    Since 1992, Idaho National Engineering and Environmental Laboratory's portable isotopic neutron spectrometry (PINS) system has been widely used for the nondestructive assessment of munitions suspected to contain chemical warfare agents, such as the nerve agent sarin. PINS is a 252 Cf-based prompt gamma-ray neutron activation analysis (PGNAA) system. The standard PINS system employs a partially moderated 5-microg 252 Cf source emitting 10 7 n/s to excite the atomic nuclei inside the item under test. The chemical elements inside the item are revealed by their characteristic gamma-ray spectrum, measured by a high-resolution high-purity germanium gamma-ray spectrometer. The system computer then infers the fill compound or mixture from the elemental data extracted from the gamma-ray spectrum. Reliable PINS assessments can be completed in as little as 100 s for favorable cases such as white phosphorus smoke munitions, but normally, a 1000 to 3000 live-second counting interval is required. To improve PINS throughput when hundreds or more munitions must be assessed, they are evaluating the possible advantages of 14-MeV neutron excitation over their current radioisotopic source

  18. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  19. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  20. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  1. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  2. The German Military Entrepreneur Ernst von Mansfeld and His Conduct of Asymmetrical Warfare in the Thirty Years War

    OpenAIRE

    Bäckström, Olli

    2011-01-01

    The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsl...

  3. Engineering Encounters: Engineering Adaptations

    Science.gov (United States)

    Gatling, Anne; Vaughn, Meredith Houle

    2015-01-01

    Engineering is not a subject that has historically been taught in elementary schools, but with the emphasis on engineering in the "Next Generation Science Standards," curricula are being developed to explicitly teach engineering content and design. However, many of the scientific investigations already conducted with students have…

  4. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  5. ANTARES: An Undersea Neutrino telescope

    CERN Multimedia

    2002-01-01

    The ANTARES (Astronomy with a Neutrino Telescope and ${Abyss}$ environmental RESearch) deep-sea neutrino telescope is designed to search for neutrinos of astrophysical origin. Neutrinos are unique probes of the high energy universe; being neutral they are not deflected by magnetic fields and interacting weakly they can readily escape from the densest regions of the universe. Potential sources of neutrino are galactic (e.g supernova remnants, micro-quasars) and extra-galactic (e.g active galactic nuclei, gamma-ray bursters). Annihilation of dark matter particles in the Sun or Galactic Centre is another well motivated potential source of extra terrestrial neutrinos. The ANTARES detector is located 40 km off the coast of Toulon (France) at a depth of 2475m in the Mediterranean Sea. Being located in the Northern hemisphere it studies the Southern sky and in particular has the Galactic Centre in its field of view. Since 2006, the detector has operated continuously in a partial configuration. The detector was compl...

  6. Engineering the just war: examination of an approach to teaching engineering ethics.

    Science.gov (United States)

    Haws, David R

    2006-04-01

    The efficiency of engineering applied to civilian projects sometimes threatens to run away with the social agenda, but in military applications, engineering often adds a devastating sleekness to the inevitable destruction of life. The relative crudeness of terrorism (e.g., 9/11) leaves a stark after-image, which belies the comparative insignificance of random (as opposed to orchestrated) belligerence. Just as engineering dwarfs the bricolage of vernacular design 'moving us past the appreciation of brush-strokes, so to speak' the scale of engineered destruction makes it difficult to focus on the charred remains of individual lives. Engineers need to guard against the inappropriate military subsumption of their effort. Fortunately, the ethics of warfare has been an ongoing topic of discussion for millennia. This paper will examine the university core class I've developed (The Moral Dimensions of Technology) to meet accreditation requirements in engineering ethics, and the discussion with engineering and non-engineering students focused by the life of electrical engineer Vannevar Bush, with selected readings in moral philosophy from the Dao de Jing, Lao Tze, Cicero, Aurelius Augustinus, Kant, Annette Baier, Peter Singer, Elizabeth Anscombe, Philippa Foot, and Judith Thomson.

  7. Air University Research Paper: Asymmetric Warfare - Exposing America’s Weaknesses

    Science.gov (United States)

    2003-04-01

    AU/ACSC/ 03-1261R/2003-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY AIR UNIVERSITY RESEARCH PAPER ASYMMETRIC WARFARE - EXPOSING AMERICA’S...Air University Research Paper : Asymmetric Wafare - Exposing America’s Weaknesses 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Std Z39-18 Disclaimer The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or

  8. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    Figure 3). However, a 2016 Department of Defense (DoD) report explained that in 2013 “China launched an object into space on a ballistic trajectory with...well as other non-kinetic counter- space capabilities.42 The USCC report also provided detailed analysis of Chinese developments of co-orbital...Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the

  9. A Review of Multi-Threat Medical Countermeasures Against Chemical Warfare and Terrorism

    Science.gov (United States)

    2004-11-01

    Biopreparat, the military and civil defense to combat chemical warfare and civilian arm of the former Soviet Union’s biological weapons chemical terrorism . program...seamlessly transition to military force protection and civil defense against chemical terrorism . Terrorist threat agents include all classes of MTMC... chemical terrorism . Using MTMC to blunt pathological actions enteric mast cell granulation in acute soman intoxicated rats. Experimentia of chemical agents

  10. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  11. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons(NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  12. A cost and operational effectiveness analysis of alternative anti-surface warfare platforms

    OpenAIRE

    Skinner, Walter Mark.

    1993-01-01

    Approved for public release; distribution is unlimited. A Cost and Operational Effectiveness Analysis (COEA) is performed for three alternative anti-surface warfare (ASUW) platforms that will conduct operations in multi-service regional scenarios. Estimated program costs, historical cost variances, and measures of operational effectiveness are determined for each COEA alternative, and service life extension effects are examined. The data is merged in a mixed-integer optimization model, MPA...

  13. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  14. Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations

    Science.gov (United States)

    2017-05-25

    protecting ethnic Russians, providing stability to neighbors, defending “self- determination,” and protecting human rights . Protection of Russian...Deterrence in the Human Domain: A COIN Framework to Deterring Unconventional Warfare in Shaping Operations A Monograph by MAJ Matthew P...should be aware that notwithstanding any other provision of law , no person shall be subject to any penalty for failing to comply with a collection of

  15. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    Science.gov (United States)

    2014-05-22

    accessed 13 February 2014). 66Teresa Degenhard “Between War and Crime: The Overlap between War and Crime: Unpacking Foucault and Agamben’s Studies...Article-2-Revision- for- Foucault -and-Agamben-Degenhardt-July-2013.pdf (accessed 5 April 2014). 26... Foucault and Agamben’s Studies within the Context of the War on Terror.”, 34. 68US Department of Defense, Electronic Warfare, Joint Publication 3-13, I-2

  16. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N-6551H-229. U.S. Navy, Arlington, VA...The Mine Countermeasure Ship USS Avenger (MCM-1) Operates off the Coast of Hawaii during Exercise Rim of the Pacific (RIMPAC) 2004. ID: 040710-N... fire -scout-following-two-crashes/. Accessed December 5, 2016. Space and Naval Warfare Systems Command. 2011. “Marine Mammal Program.” SSC Pacific

  17. Discrete Electronic Warfare Signal Processing using Compressed Sensing Based on Random Modulator Pre-Integrator

    OpenAIRE

    M. Sreenivasa Rao; Chandan C. Mishra; K. Krishna Naik; K. Maheshwara Reddy

    2015-01-01

    Electronic warfare receiver works in the wide electromagnetic spectrum in dense radar signal environment. Current trends in radar systems are ultra wideband and low probability of intercept radar technology. Detection of signals from various radar stations is a concern. Performance and probability of intercept are mainly dependent on high speed ADC technology. The sampling and reconstruction functions have to be optimized to capture incoming signals at the receiver to extract characteristics ...

  18. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    Science.gov (United States)

    1999-05-01

    1985 workforce of 406,000 by two thirds. Volkswagen intends to reduce its present workforce by one third. Proctor and Gamble has rising sales, yet is...of the Senate Governmental Affairs Committee , named “China, Russia, Libya, Iran, Iraq, and at least seven other countries... audit uses four recent Stanford Technology Law Journal articles not related to information warfare. Granted, hypothetical environments make certainty

  19. Lawfare and hybrid warfare-how Russia is using the law as a weapon

    OpenAIRE

    Mosquera, A.; Bachmann, Sascha-Dominik

    2015-01-01

    This short paper introduces the reader to the mutating military concept of hybrid warfare and one of its implementing methods, the use of law as a weapon. We aim to provide a current, comprehensive definition of the terms “hybrid warfare” and “lawfare”. This submission focuses on the following areas: where law has been/is being used as a method of war, namely the Jus ad bellum, the jus in bello and the law of treaties in international relations.

  20. Special Operations, Irregular Warfare, and Operational Art: A Theory of Special Operations

    Science.gov (United States)

    2013-12-10

    modern militaries: Ian F. W. Beckett , Modern Insurgencies and Counter-Insurgencies (New York: Routledge, 2003), 213. 1...the dynamics that influence other coalition members. They do not have the 71Mao Zedong, On Guerrilla Warfare, trans. Samuel B. Griffith (Breiningville...2004. Beckett , Ian F. W. Modern Insurgencies and Counter-Insurgencies. New York: Routledge, 2003. Bergen, Peter. “Analysis: Bin Laden might find

  1. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  2. Incorporating AFEWC IMOM as an instructional asset for NPS radar and electronic warfare curricula

    OpenAIRE

    Van Splinter, Gregg A.

    1992-01-01

    Approved for public release; distribution is unlimited In this thesis, effort is made to incorporate the computer program, Improved Many(Jammers)-on-Many(Radars) (IMOM), into radar and electronic warfare curricula at the Naval Postgraduate School. The IMOM program is used operationally by the U.S. Air Force for electronic combat mission planning. IMOM allows the user to evaluate electronic combat effects through computer color graphics display of the electronic order of battle including ...

  3. Past and Potential Theory for Special Warfare Operational Art: People’s War and Contentious Politics

    Science.gov (United States)

    2015-03-04

    the scientific method could be used to examine historical case studies.114 His examination of the English , American, French, and Russian Revolutions...its full evaluation as a grammar of revolutionary war. Finally, a translation of basic concepts from contentious politics into useful outlines and...be founded upon distinct and sound theories of war and warfare. This monograph argues that from 1952-1965, the US Army Special Forces developed two

  4. Puncturing the Counterinsurgency Myth: Britain and Irregular Warfare in the Past, Present, and Future

    Science.gov (United States)

    2011-09-01

    FUTURE INTRODUCTION Britain’s irregular warfare experience in the post- World War II era presented the military with numer- ous insurgent challenges where...STRATEGICALLY PERCEPTIVE This myth points to a painful element of British COIN conduct, namely, the short -circuiting of con- text. The preference for...military to plan for long-term coalition commitments: “Increasing globalisation ties our security to that of our allies. . . . Therefore we must

  5. Evaluation of Littoral Combat Ships for Open-Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2016-03-01

    submarines that were considered in detail for this report. Adapted from Michaele Lee Huygen, 2003, “Submarine Warfare in the 20th & 21st Centuries : A...development, architecture , capability, functional decomposition, modeling and simulation, ASW, LCS 15. NUMBER OF PAGES 99 16. PRICE CODE 17. SECURITY...2015/05/revealed-chinas-new-carrier- killer-sub-simulator/. General Dynamics. 2015. “Combat Power for the 21st Century .” Sales brochure, General

  6. Evaluating Effectiveness of a Frigate in an Anti-Air Warfare (AAW) Environment

    Science.gov (United States)

    2016-06-01

    anti-air warfare (AAW) mission, weapons and radar systems influence each other and interact with the combat software system (Figure 1). Figure 1...similar to our approach include UAV contributions to expeditionary operations (Raffetto, 2004), counter- piracy operations in the Gulf of Aden (Tsilis...statistical discovery software offers both powerful statistics and dynamic graphics capabilities to its users. In the thesis, JMP statistical discovery

  7. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available Warfare with International Cyber Collaboration for RSA ? Preparing Communities Dr Marthie Grobler, Joey Jansen van Vuuren', Dr Jannie Zaaiman? Council for Scientific and Industrial Research, Pretoria, South Africa1 University of Venda2 ABSTRACT... with the technological revolution is that cyberspace is full of complex and dynamic technological innovations that are not well suited to any legal system. A further complication is the lack of comprehensive treaties facilitating international cooperation...

  8. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Li Future Warfare and China regional and ethnic discrimination, and the spread of the internet and proliferation of sensational media. In a...communications, we have near-worldwide instant exchange of ideas and spread of ideas. Images and information of living standards, role models, and political...an unusually seductive form of military strength, in part because, like modern courtship, it appears to offer gratification without commitment.’15

  9. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent...agent from materials. The objective of this study was to provide a screening tool to identify decontamination chemistries and formulations that will...mitigation. The materials included a water-dispersible polyurethane (WDP) paint (MIL-DTL-53039) and an alkyd paint (MIL-PRF-24635). Two polymers were also

  10. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    prisoners and forcing the British to reinforce and area they thought they controlled.65 These militia groups grew larger and more emboldened after...British prisoners , Washington told him that he could not “answer for the militia who are resorting to Arms in most parts of the State, and exceedingly...the tension between punishing the colonists and welcoming them back into British rule prevented him from solving the hybrid warfare dilemmas posed

  11. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    Science.gov (United States)

    2015-10-01

    vulnerability in networks across the world as supervisory control and data acquisition ( SCADA ) systems, similar to the ones attacked in Iran, are...used worldwide to perform tasks such as traffic control, managing power grids and management of other utility systems. The heavy reliance on SCADA ...standpoint, this document will never become the agreed upon standard for today’s warfare, unless it is substantially updated . AU/ACSC/2015 28

  12. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  13. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  14. Systems Analysis of Alternative Architectures for Riverine Warfare in 2010

    Science.gov (United States)

    2006-12-01

    ONE for their inputs and feedback; Steve Felix, Rick Kelly, and all of the engineers at Naval Weapons Station China Lake. Lastly, but most...Armada Nacional Republica de Colombia, The Columbian Navy in the Fight against Narco- Terrorism, Retrieved 29 September 2006 from the World Wide Web...at http://www.armada.mil.co/index.php?idcategoria=30009&. 35 Armada Nacional Republica de Colombia, The Columbian Navy in the Fight against Narco

  15. Strategic Information Warfare: Challenges for the United States.

    Science.gov (United States)

    1998-05-01

    integrated computer-aided design, engineering and manufacturing technologies in order beat competitors to market with new products. Levi Strauss can process...example, see Francois Bar, "The Transformation of Manufacturing," in Drake, ed., The New Information Infrastructure, 62-64. For the Levi Strauss example...especially Chapter 7, "Economics, the New Battlefield," 215-238. 26 Threats from unscrupulous economic competitors are of concern throughout the

  16. Statistical and Biographical Laboratory/Center Data

    Science.gov (United States)

    1993-08-01

    Architects and Marine Engineers and the American Society of Naval Engineers. Rear Admiral Cantrell is married to the former Elizabeth Wilson. They have...DIVISIONI ECUTiVE DIRECTrOR ROGER M. SMITH 3 Mr. Roger M. Smith, a native of Ann Arbor, MI, received his bachelor’s degree in Physics from Dickinson College...have four children: Rob, Jennifer, John, and Emily . 2I I I 82 I I NAVAL UNDERSEA WARFARE CENTER DIVISION NEWPORTI E.XECUtIVE DIREMCTOR DR. JOHN E

  17. An Analysis of Undersea Glider Architectures and an Assessment of Undersea Glider Integration into Undersea Applications

    Science.gov (United States)

    2012-09-01

    71 ix LIST OF FIGURES Figure 1. SLOCUM Glider Dive Profile, from (P. Simonetti, 1992...ANT-LLC, 2010) .................................. 11 Figure 5. Glider #3 - Slocum Electric after (Webb Research, 2012a) ................ 12 Figure 6... Glider #4 - Slocum Thermal after (Webb Research, 2012b) ................ 13 Figure 7. Glider #6 - Sea Glider after (iRobot, 2012

  18. A System-of-Systems Engineering Approach for Australian Land Force Capability Integration

    Science.gov (United States)

    2012-09-01

    Shelf NCW Network Centric Warfare NCWIIS NCW Integration and Implementation Strategy NDIA National Defense Industrial Association OCD Operational...individual rather than via the systemic approach offered by SoSE. The success of this approach is critically dependent upon the energy and presence of the...Success Factors in SoS Engineering SoSE Personnel 27. It is necessary to identify and manage critical workforce competencies. It is also essential to

  19. Defining and Assessing the Impact to the Combat/Weapon Systems of a Ship Post Major Overhaul

    Science.gov (United States)

    2013-06-01

    Strike Warfare ( STW )  Surface Warfare (SUW)  Undersea Warfare (USW)  Expeditionary Warfare (EXW)  Electronic Warfare (EW) CSSQT assess all combat...quadrants one and four are recommended for CSSQT which means if funding and resources are available then these ships should be designated to perform a...CSSQT. Ships in quadrant two would benefit the most from a CSSQT and it those ships should be the first to be allocated funding and resources . 46

  20. Engineering Encounters: Reverse Engineering

    Science.gov (United States)

    McGowan, Veronica Cassone; Ventura, Marcia; Bell, Philip

    2017-01-01

    This column presents ideas and techniques to enhance your science teaching. This month's issue shares information on how students' everyday experiences can support science learning through engineering design. In this article, the authors outline a reverse-engineering model of instruction and describe one example of how it looked in our fifth-grade…

  1. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    84 Psychological Warfare Operations...Oxford University Press, 1971). 16 Charles Cruickshank,. The Fourth Arm: Psychological Warfare 1938-1945 (London, UK: Davis-Poynter, 1977), 69. 13...capability for clandestine intelligence collection and sabotage operations, in 1950, the Army only had about 20 personnel trained in psychological

  2. International humanitarian law applied to cyber-warfare: Precautions, proportionality and the notion of ‘attack’ under the humanitarian law of armed conflict

    NARCIS (Netherlands)

    Gill, T.D.; Tsagourias, N.; Buchan, R.

    2015-01-01

    This chapter examines the application of international humanitarian law to cyber warfare in the sense of rising to the level of an armed conflict. Building upon the work of the Tallinn Manual on the Application of International Law to Cyber Warfare, it places particular emphasis on the application

  3. Survey of Radar Refraction Error Corrections

    Science.gov (United States)

    2016-11-01

    RANGE YUMA PROVING GROUND NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION NAVAL AIR WARFARE CENTER WEAPONS DIVISION NAVAL UNDERSEA WARFARE CENTER...estimation for an electromagnetic wave propagating at radio frequencies through the earth’s atmosphere. Appendices contain descriptive material on the...of Radar Refraction Error Corrections, RCC 266-16 vii Acronyms BAE BAE Systems CRPL Central Radio Propagation Laboratory EM electromagnetic

  4. Chemical warfare and medical response during World War I.

    Science.gov (United States)

    Fitzgerald, Gerard J

    2008-04-01

    The first large-scale use of a traditional weapon of mass destruction (chemical, biological, or nuclear) involved the successful deployment of chemical weapons during World War I (1914-1918). Historians now refer to the Great War as the chemist's war because of the scientific and engineering mobilization efforts by the major belligerents. The development, production, and deployment of war gases such as chlorine, phosgene, and mustard created a new and complex public health threat that endangered not only soldiers and civilians on the battlefield but also chemical workers on the home front involved in the large-scale manufacturing processes. The story of chemical weapons research and development during that war provides useful insights for current public health practitioners faced with a possible chemical weapons attack against civilian or military populations.

  5. Layered Systems Engineering Engines

    Science.gov (United States)

    Breidenthal, Julian C.; Overman, Marvin J.

    2009-01-01

    A notation is described for depicting the relationships between multiple, contemporaneous systems engineering efforts undertaken within a multi-layer system-of-systems hierarchy. We combined the concepts of remoteness of activity from the end customer, depiction of activity on a timeline, and data flow to create a new kind of diagram which we call a "Layered Vee Diagram." This notation is an advance over previous notations because it is able to be simultaneously precise about activity, level of granularity, product exchanges, and timing; these advances provide systems engineering managers a significantly improved ability to express and understand the relationships between many systems engineering efforts. Using the new notation, we obtain a key insight into the relationship between project duration and the strategy selected for chaining the systems engineering effort between layers, as well as insights into the costs, opportunities, and risks associated with alternate chaining strategies.

  6. Engineer Ethics

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dae Sik; Kim, Yeong Pil; Kim, Yeong Jin

    2003-03-15

    This book tells of engineer ethics such as basic understanding of engineer ethics with history of engineering as a occupation, definition of engineering and specialized job and engineering, engineer ethics as professional ethics, general principles of ethics and its limitation, ethical theory and application, technique to solve the ethical problems, responsibility, safety and danger, information engineer ethics, biotechnological ethics like artificial insemination, life reproduction, gene therapy and environmental ethics.

  7. Engineer Ethics

    International Nuclear Information System (INIS)

    Lee, Dae Sik; Kim, Yeong Pil; Kim, Yeong Jin

    2003-03-01

    This book tells of engineer ethics such as basic understanding of engineer ethics with history of engineering as a occupation, definition of engineering and specialized job and engineering, engineer ethics as professional ethics, general principles of ethics and its limitation, ethical theory and application, technique to solve the ethical problems, responsibility, safety and danger, information engineer ethics, biotechnological ethics like artificial insemination, life reproduction, gene therapy and environmental ethics.

  8. Quality of life in chemical warfare survivors with ophthalmologic injuries: the first results form Iran Chemical Warfare Victims Health Assessment Study

    Directory of Open Access Journals (Sweden)

    Soroush Mohammad

    2009-01-01

    Full Text Available Abstract Background Iraq used chemical weapons extensively against the Iranians during the Iran-Iraq war (1980–1988. The aim of this study was to assess the health related quality of life (HRQOL in people who had ophthalmologic complications due to the sulfur mustard gas exposure during the war. Methods The Veterans and Martyrs Affair Foundation (VMAF database indicated that there were 196 patients with severe ophthalmologic complications due to chemical weapons exposure. Of these, those who gave consent (n = 147 entered into the study. Quality of life was measured using the 36-item Short Form Health Survey (SF-36 and scores were compared to those of the general public. In addition logistic regression analysis was performed to indicate variables that contribute to physical and mental health related quality of life. Results The mean age of the patients was 44.8 (SD = 8.7 ranging from 21 to 75 years. About one-third of the cases (n= 50 reported exposure to chemical weapons more than once. The mean exposure duration to sulfur mustard gas was 21.6 years (SD = 1.2. The lowest scores on the SF-36 subscales were found to be: the role physical and the general health. Quality of life in chemical warfare victims who had ophthalmologic problems was significantly lower than the general public (P Conclusion The study findings suggest that chemical warfare victims with ophthalmologic complications suffer from poor health related quality of life. It seems that the need for provision of health and support for this population is urgent. In addition, further research is necessary to measure health related quality of life in victims with different types of disabilities in order to support and enhance quality of life among this population.

  9. Detection of warfare agents in liquid foods using the brine shrimp lethality assay.

    Science.gov (United States)

    Lumor, Stephen E; Diez-Gonzalez, Francisco; Labuza, Theodore P

    2011-01-01

    The brine shrimp lethality assay (BSLA) was used for rapid and non-specific detection of biological and chemical warfare agents at concentrations considerably below that which will cause harm to humans. Warfare agents detected include T-2 toxin, trimethylsilyl cyanide, and commercially available pesticides such as dichlorvos, diazinon, dursban, malathion, and parathion. The assay was performed by introducing 50 μL of milk or orange juice contaminated with each analyte into vials containing 10 freshly hatched brine shrimp nauplii in seawater. This was incubated at 28 °C for 24 h, after which mortality was determined. Mortality was converted to probits and the LC(50) was determined for each analyte by plotting probits of mortality against analyte concentration (log(10)). Our findings were the following: (1) the lethal effects of toxins dissolved in milk were observed, with T-2 toxin being the most lethal and malathion being the least, (2) except for parathion, the dosage (based on LC(50)) of analyte in a cup of milk (200 mL) consumed by a 6-y-old (20 kg) was less than the respective published rat LD(50) values, and (3) the BSLA was only suitable for detecting toxins dissolved in orange juice if incubation time was reduced to 6 h. Our results support the application of the BSLA for routine, rapid, and non-specific prescreening of liquid foods for possible sabotage by an employee or an intentional bioterrorist act. Practical Application: The findings of this study strongly indicate that the brine shrimp lethality assay can be adapted for nonspecific detection of warfare agents or toxins in food at any point during food production and distribution.

  10. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  11. U.S. Army Land Warfare Laboratory. Volume 1. Project Report, Appendix A. Documentation

    Science.gov (United States)

    1974-06-01

    10) "EXPLOSIVES DETECTING DOGS", Final Report. Krauss, flax , Bliological Sciences Branch. U. S. Ariqy Land Warfare Laboratory, Aberdeen Proving...Readei .•,al uat ed by Alaska Nau inl i 1 :uli d. IC SI’ID ret onilt dt’d yN, ( ;,Iaid, a l ,., by PISARAi.. ROC he inu, prteparted. I1 lt ninat ion 1...to UISARV. Ret : ansmission >;ystni Evaluation qty 0l 0 sup li,-d to I Ag\\’N and USAkV which rt-comin• l:dt-d I( \\’I I mod i f cat io. Riot Col: rol

  12. Destruction of chemical warfare agent simulants by air and moisture stable metal NHC complexes.

    Science.gov (United States)

    Weetman, Catherine; Notman, Stuart; Arnold, Polly L

    2018-02-20

    The cooperative effect of both NHC and metal centre has been found to destroy chemical warfare agent (CWA) simulants. Choice of both the metal and NHC is key to these transformations as simple, monodentate N-heterocyclic carbenes in combination with silver or vanadium can promote stoichiometric destruction, whilst bidentate, aryloxide-tethered NHC complexes of silver and alkali metals promote breakdown under mild heating. Iron-NHC complexes generated in situ are competent catalysts for the destruction of each of the three targetted CWA simulants.

  13. Total Control: How the Nazis Countered Unconventional Warfare in the Netherlands During World War Two

    Science.gov (United States)

    2017-05-25

    11:mrnn ’ cc11rit) pnlic) :.incc I >t66. l·Dlkm ing the (jcrman ’ ict ori1.:~ ~) f 1939- 19-10. I titler grantccl I limmlcr rrnthority over la" :md...better deterrent in the c;mall " Durch cnmmunity. the Scc11rit) :-1.:n ict ’’i pro’ idcd the names of death candidates 3nu c"<ccu tcd people tu thl...Total Control: I low the Nazis Countered Unconventional Warfare in the Netherlands During World War Two A Monograph by Major Jeroen F van

  14. Unconventional War and Warfare in the Gray Zone. The New Spectrum of Modern Conflicts

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2016-06-01

    Full Text Available Experiences of the last couple of years indicate that political objectives are increasingly achieved without official declarations of war. Armed forces are used in untraditional ways and the so-called substitute troops begin to play an increasingly bigger part. The article aims to characterize the conflicts of alternative nature below the level of open war that are on the border between war and peace. The content of the article presents the theory of unconventional warfare and its description, and familiarizes the reader with the concept of grey zone conflicts. It further shows the challenges linked to rivalry for influence zones and security provisions.

  15. Battle-Wise: Seeking Time-Information Superiority in Networked Warfare

    Science.gov (United States)

    2006-07-01

    it best about learning from mistakes in life: “There is no wisdom in the second kick of a mule .” Although he did not have 21st-century warfare in...part of our military leadership—can we expect to avoid the “second kick of a mule .” xii BATTLE-WISE PREFACE xiii xiii Preface This book is an inquiry...recruiting meth - ods. Depending on work experience before joining the military, it may be possible actually to identify battle-wise traits in recruits. For

  16. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  17. Information warfare as ICT influence on public consciousness and public opinion

    Directory of Open Access Journals (Sweden)

    A. H. Stadnyk

    2015-12-01

    Full Text Available The article defines the key aspects of the merits and impact of information warfare on public consciousness and public opinion. In the article, we review the information war not as an auxiliary mechanism for real war, but as a mechanism of affecting the public opinion. The public opinion can not be formed completely (while there is information content, public opinion changes constantly because the information in the hands of the media acts as a real weapon aimed at the mass consciousness. The article discusses in detail the four main factors that determine the effectiveness of the impact of information: 1 information warfare agents that affect the population, mass consciousness, public opinion; 2 information weapon of war; 3 the content itself, the content that is broadcast during the information war; 4 the specifics of mass awareness in different countries, the formation and functioning of their public opinion. And how much information war characteristic of the crisis (as an example to Ukraine since the beginning of the Maidan in 2013, the presentation of information aimed at manipulating public consciousness and, accordingly, the public opinion as the outward expression of consciousness.

  18. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-08-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the warfare metaphor alive. On the other hand, there are substantial numbers of Christians who at least appear to oppose science given their high-profile opposition to the general theory of evolution. The research reported in this paper asked, "Does anti-science sentiment increase with increasing orthodox Christian belief?" Two validated, published instruments were used: The Thinking about Science Survey Instrument and the Christian Fundamentalist Belief Scale. The subjects for the study were 545 preservice elementary teachers. The analysis did not show that anti-science sentiment increases with increasing Christian belief. Subjects with strong Christian beliefs were found to be just as supportive of science, if not more so, than subjects with no Christian beliefs. The study concludes with a caution against projecting attitudes toward science "on the whole" based on attitudes specifically toward evolution when working with preservice elementary teachers. Such a projection could well be counterproductive. The study has implications for other modern countries having highly religious populations such as Turkey.

  19. Investigating the Relationship Between Drone Warfare and Civilian Casualties in Gaza

    Directory of Open Access Journals (Sweden)

    Dr. Ann Rogers

    2014-12-01

    Full Text Available Unmanned aerial vehicles (UAVs, better known as drones, are increasingly touted as ‘humanitarian’ weapons that contribute positively to fighting just wars and saving innocent lives. At the same time, civilian casualties have become the most visible and criticized aspect of drone warfare. It is argued here that drones contribute to civilian casualties not in spite of, but because of, their unique attributes. They greatly extend war across time and space, pulling more potential threats and targets into play over long periods, and because they are low-risk and highly accurate, they are more likely to be used. The assumption that drones save lives obscures a new turn in strategic thinking that sees states such as Israel and the US rely on large numbers of small, highly discriminating attacks applied over time to achieve their objectives. This examination of Israel’s 2014 war in Gaza argues that civilian casualties are not an unexpected or unintended consequence of drone warfare, but an entirely predictable outcome.

  20. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Stengl, Vaclav, E-mail: stengl@uach.cz [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika [Institute of Inorganic Chemistry AS CR v.v.i., 250 68 Rez (Czech Republic); Oplustil, Frantisek; Nemec, Tomas [Military Technical Institute of Protection Brno, Veslarska 230, 628 00 Brno (Czech Republic)

    2010-11-15

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr{sup 4+} dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr{sup 4+} converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  1. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    International Nuclear Information System (INIS)

    Stengl, Vaclav; Houskova, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Marikova, Monika; Oplustil, Frantisek; Nemec, Tomas

    2010-01-01

    Zirconium doped nano dispersive oxides of Fe, Al and Zn were prepared by a homogeneous hydrolysis of the respective sulfate salts with urea in aqueous solutions. Synthesized metal oxide hydroxides were characterized using Brunauer-Emmett-Teller (BET) surface area and Barrett-Joiner-Halenda porosity (BJH), X-ray diffraction (XRD), infrared spectroscopy (IR), scanning electron microscopy (SEM) and energy-dispersive X-ray microanalysis (EDX). These oxides were taken for an experimental evaluation of their reactivity with sulfur mustard (HD or bis(2-chloroethyl)sulfide), soman (GD or (3,3'-Dimethylbutan-2-yl)-methylphosphonofluoridate) and VX agent (S-[2-(diisopropylamino)ethyl]-O-ethyl-methylphosphonothionate). The presence of Zr 4+ dopant can increase both the surface area and the surface hydroxylation of the resulting doped oxides, decreases their crystallites' sizes thereby it may contribute in enabling the substrate adsorption at the oxide surface thus it can accelerate the rate of degradation of warfare agents. Addition of Zr 4+ converts the product of the reaction of ferric sulphate with urea from ferrihydrite to goethite. We found out that doped oxo-hydroxides Zr-FeO(OH) - being prepared by a homogeneous hydrolysis of ferric and zirconium oxo-sulfates mixture in aqueous solutions - exhibit a comparatively higher degradation activity towards chemical warfare agents (CWAs). Degradation of soman or VX agent on Zr-doped FeO(OH) containing ca. 8.3 wt.% of zirconium proceeded to completion within 30 min.

  2. The possible role of intravenous lipid emulsion in the treatment of chemical warfare agent poisoning

    Directory of Open Access Journals (Sweden)

    Arik Eisenkraft

    Full Text Available Organophosphates (OPs are cholinesterase inhibitors that lead to a characteristic toxidrome of hypersecretion, miosis, dyspnea, respiratory insufficiency, convulsions and, without proper and early antidotal treatment, death. Most of these compounds are highly lipophilic. Sulfur mustard is a toxic lipophilic alkylating agent, exerting its damage through alkylation of cellular macromolecules (e.g., DNA, proteins and intense activation of pro-inflammatory pathways. Currently approved antidotes against OPs include the peripheral anticholinergic drug atropine and an oxime that reactivates the inhibited cholinesterase. Benzodiazepines are used to stop organophosphate-induced seizures. Despite these approved drugs, efforts have been made to introduce other medical countermeasures in order to attenuate both the short-term and long-term clinical effects following exposure. Currently, there is no antidote against sulfur mustard poisoning. Intravenous lipid emulsions are used as a source of calories in parenteral nutrition. In recent years, efficacy of lipid emulsions has been shown in the treatment of poisoning by fat-soluble compounds in animal models as well as clinically in humans. In this review we discuss the usefulness of intravenous lipid emulsions as an adjunct to the in-hospital treatment of chemical warfare agent poisoning. Keywords: Intravenous lipid emulsion, Organophosphates, Sulfur mustard, Antidotes, Poisoning, Chemical Warfare agents

  3. Bioarchaeological investigation of ancient Maya violence and warfare in inland Northwest Yucatan, Mexico.

    Science.gov (United States)

    Serafin, Stanley; Lope, Carlos Peraza; Uc González, Eunice

    2014-05-01

    This study investigates evidence of changes and continuities in ancient Maya violence and warfare in inland northwest Yucatan, Mexico from the Middle Preclassic (600-300 BC) to the Postclassic (AD 1050-1542) through bioarchaeological analysis of cranial and projectile trauma. It is hypothesized that the frequency of violence increases before the Classic Maya collapse and remains high during the Postclassic period. It is also hypothesized that the flat, open terrain was conducive to warfare and resulted in higher trauma frequencies than in other parts of the Maya area. Results show that the frequency of cranial trauma decreases before the Classic collapse and increases in the Postclassic, partially matching the expected chronological trends. The frequency of cranial trauma does not differ significantly from other Maya regions but the pattern does: for all periods, males have more healed injuries than females and they are concentrated on the left side of the anterior of the skull. Some injuries appear to be from small points hafted in wooden clubs. In addition, projectile trauma is evident in a scapula with an embedded arrowhead tip, the first such case reported in a Maya skeleton. Overall, these results suggest greater reliance on open combat and less on raids in this region compared with other parts of the Maya area, possibly due to the flat, open terrain, though the identification of perimortem trauma in both women and men indicates surprise raids on settlements were also practiced. Copyright © 2014 Wiley Periodicals, Inc.

  4. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  5. Reevaluation of 1999 Health-Based Environmental Screening Levels (HBESLs) for Chemical Warfare Agents

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Dolislager, Fredrick G [ORNL

    2007-05-01

    This report evaluates whether new information and updated scientific models require that changes be made to previously published health-based environmental soil screening levels (HBESLs) and associated environmental fate/breakdown information for chemical warfare agents (USACHPPM 1999). Specifically, the present evaluation describes and compares changes that have been made since 1999 to U.S. Environmental Protection Agency (EPA) risk assessment models, EPA exposure assumptions, as well as to specific chemical warfare agent parameters (e.g., toxicity values). Comparison was made between screening value estimates recalculated with current assumptions and earlier health-based environmental screening levels presented in 1999. The chemical warfare agents evaluated include the G-series and VX nerve agents and the vesicants sulfur mustard (agent HD) and Lewisite (agent L). In addition, key degradation products of these agents were also evaluated. Study findings indicate that the combined effect of updates and/or changes to EPA risk models, EPA default exposure parameters, and certain chemical warfare agent toxicity criteria does not result in significant alteration to the USACHPPM (1999) health-based environmental screening level estimates for the G-series and VX nerve agents or the vesicant agents HD and L. Given that EPA's final position on separate Tier 1 screening levels for indoor and outdoor worker screening assessments has not yet been released as of May 2007, the study authors find that the 1999 screening level estimates (see Table ES.1) are still appropriate and protective for screening residential as well as nonresidential sites. As such, risk management decisions made on the basis of USACHPPM (1999) recommendations do not require reconsideration. While the 1999 HBESL values are appropriate for continued use as general screening criteria, the updated '2007' estimates (presented below) that follow the new EPA protocols currently under development

  6. 76 FR 10522 - Naval Surface Warfare Center, Upper Machodoc Creek and the Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2011-02-25

    ... Warfare Center, Dahlgren's patrol boats. Oystering and fishing boats or other craft may cross the river in... bombing, directed energy technology, and manned or unmanned water craft operations; expand the Middle... manned or unmanned watercraft. (ii) When hazardous operations are in progress, no person, or fishing or...

  7. Modern sample preparation techniques for gas chromatography-mass spectrometry analysis of environmental markers of chemical warfare agents use

    NARCIS (Netherlands)

    Terzic, O.; de Voogt, P.; Banoub, J.

    2014-01-01

    The chapter introduces problematics of on-site chemical analysis in the investigations of past chemical warfare agents (CWA) events. An overview of primary environmental degradation pathways of CWA leading to formation of chemical markers of their use is given. Conventional and modern sample

  8. Warfare tourism experiences and national identity: The case of Airborne Museum ‘Hartenstein’ in Oosterbeek, the Netherlands

    NARCIS (Netherlands)

    Gieling, Johannes

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists' motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  9. Warfare has changed - so should have methods: Ammunition and weapon performance induced operational risk and safety issues

    NARCIS (Netherlands)

    Verhagen, T.L.A.; Voorde, M.J. van de

    2010-01-01

    Warfare has changed. Out-of-area operations have increased the awareness that we are unfamiliar with the performance of the current conventional medium and large calibre ammunitions in day-to-day practice. Current ammunition is primarily developed and procured to defeat the traditional ‘steel’

  10. Rapid Analysis of Chemical Warfare Agents and Their Hydrolysis Products by Desorption Electrospray Ionization Mass Spectrometry (DESI-MS)

    Science.gov (United States)

    2009-10-01

    72, 77-79], polymers [80], alkaloids on plant tissue [81], chemical warfare agents on solid phase microextraction (SPME) fibers [60, 82], hydrolysis...situ detection of alkaloids in plant tissue under ambient conditions using desorption electrospray ionization. Analyst, 130, 1624-1633. [82

  11. Advanced Active Acoustics Lab (AAAL)

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Active Acoustics Lab (AAAL) is a state-of-the-art Undersea Warfare (USW) acoustic data analysis facility capable of both active and passive underwater...

  12. Mechanical engineering

    CERN Document Server

    Darbyshire, Alan

    2010-01-01

    Alan Darbyshire's best-selling text book provides five-star high quality content to a potential audience of 13,000 engineering students. It explains the most popular specialist units of the Mechanical Engineering, Manufacturing Engineering and Operations & Maintenance Engineering pathways of the new 2010 BTEC National Engineering syllabus. This challenging textbook also features contributions from specialist lecturers, ensuring that no stone is left unturned.

  13. Computational Investigations of Potential Energy Function Development for Metal--Organic Framework Simulations, Metal Carbenes, and Chemical Warfare Agents

    Science.gov (United States)

    Cioce, Christian R.

    sigma donates, and subsequent back-bonding occurs into a pi* antibonding orbital. This is a different type of interaction not seen in the three existing classes of metal-carbene complexes, namely Fischer, Schrock, and Grubbs. Finally, the virtual engineering of enhanced chemical warfare agent (CWA) detection systems is discussed. As part of a U.S. Department of Defense supported research project, in silico chemical modifications to a previously synthesized zinc-porphyrin, ZnCS1, were made to attempt to achieve preferential binding of the nerve agent sarin versus its simulant, DIMP (diisopropyl methylphosphonate). Upon modification, a combination of steric effects and induced hydrogen bonding allowed for the selective binding of sarin. The success of this work demonstrates the role that high performance computing can play in national security research, without the associated costs and high security required for experimentation.

  14. Trace Detection of Organophosphorus Chemical Warfare Agents in Wastewater and Plants by Luminescent UIO-67(Hf) and Evaluating the Bioaccumulation of Organophosphorus Chemical Warfare Agents.

    Science.gov (United States)

    Lian, Xiao; Yan, Bing

    2018-04-17

    Organophosphorus chemical warfare agents (OPCWAs) are a group of organic pollutants characterized by high toxicity and chemical stability, and they are very difficult to be degraded. The trace quality of OPCWAs in water and food will cause great harm to the human body. Therefore, the detection of OPCWAs is a difficult challenge, which has become the research hotspot over the world. In this work, a Hf-based luminescent metal-organic framework (Eu@1) is prepared, and the reactivity of Hf 12 results in a methanephosphonic acid (MPA)-induced luminescence quenching and the charge transfer from MPA to Hf(IV) and generated exciplexes which are responsible for this quenching effect. The excellent performance of Eu@1 in the detection of MPA, with its finer selectivity, high sensitivity (LOD = 0.4 ppm), and large linear range (10 -7 to 10 -3 M), is encouraging for application in wastewater detection. Importantly, MPA is a pollutant that can be absorbed by plants and causes the bioaccumulation effect, and thus, the detection of MPA in real plant samples is a purposeful topic. Eu@1 also achieved satisfactory results in actual plant sample testing, and the bioaccumulation of MPA in onions, turnips, and cabbages is determined via our sensor. This fabricated detector provides a feasible path for the detection of ppm-level OPCWAs in a complex environment, which will help humans to avoid OPCWA-contaminated foods.

  15. Domestic Preparedness Program: Evaluation of the Agilent Gas Chromatograph - Flame Photometric Detector/Mass Selective Detector (GC-FPD/MSD) System Against Chemical Warfare Agents Summary Report

    National Research Council Canada - National Science Library

    Longworth, Terri

    2003-01-01

    This report characterizes the chemical warfare agent (CWA) detection potential of the commercially available Agilent gas chromatograph-flame photometric detector/mass selective detector (GC-FPD/MSD...

  16. An Analysis of the Impact of Network-Centric Warfare on the Doctrine and Tactics, Techniques and Procedures of Intelligence at the Operational Level

    National Research Council Canada - National Science Library

    Harvey, Charles

    1999-01-01

    This project sought to determine the impacts of network centric warfare (NCW) on the planning and direction of intelligence at the operational level, and what changes in joint intelligence doctrine (JID...

  17. Fate of chemical warfare agents and toxic indutrial chemicals in landfills

    DEFF Research Database (Denmark)

    Bartelt-Hunt, D.L.; Barlaz, M.A.; Knappe, D.R.U.

    2006-01-01

    One component of preparedness for a chemical attack is planning for the disposal of contaminated debris. To assess the feasibility of contaminated debris disposal in municipal solid waste (MSW) landfills, the fate of selected chemical warfare agents (CWAs) and toxic industrial chemicals (TICs......], and two TICs [furan and carbon disulfide] were studied. The effects of both infiltration (climate) and contaminant biodegradability on fate predictions were assessed. Model results showed that hydrolysis and gas-phase advection were the principal fate pathways for CWAs and TICs, respectively. Apart from...... CX and the TICs, none of the investigated compounds was predicted to persist in a landfill for more than 5 years. Climate had little impact on CWA/TIC fate, and biodegradability was only important for compounds with long hydrolysis halflives. Monte Carlo simulations were performed to assess...

  18. Nuclear radiation in warfare. A SIPRI publication. Strahlungswirkungen beim Einsatz von Kernwaffen. Eine SIPRI-Publikation

    Energy Technology Data Exchange (ETDEWEB)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion.

  19. Comparison of Selected Methods for Individual Decontamination of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Tomas Capoun

    2014-06-01

    Full Text Available This study addresses the individual decontamination of chemical warfare agents (CWA and other hazardous substances. The individual decontamination applies to contaminated body surfaces, protective clothing and objects immediately after contamination, performed individually or by mutual assistance using prescribed or improvised devices. The article evaluates the importance of individual decontamination, security level for Fire and Rescue Service Units of the Czech Republic (FRS CR and demonstrates some of the devices. The decontamination efficiency of selected methods (sorbent, glove and sponge, two-chamber foam device and wiping with alcohol was evaluated for protective clothing and painted steel plate contaminated with O-ethyl-S-(diisopropylaminoethyl-methylthiophosphonate (VX, sulfur mustard, o-cresol and acrylonitrile. The methods were assessed from an economic point of view and with regard to specific user parameters, such as the decontamination of surfaces or materials with poor accessibility and vertical surfaces, the need for a water rinse as well as toxic waste and its disposal.

  20. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull. 2007; 6(4: 227-232

  1. Investigation of Acute Toxicity of a Chemical Warfare Agent in Kidneys

    Directory of Open Access Journals (Sweden)

    Turgut Topal

    2007-08-01

    Full Text Available One of the most important chemical warfare agents, sulfur mustard (SM causes crucial acute and chronic toxic effects. Lung, skin, eye and kidneys are the most affected organs. In this work, it was investigated if increased nitric oxide (NO and peroxynitrite are involved in nitrogen mustard (NM induced kidney damage. In this experimen, aminoguanidine (AG as inducible nitric oxide synthase (iNOS inhibitor and ebselen as peroxynitrite scavenger were used. NM administration resulted in important oxidant and antioxidant changes as well as tissue damage in kidneys. Therapeutic agents showed significant protection and reduced oxidant parameteres leading to tissue healing was observed. Results of this study suggest that drugs with similar properties can be used to protect kidney damage caused by NM. [TAF Prev Med Bull 2007; 6(4.000: 227-232

  2. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes

    Science.gov (United States)

    Fennell, John F.; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M.

    2017-01-01

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions. PMID:28452929

  3. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  4. Love-wave sensors combined with microfluidics for fast detection of biological warfare agents.

    Science.gov (United States)

    Matatagui, Daniel; Fontecha, José Luis; Fernández, María Jesús; Gràcia, Isabel; Cané, Carles; Santos, José Pedro; Horrillo, María Carmen

    2014-07-15

    The following paper examines a time-efficient method for detecting biological warfare agents (BWAs). The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13), and the rabbit immunoglobulin (Rabbit IgG) has been detected using the polyclonal antibody goat anti-rabbit (GAR). Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  5. Decontamination of adsorbed chemical warfare agents on activated carbon using hydrogen peroxide solutions.

    Science.gov (United States)

    Osovsky, Ruth; Kaplan, Doron; Nir, Ido; Rotter, Hadar; Elisha, Shmuel; Columbus, Ishay

    2014-09-16

    Mild treatment with hydrogen peroxide solutions (3-30%) efficiently decomposes adsorbed chemical warfare agents (CWAs) on microporous activated carbons used in protective garments and air filters. Better than 95% decomposition of adsorbed sulfur mustard (HD), sarin, and VX was achieved at ambient temperatures within 1-24 h, depending on the H2O2 concentration. HD was oxidized to the nontoxic HD-sulfoxide. The nerve agents were perhydrolyzed to the respective nontoxic methylphosphonic acids. The relative rapidity of the oxidation and perhydrolysis under these conditions is attributed to the microenvironment of the micropores. Apparently, the reactions are favored due to basic sites on the carbon surface. Our findings suggest a potential environmentally friendly route for decontamination of adsorbed CWAs, using H2O2 without the need of cosolvents or activators.

  6. Bioterrorism and Biological Warfare, from Past to the Present: A classic review

    Directory of Open Access Journals (Sweden)

    Majid Zare Bidaki

    2015-10-01

    Full Text Available Bioterrorism is defined as any terrorist action of intentional release or dissemination of highly pathogenic biological agents, including a variety of microorganisms or biological toxins. With the growing threat of terrorism, is necessary that the potential danger of various microorganisms – as a powerful tool of aggression and threat- to be taken seriously. This review tries to explain the concept of biological weapons and their historical development process with an emphasis on efforts to control the proliferation of these types of weapons over the last century. Potential impact of infectious diseases on people and armed forces was known from since 600 BC. Using the victims of the plague as a weapon in medieval warfare and spread of smallpox as a weapon during the war against the Indians when initially America was discovered, the development of biological weapons during the World War I, World War II and the Cold War, and even since the beginning of the third millennium, all show the strategic importance of pathogenic microorganisms as a deterrent power for the superiority of some governments and cults. Historical attempts to use infectious diseases as biological weapons reveal that the distinction between a natural outbreak of an infectious disease and that of a deliberate biological attack is very difficult. Abusing this characteristic of infectious diseases has made it possible for the purposes of superiority. International agreements to control the development of biological weapons, such as “the 1925 Geneva Protocol” and “the Convention on the Prohibition of the Development, Production and Stockpiling of Biological and Toxic Weapons” have not been able to control the development and using of biological warfare.  The current paper is a classic review (Overview article aiming at increasing the knowledge and awareness of people especially of health authorities and government officials.

  7. Nanoparticle-based optical biosensors for the direct detection of organophosphate chemical warfare agents and pesticides

    International Nuclear Information System (INIS)

    Simonian, A.L.; Good, T.A.; Wang, S.-S.; Wild, J.R.

    2005-01-01

    Neurotoxic organophosphates (OP) have found widespread use in the environment for insect control. In addition, there is the increasing threat of use of OP based chemical warfare agents in both ground based warfare and terrorist attacks. Together, these trends necessitate the development of simple and specific methods for discriminative detection of ultra low quantities of OP neurotoxins. In our previous investigations a new biosensor for the direct detection of organophosphorus neurotoxins was pioneered. In this system, the enzymatic hydrolysis of OP neurotoxins by organophosphate hydrolase (OPH) generated two protons in each hydrolytic turnover through reactions in which P-X bonds are cleaved. The sensitivity of this biosensor was limited due to the potentiometric method of detection. Recently, it was reported that a change in fluorescence properties of a fluorophore in the vicinity of gold nanoparticles might be used for detection of nanomolar concentrations of DNA oligonucleotides. The detection strategy was based on the fact that an enhancement or quenching of fluorescence intensity is a function of the distances between the gold nanoparticle and fluorophore. While these reports have demonstrated the use of nanoparticle-based sensors for the detection of target DNA, we observed that the specificity of enzyme-substrate interactions could be exploited in similar systems. To test the feasibility of this approach, OPH-gold nanoparticle conjugates were prepared, then incubated with a fluorescent enzyme inhibitor or decoy. The fluorescence intensity of the decoy was sensitive to the proximity of the gold nanoparticle, and thus could be used to indicate that the decoy was bound to the OPH. Then different paraoxon concentrations were introduced to the OPH-nanoparticle-conjugate-decoy mixtures, and normalized ratio of fluorescence intensities were measured. The greatest sensitivity to paraoxon was obtained when decoys and OPH-gold nanoparticle conjugates were present at

  8. Media Discourse in an Atmosphere of Information Warfare: From Manipulation to Aggression

    Directory of Open Access Journals (Sweden)

    Владимир Иванович Озюменко

    2017-12-01

    Full Text Available In todays atmosphere of information warfare the biased impact of the media has increased, pushing behind other functions, including the informative one. The forms of media influence have also changed: direct persuasion has been replaced by implicit manipulation, which develops into outright aggression. Since, in the media discourse aggression can be both verbal and non-verbal, we propose to use the term information (or media aggression , which is broader than verbal aggression . Media aggression can be considered as a binary process - in relation to the referent (affective aggression and in relation to the audience (cognitive aggression. As a result, the information under media aggression refers to the expression of open hostility and animosity towards the referent and meaningful impact on the consciousness of the recipient (the target audience to its ideological subordination. The purpose of this article is to justify the hypothesis that the growing media aggression is a feature of modern media discourse in the atmosphere of information warfare, and this function can be analysed within the framework of manipulative discourse as manipulative persuasion. The data has been taken from quality British and American newspapers, news websites of The BBC, The Economist, The Guardian, The New York Times, The Washington Post, and some others covering the relations between Russia and the USA, the situation in the Middle East, particularly in Syria. The the study was conducted using critical discourse analysis (Fairclough 2001, Van Dijk 2006, 2009; Wodak 2007; Weiss, Wodak 2007 and the multimodal approach (Ivanova, Spodarets 2010; Ponton 2016, and reveals various strategies and means of linguistic manipulation and media aggression. It also shows that the main aim of linguistic manipulation accentuated by verbal and non-verbal aggression is to deliberately mislead the audience imposing on it the desired idea of ideological subordination. Therefore, a

  9. Industrial Engineering

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Industrial engineering is a discipline that is concerned with increasing the effectiveness of (primarily) manufacturing and (occasionally).......Industrial engineering is a discipline that is concerned with increasing the effectiveness of (primarily) manufacturing and (occasionally)....

  10. Governing Engineering

    DEFF Research Database (Denmark)

    Buch, Anders

    2012-01-01

    Most people agree that our world face daunting problems and, correctly or not, technological solutions are seen as an integral part of an overall solution. But what exactly are the problems and how does the engineering ‘mind set’ frame these problems? This chapter sets out to unravel dominant...... perspectives in challenge per-ception in engineering in the US and Denmark. Challenge perception and response strategies are closely linked through discursive practices. Challenge perceptions within the engineering community and the surrounding society are thus critical for the shaping of engineering education...... and the engineering profession. Through an analysis of influential reports and position papers on engineering and engineering education the chapter sets out to identify how engineering is problematized and eventually governed. Drawing on insights from governmentality studies the chapter strives to elicit the bodies...

  11. Governing Engineering

    DEFF Research Database (Denmark)

    Buch, Anders

    2011-01-01

    Abstract: Most people agree that our world faces daunting problems and, correctly or not, technological solutions are seen as an integral part of an overall solution. But what exactly are the problems and how does the engineering ‘mind set’ frame these problems? This chapter sets out to unravel...... dominant perspectives in challenge perception in engineering in the US and Denmark. Challenge perception and response strategies are closely linked through discursive practices. Challenge perceptions within the engineering community and the surrounding society are thus critical for the shaping...... of engineering education and the engineering profession. Through an analysis of influential reports and position papers on engineering and engineering education the chapter sets out to identify how engineering is problematized and eventually governed. Drawing on insights from governmentality studies the chapter...

  12. Engineering _ litteraturliste

    DEFF Research Database (Denmark)

    Sillasen, Martin Krabbe; Daugbjerg, Peer; Nielsen, Keld

    2017-01-01

    Litteraturliste udarbejdet som grundlag for artiklen ”Engineering – svaret på naturfagenes udfordringer?”......Litteraturliste udarbejdet som grundlag for artiklen ”Engineering – svaret på naturfagenes udfordringer?”...

  13. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.psychologytoday.com/ blog / cutting-edge-leadership/201005/how-lead-the-millennial-generation. 8 Elizabeth Bodine-Barron, Todd C. Helmus, Madeline...environment. ISIL has taken the message boards and blog post of the 1990s and jumped in with both feet to the modern digital environment. They push content...57 Riggio. 58 Stern and Berger, 81-84. 59 Anwar Alawlaki, “The State of Ummah,” Anwar Alawaki Blog , April 23, 2009, accessed March 15, 2017

  14. Nuclear warfare

    CERN Multimedia

    Broda

    1981-01-01

    Le Prof.Broda a étudié à Vienne et Berlin et a travaillé pendant la dernière guerre mondiale en Grande Bretagne pour le conseil de la recherche médicale, notamment sur la chimie de la vision. Il est maintenant Prof. de la chimie, physique et radiochimie à l'Université de Vienne, où il concentre ses travaux sur les méchanisme de transport d'énergie à travers les cellules de membranes.

  15. Electronic Warfare

    Science.gov (United States)

    2012-02-08

    nuclear burst. A high-altitude electromagnetic pulse ( HEMP ) can generate significant disruptive field strengths over a continental-size area. The...portion of the EMS most affected by EMP and HEMP is the radio spectrum. Planning for communications system protection is significant when the potential...international law (e.g., Protocol IV of the 1980 Convention on Certain Conventional Weapons that prohibits the use of laser weapons with a combat function to

  16. Engineering Motion

    Science.gov (United States)

    Tuttle, Nicole; Stanley, Wendy; Bieniek, Tracy

    2016-01-01

    For many teachers, engineering can be intimidating; teachers receive little training in engineering, particularly those teaching early elementary students. In addition, the necessity of differentiating for students with special needs can make engineering more challenging to teach. This article describes a professional development program…

  17. Computational engineering

    CERN Document Server

    2014-01-01

    The book presents state-of-the-art works in computational engineering. Focus is on mathematical modeling, numerical simulation, experimental validation and visualization in engineering sciences. In particular, the following topics are presented: constitutive models and their implementation into finite element codes, numerical models in nonlinear elasto-dynamics including seismic excitations, multiphase models in structural engineering and multiscale models of materials systems, sensitivity and reliability analysis of engineering structures, the application of scientific computing in urban water management and hydraulic engineering, and the application of genetic algorithms for the registration of laser scanner point clouds.

  18. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Materiel and High Explosives

    Science.gov (United States)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-03-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  19. Architectural Engineers

    DEFF Research Database (Denmark)

    Petersen, Rikke Premer

    engineering is addresses from two perspectives – as an educational response and an occupational constellation. Architecture and engineering are two of the traditional design professions and they frequently meet in the occupational setting, but at educational institutions they remain largely estranged....... The paper builds on a multi-sited study of an architectural engineering program at the Technical University of Denmark and an architectural engineering team within an international engineering consultancy based on Denmark. They are both responding to new tendencies within the building industry where...... the role of engineers and architects increasingly overlap during the design process, but their approaches reflect different perceptions of the consequences. The paper discusses some of the challenges that design education, not only within engineering, is facing today: young designers must be equipped...

  20. Tissue engineering

    CERN Document Server

    Fisher, John P; Bronzino, Joseph D

    2007-01-01

    Increasingly viewed as the future of medicine, the field of tissue engineering is still in its infancy. As evidenced in both the scientific and popular press, there exists considerable excitement surrounding the strategy of regenerative medicine. To achieve its highest potential, a series of technological advances must be made. Putting the numerous breakthroughs made in this field into a broad context, Tissue Engineering disseminates current thinking on the development of engineered tissues. Divided into three sections, the book covers the fundamentals of tissue engineering, enabling technologies, and tissue engineering applications. It examines the properties of stem cells, primary cells, growth factors, and extracellular matrix as well as their impact on the development of tissue engineered devices. Contributions focus on those strategies typically incorporated into tissue engineered devices or utilized in their development, including scaffolds, nanocomposites, bioreactors, drug delivery systems, and gene t...

  1. A Model for Effective Systems Engineering Workforce Development at Space and Naval Warfare Systems Center (SSC) Atlantic

    Science.gov (United States)

    2013-09-01

    Bloom created Bloom’s taxonomy in 1956 in order to encourage the developing of KSAs in ways other than just memorization of facts. This led to the... Taxonomy of educational objectives handbook I: The cognitive domain. New York: David McKay Co Inc. Bloom B. S. (n.d.). Bloom’s taxonomy of learning...for the Identification of Training Needs................................26  B.  APPLYING BLOOM’S TAXONOMY TO CLARIFY DESIRED KNOWLEDGE, SKILLS AND

  2. Global Survey of Research and Capabilities in Genetically Engineered Organisms That Could be Used in Biological Warfare or Bioterrorism

    Science.gov (United States)

    2008-12-01

    information needed to carry out biological processes and construct other biomolecules, such as messenger RNA and proteins. The reader already familiar ...for Emerging Infectious Diseases and Li Ka Shing Institute of Health Sciences, The Chinese University of Hong Kong Cuba: Institute de Medicina ...Hospital de Bellvitge, Universidad de Barcelona • Unidad de Medicina Tropical, Servicio de Enfermedades Infecciosas, Hospital Ramon y Cajal, Madrid

  3. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    I would like to thank Sarah Ashby, an amazing human being and friend; you spent countless hours researching information that was absolutely critical...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  4. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    Science.gov (United States)

    2009-10-09

    resurgence of similar large scale hacker wars. Some groups, rallying around politically “safe” topics such as anti- Tibetan independence, however, still...also described Peng as an “experienced hacker” (see Figure 5).88 • Following this exposure on Henderson’s blog, the Coolswallow and Buddhist ...the Tibetan Government in Exile in India. The Canadian-based Information Warfare Monitor (IWM) notes the compromise of numerous government and

  5. The Short-Term Effect of Chest Physiotherapy on Spirometric Indices in Chemical Warfare Victims Exposed to Mustard Gas

    Directory of Open Access Journals (Sweden)

    A Abedi

    2008-12-01

    Full Text Available ABCTRACT Introduction & Objective: Chronic respiratory diseases are the most prevalent late sequels of sulfur mustard gas injury among Iranian chemical warfare victims. Chest physiotherapy is one of the useful methods in care, cure and infection prevention of these patients. The aim of this study was to determine the short-term effect of chest physiotherapy on spirometric indices in chemical warfare victims exposed to sulfur mustard gas. Materials & Methods: In this study, 27 of the chemical warfare victims with respiratory diseases were selected. Chest physiotherapy including postural drainage percussion and vibration were used in four positions for all patients. Pulmonary function test (PFT was obtained before (baseline, immediately and 20 minute after the chest physiotherapy. The SPSS software was used for the data analysis of the collected data. Results: Results of this study showed the significant effect (p<0.01 of chest physiotherapy upon forced expiratory volume in first second (FEV1 (baseline mean, 44.19 immediately after intervention mean 47.3 and 20 minute after intervention mean 48.3 and forced vital capacity (FVC (baseline mean, 69.37 immediately after intervention mean, 73.67 20 minute after intervention 75.74. Chest physiotherapy had significant effect (p<0.01 in asthmatic bronchitis group and also had significant effect (p<0.05 in both severe and moderate groups. Conclusion: Chest physiotherapy was able to improve pulmonary function test indices in chemical warfare victims suffering from respiratory problems. The effect on asthmatic bronchitis group, as well as both severe and moderate groups, was significant.

  6. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  7. Special Operations Forces in the People’s Liberation Army and the Development of an Integral Unconventional Warfare Mission

    Science.gov (United States)

    2005-06-01

    Yahuda , Michael . The International Politics of the Asia-Pacific, 1945-1995 (New York; Routledge, 1996). Yang, Andrew N.D. and Liao, Milton Wen...Action: The Challenge of Unconventional Warfare (Portland: Frank Cass Press, 2001), 3-4. 9. Michael J.Strack, “China: Special Operations Forces of...weapons/scud.html; Internet; accessed 21 March 2005. 59. Michael B. Gordon and General Bernard E. Trainor, “ The General’s War: The Inside Story of

  8. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    effect, it is a living document that is not intended to offer arguments or recommendations for programmatic investments or priorities. It touches on the ...reports might offer different projections or update those already discussed. In effect, it is a living document. It is also important to emphasize what...now and 2050; these are depicted by the stars inside the left circle. Most of them will not have a game-changing importance for ground warfare in

  9. Engineering Bacteria to Catabolize the Carbonaceous Component of Sarin: Teaching E. coli to Eat Isopropanol

    DEFF Research Database (Denmark)

    Brown, Margaret E.; Mukhopadhyay, Aindrila; Keasling, Jay D.

    2016-01-01

    conversion with a key reaction performed by the acetone carboxylase complex (ACX). We engineered the heterologous expression of the ACX complex from Xanthobacter autotrophicus PY2 to match the naturally occurring subunit stoichiometry and purified the recombinant complex from E. coli for biochemical analysis....... Incorporating this ACX complex and enzymes from diverse organisms, we introduced an isopropanol degradation pathway in E. coli, optimized induction conditions, and decoupled enzyme expression to probe pathway bottlenecks. Our engineered E. coli consumed 65% of isopropanol compared to no-cell controls......We report an engineered strain of Escherichia coli that catabolizes the carbonaceous component of the extremely toxic chemical warfare agent sarin. Enzymatic decomposition of sarin generates isopropanol waste that, with this engineered strain, is then transformed into acetyl-CoA by enzymatic...

  10. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  11. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    Science.gov (United States)

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  12. Invisible Engineers

    Science.gov (United States)

    Ohashi, Hideo

    Questionnaire to ask “mention three names of scientists you know” and “three names of engineers you know” was conducted and the answers from 140 adults were analyzed. The results indicated that the image of scientists is represented by Nobel laureates and that of engineers by great inventors like Thomas Edison and industry founders like Soichiro Honda. In order to reveal the image of engineers among young generation, questionnaire was conducted for pupils in middle and high schools. Answers from 1,230 pupils were analyzed and 226 names mentioned as engineers were classified. White votes reached 60%. Engineers who are neither big inventors nor company founders collected less than 1% of named votes. Engineers are astonishingly invisible from young generation. Countermeasures are proposed.

  13. Engineering mechanics

    CERN Document Server

    Gross, Dietmar; Schröder, Jörg; Wall, Wolfgang A; Rajapakse, Nimal

    Statics is the first volume of a three-volume textbook on Engineering Mechanics. The authors, using a time-honoured straightforward and flexible approach, present the basic concepts and principles of mechanics in the clearest and simplest form possible to advanced undergraduate engineering students of various disciplines and different educational backgrounds. An important objective of this book is to develop problem solving skills in a systematic manner. Another aim of this volume is to provide engineering students as well as practising engineers with a solid foundation to help them bridge the gap between undergraduate studies on the one hand and advanced courses on mechanics and/or practical engineering problems on the other. The book contains numerous examples, along with their complete solutions. Emphasis is placed upon student participation in problem solving. The contents of the book correspond to the topics normally covered in courses on basic engineering mechanics at universities and colleges. Now in i...

  14. Human engineering

    International Nuclear Information System (INIS)

    Yang, Seong Hwan; Park, Bum; Gang, Yeong Sik; Gal, Won Mo; Baek, Seung Ryeol; Choe, Jeong Hwa; Kim, Dae Sung

    2006-07-01

    This book mentions human engineering, which deals with introduction of human engineering, Man-Machine system like system design, and analysis and evaluation of Man-Machine system, data processing and data input, display, system control of man, human mistake and reliability, human measurement and design of working place, human working, hand tool and manual material handling, condition of working circumstance, working management, working analysis, motion analysis working measurement, and working improvement and design in human engineering.

  15. Software engineering

    CERN Document Server

    Sommerville, Ian

    2010-01-01

    The ninth edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of 'traditional' plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever.

  16. Information engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hunt, D.N.

    1997-02-01

    The Information Engineering thrust area develops information technology to support the programmatic needs of Lawrence Livermore National Laboratory`s Engineering Directorate. Progress in five programmatic areas are described in separate reports contained herein. These are entitled Three-dimensional Object Creation, Manipulation, and Transport, Zephyr:A Secure Internet-Based Process to Streamline Engineering Procurements, Subcarrier Multiplexing: Optical Network Demonstrations, Parallel Optical Interconnect Technology Demonstration, and Intelligent Automation Architecture.

  17. Engineering Electromagnetics

    International Nuclear Information System (INIS)

    Kim, Se Yun

    2009-01-01

    This book deals with engineering electromagnetics. It contains seven chapters, which treats understanding of engineering electromagnetics such as magnet and electron spin, current and a magnetic field and an electromagnetic wave, Essential tool for engineering electromagnetics on rector and scalar, rectangular coordinate system and curl vector, electrostatic field with coulomb rule and method of electric images, Biot-Savart law, Ampere law and magnetic force, Maxwell equation and an electromagnetic wave and reflection and penetration of electromagnetic plane wave.

  18. Neural engineering

    CERN Document Server

    2013-01-01

    Neural Engineering, 2nd Edition, contains reviews and discussions of contemporary and relevant topics by leading investigators in the field. It is intended to serve as a textbook at the graduate and advanced undergraduate level in a bioengineering curriculum. This principles and applications approach to neural engineering is essential reading for all academics, biomedical engineers, neuroscientists, neurophysiologists, and industry professionals wishing to take advantage of the latest and greatest in this emerging field.

  19. Engineering tribology

    CERN Document Server

    Stachowiak, Gwidon; Batchelor, A W; Batchelor, Andrew W

    2005-01-01

    As with the previous edition, the third edition of Engineering Tribology provides a thorough understanding of friction and wear using technologies such as lubrication and special materials. Tribology is a complex topic with its own terminology and specialized concepts, yet is vitally important throughout all engineering disciplines, including mechanical design, aerodynamics, fluid dynamics and biomedical engineering. This edition includes updated material on the hydrodynamic aspects of tribology as well as new advances in the field of biotribology, with a focus throughout on the engineering ap

  20. Biomechanical warfare in ecology; negative interactions between species by habitat modification

    NARCIS (Netherlands)

    Van Wesenbeeck, B.K.; Van de Koppel, J.; Herman, P.M.J.; Bakker, J.P.; Bouma, T.J.

    2007-01-01

    Since the introduction of the term ecosystem engineering by Jones et al. many studies have focused on positive, facilitative interactions caused by ecosystem engineering. Much less emphasis has been placed on the role of ecosystem engineering in causing negative interactions between species. Here,

  1. Biomechanical warfare in ecology; negative interactions between species by habitat modification

    NARCIS (Netherlands)

    van Wesenbeeck, B. K.; van de Koppel, J.; Herman, P. M. J.; Bakker, J. P.; Bouma, T. J.

    Since the introduction of the term ecosystem engineering by Jones et al. many studies have focused on positive, facilitative interactions caused by ecosystem engineering. Much less emphasis has been placed on the role of ecosystem engineering in causing negative interactions between species. Here,

  2. Genetic Engineering

    Science.gov (United States)

    Phillips, John

    1973-01-01

    Presents a review of genetic engineering, in which the genotypes of plants and animals (including human genotypes) may be manipulated for the benefit of the human species. Discusses associated problems and solutions and provides an extensive bibliography of literature relating to genetic engineering. (JR)

  3. Corrosion Engineering.

    Science.gov (United States)

    White, Charles V.

    A description is provided for a Corrosion and Corrosion Control course offered in the Continuing Engineering Education Program at the General Motors Institute (GMI). GMI is a small cooperative engineering school of approximately 2,000 students who alternate between six-week periods of academic study and six weeks of related work experience in…

  4. Systems Engineering

    Science.gov (United States)

    Pellerano, Fernando

    2015-01-01

    This short course provides information on what systems engineering is and how the systems engineer guides requirements, interfaces with the discipline leads, and resolves technical issues. There are many system-wide issues that either impact or are impacted by the thermal subsystem. This course will introduce these issues and illustrate them with real life examples.

  5. Fluids engineering

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Fluids engineering has played an important role in many applications, from ancient flood control to the design of high-speed compact turbomachinery. New applications of fluids engineering, such as in high-technology materials processing, biotechnology, and advanced combustion systems, have kept up unwaining interest in the subject. More accurate and sophisticated computational and measurement techniques are also constantly being developed and refined. On a more fundamental level, nonlinear dynamics and chaotic behavior of fluid flow are no longer an intellectual curiosity and fluid engineers are increasingly interested in finding practical applications for these emerging sciences. Applications of fluid technology to new areas, as well as the need to improve the design and to enhance the flexibility and reliability of flow-related machines and devices will continue to spur interest in fluids engineering. The objectives of the present seminar were: to exchange current information on arts, science, and technology of fluids engineering; to promote scientific cooperation between the fluids engineering communities of both nations, and to provide an opportunity for the participants and their colleagues to explore possible joint research programs in topics of high priority and mutual interest to both countries. The Seminar provided an excellent forum for reviewing the current state and future needs of fluids engineering for the two nations. With the Seminar ear-marking the first formal scientific exchange between Korea and the United States in the area of fluids engineering, the scope was deliberately left broad and general

  6. Food Engineering

    NARCIS (Netherlands)

    Boom, R.M.; Janssen, A.E.M.

    2014-01-01

    Food engineering is a rapidly changing discipline. Traditionally, the main focus was on food preservation and stabilization, whereas trends now are on diversity, health, taste, and sustainable production. Next to a general introduction of the definition of food engineering, this article gives a

  7. Biomedical Engineering

    CERN Document Server

    Suh, Sang C; Tanik, Murat M

    2011-01-01

    Biomedical Engineering: Health Care Systems, Technology and Techniques is an edited volume with contributions from world experts. It provides readers with unique contributions related to current research and future healthcare systems. Practitioners and researchers focused on computer science, bioinformatics, engineering and medicine will find this book a valuable reference.

  8. Emotional engineering

    CERN Document Server

    In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering vol 2. describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotional engineering provides the means to integrate products to create a new social framework and develops services beyond product realization to create of value across a full lifetime.  14 chapters cover a wide range of topics that can be applied to product, process and industry development, with special attention paid to the increasing importance of sensing in the age of extensive and frequent changes, including: • Multisensory stimulation and user experience  • Physiological measurement • Tactile sensation • Emotional quality management • Mental model • Kansei engineering.   Emotional Engineering vol 2 builds on Dr Fukuda’s previous book, Emotional Engineering, and provides read...

  9. Efficacy of liquid and foam decontamination technologies for chemical warfare agents on indoor surfaces.

    Science.gov (United States)

    Love, Adam H; Bailey, Christopher G; Hanna, M Leslie; Hok, Saphon; Vu, Alex K; Reutter, Dennis J; Raber, Ellen

    2011-11-30

    Bench-scale testing was used to evaluate the efficacy of four decontamination formulations on typical indoor surfaces following exposure to the liquid chemical warfare agents sarin (GB), soman (GD), sulfur mustard (HD), and VX. Residual surface contamination on coupons was periodically measured for up to 24h after applying one of four selected decontamination technologies [0.5% bleach solution with trisodium phosphate, Allen Vanguard Surface Decontamination Foam (SDF™), U.S. military Decon Green™, and Modec Inc. and EnviroFoam Technologies Sandia Decontamination Foam (DF-200)]. All decontamination technologies tested, except for the bleach solution, performed well on nonporous and nonpermeable glass and stainless-steel surfaces. However, chemical agent residual contamination typically remained on porous and permeable surfaces, especially for the more persistent agents, HD and VX. Solvent-based Decon Green™ performed better than aqueous-based bleach or foams on polymeric surfaces, possibly because the solvent is able to penetrate the polymer matrix. Bleach and foams out-performed Decon Green for penetrating the highly polar concrete surface. Results suggest that the different characteristics needed for an ideal and universal decontamination technology may be incompatible in a single formulation and a strategy for decontaminating a complex facility will require a range of technologies. Copyright © 2011 Elsevier B.V. All rights reserved.

  10. Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”

    Directory of Open Access Journals (Sweden)

    Romaniuk Scott Nicholas

    2015-07-01

    Full Text Available The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US targeted killing (TK program dramatically increased after the War on Terror (WoT was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006, and Buzan and Wæver (2009 to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s against that threat are also securitized and therefore become extraordinary measures.

  11. Reactions of psychiatric inpatients to the threat of biological and chemical warfare in Israel.

    Science.gov (United States)

    Strous, Rael D; Ofir, Dana; Brodsky, Ori; Yakirevitch, Janna; Drannikov, Angela; Navo, Nadav; Kotler, Moshe

    2004-04-01

    In the months before the Second Gulf War, the threat of biological and chemical warfare led many Israelis to experience significant stress and mood changes. In this study, we investigated whether this threat affected the subjective mood and behavior of inpatients with schizophrenia and compared the results with effects noted in their clinical staff. Subjects were evaluated at two points in time-2 months before the war and on day 1 of the war-with a specially designed questionnaire and with the Spielberger Scale for Trait Anxiety. Although the responses of the two groups did not differ radically before the war, on the first day of war, significant differences were noted, with patients demonstrating increases in anxiety and level of concern. Both groups reported similar effects on their mood. Patients were more concerned about the potential for the outbreak of World War III, whereas staff were more concerned about economic effects. Female subjects in both groups demonstrated greater anxiety and mood changes after the outbreak of war compared with before the war. Effects observed on the patients may be related to the decreased coping threshold resulting from their illness, which renders psychotic patients more vulnerable to any acute stressor; however, effects on the staff members should not be ignored.

  12. Transmissivity and storage coefficient estimates from slug tests, Naval Air Warfare Center, West Trenton, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2014-01-01

    Slug tests were conducted on 56 observation wells open to bedrock at the former Naval Air Warfare Center (NAWC) in West Trenton, New Jersey. Aquifer transmissivity (T) and storage coefficient (S) values for most wells were estimated from slug-test data using the Cooper-Bredehoeft-Papadopulos method. Test data from three wells exhibited fast, underdamped water-level responses and were analyzed with the Butler high-K method. The range of T at NAWC was approximately 0.07 to 10,000 square feet per day. At 11 wells, water levels did not change measurably after 20 minutes following slug insertion; transmissivity at these 11 wells was estimated to be less than 0.07 square feet per day. The range of S was approximately 10-10 to 0.01, the mode being 10-10. Water-level responses for tests at three wells fit poorly to the type curves of both methods, indicating that these methods were not appropriate for adequately estimating T and S from those data.

  13. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    Science.gov (United States)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  14. Global physics: from percolation to terrorism, guerilla warfare and clandestine activities

    Science.gov (United States)

    Galam, Serge

    2003-12-01

    The September 11 attack on the US has revealed an unprecedented terrorism with worldwide range of destruction. It is argued to result from the first worldwide percolation of passive supporters. They are people sympathetic to the terrorism cause but without being involved with it. They just do not oppose it in case they could. This scheme puts suppression of the percolation as the major strategic issue in the fight against terrorism. Acting on the population is shown to be useless. Instead a new strategic scheme is suggested to increase the terrorism percolation threshold and in turn suppress the percolation. The relevant associated space is identified as a multi-dimensional social space including both the ground earth surface and all various independent flags displayed by the terrorist group. Some hints are given on how to shrink the geographical spreading of terrorism threat. The model apply to a large spectrum of clandestine activities including guerilla warfare as well as tax evasion, corruption, illegal gambling, illegal prostitution and black markets.

  15. Metabolic Syndrome in Chemical Warfare Patients with Chronic Obstructive Pulmonary Disease

    Directory of Open Access Journals (Sweden)

    Shahrzad M. Lari

    2014-11-01

    Full Text Available   Introduction: Sulfur mustard (SM, a toxic alkylating gas, can cause serious long-term pulmonary complications such as chronic obstructive pulmonary disease (COPD. Metabolic syndrome (MetS is one of the important comorbidities of COPD. This study was designed to evaluate the frequency of metabolic syndrome in Iranian chemical warfare patients (CWPs with COPD. Materials and Methods: Thirty CWPs with a mean age of 46.93± 6.8 were enrolled in this study. The following parameters were studied in: complete pulmonary function tests, health-related quality of life, serum triglycerides (TG, high density lipoprotein (HDL and fasting blood sugar (FBS levels. Additionally, 32 COPD patients and 56 healthy persons were considered as control groups who were matched to CWPs. Results: We found a statistically significant difference in the frequency of MetS between the COPD patients and the healthy control group (p=0.04. Additionally, we observed a statistically significant difference in the mean HDL levels among these groups (p=

  16. Structural Effect of Thioureas on the Detection of Chemical Warfare Agent Simulants.

    Science.gov (United States)

    Ha, Seonggyun; Lee, Minhe; Seo, Hyun Ook; Song, Sun Gu; Kim, Kyung-Su; Park, Chan Heum; Kim, Il Hee; Kim, Young Dok; Song, Changsik

    2017-08-25

    The ability to rapidly detect, identify, and monitor chemical warfare agents (CWAs) is imperative for both military and civilian defense. Since most CWAs and their simulants have an organophosphonate group, which is a hydrogen (H)-bond acceptor, many H-bond donors have been developed to effectively bind to the organophosphonate group. Although thioureas have been actively studied as an organocatalyst, they are relatively less investigated in CWA detection. In addition, there is a lack of studies on the structure-property relationship for gas phase detection. In this study, we synthesized various thioureas of different chemical structures, and tested them for sensing dimethylmethylphosphonate (DMMP), a CWA simulant. Molecular interaction between DMMP and thiourea was measured by 1 H NMR titration and supported by density functional theory (DFT) calculations. Strong H-bond donor ability of thiourea may cause self-aggregation, and CH-π interaction can play an important role in the DMMP detection. Gas-phase adsorption of DMMP was also measured using a quartz crystal microbalance (QCM) and analyzed using the simple Langmuir isotherm, showing the importance of structure-induced morphology of thioureas on the surface.

  17. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  18. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains

    Directory of Open Access Journals (Sweden)

    Alice Checcucci

    2017-11-01

    Full Text Available Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  19. China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities

    Directory of Open Access Journals (Sweden)

    Emilio Iasiello

    2016-06-01

    Full Text Available China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions.

  20. Virtual Warfare: Masculinity, Sexuality, and Propaganda in the Russo-Ukrainian War

    Directory of Open Access Journals (Sweden)

    Maryna Romanets

    2017-03-01

    Full Text Available This paper explores the intersection of sexual and political discourses as a particular aspect of the body politics that Russia has employed, among other strategies, in its massive propaganda offensive during the hybrid warfare against Ukraine.While recognizing sexuality as one of the mainstream concepts in political analysis, the paper draws on sexually explicit imagery and idiom used in Russian social media, and public discursive space in general, as propaganda techniques, and maps their “genealogy” within wider sociocultural and political contexts. Being conceptualized in terms of Russian hegemonic masculinity in relation to subordinated femininity and non-hegemonic masculinities of its adversarial others, these setups reveal how sexuality constitutes uneven and contradictory nexuses of power once being co-opted by Putin’s propaganda machine. It is noteworthy that Russia’s neo-imperial discursive tactics of homologizing sexual and political dominance—when supplemented with the official rhetoric of restituting Russia as a great power, Orthodox Christian fundamentalism as an integral part of Russian unique “state-civilization,” state-sanctioned homophobia, and traditional macho gender ideology—contribute quite effectively to sustaining public support in Russia for aggression against Ukraine in the process of Russian reimperialization of the former Soviet space.

  1. Trade, Diplomacy, and Warfare: The Quest for Elite Rhizobia Inoculant Strains.

    Science.gov (United States)

    Checcucci, Alice; DiCenzo, George C; Bazzicalupo, Marco; Mengoni, Alessio

    2017-01-01

    Rhizobia form symbiotic nitrogen-fixing nodules on leguminous plants, which provides an important source of fixed nitrogen input into the soil ecosystem. The improvement of symbiotic nitrogen fixation is one of the main challenges facing agriculture research. Doing so will reduce the usage of chemical nitrogen fertilizer, contributing to the development of sustainable agriculture practices to deal with the increasing global human population. Sociomicrobiological studies of rhizobia have become a model for the study of the evolution of mutualistic interactions. The exploitation of the wide range of social interactions rhizobia establish among themselves, with the soil and root microbiota, and with the host plant, could constitute a great advantage in the development of a new generation of highly effective rhizobia inoculants. Here, we provide a brief overview of the current knowledge on three main aspects of rhizobia interaction: trade of fixed nitrogen with the plant; diplomacy in terms of communication and possible synergistic effects; and warfare, as antagonism and plant control over symbiosis. Then, we propose new areas of investigation and the selection of strains based on the combination of the genetic determinants for the relevant rhizobia symbiotic behavioral phenotypes.

  2. Explosives and chemical warfare agents - detection and analysis with PTR-MS

    Energy Technology Data Exchange (ETDEWEB)

    Sulzer, Philipp; Juerschik, Simone; Jaksch, Stefan; Jordan, Alfons; Hanel, Gernot; Hartungen, Eugen; Seehauser, Hans; Maerk, Lukas; Haidacher, Stefan; Schottkowsky, Ralf [IONICON Analytik GmbH, Innsbruck (Austria); Petersson, Fredrik [Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria); Maerk, Tilmann [IONICON Analytik GmbH, Innsbruck (Austria); Institut fuer Ionenphysik und Angewandte Physik, Leopold-Franzens Universitaet Innsbruck (Austria)

    2010-07-01

    We utilized a recently developed high sensitivity PTR-MS instrument equipped with a high resolution time-of-flight mass analyzer for detailed investigations on explosives and chemical warfare agents (CWAs). We show that with this so called PTR-TOF 8000 it is possible to identify solid explosives (RDX, TNT, HMX, PETN and Semtex A) by analyzing the headspace above small quantities of samples at room temperature and from trace quantities not visible to the naked eye placed on surfaces. As the mentioned solid explosives possess very low vapor pressures, the main challenge for detecting them in the gas phase is to provide an instrument with a sufficient sensitivity. CWAs on the other side have very high vapor pressures but are difficult to identify unambiguously as their nominal molecular masses are usually comparably small and therefore hard to distinguish from harmless everyday-compounds (e.g. mustard gas: 159 g/mol). In the present work we demonstrate that we can detect a broad range of dangerous substances, ranging from the CWA mustard gas to the explosive HMX.

  3. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  4. Between Female Dialogics and Traces of Essentialism: Gender and Warfare in Christa Wolf's Major Writings

    Directory of Open Access Journals (Sweden)

    Sabine Wilke

    1993-06-01

    Full Text Available The relationship between memory, writing, and the question of how we define ourselves as gendered subjects is at the center of Christa Wolf's work. Her literary production, starting in the late fifties with a rather naive and un-selfconscious love story, has undergone a dramatic shift. In her more recent texts, Wolf sets out to rewrite classical mythology to make us aware of those intersections in the history of Western civilization at which women were made economically and psychologically into objects. The present essay seeks to locate Christa Wolf's evolving conception of gender and warfare within the contemporary theoretical discussion on identity and the subject sketched briefly above. While of late there has been a wealth of studies into the construction of gender in particular works by Wolf, no scholarly contribution has yet addressed the range of answers regarding those questions in her overall oeuvre. I will argue that whereas Wolf's earlier works present a dialogic conception of gender, her later narratives more and more expound a notion of the essentially more peaceful female subject that is counterposed to the essentially warloving male. In these works "female subjectivity is taken to be capable of articulating itself fully in its radical otherness outside of male discourse," which seems to support ideas of an ontological essence of "woman."

  5. Chemical warfare agent detection in complex environments with comprehensive two-dimensional gas chromatography

    Science.gov (United States)

    Reichenbach, Stephen E.; Ni, Mingtian; Kottapalli, Visweswara; Visvanathan, Arvind; Ledford, Edward B., Jr.; Oostdijk, John; Trap, Henk C.

    2003-08-01

    Comprehensive two-dimensional gas chromatography (GCxGC) is an emerging technology for chemical separation that provides an order-of-magnitude increase in separation capacity over traditional gas chromatography. GCxGC separates chemical species with two capillary columns interfaced by two-stage thermal desorption. Because GCxGC is comprehensive and has high separation capacity, it can perform multiple traditional analytical methods with a single analysis. GCxGC has great potential for a wide variety of environmental sensing applications, including detection of chemical warfare agents (CWA) and other harmful chemicals. This paper demonstrates separation of nerve agents sarin and soman from a matrix of gasoline and diesel fuel. Using a combination of an initial column separating on the basis of boiling point and a second column separating on the basis of polarity, GCxGC clearly separates the nerve agents from the thousands of other chemicals in the sample. The GCxGC data is visualized, processed, and analyzed as a two-dimensional digital image using a software system for GCxGC image processing developed at the University of Nebraska - Lincoln.

  6. Chemical Warfare Agent Surface Adsorption: Hydrogen Bonding of Sarin and Soman to Amorphous Silica.

    Science.gov (United States)

    Davis, Erin Durke; Gordon, Wesley O; Wilmsmeyer, Amanda R; Troya, Diego; Morris, John R

    2014-04-17

    Sarin and soman are warfare nerve agents that represent some of the most toxic compounds ever synthesized. The extreme risk in handling such molecules has, until now, precluded detailed research into the surface chemistry of agents. We have developed a surface science approach to explore the fundamental nature of hydrogen bonding forces between these agents and a hydroxylated surface. Infrared spectroscopy revealed that both agents adsorb to amorphous silica through the formation of surprisingly strong hydrogen-bonding interactions with primarily isolated silanol groups (SiOH). Comparisons with previous theoretical results reveal that this bonding occurs almost exclusively through the phosphoryl oxygen (P═O) of the agent. Temperature-programmed desorption experiments determined that the activation energy for hydrogen bond rupture and desorption of sarin and soman was 50 ± 2 and 52 ± 2 kJ/mol, respectively. Together with results from previous studies involving other phosphoryl-containing molecules, we have constructed a detailed understanding of the structure-function relationship for nerve agent hydrogen bonding at the gas-surface interface.

  7. Requirements Engineering

    CERN Document Server

    Hull, Elizabeth; Dick, Jeremy

    2011-01-01

    Written for those who want to develop their knowledge of requirements engineering process, whether practitioners or students.Using the latest research and driven by practical experience from industry, Requirements Engineering gives useful hints to practitioners on how to write and structure requirements. It explains the importance of Systems Engineering and the creation of effective solutions to problems. It describes the underlying representations used in system modeling and introduces the UML2, and considers the relationship between requirements and modeling. Covering a generic multi-layer r

  8. Glycosylation Engineering

    DEFF Research Database (Denmark)

    Clausen, Henrik; Wandall, Hans H.; Steentoft, Catharina

    2017-01-01

    Knowledge of the cellular pathways of glycosylation across phylogeny provides opportunities for designing glycans via genetic engineering in a wide variety of cell types including bacteria, fungi, plant cells, and mammalian cells. The commercial demand for glycosylation engineering is broad......, including production of biological therapeutics with defined glycosylation (Chapter 57). This chapter describes how knowledge of glycan structures and their metabolism (Parts I–III of this book) has led to the current state of glycosylation engineering in different cell types. Perspectives for rapid...

  9. Engineering mathematics

    CERN Document Server

    Bird, John

    2014-01-01

    A practical introduction to the core mathematics required for engineering study and practiceNow in its seventh edition, Engineering Mathematics is an established textbook that has helped thousands of students to succeed in their exams.John Bird's approach is based on worked examples and interactive problems. This makes it ideal for students from a wide range of academic backgrounds as the student can work through the material at their own pace. Mathematical theories are explained in a straightforward manner, being supported by practical engineering examples and applications in order to ensure

  10. Coastal Engineering

    NARCIS (Netherlands)

    Van der Velden, E.T.J.M.

    1989-01-01

    Introduction, waves, sediment transport, littoral transport, lonshore sediment transport, onshore-offshore sediment transport, coastal changes, dune erosion and storm surges, sedimentation in channels and trenches, coastal engineering in practice.

  11. Software engineering

    CERN Document Server

    Sommerville, Ian

    2016-01-01

    For courses in computer science and software engineering The Fundamental Practice of Software Engineering Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world's major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner. The Tenth Edition contains new information that highlights various technological updates of recent years, providing readers with highly relevant and current information. Sommerville's experience in system dependability and systems engineering guides the text through a traditional plan-based approach that incorporates some novel agile methods. The text strives to teach the innovators of tomorrow how to create software that will make our world a better, safer, and more advanced place to live.

  12. Nuclear Engineering

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    The Nuclear Engineering Division is engaged in both teaching and research. Staff members teach both graduate and undergraduate courses at the UPR Mayaguez Campus and direct the thesis work of nuclear engineering students. They do research on their own projects and assist the staff of other PRNC divisions as the need arises. The scientists on the Division's staff all hold joint appointments at PRNC and UPR, and they make up the faculty of the UPR Nuclear Engineering Department, the Head of the PRNC Division being also the Chairman of the UPR Department. The Division provides the classrooms, offices, laboratories and equipment, and most of the administrative personnel required for the education and training of the graduate students at the UPR Nuclear Engineering Department

  13. Harmonic engine

    Science.gov (United States)

    Bennett, Charles L [Livermore, CA

    2009-10-20

    A high efficiency harmonic engine based on a resonantly reciprocating piston expander that extracts work from heat and pressurizes working fluid in a reciprocating piston compressor. The engine preferably includes harmonic oscillator valves capable of oscillating at a resonant frequency for controlling the flow of working fluid into and out of the expander, and also preferably includes a shunt line connecting an expansion chamber of the expander to a buffer chamber of the expander for minimizing pressure variations in the fluidic circuit of the engine. The engine is especially designed to operate with very high temperature input to the expander and very low temperature input to the compressor, to produce very high thermal conversion efficiency.

  14. Green Engineering

    Science.gov (United States)

    Green Engineering is the design, commercialization and use of processes and products that are feasible and economical while reducing the generation of pollution at the source and minimizing the risk to human health and the environment.

  15. Engineering personnel

    International Nuclear Information System (INIS)

    Paskievici, W.

    The expansion of nuclear power is taxing human, material, and capital resources in developed and developing countries. This paper explores the human resources as represented by employment, graduation statistics, and educational curricula for nuclear engineers. (E.C.B.)

  16. Crystal Engineering

    Indian Academy of Sciences (India)

    Nangia (2002). “Today, research areas under the wide umbrella of crystal engineering include: supramolecular synthesis; nanotechnology; separation science and catalysis; supramolecular materials and devices; polymorphism; cocrystals, crystal structure prediction; drug design and ligand–protein binding.”

  17. Geoenvironmental engineering

    International Nuclear Information System (INIS)

    Shin, Eun Cheol; Park, Jeong Jun

    2009-08-01

    This book deals with definition of soil and scope of clean-up of soil, trend of geoenvironmental engineering at home and foreign countries, main concern of geoenvironmental engineering in domestic and abroad, design and building of landfills such as summary, trend of landfill policy in Korea, post management of landfill facilities, stabilizing and stability of landfill, research method and soil pollution source, restoration technology of soil pollution like restoration technique of oil pollution with thermal processing.

  18. Reliability Engineering

    International Nuclear Information System (INIS)

    Lee, Sang Yong

    1992-07-01

    This book is about reliability engineering, which describes definition and importance of reliability, development of reliability engineering, failure rate and failure probability density function about types of it, CFR and index distribution, IFR and normal distribution and Weibull distribution, maintainability and movability, reliability test and reliability assumption in index distribution type, normal distribution type and Weibull distribution type, reliability sampling test, reliability of system, design of reliability and functionality failure analysis by FTA.

  19. Microwave engineering

    CERN Document Server

    Pozar, David M

    2012-01-01

    The 4th edition of this classic text provides a thorough coverage of RF and microwave engineering concepts, starting from fundamental principles of electrical engineering, with applications to microwave circuits and devices of practical importance.  Coverage includes microwave network analysis, impedance matching, directional couplers and hybrids, microwave filters, ferrite devices, noise, nonlinear effects, and the design of microwave oscillators, amplifiers, and mixers. Material on microwave and RF systems includes wireless communications, radar, radiometry, and radiation hazards. A large

  20. COPD assessment test (CAT): simple tool for evaluating quality of life of chemical warfare patients with chronic obstructive pulmonary disease.

    Science.gov (United States)

    Lari, Shahrzad M; Ghobadi, Hassan; Attaran, Davood; Mahmoodpour, Afsoun; Shadkam, Omid; Rostami, Maryam

    2014-01-01

    Chronic obstructive pulmonary disease (COPD) is one of the serious late pulmonary complications caused by sulphur mustard exposure. Health status evaluations of chemical warfare patients with COPD are important to the management of these patients. The aim of this study was to determine the efficacy of the COPD assessment test (CAT) in evaluating the health-related quality of life (HRQOL) of chemical warfare patients with COPD. Eighty-two consecutive patients with stable COPD were enrolled in this study. All subjects were visited by one physician, and the HRQOL was evaluated by the CAT and St. George Respiratory Questionnaires (SGRQs). In addition, a standard spirometry test, 6-min walk distance test and pulse oxymetry were conducted. The severity of the COPD was determined using Global Initiative for Chronic Obstructive Lung Disease (GOLD) staging and the body mass index, obstruction, dyspnoea and exercise (BODE) index. The mean age of the patients was 47.30 ± 7.08 years. The mean CAT score was 26.03 ± 8.28. Thirty-five (43%) patients were in CAT stage 3. There were statistically significant correlations between the CAT and the SGRQ (r = 0.70, P = 0.001) and the BODE index (r = 0.70, P = 0.001). A statistically significant inverse correlation was found between the CAT score and the forced expiratory volume in 1 s (r = -0.30, P = 0.03). Our results demonstrated that the CAT is a simple and valid tool for assessment of HRQOL in chemical warfare patients with COPD and can be used in clinical practice. © 2013 John Wiley & Sons Ltd.

  1. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    Energy Technology Data Exchange (ETDEWEB)

    Zboril, Radek, E-mail: zboril@prfnw.upol.cz [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Andrle, Marek; Oplustil, Frantisek [Military Institute VOP-026 Sternberk, Division in Brno, Rybkova 8, 602 00 Brno (Czech Republic); Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek [Regional Centre of Advanced Technologies and Materials, Departments of Physical Chemistry and Experimental Physics, 17. listopadu 1192/12, 771 46 Olomouc (Czech Republic); Sharma, Virender K., E-mail: vsharma@fit.edu [Chemistry Department, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States); Center of Ferrate Excellence, Florida Institute of Technology, 150 West University Boulevard, Melbourne, FL 32901 (United States)

    2012-04-15

    Highlights: Black-Right-Pointing-Pointer Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. Black-Right-Pointing-Pointer Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). Black-Right-Pointing-Pointer Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Moessbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3 Prime -imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants ({approx}10{sup -2} s{sup -1}) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10{sup -8}-10{sup -6} s{sup -1}). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  2. Treatment of chemical warfare agents by zero-valent iron nanoparticles and ferrate(VI)/(III) composite

    International Nuclear Information System (INIS)

    Zboril, Radek; Andrle, Marek; Oplustil, Frantisek; Machala, Libor; Tucek, Jiri; Filip, Jan; Marusak, Zdenek; Sharma, Virender K.

    2012-01-01

    Highlights: ► Ferrate(VI) has been found to be highly efficient to decontaminate chemical warfare agents. ► Fast degradation of sulfur mustard, soman and compound VX by ferrate(VI). ► Nanoscale zero-valent iron particles are considerably less efficient in degradation of studied warfare agents compared to ferrate(VI). - Abstract: Nanoscale zero-valent iron (nZVI) particles and a composite containing a mixture of ferrate(VI) and ferrate(III) were prepared by thermal procedures. The phase compositions, valence states of iron, and particle sizes of iron-bearing compounds were determined by combination of X-ray powder diffraction, Mössbauer spectroscopy and scanning electron microscopy. The applicability of these environmentally friendly iron based materials in treatment of chemical warfare agents (CWAs) has been tested with three representative compounds, sulfur mustard (bis(2-chlorethyl) sulfide, HD), soman ((3,3′-imethylbutan-2-yl)-methylphosphonofluoridate, GD), and O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothiolate (VX). Zero-valent iron, even in the nanodimensional state, had a sluggish reactivity with CWAs, which was also observed in low degrees of CWAs degradation. On the contrary, ferrate(VI)/(III) composite exhibited a high reactivity and complete degradations of CWAs were accomplished. Under the studied conditions, the estimated first-order rate constants (∼10 −2 s −1 ) with the ferrate(VI)/(III) composite were several orders of magnitude higher than those of spontaneous hydrolysis of CWAs (10 −8 –10 −6 s −1 ). The results demonstrated that the oxidative technology based on application of ferrate(VI) is very promising to decontaminate CWAs.

  3. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  4. The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    OpenAIRE

    Shakarian, Paulo; Shakarian, Jana; Ruef, Andrew

    2013-01-01

    Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We then specifically look at how the case study of Operation Aurora, a cyber-operation directed against...

  5. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: System Development

    Science.gov (United States)

    2014-01-01

    during the SBIR process were Engineering Acoustics Inc., ( EAI ) and Chesapeake Technology International (CTI). The role of EAI was to design and...Engineering deliverables Engineering Acoustics, Inc. SBIR Under a previous SBIR, EAI developed the C-2 tactor which had become the industry... EAI also developed the eccentric-mass rubber (EMR) tactor to complement the C-2. The EMR weighs less than the C-2 and costs less to manufacture. It

  6. Modern warfare as a significant form of zoogeomorphic disturbance upon the landscape

    Science.gov (United States)

    Hupy, Joseph P.; Koehler, Thomas

    2012-07-01

    The damage exerted by warfare on the physical landscape is one, of many, anthropogenic impacts upon the environment. Bombturbation is a term that describes the impacts of explosive munitions upon the landscape. Bombturbation, like many other forms of zoogeomorphology, is a disruptive force, capable of moving large amounts of sediments, and denuding landscapes to the point where changes in micro and mesotopography have long-term implications. The long term implication of bombturbative actions depends on the type and duration of explosive device that rendered the disturbance, and the geographic context of the landscape disturbed; i.e. cultural and physical factors. Recovery from bombturbative activity, in the context of this research, is measured by vegetative regrowth and soil development in cratered disturbances. A comparison and contrast between the two battlefields of Verdun, France and Khe Sanh, Vietnam show that bombturbative actions have significantly altered the topography at each location, thus influencing surface runoff and processes of soil development. Principals of the Runge pedogenic model, or the energy of water moving through the soil profile, best explain how the varying climate and parent material at each location influence post disturbance soil development rates. Whereas the data collected at Verdun suggest that explosive munitions have put that landscape on diverging path of development, thus rendering it much different post-disturbance landscape, Khe Sanh displays much different recovery patterns. Preliminary research at Khe Sanh indicates that reforestation and soil development following disturbance are not so much influenced by bombturbative patterns as land use activities in the area of study.

  7. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  8. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  9. The use of advanced simulation in the training of anesthesiologists to treat chemical warfare casualties.

    Science.gov (United States)

    Berkenstadt, Haim; Ziv, Amitai; Barsuk, Daphna; Levine, Inbal; Cohen, Amir; Vardi, Amir

    2003-06-01

    Training anesthesiologists to treat nerve gas intoxication in a mass casualty scenario is a complicated task. The scenario is an unfamiliar medical situation involving the need to decontaminate patients before providing definitive medical treatment, and the need for physical protection to the medical team before decontamination. We describe the development of a simulation-based training program. In one site of a virtual hospital, anesthesiologists were trained in initial airway and breathing resuscitation before decontamination while wearing full protective gear. In another site, they were trained in the treatment of critically-ill patients with combined conventional and chemical injuries or severe intoxication. Intubation simulators of newborn, pediatric, and adult patients, advanced full-scale simulators, and actors simulating patients were used. Initial airway, breathing, and antidotal treatment were performed successfully, with or without full protective gear. The gas mask did not interfere with orotracheal intubation, but limited effective communication within the medical team. Chemical protective gloves were the limiting factor in the performance of medical tasks such as fixing the orotracheal tube. Twenty-two participants (88%) pointed out that the simulated cases represented realistic problems in this scenario, and all 25 participants found the simulated-based training superior to previous traditional training they had in this field. Using advanced simulation, we were able to train anesthesiologists to treat nerve gas intoxication casualties and to learn about the limitations of providing medical care in this setting. Advanced medical simulation can be used to train anesthesiologists to treat nonconventional warfare casualties. The limitations of medical performance in full protective gear can be learned from this training.

  10. Computed Tomography Imaging findings in Chemical Warfare Victims with pulmonary Complications

    Directory of Open Access Journals (Sweden)

    Zahra Salehinezhad

    2013-05-01

    Full Text Available Introduction: Data on imaging findings in pulmonary complications of chemical agents is scarce. The current study aimed to evaluate radiological findings of late onset pulmonary complications in chemical warfare victims (CWV and to guide pulmonologists in diagnosis of these subjects. Materials and Methods: Ninety- three male CWV were enrolled in this prospective study, 20-25 years (mean=23 after exposure. Demographic and clinical data were recorded. High resolution computed Tomography (HRCT of the lung was performed during inspiration and expiration and was double reported blindly by two radiologists. Final diagnosis was made according to HRCT findings. The HRCT findings, final diagnosis, and distribution of the abnormalities were compared between subjects whom had been exposed to more complex chemical agents used during the second half of the war and simpler agents during the first half. Results: The most frequent HRCT findings were air trapping (56.7% and mosaic attenuation (35.1%. The distribution of abnormalities was mostly local (79.4% and bilateral (73% especially in lower regions (61.3%. The diagnosed respiratory diseases included bronchiolitis obliterans (43%, chronic obstructive pulmonary disease (COPD (27.9%, asthma (23.6%, bronchiectasis (13.9% and interstitial lung disease (ILD (9.6%. Frequency of subjects involved in the second half of the period of war was more than the first period (P-value < 0.05 but the HRCT findings were similar. Conclusions: Bronchiolitis obliterans with picture of focal bilateral air trapping was the most common finding in CWV but asthma appeared to have become a new problem in these subjects.

  11. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Directory of Open Access Journals (Sweden)

    Moshiri Mohammd

    2012-11-01

    Full Text Available Abstract Organophosphorous (OP Nerve agents (NAs are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE resulting in accumulation of toxic levels of acetylcholine (ACh at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I AChE activity measurement, (II Determination of hydrolysis products in plasma and urine, (III Fluoride reactivation of phosphylated binding sites and (IV Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning.

  12. [Analytical and on-site detection methods for chemical warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2006-12-01

    Chemical warfare agents (CWAs) are fast acting and sometimes lethal, even at low levels, and can be classified into nerve gases, blister agents, choking agents, blood agents, vomit agents, tear gases, and incapacitating agents. As countermeasures against CWA terrorism, detection and identification are important. In crisis management, monitoring of CWAs in public places and security checks at territorial borders, big event venues, and executive facilities are performed for protection against terrorism. In consequence management, on-site detection by first responders and laboratory analysis after on-site sampling and transfer are performed for minimization of terrorism damage, leading to personal protection, initial investigation, and emergency lifesaving. In incident management, laboratory analysis is performed to provide evidence at court trials for the prevention of future crimes. Laboratory analysis consists of pretreatment of on-site and casualty samples and instrumental analysis using GC-MS. However, CWAs are easily degraded, and thus are difficult to detect. Instead, it is useful to detect their metabolites and degradation products using tert-butyldimethylsilyl derivatization GC-MS or direct LC-MS. Commercially available chemical detection equipment such as gas detection tubes and ion mobility spectrometers are used for on-site detection. We have evaluated the detection performance of such equipment and found that no equipment fulfills the required perfect performance of CWA detection sensitivity, accuracy, response time, return time, and operation. To overcome the drawbacks, we have adopted the monitoring tape method and counterflow introduction atmospheric pressure chemical ionization mass spectrometry and recommend the combination of commercial detection equipment and these new technologies for simultaneous, rapid detection of all CWAs.

  13. Application of stem cells in tissue engineering for defense medicine.

    Science.gov (United States)

    Ude, Chinedu Cletus; Miskon, Azizi; Idrus, Ruszymah Bt Hj; Abu Bakar, Muhamad Bin

    2018-02-26

    The dynamic nature of modern warfare, including threats and injuries faced by soldiers, necessitates the development of countermeasures that address a wide variety of injuries. Tissue engineering has emerged as a field with the potential to provide contemporary solutions. In this review, discussions focus on the applications of stem cells in tissue engineering to address health risks frequently faced by combatants at war. Human development depends intimately on stem cells, the mysterious precursor to every kind of cell in the body that, with proper instruction, can grow and differentiate into any new tissue or organ. Recent reports have suggested the greater therapeutic effects of the anti-inflammatory, trophic, paracrine and immune-modulatory functions associated with these cells, which induce them to restore normal healing and tissue regeneration by modulating immune reactions, regulating inflammation, and suppressing fibrosis. Therefore, the use of stem cells holds significant promise for the treatment of many battlefield injuries and their complications. These applications include the treatment of injuries to the skin, sensory organs, nervous system tissues, the musculoskeletal system, circulatory/pulmonary tissues and genitals/testicles and of acute radiation syndrome and the development of novel biosensors. The new research developments in these areas suggest that solutions are being developed to reduce critical consequences of wounds and exposures suffered in warfare. Current military applications of stem cell-based therapies are already saving the lives of soldiers who would have died in previous conflicts. Injuries that would have resulted in deaths previously now result in wounds today; similarly, today's permanent wounds may be reduced to tomorrow's bad memories with further advances in stem cell-based therapies.

  14. Employing Concept Definition Techniques to Deliver Value on the RAN Air Warfare Destroyer Program

    Science.gov (United States)

    2013-02-01

    Saunders Raytheon Australia Abstract Modern, complex development systems pose risks in defining the right system solution , building/integrating...Biography Steve Saunders, FIEAust CPEng, is an Engineering Fellow for Raytheon Australia . He received his Bachelor of Electrical Engineering from the...University of Technology Sydney (UTS) with first class Honors in 1990. He has worked with Rockwell International, Boeing Australia and now Raytheon

  15. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    mediate many biological functions such as reproduction, metabolism, growth , temperature , heart rate, behavior, memory and emotional state. Examples...large-scale fermentation . More recently, entire metabolic pathways, albeit of limited complexity, have been engineered into organisms, for example...for the production of artemisinin in yeast .2 In addition to such metabolic engineering projects, whole genomes are being sequenced, leading to the

  16. ANTARES: The first undersea neutrino telescope

    Science.gov (United States)

    Ageron, M.; Aguilar, J. A.; Al Samarai, I.; Albert, A.; Ameli, F.; André, M.; Anghinolfi, M.; Anton, G.; Anvar, S.; Ardid, M.; Arnaud, K.; Aslanides, E.; Assis Jesus, A. C.; Astraatmadja, T.; Aubert, J.-J.; Auer, R.; Barbarito, E.; Baret, B.; Basa, S.; Bazzotti, M.; Becherini, Y.; Beltramelli, J.; Bersani, A.; Bertin, V.; Beurthey, S.; Biagi, S.; Bigongiari, C.; Billault, M.; Blaes, R.; Bogazzi, C.; de Botton, N.; Bou-Cabo, M.; Boudahef, B.; Bouwhuis, M. C.; Brown, A. M.; Brunner, J.; Busto, J.; Caillat, L.; Calzas, A.; Camarena, F.; Capone, A.; Caponetto, L.; Cârloganu, C.; Carminati, G.; Carmona, E.; Carr, J.; Carton, P. H.; Cassano, B.; Castorina, E.; Cecchini, S.; Ceres, A.; Chaleil, Th.; Charvis, Ph.; Chauchot, P.; Chiarusi, T.; Circella, M.; Compère, C.; Coniglione, R.; Coppolani, X.; Cosquer, A.; Costantini, H.; Cottini, N.; Coyle, P.; Cuneo, S.; Curtil, C.; D'Amato, C.; Damy, G.; van Dantzig, R.; de Bonis, G.; Decock, G.; Decowski, M. P.; Dekeyser, I.; Delagnes, E.; Desages-Ardellier, F.; Deschamps, A.; Destelle, J.-J.; di Maria, F.; Dinkespiler, B.; Distefano, C.; Dominique, J.-L.; Donzaud, C.; Dornic, D.; Dorosti, Q.; Drogou, J.-F.; Drouhin, D.; Druillole, F.; Durand, D.; Durand, R.; Eberl, T.; Emanuele, U.; Engelen, J. J.; Ernenwein, J.-P.; Escoffier, S.; Falchini, E.; Favard, S.; Fehr, F.; Feinstein, F.; Ferri, M.; Ferry, S.; Fiorello, C.; Flaminio, V.; Folger, F.; Fritsch, U.; Fuda, J.-L.; Galatá, S.; Galeotti, S.; Gay, P.; Gensolen, F.; Giacomelli, G.; Gojak, C.; Gómez-González, J. P.; Goret, Ph.; Graf, K.; Guillard, G.; Halladjian, G.; Hallewell, G.; van Haren, H.; Hartmann, B.; Heijboer, A. J.; Heine, E.; Hello, Y.; Henry, S.; Hernández-Rey, J. J.; Herold, B.; Hößl, J.; Hogenbirk, J.; Hsu, C. C.; Hubbard, J. R.; Jaquet, M.; Jaspers, M.; de Jong, M.; Jourde, D.; Kadler, M.; Kalantar-Nayestanaki, N.; Kalekin, O.; Kappes, A.; Karg, T.; Karkar, S.; Karolak, M.; Katz, U.; Keller, P.; Kestener, P.; Kok, E.; Kok, H.; Kooijman, P.; Kopper, C.; Kouchner, A.; Kretschmer, W.; Kruijer, A.; Kuch, S.; Kulikovskiy, V.; Lachartre, D.; Lafoux, H.; Lagier, P.; Lahmann, R.; Lahonde-Hamdoun, C.; Lamare, P.; Lambard, G.; Languillat, J.-C.; Larosa, G.; Lavalle, J.; Le Guen, Y.; Le Provost, H.; Levansuu, A.; Lefèvre, D.; Legou, T.; Lelaizant, G.; Lévéque, C.; Lim, G.; Lo Presti, D.; Loehner, H.; Loucatos, S.; Louis, F.; Lucarelli, F.; Lyashuk, V.; Magnier, P.; Mangano, S.; Marcel, A.; Marcelin, M.; Margiotta, A.; Martinez-Mora, J. A.; Masullo, R.; Mazéas, F.; Mazure, A.; Meli, A.; Melissas, M.; Migneco, E.; Mongelli, M.; Montaruli, T.; Morganti, M.; Moscoso, L.; Motz, H.; Musumeci, M.; Naumann, C.; Naumann-Godo, M.; Neff, M.; Niess, V.; Nooren, G. J. L.; Oberski, J. E. J.; Olivetto, C.; Palanque-Delabrouille, N.; Palioselitis, D.; Papaleo, R.; Păvălaş, G. E.; Payet, K.; Payre, P.; Peek, H.; Petrovic, J.; Piattelli, P.; Picot-Clemente, N.; Picq, C.; Piret, Y.; Poinsignon, J.; Popa, V.; Pradier, T.; Presani, E.; Prono, G.; Racca, C.; Raia, G.; van Randwijk, J.; Real, D.; Reed, C.; Réthoré, F.; Rewiersma, P.; Riccobene, G.; Richardt, C.; Richter, R.; Ricol, J. S.; Rigaud, V.; Roca, V.; Roensch, K.; Rolin, J.-F.; Rostovtsev, A.; Rottura, A.; Roux, J.; Rujoiu, M.; Ruppi, M.; Russo, G. V.; Salesa, F.; Salomon, K.; Sapienza, P.; Schmitt, F.; Schöck, F.; Schuller, J.-P.; Schüssler, F.; Sciliberto, D.; Shanidze, R.; Shirokov, E.; Simeone, F.; Sottoriva, A.; Spies, A.; Spona, T.; Spurio, M.; Steijger, J. J. M.; Stolarczyk, Th.; Streeb, K.; Sulak, L.; Taiuti, M.; Tamburini, C.; Tao, C.; Tasca, L.; Terreni, G.; Tezier, D.; Toscano, S.; Urbano, F.; Valdy, P.; Vallage, B.; van Elewyck, V.; Vannoni, G.; Vecchi, M.; Venekamp, G.; Verlaat, B.; Vernin, P.; Virique, E.; de Vries, G.; van Wijk, R.; Wijnker, G.; Wobbe, G.; de Wolf, E.; Yakovenko, Y.; Yepes, H.; Zaborov, D.; Zaccone, H.; Zornoza, J. D.; Zúñiga, J.

    2011-11-01

    The ANTARES Neutrino Telescope was completed in May 2008 and is the first operational Neutrino Telescope in the Mediterranean Sea. The main purpose of the detector is to perform neutrino astronomy and the apparatus also offers facilities for marine and Earth sciences. This paper describes the design, the construction and the installation of the telescope in the deep sea, offshore from Toulon in France. An illustration of the detector performance is given.

  17. ANTARES : The first undersea neutrino telescope

    NARCIS (Netherlands)

    Ageron, M.; Aguilar, J. A.; Al Samarai, I.; Albert, A.; Ameli, F.; Andre, M.; Anghinolfi, M.; Anton, G.; Anvar, S.; Ardid, M.; Arnaud, K.; Aslanides, E.; Jesus, A. C. Assis; Astraatmadja, T.; Aubert, J. -J.; Auer, R.; Barbarito, E.; Baret, B.; Basa, S.; Bazzotti, M.; Becherini, Y.; Beltramelli, J.; Bersani, A.; Bertin, V.; Beurthey, S.; Biagi, S.; Bigongiari, C.; Billault, M.; Blaes, R.; Bogazzi, C.; de Botton, N.; Bou-Cabo, M.; Boudahef, B.; Bouwhuis, M. C.; Brown, A. M.; Brunner, J.; Busto, J.; Caillat, L.; Calzas, A.; Camarena, F.; Capone, A.; Caponetto, L.; Carloganu, C.; Carminati, G.; Carmona, E.; Carr, J.; Carton, P. H.; Cassano, B.; Castorina, E.; Cecchini, S.; Ceres, A.; Chaleil, Th; Charvis, Ph; Chauchot, P.; Chiarusi, T.; Circella, M.; Compere, C.; Coniglione, R.; Coppolani, X.; Cosquer, A.; Costantini, H.; Cottini, N.; Coyle, P.; Cuneo, S.; Curtil, C.; D'Amato, C.; Damy, G.; van Dantzig, R.; De Bonis, G.; Decock, G.; Decowski, M. P.; Dekeyser, I.; Delagnes, E.; Desages-Ardellier, F.; Deschamps, A.; Destelle, J. -J.; Di Maria, F.; Dinkespiler, B.; Distefano, C.; Dominique, J. -L.; Donzaud, C.; Dornic, D.; Dorosti, Q.; Drogou, J. -F.; Drouhin, D.; Druillole, F.; Durand, D.; Durand, R.; Eberl, T.; Emanuele, U.; Engelen, J. J.; Ernenwein, J. -P.; Escoffier, S.; Falchini, E.; Favard, S.; Fehr, F.; Feinstein, F.; Ferri, M.; Ferry, S.; Fiorello, C.; Flaminio, V.; Folger, F.; Fritsch, U.; Fuda, J. -L.; Galata, S.; Galeotti, S.; Gay, P.; Gensolen, F.; Giacomelli, G.; Gojak, C.; Gomez-Gonzalez, J. P.; Goret, Ph.; Graf, K.; Guillard, G.; Halladjian, G.; Hallewell, G.; van Haren, H.; Hartmann, B.; Heijboer, A. J.; Heine, E.; Hello, Y.; Henry, S.; Hernandez-Rey, J. J.; Herold, B.; Hoessl, J.; Hogenbirk, J.; Hsu, C. C.; Hubbard, J. R.; Jaquet, M.; Jaspers, M.; de Jong, M.; Jourde, D.; Kadler, M.; Kalantar-Nayestanaki, N.; Kalekin, O.; Kappes, A.; Karg, T.; Karkar, S.; Karolak, M.; Katz, U.; Keller, P.; Kestener, P.; Kok, E.; Kok, H.; Kooijman, P.; Kopper, C.; Kouchner, A.; Kretschmer, W.; Kruijer, A.; Kuch, S.; Kulikovskiy, V.; Lachartre, D.; Lafoux, H.; Lagier, P.; Lahmann, R.; Lahonde-Hamdoun, C.; Lamare, P.; Lambard, G.; Languillat, J-C; Larosa, G.; Lavalle, J.; Le Guen, Y.; Le Provost, H.; LeVanSuu, A.; Lefevre, D.; Legou, T.; Lelaizant, G.; Leveque, C.; Lim, G.; Lo Presti, D.; Loehner, H.; Loucatos, S.; Louis, F.; Lucarelli, F.; Lyashuk, V.; Magnier, P.; Mangano, S.; Marcel, A.; Marcelin, M.; Margiotta, A.; Martinez-Mora, J. A.; Masullo, R.; Mazeas, F.; Mazure, A.; Meli, A.; Melissas, M.; Migneco, E.; Mongelli, M.; Montaruli, T.; Morganti, M.; Moscoso, L.; Motz, H.; Musumeci, M.; Naumann, C.; Naumann-Godo, M.; Neff, M.; Niess, V.; Nooren, G. J. L.; Oberski, J. E. J.; Olivetto, C.; Palanque-Delabrouille, N.; Patioselitis, D.; Papaleo, R.; Pavalas, G. E.; Payet, K.; Payre, P.; Peek, H.; Petrovic, J.; Piattelli, P.; Picot-Clemente, N.; Picq, C.; Piret, Y.; Poinsignon, J.; Popa, V.; Pradier, T.; Presani, E.; Prono, G.; Racca, C.; Raia, G.; van Randwijk, J.; Real, D.; Reed, C.; Rethore, F.; Rewiersma, P.; Riccobene, G.; Richardt, C.; Richter, R.; Ricol, J. S.; Rigaud, V.; Roca, V.; Roensch, K.; Rolin, J. -F.; Rostovtsev, A.; Rottura, A.; Roux, J.; Rujoiu, M.; Ruppi, M.; Russo, G. V.; Salesa, F.; Salomon, K.; Sapienza, P.; Schmitt, F.; Schoeck, F.; Schuller, J. -P.; Schuessler, F.; Sciliberto, D.; Shanidze, R.; Shirokov, E.; Simeone, F.; Sottoriva, A.; Spies, A.; Spona, T.; Spurio, M.; Steijger, J. J. M.; Stolarczyk, Th; Streeb, K.; Sulak, L.; Taiuti, M.; Tamburini, C.; Tao, C.; Tasca, L.; Terreni, G.; Tezier, D.; Toscano, S.; Urbano, F.; Valdy, P.; Vallage, B.; Van Elewyck, V.; Vannoni, G.; Vecchi, M.; Venekamp, G.; Verlaat, B.; Vernin, P.; Virique, E.; de Vries, G.; Wijnker, G.; Wobbe, G.; de Wolf, E.; Yakovenko, Y.; Yepes, H.; Zaborov, D.; Zaccone, H.; Zornoza, J. D.; Zuniga, J.; van Wijk, R.

    2011-01-01

    The ANTARES Neutrino Telescope was completed in May 2008 and is the first operational Neutrino Telescope in the Mediterranean Sea. The main purpose of the detector is to perform neutrino astronomy and the apparatus also offers facilities for marine and Earth sciences. This paper describes the

  18. ACUMEN 2012: Atlantic Canyons Undersea Mapping Expeditions

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Between February and August 2012, a team of NOAA and external partners will conduct a mapping ‘blitz’ focused on deepwater canyons off the northeastern...

  19. Human and Computer Control of Undersea Teleoperators

    Science.gov (United States)

    1978-07-15

    transferring lead bricks in a nuclear hot cell , Vertut (1976) has shown that the time to move one block (cycle time) depends on the type of hand grip used...lations (which can be graphed as planes in hyperspace , lines if only two trade- off variables are included such as are shown in Figure 8.2 ). For each

  20. Engineering Optics

    CERN Document Server

    Iizuka, Keigo

    2008-01-01

    Engineering Optics is a book for students who want to apply their knowledge of optics to engineering problems, as well as for engineering students who want to acquire the basic principles of optics. It covers such important topics as optical signal processing, holography, tomography, holographic radars, fiber optical communication, electro- and acousto-optic devices, and integrated optics (including optical bistability). As a basis for understanding these topics, the first few chapters give easy-to-follow explanations of diffraction theory, Fourier transforms, and geometrical optics. Practical examples, such as the video disk, the Fresnel zone plate, and many more, appear throughout the text, together with numerous solved exercises. There is an entirely new section in this updated edition on 3-D imaging.

  1. Engineering physics

    CERN Document Server

    Mukherji, Uma

    2015-01-01

    ENGINEERING PHYSICS is designed as a textbook for first year engineering students of a two semester course in Applied Physics according to new revised syllabus. However the scope of this book is not only limited to undergraduate engineering students and science students, it can also serve as a reference book for practicing scientists.Advanced technological topics like LCD, Squid, Maglev system, Electron microscopes, MRI, Photonics - Photonic fibre, Nano-particles, CNT, Quantum computing etc., are explained with basic underlying principles of Physics.This text explained following topics with numerous solved, unsolved problems and questions from different angles. Part-I contains crystal structure, Liquid crystal, Thermo-electric effect, Thermionic emission, Ultrasonic, Acoustics, semiconductor and magnetic materials. Whereas Part-2 contains Optics, X-rays, Electron optics, Dielectric materials, Quantum Physics and Schrodinger wave equation, Laser, Fibre-optics and Holography, Radio-activity, Super-conductivity,...

  2. Engineering surveying

    CERN Document Server

    Schofield, W

    2007-01-01

    Engineering surveying involves determining the position of natural and man-made features on or beneath the Earth's surface and utilizing these features in the planning, design and construction of works. It is a critical part of any engineering project. Without an accurate understanding of the size, shape and nature of the site the project risks expensive and time-consuming errors or even catastrophic failure.Engineering Surveying 6th edition covers all the basic principles and practice of this complex subject and the authors bring expertise and clarity. Previous editions of this classic text have given readers a clear understanding of fundamentals such as vertical control, distance, angles and position right through to the most modern technologies, and this fully updated edition continues that tradition.This sixth edition includes:* An introduction to geodesy to facilitate greater understanding of satellite systems* A fully updated chapter on GPS, GLONASS and GALILEO for satellite positioning in surveying* Al...

  3. Micro Engineering

    DEFF Research Database (Denmark)

    Alting, Leo; Kimura, F.; Hansen, Hans Nørgaard

    2003-01-01

    The paper addresses the questions of how micro products are designed and how they are manufactured. Definitions of micro products and micro engineering are discussed and the presentation is aimed at describing typical issues, possibilities and tools regarding design of micro products. The implica......The paper addresses the questions of how micro products are designed and how they are manufactured. Definitions of micro products and micro engineering are discussed and the presentation is aimed at describing typical issues, possibilities and tools regarding design of micro products...

  4. Biochemistry engineering

    International Nuclear Information System (INIS)

    Jang, Ho Nam

    1993-01-01

    This deals with biochemistry engineering with nine chapters. It explains bionics on development and prospect, basics of life science on classification and structure, enzyme and metabolism, fundamentals of chemical engineering on viscosity, shear rate, PFR, CSTR, mixing, dispersion, measurement and response, Enzyme kinetics, competitive inhibition, pH profile, temperature profile, stoichiometry and fermentation kinetics, bio-reactor on Enzyme-reactor and microorganism-reactor, measurement and processing on data acquisition and data processing, separation and purification, waste water treatment and economics of bionics process.

  5. Software engineering

    CERN Document Server

    Thorin, Marc

    1985-01-01

    Software Engineering describes the conceptual bases as well as the main methods and rules on computer programming. This book presents software engineering as a coherent and logically built synthesis and makes it possible to properly carry out an application of small or medium difficulty that can later be developed and adapted to more complex cases. This text is comprised of six chapters and begins by introducing the reader to the fundamental notions of entities, actions, and programming. The next two chapters elaborate on the concepts of information and consistency domains and show that a proc

  6. Engineering tribology

    CERN Document Server

    Stachowiak, Gwidon

    2014-01-01

    Engineering Tribology, 4th Edition is an established introductory reference focusing on the key concepts and engineering implications of tribology. Taking an interdisciplinary view, the book brings together the relevant knowledge from different fields needed to achieve effective analysis and control of friction and wear. Updated to cover recent advances in tribology, this new edition includes new sections on ionic and mesogenic lubricants, surface texturing, and multiscale characterization of 3D surfaces and coatings. Current trends in nanotribology are discussed, such as those relating to

  7. Development and Application of Acute Exposure Guideline Levels (AEGLs) for Chemical Warfare Nerve and Sulfur Mustard Agents.

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Annetta Paule [ORNL; Opresko, Dennis M [ORNL; Young, Robert A [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency

    2006-01-01

    Acute exposure guideline levels (AEGLs) have been developed for the chemical warfare agents GB, GA, GD, GF, VX, and sulfur mustard. These AEGLs were approved by the National Advisory Committee for Acute Exposure Guideline Levels for Hazardous Substances after Federal Register publication and comment, and judged as scientifically valid by the National Research Council Committee on Toxicology Subcommittee on AEGLs. AEGLs represent general public exposure limits for durations ranging from 10 min to 8 h, and for three levels of severity (AEGL-1, AEGL-2, AEGL-3). Mild effects are possible at concentrations greater than AEGL-1, while life-threatening effects are expected at concentrations greater than AEGL-3. AEGLs can be applied to various civilian and national defense purposes, including evacuation and shelter-in-place protocols, reentry levels, protective clothing specifications, and analytical monitoring requirements. This report documents development and derivation of AEGL values for six key chemical warfare agents, and makes recommendations for their application to various potential exposure scenarios.

  8. A Comparison of QSAR Based Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants

    Science.gov (United States)

    2014-07-01

    AND EXPERIMENTAL DATA FOR SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS ECBC-TR-1259 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Cabalo , Jerry B. (ECBC); and Knox, Craig K. (Leidos) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT

  9. Development of an automated on-line pepsin digestion-liquid chromatography-tandem mass spectrometry configuration for the rapid analysis of protein adducts of chemical warfare agents

    NARCIS (Netherlands)

    Carol-Visser, J.; van der Schans, M.; Fidder, A.; Huist, A.G.; van Baar, B.L.M.; Irth, H.; Noort, D.

    2008-01-01

    Rapid monitoring and retrospective verification are key issues in protection against and non-proliferation of chemical warfare agents (CWA). Such monitoring and verification are adequately accomplished by the analysis of persistent protein adducts of these agents. Liquid chromatography-mass

  10. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SYSTEM ARCHITECTURE ...TITLE AND SUBTITLE SYSTEM ARCHITECTURE AND OPERATIONAL ANALYSIS OF MEDIUM DISPLACEMENT UNMANNED SURFACE VEHICLE SEA HUNTER AS A SURFACE WARFARE...traceability, requirements and capabilities while determining the architecture framework in accordance with the Department of Defense Architectural

  11. Combustion engineering

    CERN Document Server

    Ragland, Kenneth W

    2011-01-01

    Introduction to Combustion Engineering The Nature of Combustion Combustion Emissions Global Climate Change Sustainability World Energy Production Structure of the Book   Section I: Basic Concepts Fuels Gaseous Fuels Liquid Fuels Solid Fuels Problems Thermodynamics of Combustion Review of First Law Concepts Properties of Mixtures Combustion StoichiometryChemical EnergyChemical EquilibriumAdiabatic Flame TemperatureChemical Kinetics of CombustionElementary ReactionsChain ReactionsGlobal ReactionsNitric Oxide KineticsReactions at a Solid SurfaceProblemsReferences  Section II: Combustion of Gaseous and Vaporized FuelsFlamesLaminar Premixed FlamesLaminar Flame TheoryTurbulent Premixed FlamesExplosion LimitsDiffusion FlamesGas-Fired Furnaces and BoilersEnergy Balance and EfficiencyFuel SubstitutionResidential Gas BurnersIndustrial Gas BurnersUtility Gas BurnersLow Swirl Gas BurnersPremixed-Charge Engine CombustionIntroduction to the Spark Ignition EngineEngine EfficiencyOne-Zone Model of Combustion in a Piston-...

  12. Metabolic Engineering

    Indian Academy of Sciences (India)

    IAS Admin

    and in vitro to be able to alter properties of the encoded enzyme, and (6) assemble an array of genes for their expression inside the host cell. Although bacteria and yeast are the pioneering hosts for metabolic engineering, other organisms such as fungi, animal as well as plant cells are also used nowadays for similar experi ...

  13. Metabolic Engineering

    Indian Academy of Sciences (India)

    IAS Admin

    Metabolic engineering is a process for modulating the me- tabolism of the organisms so as to produce the required amounts of the desired metabolite through genetic manipula- tions. Considering its advantages over the other chemical synthesis routes, this area of biotechnology is likely to revolu- tionize the way in which ...

  14. Sound engineer

    CERN Document Server

    Mara, Wil

    2015-01-01

    "Readers will learn what it takes to succeed as a sound engineer. The book also explains the necessary educational steps, useful character traits, potential hazards, and daily job tasks related to this career. Sidebars include thought-provoking trivia. Questions in the backmatter ask for text-dependent analysis. Photos, a glossary, and additional resources are included."-- Provided by publisher.

  15. 16th Annual Expeditionary Warfare Conference: Integrating Future and Present Capabilities

    Science.gov (United States)

    2011-10-27

    engines, waterjets and diesel engines. WEATHERHAVEN RESOURCES, INC. Weatherhaven is a leading provider of portable shelters, camps and systems for remote...Engines (9.1 MW each, 36.4 MW total) • (4) ZF 60000NR2H Reduction Gears • (4) Wartsila WLD 1400 SR Waterjets • (4) IF V1312C2ME-HPCR Diesel...enacted level and 10% below the FY2011 enacted level Current DoD Fiscal Environment -2 August 2011- -18 August 2011- “…additional cuts caused by

  16. Biocommodity Engineering.

    Science.gov (United States)

    Lynd; Wyman; Gerngross

    1999-10-01

    The application of biotechnology to the production of commodity products (fuels, chemicals, and materials) offering benefits in terms of sustainable resource supply and environmental quality is an emergent area of intellectual endeavor and industrial practice with great promise. Such "biocommodity engineering" is distinct from biotechnology motivated by health care at multiple levels, including economic driving forces, the importance of feedstocks and cost-motivated process engineering, and the scale of application. Plant biomass represents both the dominant foreseeable source of feedstocks for biotechnological processes as well as the only foreseeable sustainable source of organic fuels, chemicals, and materials. A variety of forms of biomass, notably many cellulosic feedstocks, are potentially available at a large scale and are cost-competitive with low-cost petroleum whether considered on a mass or energy basis, and in terms of price defined on a purchase or net basis for both current and projected mature technology, and on a transfer basis for mature technology. Thus the central, and we believe surmountable, impediment to more widespread application of biocommodity engineering is the general absence of low-cost processing technology. Technological and research challenges associated with converting plant biomass into commodity products are considered relative to overcoming the recalcitrance of cellulosic biomass (converting cellulosic biomass into reactive intermediates) and product diversification (converting reactive intermediates into useful products). Advances are needed in pretreatment technology to make cellulosic materials accessible to enzymatic hydrolysis, with increased attention to the fundamental chemistry operative in pretreatment processes likely to accelerate progress. Important biotechnological challenges related to the utilization of cellulosic biomass include developing cellulase enzymes and microorganisms to produce them, fermentation of

  17. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    Science.gov (United States)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household

  18. Impact of psychological problems in chemical warfare survivors with severe ophthalmologic complication, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Ghaedi Gholamhosein

    2012-04-01

    Full Text Available Abstract Background Sulfur mustard (SM has been used as a chemical warfare agent since the early twentieth century. Despite the large number of studies that have investigated SM induced ocular injuries, few of those studies have also focused on the psychological health status of victims. This study has evaluated the most prominent influences on the psychological health status of patients with severe SM induced ocular injuries. Methods This descriptive study was conducted on 149 Iranian war veterans with severe SM induced eye injuries. The psychological health status of all patients was assessed using the Iranian standardized Symptom Check List 90-Revised (SCL90-R questionnaire. The results of patients' Global Severity Index (GSI were compared with the optimal cut-off point of 0.4 that has previously been calculated for GSI in Iranian community. The Mann-Whitney U test, T tests and effect sizes (using Cohen's d were employed as statistical methods. Data were analyzed using SPSS software. Results The mean age of patients was 44.86 (SD = 8.7 and mean duration of disease was 21.58 (SD = 1.20 years. Rate of exposure was once in 99 (66.4% cases. The mean GSI (1.46 of the study group was higher compared to standardized cut off point (0.4 of the Iranian community. The results of this study showed that the mean of total GSI score was higher in participants with lower educational levels (effect size = 0.507, unemployment (effect size = 0.464 and having more than 3 children (effect size = 0.62. Among the participants, 87 (58.4% cases had a positive psychological history for hospitalization or receiving outpatient cares previously and 62 (41.6% cases had a negative psychological history. In addition, the mean of GSI in participants with negative psychological history was lower than those with positive psychological history (Mean Change Difference = -0.621 with SD = 0.120. There was a significant difference between positive and negative psychological history

  19. Interleukin-6 and airflow limitation in chemical warfare patients with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    Davood Attaran

    2010-09-01

    disease, interleukin-6, inflammation, chemical warfare

  20. Anticonvulsant efficacy of antihistamine cyproheptadine in rats exposed to the chemical warfare nerve agent soman.

    Science.gov (United States)

    Winkler, Jennifer L; Skovira, Jacob W; Kan, Robert K

    2017-01-01

    Organophosphate compounds, such as soman and sarin, are highly toxic chemical warfare nerve agents that cause a build-up of acetylcholine in synapses and neuromuscular junctions. Current therapies aim to prevent seizures and protect against brain injury following exposure. The present study was designed to evaluate the effectiveness of the antihistamine cyproheptadine in improving survival and controlling seizures in rats exposed to soman. Rats were pretreated with the oxime reactivator HI-6 (125mg/kg, ip) 30min prior to soman exposure (225μg/kg, sc) and then treated with atropine methylnitrate (AMN, 2.0mg/kg, im) 1min after soman. Cyproheptadine (10, 13, 16 or 20mg/kg, ip) was given at one of three time points: 1min after soman intoxication, at the onset of soman-induced seizures or 5min after seizure onset. Control animals were exposed to soman and given an equivalent volume of sterile water instead of cyproheptadine. The incidence of seizures, mortality, neuron counts, neuropathology and apoptosis in specific regions of the brain were evaluated. In animals given HI-6 and AMN the incidence of soman-induced seizure and mortality rate within the first 24h were 100%. When cyproheptadine was given at a dose of 13 or 20mg/kg 1min after soman exposure, the incidence of seizures was reduced from 100% to 13% and 30%, respectively. In addition, cyproheptadine given at 1min after soman exposure increased the survival rate to 100% regardless of dose. When cyproheptadine was administered at seizure onset, seizures were terminated in 100% of the animals at doses above 10mg/kg. The survival rate with cyproheptadine treatment at the onset of seizure was ≥83%. Seizures terminated in ≥75% of the animals that received cyproheptadine 5min after soman-induced seizure onset. When given at 5min after seizure onset the survival rate was 100% at all tested doses of cyproheptadine. The neuropathology scores and the number of TUNEL positive cells in the brain regions examined

  1. Anthropogenic landforms of warfare origin and their ecological significance: the Verdun Forest, NE France

    Science.gov (United States)

    De Matos Machado, Rémi; Amat, Jean-Paul; Arnaud-Fassetta, Gilles; Bétard, François; Bilodeau, Clélia; Jacquemot, Stéphanie; Toumazet, Jean-Pierre

    2017-04-01

    By its unprecedented industrial character, the First World War marked landscapes like no other conflict in the world. As a result of artillery bombardment and building facilities, the relief suffered major disturbances giving rise to millions anthropogenic landforms of warfare origin on the Western front: shell craters, trenches, shelters and gun sites. This landscape made of bumps and holes that dominated the lands of West Flanders and North-eastern France during the four years of war took chaotic aspects on the great battle sites. In some areas, substrate crushing by repeated bombings resulted in a field lowering of several metres. Although these geomorphological legacies of war are still present on these scarred lands, their effects on local environment and on present-day biodiversity patterns are not fully understood. On the battlefield of Verdun, where a huge number and range of conflict-induced landforms may be observed, special attention is being paid to the ecological significance of these anthropogenic landforms in a current landscape matrix dominated by forest. In 2013, an airborne LiDAR mission conducted over the battlefield has brought to light the relief inherited from the fighting that was until now concealed by the Verdun forest planted in the 1930's. Through a digital terrain model (DTM) with centimetre level accuracy, it is now possible to observe the smallest traces of the fighting. A first programmatic mapping work allowed to inventory and to locate these reliefs on the whole 10,000 hectares covered by the DTM. Also, the calculation of their geometry enabled us to quantify the erosion rate due to the military activities on the battlefield. On the basis of these morphometric measurements, a typology was developed to better appreciate the morphological diversity of conflict-induced landforms. The results show that these anthropogenic landforms are generally hollow. Because of this particular morphology, the conflict-induced landforms provide

  2. Engineering Review Information System

    Science.gov (United States)

    Grems, III, Edward G. (Inventor); Henze, James E. (Inventor); Bixby, Jonathan A. (Inventor); Roberts, Mark (Inventor); Mann, Thomas (Inventor)

    2015-01-01

    A disciplinal engineering review computer information system and method by defining a database of disciplinal engineering review process entities for an enterprise engineering program, opening a computer supported engineering item based upon the defined disciplinal engineering review process entities, managing a review of the opened engineering item according to the defined disciplinal engineering review process entities, and closing the opened engineering item according to the opened engineering item review.

  3. Engine Handling.

    Science.gov (United States)

    1983-02-01

    air seal for long life turbine engine. AIAA - 81 - 1440 4.- STEWART P.A.E., BRASNETT K.A., The contribution of dynamic x - ray to gas turbine air...trio exigeant A ce nivoau. Los calculo 4’int~gration du syotime adjoint sont trio p~nalisanto en tempo de calcul. LuA vatu g.aeh d & apt~If adjoint

  4. Robot engineering

    International Nuclear Information System (INIS)

    Jung, Seul

    2006-02-01

    This book deals with robot engineering, giving descriptions of robot's history, current tendency of robot field, work and characteristic of industrial robot, essential merit and vector, application of matrix, analysis of basic vector, expression of Denavit-Hartenberg, robot kinematics such as forward kinematics, inverse kinematics, cases of MATLAB program, and motion kinematics, robot kinetics like moment of inertia, centrifugal force and coriolis power, and Euler-Lagrangian equation course plan, SIMULINK position control of robots.

  5. Planetary engineering

    Science.gov (United States)

    Pollack, James B.; Sagan, Carl

    1991-01-01

    Assuming commercial fusion power, heavy lift vehicles and major advances in genetic engineering, the authors survey possible late-21st century methods of working major transformations in planetary environments. Much more Earthlike climates may be produced on Mars by generating low freezing point greenhouse gases from indigenous materials; on Venus by biological conversion of CO2 to graphite, by canceling the greenhouse effect with high-altitude absorbing fine particles, or by a sunshield at the first Lagrangian point; and on Titan by greenhouses and/or fusion warming. However, in our present state of ignorance we cannot guarantee a stable endstate or exclude unanticipated climatic feedbacks or other unintended consequences. Moreover, as the authors illustrate by several examples, many conceivable modes of planetary engineering are so wasteful of scarce solar system resources and so destructive of important scientific information as to raise profound ethical issues, even if they were economically feasible, which they are not. Global warming on Earth may lead to calls for mitigation by planetary engineering, e.g., emplacement and replenishment of anti-greenhouse layers at high altitudes, or sunshields in space. But here especially we must be concerned about precision, stability, and inadvertent side-effects. The safest and most cost-effective means of countering global warming - beyond, e.g., improved energy efficiency, CFC bans and alternative energy sources - is the continuing reforestation of approximately 2 times 107 sq km of the Earth's surface. This can be accomplished with present technology and probably at the least cost.

  6. Web Engineering

    Energy Technology Data Exchange (ETDEWEB)

    White, Bebo

    2003-06-23

    Web Engineering is the application of systematic, disciplined and quantifiable approaches to development, operation, and maintenance of Web-based applications. It is both a pro-active approach and a growing collection of theoretical and empirical research in Web application development. This paper gives an overview of Web Engineering by addressing the questions: (a) why is it needed? (b) what is its domain of operation? (c) how does it help and what should it do to improve Web application development? and (d) how should it be incorporated in education and training? The paper discusses the significant differences that exist between Web applications and conventional software, the taxonomy of Web applications, the progress made so far and the research issues and experience of creating a specialization at the master's level. The paper reaches a conclusion that Web Engineering at this stage is a moving target since Web technologies are constantly evolving, making new types of applications possible, which in turn may require innovations in how they are built, deployed and maintained.

  7. Planetary engineering

    Science.gov (United States)

    Pollack, James B.; Sagan, Carl

    Assuming commercial fusion power, heavy lift vehicles and major advances in genetic engineering, the authors survey possible late-21st century methods of working major transformations in planetary environments. Much more Earthlike climates may be produced on Mars by generating low freezing point greenhouse gases from indigenous materials; on Venus by biological conversion of CO2 to graphite, by canceling the greenhouse effect with high-altitude absorbing fine particles, or by a sunshield at the first Lagrangian point; and on Titan by greenhouses and/or fusion warming. However, in our present state of ignorance we cannot guarantee a stable endstate or exclude unanticipated climatic feedbacks or other unintended consequences. Moreover, as the authors illustrate by several examples, many conceivable modes of planetary engineering are so wasteful of scarce solar system resources and so destructive of important scientific information as to raise profound ethical issues, even if they were economically feasible, which they are not. Global warming on Earth may lead to calls for mitigation by planetary engineering, e.g., emplacement and replenishment of anti-greenhouse layers at high altitudes, or sunshields in space. But here especially we must be concerned about precision, stability, and inadvertent side-effects. The safest and most cost-effective means of countering global warming - beyond, e.g., improved energy efficiency, CFC bans and alternative energy sources - is the continuing reforestation of approximately 2 times 107 sq km of the Earth's surface. This can be accomplished with present technology and probably at the least cost.

  8. Evaluation of Molecular Markers and Analytical Methods Documenting the Occurrence of Mustard Gas and Arsenical Warfare Agents in Soil.

    Science.gov (United States)

    Sassolini, Alessandro; Brinchi, Giampaolo; Di Gennaro, Antonio; Dionisi, Simone; Dominici, Carola; Fantozzi, Luca; Onofri, Giorgio; Piazza, Rosario; Guidotti, Maurizio

    2016-09-01

    The chemicals warfare agents (CWAs) are an extremely toxic class of molecules widely produced in many industrialized countries for decades, these compounds frequently contained arsenic. The plants where the CWAs have been produced or the plants where they have been demilitarized after the Second World War with unacceptable techniques can represent a serious environmental problem. CWAs standards are difficult to find on market so in present work an environmental assessment method based on markers has been proposed. Triphenylarsine, phenylarsine oxide and thiodiglycol have been selected as markers. Three reliable analytical methods based on gaschromatography and mass detection have been proposed and tested for quantitative analysis of markers. Methods performance have been evaluated testing uncertainty, linearity, recovery and detection limits and also comparing detection limits with exposure limits of reference CWAs. Proposed assessment methods have been applied to a case study of a former industrial plant sited in an area characterized by a high background of mineral arsenic.

  9. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  10. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  11. Engineering justice transforming engineering education and practice

    CERN Document Server

    Leydens, Jon A

    2018-01-01

    Using social justice as a catalyst for curricular transformation, Engineering Justice presents an examination of how politics, culture, and other social issues are inherent in the practice of engineering. It aims to align engineering curricula with socially just outcomes, increase enrollment among underrepresented groups, and lessen lingering gender, class, and ethnicity gaps by showing how the power of engineering knowledge can be explicitly harnessed to serve the underserved and address social inequalities. This book is meant to transform the way educators think about engineering curricula through creating or transforming existing courses to attract, retain, and motivate engineering students to become professionals who enact engineering for social justice. Engineering Justice offers thought-provoking chapters on: why social justice is inherent yet often invisible in engineering education and practice; engineering design for social justice; social justice in the engineering sciences; social justice in human...

  12. “John A. MacMillan: Pioneer Missionary of Spiritual Warfare and the Believer’s Authority”

    Directory of Open Access Journals (Sweden)

    Paul King

    2016-01-01

    Full Text Available Many people associate teaching on spiritual warfare and the authority of the believer from charismatic or Word of Faith sources, especially like Kenneth Hagin. However, the original source of teaching on this doctrine comes from classic holiness roots in the Higher Life and Keswick movements, especially from John A. MacMillan, a missionary, writer, editor, and professor with the Christian and Missionary Alliance. In 1932 he wrote a series of articles entitled “The Authority of the Believer,” eventually published in book form, distributed widely and republished in other periodicals. MacMillan had a remarkable and extensive ministry in the exercise of the authority of the believer and spiritual warfare spanning more than thirty years. His experiences include divine protection, healing, divine intervention, power encounters with demonic forces, and teaching on territorial spirits and generational bondages. Numerous evangelical and charismatic leaders have quoted or referred to his teachings and principles.Banyak orang mengasosiasikan pengajaran peperangan rohani dan otoritas orang percaya dari karismatik atau sumber Firman Iman, terutama seperti Kenneth Hagin. Namun, sumber asli dari pengajaran doktrin ini berasal dari akar kekudusan klasik dalam gerakan Higher Life dan Keswick, terutama dari John A. MacMillan, seorang misionaris, penulis, editor, dan profesor dengan Christian and Missionary Alliance. Pada tahun 1932 ia menulis serangkaian artikel yang berjudul “Otoritas orang percaya,” akhirnya diterbitkan dalam bentuk buku, didistribusikan secara luas dan diterbitkan di majalah lainnya. MacMillan memiliki pelayanan yang luar biasa dan luas dalam pelaksanaan otoritas orang percaya dan peperangan rohani yang lebih dari tiga puluh tahun. Pengalamannya termasuk perlindungan ilahi, penyembuhan, campur tangan ilahi, pertemuan kuasa dengan kekuatan jahat, dan pengajaran tentang roh teritorial dan perbudakan generasi. Banyak pemimpin injili dan

  13. Microprocessor engineering

    CERN Document Server

    Holdsworth, B

    2013-01-01

    Microprocessor Engineering provides an insight in the structures and operating techniques of a small computer. The book is comprised of 10 chapters that deal with the various aspects of computing. The first two chapters tackle the basic arithmetic and logic processes. The third chapter covers the various memory devices, both ROM and RWM. Next, the book deals with the general architecture of microprocessor. The succeeding three chapters discuss the software aspects of machine operation, while the last remaining three chapters talk about the relationship of the microprocessor with the outside wo

  14. Internet Search Engines

    OpenAIRE

    Fatmaa El Zahraa Mohamed Abdou

    2004-01-01

    A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  15. Management of DoD Irregular Warfare (IW) and Security Force Assistance (SFA) Capabilities

    Science.gov (United States)

    2016-05-03

    training, education, and experience) to support their theater strategies and DoD strategic plans. DoDI 3000.11, May 3, 2016 SECTION 3: PROCEDURES 6...professional licensing such as: Law, Business, Government, Economics, Anthropology , Engineering, Agriculture, Veterinary Medicine, and others. (4...development of the capacity and capability of foreign security forces and their supporting institutions. theater strategy. An overarching construct

  16. The Making of a Government LSI - From Warfare Capability to Operational System

    Science.gov (United States)

    2015-04-30

    Box Launcher; Systems Engineering Organization ( SEO ); and Flight Test. These program offices operated under the oversight of the Navy-led Joint...C9P02R01-043). Monterey, CA: Naval Postgraduate School. Retrieved from http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix= html &identifier

  17. Brandishing the Economic Weapon: A Study of United States Economic Warfare against Japan, 1940 - 1941

    Science.gov (United States)

    1985-04-26

    Italy moved to bring the immense resources and the power of China and of Southeast Asia under its control. Roosevelt directed advisor Clark ...Regneir, Comments on the proposals of LTC Leavell , Engineer, on seizing East Indies Oil Wells, 13 January 1941, Stimson Papers, reel 103, p. 63. 26

  18. Analysis of Human-Computer Interaction in the Expeditionary Warfare Decision Support System (EDSS)

    Science.gov (United States)

    2004-09-01

    interpreted several ways. Jakob Nielsen , a well known usability expert, describes the factors of a usable system: learnability—the system should be easy...Defense Authorization Act for FY01, March 2001. Nielsen , J., 1993. Usability Engineering. Morgan Kaufmann/Academic Press, San Francisco, 12–13, 26–33

  19. An engineering context for software engineering

    OpenAIRE

    Riehle, Richard D.

    2008-01-01

    New engineering disciplines are emerging in the late Twentieth and early Twenty-first Century. One such emerging discipline is software engineering. The engineering community at large has long harbored a sense of skepticism about the validity of the term software engineering. During most of the fifty-plus years of software practice, that skepticism was probably justified. Professional education of software developers often fell short of the standard expected for conventional engineers; so...

  20. Engineering electromagnetics

    CERN Document Server

    Thomas, David T; Hartnett, James P; Hughes, William F

    1973-01-01

    The applications involving electromagnetic fields are so pervasive that it is difficult to estimate their contribution to the industrial output: generation of electricity, power transmission lines, electric motors, actuators, relays, radio, TV and microwave transmission and reception, magnetic storage, and even the mundane little magnet used to hold a paper note on the refrigerator are all electromagnetic in nature. One would be hard pressed to find a device that works without relaying on any electromagnetic principle or effect. This text provides a good theoretical understanding of the electromagnetic field equations but also treats a large number of applications. In fact, no topic is presented unless it is directly applicable to engineering design or unless it is needed for the understanding of another topic. In electrostatics, for example, the text includes discussions of photocopying, ink-jet printing, electrostatic separation and deposition, sandpaper production, paint spraying, and powder coating. In ma...