WorldWideScience

Sample records for warfare ew systems

  1. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  2. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  3. Introduction to Modern EW Systems. Edited by Andrea De Martino, Artech House, 2012; 417 pages. Price: £119.00, ISBN 978-1-60807-207-1

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2013-01-01

    Full Text Available Master the latest electronic warfare (EW techniques and technologies related to on-board military platforms with this authoritative resource. You gain expert design guidance on technologies and equipment used to detect and identify emitter threats, giving you an advantage in the never-ending chess game between sensor guided weapons and EW systems. This unique book offers you deeper insight into EW systems principles of operation and their mathematical descriptions, arming you with better knowledge for your specific design applications.

  4. Electronic Warfare (EW) Receiver and Processing Concepts Evaluation Program (RAPCEval 2)

    National Research Council Canada - National Science Library

    Bass, W

    1999-01-01

    .... Tasks initiated under OPTION 1 of the contract of this program provided analysis for inputs and countermeasures for electronic receivers of radar, electro-optic, infrared, and ultraviolet systems...

  5. Electronic Warfare (EW) Receiver and Processing Concepts Evaluation Program (RAPCEval2)

    National Research Council Canada - National Science Library

    Bass, W

    1999-01-01

    .... Tasks initiated under OPTION 1 of the contract of this program provided analysis for inputs and countermeasures for electronic receivers of radar, electro-optic, infrared, and ultraviolet systems...

  6. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  7. Wind Turbine Generator System Safety and Function Test Report for the Entegrity EW50 Wind Turbine

    Energy Technology Data Exchange (ETDEWEB)

    Smith, J.; Huskey, A.; Jager, D.; Hur, J.

    2012-11-01

    This report summarizes the results of a safety and function test that NREL conducted on the Entegrity EW50 wind turbine. This test was conducted in accordance with the International Electrotechnical Commissions' (IEC) standard, Wind Turbine Generator System Part 2: Design requirements for small wind turbines, IEC 61400-2 Ed.2.0, 2006-03.

  8. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  9. Photometric solution and frequency analysis of the oEA system EW Boo

    International Nuclear Information System (INIS)

    Zhang, X. B.; Wang, K.; Luo, Y. P.

    2015-01-01

    We present the first photometric solution and frequency analysis of the neglected oscillating Algol-type (oEA) binary EW Boo. B- and V-band light curves of the star were obtained on 11 nights in 2014. Using the Wilson–Devinney code, the eclipsing light curves were synthesized and the first photometric solution was derived for the binary system. The results reveal that EW Boo could be a semi-detached system with the less-massive secondary component filling its Roche lobe. By subtracting the eclipsing light changes from the data, we obtained the intrinsic pulsating light curves of the hotter, massive primary component. Frequency analysis of residual light shows multi-mode pulsation with the dominant period at 0.01909 days. A preliminary mode identification suggests that the star could be pulsating in non-radial (l = 1) modes. The long-term orbital period variation of the system was also investigated for the first time. An improved orbital period and new ephemerides of the eclipsing binary are given. The O−C analysis indicates a secular period increasing at a rate of dP/dt=2.9×10 −7 days yr −1 , which could be interpreted as mass transfer from the cooler secondary to the primary component.

  10. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  11. A probabilistic approach of the Flash Flood Early Warning System (FF-EWS) in Catalonia based on radar ensemble generation

    Science.gov (United States)

    Velasco, David; Sempere-Torres, Daniel; Corral, Carles; Llort, Xavier; Velasco, Enrique

    2010-05-01

    Early Warning Systems (EWS) are commonly identified as the most efficient tools in order to improve the preparedness and risk management against heavy rains and Flash Floods (FF) with the objective of reducing economical losses and human casualties. In particular, flash floods affecting torrential Mediterranean catchments are a key element to be incorporated within operational EWSs. The characteristic high spatial and temporal variability of the storms requires high-resolution data and methods to monitor/forecast the evolution of rainfall and its hydrological impact in small and medium torrential basins. A first version of an operational FF-EWS has been implemented in Catalonia (NE Spain) under the name of EHIMI system (Integrated Tool for Hydrometeorological Forecasting) with the support of the Catalan Water Agency (ACA) and the Meteorological Service of Catalonia (SMC). Flash flood warnings are issued based on radar-rainfall estimates. Rainfall estimation is performed on radar observations with high spatial and temporal resolution (1km2 and 10 minutes) in order to adapt the warning scale to the 1-km grid of the EWS. The method is based on comparing observed accumulated rainfall against rainfall thresholds provided by the regional Intensity-Duration-Frequency (IDF) curves. The so-called "aggregated rainfall warning" at every river cell is obtained as the spatially averaged rainfall over its associated upstream draining area. Regarding the time aggregation of rainfall, the critical duration is thought to be an accumulation period similar to the concentration time of each cachtment. The warning is issued once the forecasted rainfall accumulation exceeds the rainfall thresholds mentioned above, which are associated to certain probability of occurrence. Finally, the hazard warning is provided and shown to the decision-maker in terms of exceeded return periods at every river cell covering the whole area of Catalonia. The objective of the present work includes the

  12. [Cutaneous and systemic toxicology of vesicants used in warfare].

    Science.gov (United States)

    Pita, R; Vidal-Asensi, S

    2010-01-01

    Vesicants are a group of chemicals used in warfare. The most representative agent is yperite, also known as mustard gas. The blisters that appeared on those exposed to yperite during combat in the First World War are responsible for the current name--vesicants--for this group of chemicals. Their affects are produced mainly through localized action of liquid or vapor forms on the skin, eyes, and respiratory tract. However, the high absorption of the liquid form through the skin or the vapor form on inhalation may cause substantial systemic effects. Here we analyze these effects, treatment of intoxication, and long-term sequelae, drawing on our experience and a review of the literature.

  13. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  14. Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

    Directory of Open Access Journals (Sweden)

    So Ryoung Park

    2018-01-01

    Full Text Available An electronic warfare (EW simulator is presented to investigate and evaluate the tracking performance of radar system under the electronic attack situations. The EW simulator has the input section in which the characteristic parameters of radar threat, radar warning receiver, jammer, electromagnetic wave propagation, and simulation scenario can be set up. During the process of simulation, the simulator displays the situations of simulation such as the received signal and its spectrum, radar scope, and angle tracking scope and also calculates the transient and root-mean-squared tracking errors of the range and angle tracking system of radar. Using the proposed EW simulator, we analyze the effect of concealment according to the noise and signal powers under the noise jamming and also analyze the effect of deception by calculating errors between the desired value and the estimated one under the deceptive jamming. Furthermore, the proposed EW simulator can be used to figure out the feature of radar threats based on the information collected from the EW receiver and also used to carry out the electronic attacks efficiently in electronic warfare.

  15. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  16. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  17. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  18. Efikasnost sistema PVO u uslovima elektronskih dejstava / Efficiency of antiaircraft system in electronic warfare

    Directory of Open Access Journals (Sweden)

    Vladimir V. Šepec

    2007-01-01

    Full Text Available U radu je primenjena teorija masovnog opsluživanja u analizi efikasnosti sistema protivvazduhoplovne odbrane (sistema PVO u uslovima elektronskih dejstava protivnika. Prikazan je model za ocenu efikasnosti sistema PVO i predstavljeni su izrazi za procenu efikasnosti sistema PVO u uslovima elektronskih dejstava. / In this article the theory of mass servicing is used in the analysis of efficiency of antiaircraft system in the conditions of electronic warfare. The model for analysis of the antiaircraft system efficiency has been shown and formulas for qualitative analysis of antiaircraft system efficiency have been presented in the conditions of electronic warfare.

  19. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  20. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  1. Evaluation of the Space and Naval Warfare Systems Command (SPAWAR) Cost and Performance Measurement

    OpenAIRE

    Flavell, Drew G.; Dorwin, Timothy E.

    1999-01-01

    Approved for public release; distribution is unlimited. This thesis examines the Cost and Performance Measurements within four Program Directorates at the Space and Naval Warfare Systems Command (SPAWAR). SPAWAR is the Navy's full-spectrum research, development, test and evaluation, engineering and fleet support center for Command, Control and Communications Systems, Ocean Surveillance Systems and the integration of those systems that overarch multiplatforms. In the era of lean military bu...

  2. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1) Attrition Model

    OpenAIRE

    Chen, Xiangyong; Zhang, Ancai

    2014-01-01

    For the particularity of warfare hybrid dynamic process, a class of warfare hybrid dynamic systems is established based on Lanchester equation in a (n,1) battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation), and discrete event systems (described by variable tactics). Furthermore, an expository discussion is presented on an optimal variable tact...

  3. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  4. Implementing EW Receivers Based on Large Point Reconfigured FFT on FPGA Platforms

    Directory of Open Access Journals (Sweden)

    He Chen

    2011-12-01

    Full Text Available This paper presents design and implementation of digital receiver based on large point fast Fourier transform (FFT suitable for electronic warfare (EW applications. When implementing the FFT algorithm on field-programmable gate array (FPGA platforms, the primary goal is to maximize throughput and minimize area. This algorithm adopts two-dimension, parallel and pipeline stream mode and implements the reconfiguration of FFT's points. Moreover, a double-sequence-separation FFT algorithm has been implemented in order to achieve faster real time processing in broadband digital receivers. The performance of the hardware implementation on the FPGA platforms of broadband digital receivers has been analyzed in depth. It reaches the requirement of high-speed digital signal processing, and reveals the designing this kind of digital signal processing systems on FPGA platforms. Keywords: digital receivers, field programmable gate array (FPGA, fast Fourier transform (FFT, large point reconfigured, signal processing system.

  5. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    Science.gov (United States)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  6. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  7. EW 101 a first course in electronic warfare

    CERN Document Server

    Adamy, David L

    2000-01-01

    This popular series of tutorials, featured over a period of years in the Journal of Electronic Defense, is now available in a single volume. Organized into chapters with new introductory and supplementary material from the author, you get clear, concise and well-illustrated examinations of critical topics such as antenna parameters, receiver sensitivity, processing tasks, and search strategies, LPI signals, jamming, communication links, and simulation. The chapters define key terms and explain how and why particular technologies are relevant to electronic defense. Detailed charts, diagrams and

  8. Enterprises as Inquiring Systems with Implications for Information Warfare

    Science.gov (United States)

    2014-06-01

    and reductionist, but applied in almost all decisions because it is considered “objective” and logic is “better” than intuition. 2.3 Kantian Model...The Kantian system is something of a mixture of Leibnizian and Lockian. The system is open, like that of Lockian. It generates hypotheses on the...basis of inputs received. The unique feature of the Kantian system is that the theoretic aspect allows an input to be interpreted in different ways

  9. Linear Optimization of Frequency Spectrum Assignments Across System

    Science.gov (United States)

    2016-03-01

    selection tools, frequency allocation, transmission optimization, electromagnetic maneuver warfare, electronic protection, assignment model 15. NUMBER ...Characteristics Modeled ...............................................................29 Table 10.   Antenna Systems Modeled , Number of Systems and...surveillance EW early warning GAMS general algebraic modeling system GHz gigahertz IDE integrated development environment ILP integer linear program

  10. Return on Investment Analysis of Information Warfare Systems

    National Research Council Canada - National Science Library

    Rios, Cesar G., Jr

    2005-01-01

    .... This research and case study demonstrate how the Knowledge Value Added (KVA) Methodology can be used to formulate a framework for extracting and analyzing performance parameters and measures of effectiveness for each system...

  11. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  12. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  13. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  14. Scenario-Based Systems Engineering Application to Mine Warfare

    Science.gov (United States)

    2015-12-01

    hunter- killer capabilities to find, classify, and destroy moored and bottom mines with sonar and video systems, cable cutting devices, and mine...Method: Serial 3 LCS MH-60s LCS: RMS with AN/AQS-20, MH-60s: Archerfish Hunt Method: Serial 1M MK18 MH-60s LCS: MK18 Mod 2, MH-60s...Archerfish Hunt Method: Serial 2M MK18 MH-60s LCS: MK18 Mod 2, MH-60s: Archerfish Hunt Method: Serial 3M MK18 MH-60s LCS: MK18

  15. Setting up a mobile Lidar (DIAL) system for detecting chemical warfare agents

    International Nuclear Information System (INIS)

    Tehrani, M Kavosh; Jaafari, E; Mobashery, A; Mohammad, M Malek

    2015-01-01

    The mobile light detection and ranging DIAL system of Malek Ashtar University of Technology has been developed for the detection of chemical warfare agents whose absorption wavelengths are in the range of 9.2–10.8 μm tunable CO 2 lasers of the system. In this paper, this system is first described and then ammonia detection is analyzed experimentally. Also, experimental results of detecting a sarin agent simulant, dimethyl–methyl phosphonate (DMMP), are presented. The power levels received from different ranges to detect specific concentrations of NH 3 and DMMP have been measured and debated. The primary test results with a 150 ns clipped pulse width by passive pinhole plasma shutter indicate that the system is capable of monitoring several species of pollutants in the range of about 1 km, with a 20 m spatial and 2 min temporal resolution. (paper)

  16. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  17. Electronic Warfare in Operations

    Science.gov (United States)

    2009-02-25

    intelligence-related portion of the EW running estimate. Provides input to the restricted frequency list by recommending guarded frequencies. Provides...preparation of the restricted frequency list and issuance of emissions control guidance. Coordinates frequency allotment, assignment, and use... frequency list . Validating and approving or denying cease-jamming requests. Maintaining situational awareness of all jamming-capable systems in the area

  18. Modeling and Optimal Control of a Class of Warfare Hybrid Dynamic Systems Based on Lanchester (n,1 Attrition Model

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    hybrid dynamic systems is established based on Lanchester equation in a (n,1 battle, where a heterogeneous force of n different troop types faces a homogeneous force. This model can be characterized by the interaction of continuous-time models (governed by Lanchester equation, and discrete event systems (described by variable tactics. Furthermore, an expository discussion is presented on an optimal variable tactics control problem for warfare hybrid dynamic system. The optimal control strategies are designed based on dynamic programming and differential game theory. As an example of the consequences of this optimal control problem, we take the (2, 1 case and solve the optimal strategies in a (2, 1 case. Simulation results show the feasibility of warfare hybrid system model and the effectiveness of the optimal control strategies designed.

  19. A new General Purpose Decontamination System for Chemical and Biological Warfare and Terrorism Agents

    National Research Council Canada - National Science Library

    Khetan, Sushil; Banerjee, xdDeboshri; Chanda, Arani; Collins, Terry

    2003-01-01

    Partial contents: Fe-TAML Activator of Peroxide,Activators of Hydrogen peroxide,Biological Warfare Agents,Bacterial Endospore,Bacterial Spore Deactivation,Modeling Studies,Deactivation Studies with Bacillus spores...

  20. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  1. Insect-gene-activity detection system for chemical and biological warfare agents and toxic industrial chemicals

    Science.gov (United States)

    Mackie, Ryan S.; Schilling, Amanda S.; Lopez, Arturo M.; Rayms-Keller, Alfredo

    2002-02-01

    Detection of multiple chemical and biological weapons (CBW) agents and/or complex mixtures of toxic industrial chemicals (TIC) is imperative for both the commercial and military sectors. In a military scenario, a multi-CBW attack would create confusion, thereby delaying decontamination and therapeutic efforts. In the commercial sector, polluted sites invariably contain a mixture of TIC. Novel detection systems capable of detecting CBW and TIC are sorely needed. While it may be impossible to build a detector capable of discriminating all the possible combinations of CBW, a detection system capable of statistically predicting the most likely composition of a given mixture is within the reach of current emerging technologies. Aquatic insect-gene activity may prove to be a sensitive, discriminating, and elegant paradigm for the detection of CBW and TIC. We propose to systematically establish the expression patterns of selected protein markers in insects exposed to specific mixtures of chemical and biological warfare agents to generate a library of biosignatures of exposure. The predicting capabilities of an operational library of biosignatures of exposures will allow the detection of emerging novel or genetically engineered agents, as well as complex mixtures of chemical and biological weapons agents. CBW and TIC are discussed in the context of war, terrorism, and pollution.

  2. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  3. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  4. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  5. Application of the MASH v1.0 Code System to radiological warfare radiation threats

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Smith, M.S.

    1994-01-01

    Nuclear hardening capabilities of US and foreign ground force systems is a primary concern of the Department of Defense (DoD) and US Army. The Monte Carlo Adjoint Shielding Code System -- MASH v1.0 was developed at Oak Ridge National Laboratory (ORNL) to analyze these capabilities, i.e. the shielding effectiveness, for prompt radiation from a nuclear weapon detonation. Rapidly changing world events and the proliferation of nuclear weapons related technology have increased the kinds of nuclear threats to include intentionally dispersed radiation sources and fallout from tactical nuclear weapons used in the modern AirLand battlefield scenario. Consequently, a DoD area of increasing interest focuses on determining the shielding effectiveness of foreign and US armored vehicles to radiological warfare and fallout radiation threats. To demonstrate the applicability of MASH for analyzing dispersed radiation source problems, calculations have been completed for two distributed sources; a dispersed radiation environment simulated by a uniformly distributed 60 Co source, and a 235 U fission weapon fallout source. Fluence and dose assessments were performed for the free-field, the inside of a steel-walled two-meter box, in a phantom standing in the free-field, and in a phantom standing in the two-meter box. The results indicate substantial radiation protection factors for the 60 Co dispersed radiation source and the fallout source compared to the prompt radiation protection factors. The dose protection factors ranged from 40 to 95 for the two-meter box and from 55 to 123 for the mid-gut position of the phantom standing in the box. The results further indicate that a 60 Co source might be a good first order approximation for a tactical fission weapon fallout protection factor analysis

  6. Duration Test Report for the Entegrity EW50 Wind Turbine

    Energy Technology Data Exchange (ETDEWEB)

    Smith, J.; Huskey, A.; Jager, D.; Hur, J.

    2012-12-01

    This report summarizes the results of a duration test that NREL conducted on the Entegrity EW50 wind turbine. This test was conducted in accordance with the International Electrotechnical Commissions' (IEC) standard, Wind Turbine Generator System Part 2: Design requirements for small wind turbines, IEC 61400-2 Ed.2.0, 2006-03.

  7. Differential Game for a Class of Warfare Dynamic Systems with Reinforcement Based on Lanchester Equation

    Directory of Open Access Journals (Sweden)

    Xiangyong Chen

    2014-01-01

    Full Text Available This paper concerns the optimal reinforcement game problem between two opposing forces in military conflicts. With some moderate assumptions, we employ Lanchester equation and differential game theory to develop a corresponding optimization game model. After that, we establish the optimum condition for the differential game problem and give an algorithm to obtain the optimal reinforcement strategies. Furthermore, we also discuss the convergence of the algorithm. Finally, a numerical example illustrates the effectiveness of the presented optimal schemes. Our proposed results provide a theoretical guide for both making warfare command decision and assessing military actions.

  8. Deconflicting Electronic Warfare in Joint Operations

    National Research Council Canada - National Science Library

    Huber, Arthur F; Carlberg, Gary; Gilliard, Prince; Marquet, L. D

    2007-01-01

    ... in velocity and lethality, it is becoming a growing issue for those who conduct EW. More and more systems both weapons and purely commercial devices are vying for their place in an increasingly crowded frequency spectrum...

  9. Exact solutions of space-time fractional EW and modified EW equations

    International Nuclear Information System (INIS)

    Korkmaz, Alper

    2017-01-01

    The bright soliton solutions and singular solutions are constructed for the space-time fractional EW and the space-time fractional modified EW (MEW) equations. Both equations are reduced to ordinary differential equations by the use of fractional complex transform (FCT) and properties of modified Riemann–Liouville derivative. Then, various ansatz method are implemented to construct the solutions for both equations.

  10. Antenna Systems and Electronic Warfare Applications. Edited by Richard A. Poisel, Artech House, 2012; 1036 pages. Price: £129.00, ISBN 978-1-60807-484-6

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2013-01-01

    Full Text Available This comprehensive book serves as a one-stop resource for practical EW antenna system know-how. Supported with over 700 illustrations and nearly 1,700 equations, this authoritative reference offers you detailed explanations of all the important foundations and aspects of this technology. Moreover, you get an in-depth treatment of a wide range of antenna system applications. 

  11. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  12. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  13. Biasing hydrogen bond donating host systems towards chemical warfare agent recognition.

    Science.gov (United States)

    Hiscock, Jennifer R; Wells, Neil J; Ede, Jayne A; Gale, Philip A; Sambrook, Mark R

    2016-10-12

    A series of neutral ditopic and negatively charged, monotopic host molecules have been evaluated for their ability to bind chloride and dihydrogen phosphate anions, and neutral organophosphorus species dimethyl methylphosphonate (DMMP), pinacolyl methylphosphonate (PMP) and the chemical warfare agent (CWA) pinacolyl methylphosphonofluoridate (GD, soman) in organic solvent via hydrogen bonding. Urea, thiourea and boronic acid groups are shown to bind anions and neutral guests through the formation of hydrogen bonds, with the urea and thiourea groups typically exhibiting higher affinity interactions. The introduction of a negative charge on the host structure is shown to decrease anion affinity, whilst still allowing for high stability host-GD complex formation. Importantly, the affinity of the host for the neutral CWA GD is greater than for anionic guests, thus demonstrating the potential for selectivity reversal based on charge repulsion.

  14. HERA results on QCD and EW physics

    International Nuclear Information System (INIS)

    Zarnecki, A.F.

    1997-01-01

    Selected HERA results on QCD and EW interactions are presented. They include the measurement of the proton structure function and its analysis in terms of the QCD evolution, as well as results concerning deep inelastic scattering at very low and very high Q 2 . Selected HERA limits on new physics and parameters which extend the standard model are also presented. (author)

  15. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  16. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  17. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  18. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  19. FOXO1 is a direct target of EWS-Fli1 oncogenic fusion protein in Ewing's sarcoma cells

    International Nuclear Information System (INIS)

    Yang, Liu; Hu, Hsien-Ming; Zielinska-Kwiatkowska, Anna; Chansky, Howard A.

    2010-01-01

    Research highlights: → Inducible and reversible siRNA knockdown of an oncogenic fusion protein such as EWS-Fli1 is feasible and more advantageous than other siRNA methods. → The tumor suppressor gene FOXO1 is a new EWS-Fli1 target. → While trans-activators are known for the FOXO1 gene, there has been no report on negative regulators of FOXO1 transcription. → This study provides first evidence that the EWS-Fli1 oncogenic fusion protein can function as a transcriptional repressor of the FOXO1 gene. -- Abstract: Ewing's family tumors are characterized by a specific t(11;22) chromosomal translocation that results in the formation of EWS-Fli1 oncogenic fusion protein. To investigate the effects of EWS-Fli1 on gene expression, we carried out DNA microarray analysis after specific knockdown of EWS-Fli1 through transfection of synthetic siRNAs. EWS-Fli1 knockdown increased expression of genes such as DKK1 and p57 that are known to be repressed by EWS-Fli1 fusion protein. Among other potential EWS-Fli1 targets identified by our microarray analysis, we have focused on the FOXO1 gene since it encodes a potential tumor suppressor and has not been previously reported in Ewing's cells. To better understand how EWS-Fli1 affects FOXO1 expression, we have established a doxycycline-inducible siRNA system to achieve stable and reversible knockdown of EWS-Fli1 in Ewing's sarcoma cells. Here we show that FOXO1 expression in Ewing's cells has an inverse relationship with EWS-Fli1 protein level, and FOXO1 promoter activity is increased after doxycycline-induced EWS-Fli1 knockdown. In addition, we have found that direct binding of EWS-Fli1 to FOXO1 promoter is attenuated after doxycycline-induced siRNA knockdown of the fusion protein. Together, these results suggest that suppression of FOXO1 function by EWS-Fli1 fusion protein may contribute to cellular transformation in Ewing's family tumors.

  20. GLI1 is a central mediator of EWS/FLI1 signaling in Ewing tumors.

    Directory of Open Access Journals (Sweden)

    Jay Joo

    2009-10-01

    Full Text Available The Ewing Sarcoma Family Tumors (ESFT consist of the classical pathologic entities of Ewing Sarcoma and peripheral Primitive Neuroectodermal Tumor. Occurring largely in the childhood through young adult years, these tumors have an unsurpassed propensity for metastasis and have no defined cell of origin. The biology of these aggressive malignancies centers around EWS/FLI1 and related EWS/ETS chimeric transcription factors, which are largely limited to this tumor class. Much progress has been made in the identification of a network of loci whose expression is modulated by EWS/FLI1 and its congeners. To date, little progress has been made in reconstructing the sequence of direct and indirect events that produce this network of modulated loci. The recent identification of GLI1 as an upregulated target of EWS/ETS transcription factors suggests a target which may be a more central mediator in the ESFT signaling network. In this paper, we further define the relationship of EWS/FLI1 expression and GLI1 upregulation in ESFT. This relationship is supported with data from primary tumor specimens. It is consistently observed across multiple ESFT cell lines and with multiple means of EWS/FLI1 inhibition. GLI1 inhibition affects tumor cell line phenotype whether shRNA or endogenous or pharmacologic inhibitors are employed. As is seen in model transformation systems, GLI1 upregulation by EWS/FLI1 appears to be independent of Hedgehog stimulation. Consistent with a more central role in ESFT pathogenesis, several known EWS/FLI1 targets appear to be targeted through GLI1. These findings further establish a central role for GLI1 in the pathogenesis of Ewing Tumors.

  1. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  2. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  3. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  4. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  5. "EWS Matrix" and "EWG Matrix": "De-sign for All" tools referred to the development of a enabling communication system for public spaces.

    Science.gov (United States)

    Di Bucchianico, Giuseppe; Camplone, Stefania; Picciani, Stefano; Vallese, Valeria

    2012-01-01

    The widespread sense of spatial disorientation that can be experienced in many public places (buildings and open spaces),generally depends on a design approach that doesn't take into account both the "communication skills" of the different parts of the spatial organization, both the variability of people and their ways of interacting with environments, orienteering themselves. Nevertheless, "not find the way" often has some obvious practical costs (loss of time, failure to achieve a target) and some more intangible, but no less important, emotional costs. That's why the design of signage systems must take into account both the specificities of places and the extreme variability of its users. The paper presents the results of a study on this specific issue. In particular, the study focuses on the description of some tools useful for the analysis and design of a signage system that is truly "for All".

  6. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  7. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  8. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  9. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    nations: France and the U.S.12 The non- state actor in the 2006 Israel-Hezbollah War, Lebanese Hezbollah, combined the aspects of conventional and...served weapons systems.94 In terms of concurrent experience, the German Army successfully invaded Poland in 1939 and had successfully dominated France in...dominant ideology was that of the Communist Party as interpreted by Joseph Stalin. Generically interpreted, communism—Leninism/ Marxism — can be described

  10. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  11. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  12. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  13. Alternative Command Funding and Functional Organization at the Space and Naval Warfare Systems Command (SPAWAR)

    National Research Council Canada - National Science Library

    Kimmel, Cathy

    2001-01-01

    .... Funding options available to SPAWAR System Centers are mission funding, which are monies appropriated by Congress, and reimbursable funding, which are monies recovered from customers for services rendered...

  14. Factors Affecting EWS-FLI1 Activity in Ewing's Sarcoma

    Science.gov (United States)

    Herrero-Martin, David; Fourtouna, Argyro; Niedan, Stephan; Riedmann, Lucia T.; Schwentner, Raphaela; Aryee, Dave N. T.

    2011-01-01

    Ewing's sarcoma family tumors (ESFT) are characterized by specific chromosomal translocations, which give rise to EWS-ETS chimeric proteins. These aberrant transcription factors are the main pathogenic drivers of ESFT. Elucidation of the factors influencing EWS-ETS expression and/or activity will guide the development of novel therapeutic agents against this fatal disease. PMID:22135504

  15. Factors Affecting EWS-FLI1 Activity in Ewing's Sarcoma

    Directory of Open Access Journals (Sweden)

    David Herrero-Martin

    2011-01-01

    Full Text Available Ewing's sarcoma family tumors (ESFT are characterized by specific chromosomal translocations, which give rise to EWS-ETS chimeric proteins. These aberrant transcription factors are the main pathogenic drivers of ESFT. Elucidation of the factors influencing EWS-ETS expression and/or activity will guide the development of novel therapeutic agents against this fatal disease.

  16. Application of Model-Based Systems Engineering (MBSE) to Compare Legacy and Future Forces in Mine Warfare (MIW) Missions

    Science.gov (United States)

    2014-12-01

    indicate that the satisfaction of these requirements had been addressed. 108 Table 8. MOP to Requirement Mapping Matrix MOP(s) REQUIREMENT 1.1...GUIs) to modify their behaviors. ExtendSim also has an equation editor for creating custom algorithms to add functionality not already present in the...Expeditionary Warfare Conference, Wyndham Bay Point Hotel , Panama City, FL, October 24. http://www.dtic.mil/ndia/2011expwar/MondayAmador.pdf. Bahr

  17. Information Warfare: using the viable system model as a framework to attack organisations

    Directory of Open Access Journals (Sweden)

    Bill Hutchinson

    2002-05-01

    Full Text Available Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

  18. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  19. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  20. A Framework for the Management of Evolving Requirements in Software Systems Supporting Network-Centric Warfare

    National Research Council Canada - National Science Library

    Reynolds, Linda K

    2006-01-01

    .... There are many sources of requirements for these software systems supporting NCO, which may increase in number as the Services continue to develop the capabilities necessary for the transformation...

  1. Satellite and Ground Communication Systems: Space and Electronic Warfare Threats to the United States Army

    Science.gov (United States)

    2017-02-01

    as if SATCOM is guaranteed. This complacency is accompanied by the procurement of high-data communication and mission command systems that deny...threat. To overcome these significant vulnerabilities, the US Army must procure communications systems that maintain the information high ground, but...precious gift of our freedom.”1 A key element of remaining strong on the ground is maintaining the capability to effectively communicate on the ground. If

  2. Coalition Warfare Program Tactile Situation Awareness System for Aviation Applications: Simulator Flight Test

    Science.gov (United States)

    2015-12-01

    David Myers1 Timothy Gowen2 Angus Rupert3 Ben Lawson3 Justin Dailey3,4 1Chesapeake Technology International 2Naval Aviation Center for... Angus Rupert of the USAARL. The algorithm is described in “Configuration Parameters for the Tactile Situation Awareness System (TSAS)” dated July 2010

  3. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  4. An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

    Directory of Open Access Journals (Sweden)

    HyunSeo Kang

    2018-01-01

    Full Text Available A variety of electronic warfare models are developed in the Electronic Warfare Research Center. An Open Architecture Framework for Electronic Warfare (OAFEw has been developed for reusability of various object models participating in the electronic warfare simulation and for extensibility of the electronic warfare simulator. OAFEw is a kind of component-based software (SW lifecycle management support framework. This OAFEw is defined by six components and ten rules. The purpose of this study is to construct a Distributed Simulation Interface Model, according to the rules of OAFEw, and create Use Case Model of OAFEw Reference Conceptual Model version 1.0. This is embodied in the OAFEw-FOM (Federate Object Model for High-Level Architecture (HLA based distributed simulation. Therefore, we design and implement EW real-time distributed simulation that can work with a model in C++ and MATLAB API (Application Programming Interface. In addition, OAFEw-FOM, electronic component model, and scenario of the electronic warfare domain were designed through simple scenarios for verification, and real-time distributed simulation between C++ and MATLAB was performed through OAFEw-Distributed Simulation Interface.

  5. Naval Surface Warfare Center Technical Digest. Research and Technology - Shaping Future Naval Systems

    Science.gov (United States)

    1991-09-01

    SiO2 are heated at 700 12 to 26 pm were mixed with celsian in to 900 0 C to form topaz, and in reaction (2), topaz 106 amounts from 10 to 40 volume...Ceram. Vidrio .. Vol. 15, No. 6, 1976, pp. 379-381. Celsian ceramics were prepared and 7. Talmy. I. G. and Haught, D. A., Ceramics in the System i o

  6. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  7. Small-molecule screen identifies modulators of EWS/FLI1 target gene expression and cell survival in Ewing's sarcoma.

    Science.gov (United States)

    Boro, Aleksandar; Prêtre, Kathya; Rechfeld, Florian; Thalhammer, Verena; Oesch, Susanne; Wachtel, Marco; Schäfer, Beat W; Niggli, Felix K

    2012-11-01

    Ewing's sarcoma family of tumors (EFT) is characterized by the presence of chromosomal translocations leading to the expression of oncogenic transcription factors such as, in the majority of cases, EWS/FLI1. Because of its key role in Ewing's sarcoma development and maintenance, EWS/FLI1 represents an attractive therapeutic target. Here, we characterize PHLDA1 as a novel direct target gene whose expression is repressed by EWS/FLI1. Using this gene and additional specific well-characterized target genes such as NROB1, NKX2.2 and CAV1, all activated by EWS/FLI1, as a read-out system, we screened a small-molecule compound library enriched for FDA-approved drugs that modulated the expression of EWS/FLI1 target genes. Among a hit-list of nine well-known drugs such as camptothecin, fenretinide, etoposide and doxorubicin, we also identified the kinase inhibitor midostaurin (PKC412). Subsequent experiments demonstrated that midostaurin is able to induce apoptosis in a panel of six Ewing's sarcoma cell lines in vitro and can significantly suppress xenograft tumor growth in vivo. These results suggest that midostaurin might be a novel drug that is active against Ewing's cells, which might act by modulating the expression of EWS/FLI1 target genes. Copyright © 2012 UICC.

  8. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  9. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  10. Advanced Undersea Warfare Systems

    Science.gov (United States)

    2011-06-01

    Glider can self-destruct or enter a hibernation state to be retrieved at a future time. Figure 4.19: Glider Recovery Assisted by Helicopter Retrieval 97...analysis using a physics based sensor model is recommended.79 Finally, Simkit, an open source Java based program DES maintained by Professor Arnold Buss of

  11. Photometric Analysis and Period Investigation of the EW Type ...

    Indian Academy of Sciences (India)

    Photometric Analysis and Period Investigation of the EW Type. Eclipsing ... binary with the less massive secondary component filling the inner Roche lobe. ..... Cox 2000) assuming that the primary component is a normal main sequence star.

  12. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  13. Let-7a is a direct EWS-FLI-1 target implicated in Ewing's sarcoma development.

    Directory of Open Access Journals (Sweden)

    Claudio De Vito

    Full Text Available Ewing's sarcoma family tumors (ESFT are the second most common bone malignancy in children and young adults, characterized by unique chromosomal translocations that in 85% of cases lead to expression of the EWS-FLI-1 fusion protein. EWS-FLI-1 functions as an aberrant transcription factor that can both induce and suppress members of its target gene repertoire. We have recently demonstrated that EWS-FLI-1 can alter microRNA (miRNA expression and that miRNA145 is a direct EWS-FLI-1 target whose suppression is implicated in ESFT development. Here, we use miRNA arrays to compare the global miRNA expression profile of human mesenchymal stem cells (MSC and ESFT cell lines, and show that ESFT display a distinct miRNA signature that includes induction of the oncogenic miRNA 17-92 cluster and repression of the tumor suppressor let-7 family. We demonstrate that direct repression of let-7a by EWS-FLI-1 participates in the tumorigenic potential of ESFT cells in vivo. The mechanism whereby let-7a expression regulates ESFT growth is shown to be mediated by its target gene HMGA2, as let-7a overexpression and HMGA2 repression both block ESFT cell tumorigenicity. Consistent with these observations, systemic delivery of synthetic let-7a into ESFT-bearing mice restored its expression in tumor cells, decreased HMGA2 expression levels and resulted in ESFT growth inhibition in vivo. Our observations provide evidence that deregulation of let-7a target gene expression participates in ESFT development and identify let-7a as promising new therapeutic target for one of the most aggressive pediatric malignancies.

  14. Portable Solid Phase Micro-Extraction Coupled with Ion Mobility Spectrometry System for On-Site Analysis of Chemical Warfare Agents and Simulants in Water Samples

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2014-11-01

    Full Text Available On-site analysis is an efficient approach to facilitate analysis at the location of the system under investigation as it can result in more accurate, more precise and quickly available analytical data. In our work, a novel self-made thermal desorption based interface was fabricated to couple solid-phase microextraction with ion mobility spectrometry for on-site water analysis. The portable interface can be connected with the front-end of an ion mobility spectrometer directly without other modifications. The analytical performance was evaluated via the extraction of chemical warfare agents and simulants in water samples. Several parameters including ionic strength and extraction time have been investigated in detail. The application of the developed method afforded satisfactory recoveries ranging from 72.9% to 114.4% when applied to the analysis of real water samples.

  15. Portable Solid Phase Micro-Extraction Coupled with Ion Mobility Spectrometry System for On-Site Analysis of Chemical Warfare Agents and Simulants in Water Samples

    Science.gov (United States)

    Yang, Liu; Han, Qiang; Cao, Shuya; Yang, Jie; Yang, Junchao; Ding, Mingyu

    2014-01-01

    On-site analysis is an efficient approach to facilitate analysis at the location of the system under investigation as it can result in more accurate, more precise and quickly available analytical data. In our work, a novel self-made thermal desorption based interface was fabricated to couple solid-phase microextraction with ion mobility spectrometry for on-site water analysis. The portable interface can be connected with the front-end of an ion mobility spectrometer directly without other modifications. The analytical performance was evaluated via the extraction of chemical warfare agents and simulants in water samples. Several parameters including ionic strength and extraction time have been investigated in detail. The application of the developed method afforded satisfactory recoveries ranging from 72.9% to 114.4% when applied to the analysis of real water samples. PMID:25384006

  16. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  17. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  18. Electronic Warfare: Rethinking the Importance of Its Role In Military Operations

    Science.gov (United States)

    2016-06-10

    of EW. When a B-1B bomber deploys ordnance against an enemy airfield, the effects and battle damage assessment ( BDA ) are immediately visible. An...effects, or BDA , against those radar systems. 17 Finally, EW is non-lethal. Lethality invokes a heightened level of concern and awareness when

  19. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  20. Promoting the Scientific Development of the Construction of Psychological Warfare of Our Army with System Theory%以系统论促进我军心理战建设科学发展

    Institute of Scientific and Technical Information of China (English)

    王晓华; 白莉

    2011-01-01

    我军心理战建设应汲取系统论的营养,从明确目标上破题,整体推进,重点优化组织指挥体制。%The construction of psychological warfare of our army should absorb nutrition from system theory,in which the-goal should be clear,the process should work integrated,andfoc-using on optimizing commanding system.

  1. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  2. Domestic Preparedness Program: Evaluation of the Agilent Gas Chromatograph - Flame Photometric Detector/Mass Selective Detector (GC-FPD/MSD) System Against Chemical Warfare Agents Summary Report

    National Research Council Canada - National Science Library

    Longworth, Terri

    2003-01-01

    This report characterizes the chemical warfare agent (CWA) detection potential of the commercially available Agilent gas chromatograph-flame photometric detector/mass selective detector (GC-FPD/MSD...

  3. Redefining Hybrid Warfare: Russia's Non-linear War against the West

    Directory of Open Access Journals (Sweden)

    Tad Schnaufer

    2017-03-01

    Full Text Available The term hybrid warfare fails to properly describe Russian operations in Ukraine and elsewhere. Russia has undertaken unconventional techniques to build its influence and test the boundaries of a shaken international system. Notably, Russia’s actions in Ukraine display an evolved style of warfare that goes beyond its initial label of hybrid warfare. The term non-linear war (NLW will be defined in this article to encompass Russia’s actions and allow policymakers the correct framework to discuss and respond to Russia. NLW plays to the advantage of countries like Russia and constitute the future of warfare.

  4. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  5. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  6. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  7. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  8. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  10. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  11. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  12. ECG-ViEW II, a freely accessible electrocardiogram database

    Science.gov (United States)

    Park, Man Young; Lee, Sukhoon; Jeon, Min Seok; Yoon, Dukyong; Park, Rae Woong

    2017-01-01

    The Electrocardiogram Vigilance with Electronic data Warehouse II (ECG-ViEW II) is a large, single-center database comprising numeric parameter data of the surface electrocardiograms of all patients who underwent testing from 1 June 1994 to 31 July 2013. The electrocardiographic data include the test date, clinical department, RR interval, PR interval, QRS duration, QT interval, QTc interval, P axis, QRS axis, and T axis. These data are connected with patient age, sex, ethnicity, comorbidities, age-adjusted Charlson comorbidity index, prescribed drugs, and electrolyte levels. This longitudinal observational database contains 979,273 electrocardiograms from 461,178 patients over a 19-year study period. This database can provide an opportunity to study electrocardiographic changes caused by medications, disease, or other demographic variables. ECG-ViEW II is freely available at http://www.ecgview.org. PMID:28437484

  13. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  14. EWS and FUS bind a subset of transcribed genes encoding proteins enriched in RNA regulatory functions

    DEFF Research Database (Denmark)

    Luo, Yonglun; Friis, Jenny Blechingberg; Fernandes, Ana Miguel

    2015-01-01

    at different levels. Gene Ontology analyses showed that FUS and EWS target genes preferentially encode proteins involved in regulatory processes at the RNA level. Conclusions The presented results yield new insights into gene interactions of EWS and FUS and have identified a set of FUS and EWS target genes...... involved in pathways at the RNA regulatory level with potential to mediate normal and disease-associated functions of the FUS and EWS proteins.......Background FUS (TLS) and EWS (EWSR1) belong to the FET-protein family of RNA and DNA binding proteins. FUS and EWS are structurally and functionally related and participate in transcriptional regulation and RNA processing. FUS and EWS are identified in translocation generated cancer fusion proteins...

  15. Wywiad z Ewą Gąsowską

    Directory of Open Access Journals (Sweden)

    Monika Stec

    2014-06-01

    Full Text Available An interview with Ewa Gąsowska In the interview, Ewa Gąsowska described her ten-year-long struggle with the Polish legal system. Gąsowska’s objective has been to reinstate the good name of her grandfather, Jan Rybak, who was murdered in 1945. According to Gąsowska, the reason for her grandfather’s death was his political activity in PPR (Polish Labourers’ Party and his post-war commitment to the reconstruction of People’s Poland (Polska Rzeczpospolita Ludowa. Gąsowska claims that he was murdered by members of Narodowe Siły Zbrojne (National Armed Forces. Almost 60 years after the death of Jan Rybak, a book was published which presents his activity and death in a different light. The book had been written by one of those regarded by Rybak’s family as his murderers. This “courtroom drama” is situated in the context of the relations between the Rybak family and the local community (the place where Jan Rybak, and most likely also his murderers, were born, as well as the socio-political transformations in the contemporary Poland.   Wywiad z Ewą Gąsowską Ewa Gąsowska opowiada historię swoich dziesięcioletnich zmagań z wymiarem sprawiedliwości. Jej celem jest rehabilitacja dobrego imienia dziadka, Jana Rybaka, który został zamordowany w 1945 roku. Zdaniem Ewy Gąsowskiej, powodem zabójstwa była partyjna aktywność jej dziadka (PPR i jego powojenne zaangażowanie w odbudowę Polski Ludowej, a jego mordercami byli członkowie Narodowych Sił Zbrojnych. Prawie 60 lat później ukazała się książka wspomnieniowa, która inaczej przedstawia działalność i okoliczności śmierci Jana Rybaka. Jej autorem jest osoba, którą rodzina uważa za mordercę. Ważny kontekst tego „serialu sądowego” stanowią relacje rodziny Rybaka z lokalną społecznością, z której się wywodzi on i – prawdopodobnie – jego zabójcy, jak też przemiany społeczno-polityczne we współczesnej Polsce.

  16. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  17. Development of a landlside EWS based on rainfall thresholds for Tuscany Region, Italy

    Science.gov (United States)

    Rosi, Ascanio; Segoni, Samuele; Battistini, Alessandro; Rossi, Guglielmo; Catani, Filippo; Casagli, Nicola

    2017-04-01

    We present the set-up of a landslide EWS based on rainfall thresholds for the Tuscany region (central Italy), that shows a heterogeneous distribution of reliefs and precipitation. The work started with the definition of a single set of thresholds for the whole region, but it resulted unsuitable for EWS purposes, because of the heterogeneity of the Tuscan territory and non-repeatability of the analyses, that were affected by a high degree of subjectivity. To overcome this problem, the work started from the implementation of a software capable of objectively defining the rainfall thresholds, since some of the main issues of these thresholds are the subjectivity of the analysis and therefore their non-repeatability. This software, named MaCumBA, is largely automated and can analyze, in a short time, a high number of rainfall events to define several parameters of the threshold, such as the intensity (I) and the duration (D) of the rainfall event, the no-rain time gap (NRG: how many hours without rain are needed to consider two events as separated) and the equation describing the threshold. The possibility of quickly perform several analyses lead to the decision to divide the territory in 25 homogeneous areas (named alert zones, AZ), so as a single threshold for each AZ could be defined. For the definition of the thresholds two independent datasets (of joint rainfall-landslide occurrences) have been used: a calibration dataset (data from 2000 to 2007) and a validation dataset (2008-2009). Once the thresholds were defined, a WebGIS-based EWS has been implemented. In this system it is possible to focus both on monitoring of real-time data and on forecasting at different lead times up to 48 h; forecasting data are collected from LAMI (Limited Area Model Italy) rainfall forecasts. The EWS works on the basis of the threshold parameters defined by MaCumBA (I, D, NRG). An important feature of the warning system is that the visualization of the thresholds in the Web

  18. EWS and FUS bind a subset of transcribed genes encoding proteins enriched in RNA regulatory functions.

    Science.gov (United States)

    Luo, Yonglun; Blechingberg, Jenny; Fernandes, Ana Miguel; Li, Shengting; Fryland, Tue; Børglum, Anders D; Bolund, Lars; Nielsen, Anders Lade

    2015-11-14

    FUS (TLS) and EWS (EWSR1) belong to the FET-protein family of RNA and DNA binding proteins. FUS and EWS are structurally and functionally related and participate in transcriptional regulation and RNA processing. FUS and EWS are identified in translocation generated cancer fusion proteins and involved in the human neurological diseases amyotrophic lateral sclerosis and fronto-temporal lobar degeneration. To determine the gene regulatory functions of FUS and EWS at the level of chromatin, we have performed chromatin immunoprecipitation followed by next generation sequencing (ChIP-seq). Our results show that FUS and EWS bind to a subset of actively transcribed genes, that binding often is downstream the poly(A)-signal, and that binding overlaps with RNA polymerase II. Functional examinations of selected target genes identified that FUS and EWS can regulate gene expression at different levels. Gene Ontology analyses showed that FUS and EWS target genes preferentially encode proteins involved in regulatory processes at the RNA level. The presented results yield new insights into gene interactions of EWS and FUS and have identified a set of FUS and EWS target genes involved in pathways at the RNA regulatory level with potential to mediate normal and disease-associated functions of the FUS and EWS proteins.

  19. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  20. Development of a gas-cylinder-free plasma desorption/ionization system for on-site detection of chemical warfare agents.

    Science.gov (United States)

    Iwai, Takahiro; Kakegawa, Ken; Aida, Mari; Nagashima, Hisayuki; Nagoya, Tomoki; Kanamori-Kataoka, Mieko; Miyahara, Hidekazu; Seto, Yasuo; Okino, Akitoshi

    2015-06-02

    A gas-cylinder-free plasma desorption/ionization system was developed to realize a mobile on-site analytical device for detection of chemical warfare agents (CWAs). In this system, the plasma source was directly connected to the inlet of a mass spectrometer. The plasma can be generated with ambient air, which is drawn into the discharge region by negative pressure in the mass spectrometer. High-power density pulsed plasma of 100 kW could be generated by using a microhollow cathode and a laboratory-built high-intensity pulsed power supply (pulse width: 10-20 μs; repetition frequency: 50 Hz). CWAs were desorbed and protonated in the enclosed space adjacent to the plasma source. Protonated sample molecules were introduced to the mass spectrometer by airflow through the discharge region. To evaluate the analytical performance of this device, helium and air plasma were directly irradiated to CWAs in the gas-cylinder-free plasma desorption/ionization system and the protonated molecules were analyzed by using an ion-trap mass spectrometer. A blister agent (nitrogen mustard 3) and nerve gases [cyclohexylsarin (GF), tabun (GA), and O-ethyl S-2-N,N-diisopropylaminoethyl methylphosphonothiolate (VX)] in solution in n-hexane were applied to the Teflon rod and used as test samples, after solvent evaporation. As a result, protonated molecules of CWAs were successfully observed as the characteristic ion peaks at m/z 204, 181, 163, and 268, respectively. In air plasma, the limits of detection were estimated to be 22, 20, 4.8, and 1.0 pmol, respectively, which were lower than those obtained with helium plasma. To achieve quantitative analysis, calibration curves were made by using CWA stimulant dipinacolyl methylphosphonate as an internal standard; straight correlation lines (R(2) = 0.9998) of the peak intensity ratios (target per internal standard) were obtained. Remarkably, GA and GF gave protonated dimer ions, and the ratios of the protonated dimer ions to the protonated

  1. A novel type of EWS-CHOP fusion gene in myxoid liposarcoma

    International Nuclear Information System (INIS)

    Matsui, Yoshito; Ueda, Takafumi; Kubo, Takahiro; Hasegawa, Tadashi; Tomita, Yasuhiko; Okamoto, Mina; Myoui, Akira; Kakunaga, Shigeki; Yasui, Natsuo; Yoshikawa, Hideki

    2006-01-01

    The cytogenetic hallmark of myxoid type and round cell type liposarcoma consists of reciprocal translocation of t(12;16)(q13;p11) and t(12;22)(q13;q12), which results in fusion of TLS/FUS and CHOP, and EWS and CHOP, respectively. Nine structural variations of the TLS/FUS-CHOP chimeric transcript have been reported, however, only two types of EWS-CHOP have been described. We describe here a case of myxoid liposarcoma containing a novel EWS-CHOP chimeric transcript and identified the breakpoint occurring in intron 13 of EWS. Reverse transcription-polymerase chain reaction and direct sequence showed that exon 13 of EWS was in-frame fused to exon 2 of CHOP. Genomic analysis revealed that the breaks were located in intron 13 of EWS and intron 1 of CHOP

  2. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  3. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  4. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  5. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  6. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  7. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  8. CRUSER's Warfare Innovation Workshop Focused on Hybrid War in the Urban Littorals

    OpenAIRE

    Ehrlich, Michael

    2017-01-01

    News Stories Archive The Naval Postgraduate School (NPS) Consortium for Robotics and Unmanned Systems Education and Research, CRUSER, hosted its annual Warfare Innovation Workshop (WIW) in Glasgow Hall, Sept. 18-21.

  9. A zebrafish transgenic model of Ewing's sarcoma reveals conserved mediators of EWS-FLI1 tumorigenesis.

    Science.gov (United States)

    Leacock, Stefanie W; Basse, Audrey N; Chandler, Garvin L; Kirk, Anne M; Rakheja, Dinesh; Amatruda, James F

    2012-01-01

    Ewing's sarcoma, a malignant bone tumor of children and young adults, is a member of the small-round-blue-cell tumor family. Ewing's sarcoma family tumors (ESFTs), which include peripheral primitive neuroectodermal tumors (PNETs), are characterized by chromosomal translocations that generate fusions between the EWS gene and ETS-family transcription factors, most commonly FLI1. The EWS-FLI1 fusion oncoprotein represents an attractive therapeutic target for treatment of Ewing's sarcoma. The cell of origin of ESFT and the molecular mechanisms by which EWS-FLI1 mediates tumorigenesis remain unknown, and few animal models of Ewing's sarcoma exist. Here, we report the use of zebrafish as a vertebrate model of EWS-FLI1 function and tumorigenesis. Mosaic expression of the human EWS-FLI1 fusion protein in zebrafish caused the development of tumors with histology strongly resembling that of human Ewing's sarcoma. The incidence of tumors increased in a p53 mutant background, suggesting that the p53 pathway suppresses EWS-FLI1-driven tumorigenesis. Gene expression profiling of the zebrafish tumors defined a set of genes that might be regulated by EWS-FLI1, including the zebrafish ortholog of a crucial EWS-FLI1 target gene in humans. Stable zebrafish transgenic lines expressing EWS-FLI1 under the control of the heat-shock promoter exhibit altered embryonic development and defective convergence and extension, suggesting that EWS-FLI1 interacts with conserved developmental pathways. These results indicate that functional targets of EWS-FLI1 that mediate tumorigenesis are conserved from zebrafish to human and provide a novel context in which to study the function of this fusion oncogene.

  10. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  11. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  12. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  13. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  14. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  15. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  16. Acetylation Increases EWS-FLI1 DNA Binding and Transcriptional Activity

    International Nuclear Information System (INIS)

    Schlottmann, Silke; Erkizan, Hayriye V.; Barber-Rotenberg, Julie S.; Knights, Chad; Cheema, Amrita; Üren, Aykut; Avantaggiati, Maria L.; Toretsky, Jeffrey A.

    2012-01-01

    Ewing Sarcoma (ES) is associated with a balanced chromosomal translocation that in most cases leads to the expression of the oncogenic fusion protein and transcription factor EWS-FLI1. EWS-FLI1 has been shown to be crucial for ES cell survival and tumor growth. However, its regulation is still enigmatic. To date, no functionally significant post-translational modifications of EWS-FLI1 have been shown. Since ES are sensitive to histone deacetylase inhibitors (HDI), and these inhibitors are advancing in clinical trials, we sought to identify if EWS-FLI1 is directly acetylated. We convincingly show acetylation of the C-terminal FLI1 (FLI1-CTD) domain, which is the DNA binding domain of EWS-FLI1. In vitro acetylation studies showed that acetylated FLI1-CTD has higher DNA binding activity than the non-acetylated protein. Over-expression of PCAF or treatment with HDI increased the transcriptional activity of EWS-FLI1, when co-expressed in Cos7 cells. However, our data that evaluates the acetylation of full-length EWS-FLI1 in ES cells remains unclear, despite creating acetylation specific antibodies to four potential acetylation sites. We conclude that EWS-FLI1 may either gain access to chromatin as a result of histone acetylation or undergo regulation by direct acetylation. These data should be considered when patients are treated with HDAC inhibitors. Further investigation of this phenomenon will reveal if this potential acetylation has an impact on tumor response.

  17. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  18. Drone Warfare: Is the United States Violating the Law of Armed Conflict

    Science.gov (United States)

    2011-02-16

    NOTE AIR WAR COLLEGE AIR UNIVERSITY DRONE WARFARE: IS THE UNITED STATES VIOLATING THE LAW OF ARMED CONFLICT? by Barbara E. Shestko, Col...Base, Alabama. 1 Introduction The United States has become increasingly dependent upon the use of unmanned aircraft systems (UASs) or “ drones ” to...kill targeted members of al-Qaeda and the Taliban.1 Due to the success of drone warfare, we can expect the United States to continue its current

  19. Mechanisms of transcriptional repression by EWS-FLl1 in Ewing Sarcoma

    International Nuclear Information System (INIS)

    Niedan, S.

    2012-01-01

    The EWS-FLI1 chimeric oncoprotein characterizing Ewing Sarcoma (ES) is a prototypic aberrant ETS transcription factor with activating and repressive gene regulatory functions. Mechanisms of transcriptional regulation, especially transcriptional repression by EWS-FLI1, are poorly understood. We report that EWS-FLI1 repressed promoters are enriched in forkhead box recognition motifs, and identify FOXO1 as a EWS-FLI1 suppressed master regulator responsible for a significant subset of EWS-FLI1 repressed genes. In addition to transcriptional FOXO1 regulation by direct promoter binding of EWS-FLI1, its subcellular localization and activity is regulated by CDK2 and AKT mediated phosphorylation downstream of EWS-FLI1. Functional restoration of nuclear FOXO1 expression in ES cells impaired proliferation and significantly reduced clonogenicity. Gene-expression profiling revealed a significant overlap between EWS-FLI1 repressed and FOXO1-activated genes. Treatment of ES cell lines with Methylseleninic acid (MSA) evoked reactivation of endogenous FOXO1 in the presence of EWS-FLI1 in a dose- and time-dependent manner and induced massive cell death which was found to be partially FOXO1-dependent. In an orthotopic xenograft mouse model, MSA increased FOXO1 expression in the tumor paralleled by a significant decrease in ES tumor growth. Together, these data suggest that a repressive sub-signature of EWS-FLI1 repressed genes precipitates suppression of FOXO1. FOXO1 re-activation by small molecules may therefore constitute a novel therapeutic strategy in the treatment of ES. (author) [de

  20. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  1. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  2. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

    Directory of Open Access Journals (Sweden)

    Kathryn Merrick

    2016-07-01

    Full Text Available Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of information warfare literature, with the purpose of identifying games that model different types of information warfare operations. Our contribution is a systematic identification and classification of information warfare games, as a basis for modelling decision-making by humans and machines in such scenarios. We also present a taxonomy of games that map to information warfare and cyber crime problems as a precursor to future research on decision-making in such scenarios. We identify and discuss open research questions including the role of behavioural game theory in modelling human decision making and the role of machine decision-making in information warfare scenarios.

  3. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  4. Emerging Trends in China’s Development of Unmanned Systems

    Science.gov (United States)

    2015-01-01

    electronic warfare (EW); mine warfare/mine countermeasures; combat applications/strike missions; and humanitarian assistance and disaster relief (HA/DR...emerged in February 2013 that China had consid- ered launching a drone strike in Myanmar to kill a drug traf- ficker who was wanted for killing 13 Chinese...HA/DR humanitarian assistance and disaster relief HALE high altitude, long endurance ISR intelligence, surveillance, and reconnaissance MALE medium

  5. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  6. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  7. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  8. Cyber warfare:terms, issues, laws and controversies

    OpenAIRE

    Seviş, Kamile Nur; Şeker, Ensar

    2016-01-01

    Recent years have shown us the importance of cybersecurity. Especially, when the matter is national security, it is even more essential and crucial. Increasing cyber attacks, especially between countries in governmental level, created a new term cyber warfare. Creating some rules and regulations for this kind of war is necessary therefore international justice systems are working on it continuously. In this paper, we mentioned fundamental terms of cyber...

  9. Russian and Chinese Information Warfare: Theory and Practice

    Science.gov (United States)

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  10. Biological and Chemical Warfare

    African Journals Online (AJOL)

    tar" making delivery into enemy lines surer and more accurate. ..... ceptible to antibiotic drugs, antibiotic-resist- ant strains occur ... means of a early warning system based on an automatic alarm ... given immediately by intramuscular injec- tion.

  11. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  12. The cell cycle regulator CCDC6 is a key target of RNA-binding protein EWS.

    Directory of Open Access Journals (Sweden)

    Sujitha Duggimpudi

    Full Text Available Genetic translocation of EWSR1 to ETS transcription factor coding region is considered as primary cause for Ewing sarcoma. Previous studies focused on the biology of chimeric transcription factors formed due to this translocation. However, the physiological consequences of heterozygous EWSR1 loss in these tumors have largely remained elusive. Previously, we have identified various mRNAs bound to EWS using PAR-CLIP. In this study, we demonstrate CCDC6, a known cell cycle regulator protein, as a novel target regulated by EWS. siRNA mediated down regulation of EWS caused an elevated apoptosis in cells in a CCDC6-dependant manner. This effect was rescued upon re-expression of CCDC6. This study provides evidence for a novel functional link through which wild-type EWS operates in a target-dependant manner in Ewing sarcoma.

  13. Antisubmarine Warfare (ASW) Lexicon

    Science.gov (United States)

    1990-01-01

    Communications Satellite CRT Cathode Ray Tube COMNAVSURFLANT Commander, CS Combat System; Computer Subsystem Naval Surface Force, U.S. Atlantic Fleet CSA Close...Sideband Low-Frequency Acoustic Vernier Analyzer LSD Large Screen Display LC Launch Control LSI Low Ship Impact 24 LSNSR Line-of-Bearing Sensor NCA

  14. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  15. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  16. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  17. Identification of chemical warfare agent with radiological measurements

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Ai Xianyun

    2000-01-01

    There are three non-destructive radiological methods for identification of warfare agents and TNT. Their principles and problems related were discussed. Portable isotopic neutron spectroscopy is based on the assay of key elemental composition (such as Cl, P, H, As, S, N) in chemical agents by neutron induced prompt gamma ray analysis. Hydrogen concentration measurement by means of using thermal neutron can be employed to identify chemical warfare agents and TNT that contains different hydrogen fraction. The calibration curves of thermal neutron count rate against hydrogen concentration were measured. X ray imagination system can be used to determine the internal structure of chemical bombs, there by to identify them. The radiological methods are very useful for identification of old chemical weapons abandoned by Japan Army during World War 2

  18. A photometric analysis of the neglected EW-type binary V336 TrA

    Science.gov (United States)

    Kriwattanawong, W.; Sarotsakulchai, T.; Maungkorn, S.; Reichart, D. E.; Haislip, J. B.; Kouprianov, V. V.; LaCluyze, A. P.; Moore, J. P.

    2018-05-01

    This study presents an analysis of photometric light curves and absolute parameters for the EW-type binary V336 TrA. VRI imaging observations were taken in 2013 by using the robotic telescopes PROMPT 4 and PROMPT 5 at Cerro Tololo Inter-American Observatory (CTIO), Chile. The observed light curves were fitted by using the Wilson-Devinney method. The results showed that V336 TrA is a W-type contact binary with a mass ratio of q = 1.396. The binary is a weak contact system with a fill-out factor of f = 15.69%. The system contains components with masses of 0.653 M⊙ and 0.912 M⊙ for the hotter and the cooler, respectively. The location of the secondary (less massive) component on the log M - log L diagram was found to be near the TAMS. The component has evolved to be oversize and overluminous. The orbital angular momentum of the binary was found to be log Jo = 51.61 cgs, less than all detached systems for same mass. The system has undergone angular momentum and/or mass loss, during the binary evolution from the detached to contact system.

  19. Identification of a tripartite import signal in the Ewing Sarcoma protein (EWS)

    International Nuclear Information System (INIS)

    Shaw, Debra J.; Morse, Robert; Todd, Adrian G.; Eggleton, Paul; Lorson, Christian L.; Young, Philip J.

    2009-01-01

    The Ewing Sarcoma (EWS) protein is a ubiquitously expressed RNA processing factor that localises predominantly to the nucleus. However, the mechanism through which EWS enters the nucleus remains unclear, with differing reports identifying three separate import signals within the EWS protein. Here we have utilized a panel of truncated EWS proteins to clarify the reported nuclear localisation signals. We describe three C-terminal domains that are important for efficient EWS nuclear localization: (1) the third RGG-motif; (2) the last 10 amino acids (known as the PY-import motif); and (3) the zinc-finger motif. Although these three domains are involved in nuclear import, they are not independently capable of driving the efficient import of a GFP-moiety. However, collectively they form a complex tripartite signal that efficiently drives GFP-import into the nucleus. This study helps clarify the EWS import signal, and the identification of the involvement of both the RGG- and zinc-finger motifs has wide reaching implications.

  20. Identification of a tripartite import signal in the Ewing Sarcoma protein (EWS)

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, Debra J.; Morse, Robert; Todd, Adrian G. [Clinical Neurobiology, IBCS, Peninsula College of Medicine and Dentistry, Exeter EX1 2LU (United Kingdom); Eggleton, Paul [Inflammation and Musculoskeletal Disease, IBCS, Peninsula College of Medicine and Dentistry, Exeter EX1 2LU (United Kingdom); MRC Immunochemistry Unit, University of Oxford, Oxford OX1 3QU (United Kingdom); Lorson, Christian L. [Department of Veterinary Pathobiology, Bond Life Sciences Center, 1201 Rollins Road, University of Missouri, Columbia, MO 65211 (United States); Young, Philip J., E-mail: philip.young@pms.ac.uk [Clinical Neurobiology, IBCS, Peninsula College of Medicine and Dentistry, Exeter EX1 2LU (United Kingdom)

    2009-12-25

    The Ewing Sarcoma (EWS) protein is a ubiquitously expressed RNA processing factor that localises predominantly to the nucleus. However, the mechanism through which EWS enters the nucleus remains unclear, with differing reports identifying three separate import signals within the EWS protein. Here we have utilized a panel of truncated EWS proteins to clarify the reported nuclear localisation signals. We describe three C-terminal domains that are important for efficient EWS nuclear localization: (1) the third RGG-motif; (2) the last 10 amino acids (known as the PY-import motif); and (3) the zinc-finger motif. Although these three domains are involved in nuclear import, they are not independently capable of driving the efficient import of a GFP-moiety. However, collectively they form a complex tripartite signal that efficiently drives GFP-import into the nucleus. This study helps clarify the EWS import signal, and the identification of the involvement of both the RGG- and zinc-finger motifs has wide reaching implications.

  1. Quality of Life in Iranian Chemical Warfare Veteran's.

    Science.gov (United States)

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P chemical warfare survivors suffering from late complications have a low health related quality of life.

  2. Bench-Scale Investigation of Composting for Remediation of Explosives-Contaminated Soils from Naval Surface Warfare Center, Crane, Indiana

    National Research Council Canada - National Science Library

    Preston, Kurt

    1998-01-01

    ...), and octahydro-1,3,5,7-tetranitro-1,3,5,7- tetrazocine (HMX). The Naval Surface Warfare Center (NSWC), Crane, Indiana, provides material and logistic support to the Navy's weapon systems, including expendable and nonexpendable ordnance items...

  3. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  4. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  5. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  6. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  7. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  8. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  9. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  10. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  11. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  12. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    Science.gov (United States)

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  13. PI3K/AKT signaling modulates transcriptional expression of EWS/FLI1 through specificity protein 1.

    Science.gov (United States)

    Giorgi, Chiara; Boro, Aleksandar; Rechfeld, Florian; Lopez-Garcia, Laura A; Gierisch, Maria E; Schäfer, Beat W; Niggli, Felix K

    2015-10-06

    Ewing sarcoma (ES) is the second most frequent bone cancer in childhood and is characterized by the presence of the balanced translocation t(11;22)(q24;q12) in more than 85% of cases, generating a dysregulated transcription factor EWS/FLI1. This fusion protein is an essential oncogenic component of ES development which is necessary for tumor cell maintenance and represents an attractive therapeutic target. To search for modulators of EWS/FLI1 activity we screened a library of 153 targeted compounds and identified inhibitors of the PI3K pathway to directly modulate EWS/FLI1 transcription. Surprisingly, treatment of four different ES cell lines with BEZ235 resulted in down regulation of EWS/FLI1 mRNA and protein by ~50% with subsequent modulation of target gene expression. Analysis of the EWS/FLI1 promoter region (-2239/+67) using various deletion constructs identified two 14 bp minimal elements as being important for EWS/FLI1 transcription. We identified SP1 as modulator of EWS/FLI1 gene expression and demonstrated direct binding to one of these regions in the EWS/FLI1 promoter by EMSA and ChIP experiments. These results provide the first insights on the transcriptional regulation of EWS/FLI1, an area that has not been investigated so far, and offer an additional molecular explanation for the known sensitivity of ES cell lines to PI3K inhibition.

  14. QCD parton showers and NLO EW corrections to Drell-Yan

    CERN Document Server

    Richardson, P; Sapronov, A A; Seymour, M H; Skands, P Z

    2012-01-01

    We report on the implementation of an interface between the SANC generator framework for Drell-Yan hard processes, which includes next-to-leading order electroweak (NLO EW) corrections, and the Herwig++ and Pythia8 QCD parton shower Monte Carlos. A special aspect of this implementation is that the initial-state shower evolution in both shower generators has been augmented to handle the case of an incoming photon-in-a-proton, diagrams for which appear at the NLO EW level. The difference between shower algorithms leads to residual differences in the relative corrections of 2-3% in the p_T(mu) distributions at p_T(mu)>~50 GeV (where the NLO EW correction itself is of order 10%).

  15. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    Science.gov (United States)

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  16. Chemical and biological warfare. Should defenses be researched and deployed?

    Science.gov (United States)

    Orient, J M

    1989-08-04

    The threat of chemical and biological weapons of mass destruction has intensified because of improved delivery systems and advances in chemistry, genetics, and other sciences. Possible US responses to this threat include deterrence, defenses, and/or disarmament, including a reaffirmation of the Biological and Toxin Weapons Convention of 1972, which is now in jeopardy. This article discusses the history of chemical and biological warfare, existing and potential weapons, the proliferation of weapons and delivery systems, ways to prevent the use of these weapons, and ways to protect populations from their effects.

  17. Ultraviolet Raman scattering from persistent chemical warfare agents

    Science.gov (United States)

    Kullander, Fredrik; Wästerby, Pär.; Landström, Lars

    2016-05-01

    Laser induced Raman scattering at excitation wavelengths in the middle ultraviolet was examined using a pulsed tunable laser based spectrometer system. Droplets of chemical warfare agents, with a volume of 2 μl, were placed on a silicon surface and irradiated with sequences of laser pulses. The Raman scattering from V-series nerve agents, Tabun (GA) and Mustard gas (HD) was studied with the aim of finding the optimum parameters and the requirements for a detection system. A particular emphasis was put on V-agents that have been previously shown to yield relatively weak Raman scattering in this excitation band.

  18. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  19. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  20. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    Science.gov (United States)

    2016-12-01

    ENGINEERING APPROACH Numerous systems engineering process models were considered for this study including the Waterfall , Spiral, and “Vee” models . Given the... model based systems engineering, design of experiments, requirements analysis, mine warfare, MIW, mine countermeasures, MCM, littoral combat ship, LCS...E. IMPLEMENTATION IN SIMULATION MODEL .............................47 VII. MODELING AND SIMULATION ARCHITECTURE ..................................49

  1. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    Science.gov (United States)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  2. SiGe-based re-engineering of electronic warfare subsystems

    CERN Document Server

    Lambrechts, Wynand

    2017-01-01

    This book equips readers with a thorough understanding of the applicability of new-generation silicon-germanium (SiGe) electronic subsystems for the military purposes of electronic warfare and defensive countermeasures. The theoretical and technical background is extensively explained and all aspects of the integration of SiGe as an enabling technology for maritime, land, and airborne (including space) electronic warfare are addressed, including research, design, development, and implementation. The coverage is supported by mathematical derivations, informative illustrations, practical examples, and case studies. While SiGe technology provides speed, performance, and price advantages in many markets, sharing of information on its use in electronic warfare systems has to date been limited, especially in developing nations. This book will therefore be warmly welcomed as an engineering guideline that focuses especially on the speed and reliability of current-generation SiGe circuits and highlights emerging innov...

  3. THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

    Directory of Open Access Journals (Sweden)

    Sorin DUCARU

    2016-06-01

    Full Text Available The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication and information systems. The cyber threat landscape points to a significant increase of the frequency, intensity, duration and sophistication of cyber-attacks. One of the new and concerning trends is the use of cyber capabilities in relation with military of hybrid operations – the so-called cyber dimension of hybrid warfare. NATO’s strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies. International cooperation is also a key factor in this sense. It is in this context that NATO’s response to cyber-attacks in the context of hybrid warfare must be further refined.

  4. A zebrafish transgenic model of Ewing’s sarcoma reveals conserved mediators of EWS-FLI1 tumorigenesis

    Directory of Open Access Journals (Sweden)

    Stefanie W. Leacock

    2012-01-01

    Ewing’s sarcoma, a malignant bone tumor of children and young adults, is a member of the small-round-blue-cell tumor family. Ewing’s sarcoma family tumors (ESFTs, which include peripheral primitive neuroectodermal tumors (PNETs, are characterized by chromosomal translocations that generate fusions between the EWS gene and ETS-family transcription factors, most commonly FLI1. The EWS-FLI1 fusion oncoprotein represents an attractive therapeutic target for treatment of Ewing’s sarcoma. The cell of origin of ESFT and the molecular mechanisms by which EWS-FLI1 mediates tumorigenesis remain unknown, and few animal models of Ewing’s sarcoma exist. Here, we report the use of zebrafish as a vertebrate model of EWS-FLI1 function and tumorigenesis. Mosaic expression of the human EWS-FLI1 fusion protein in zebrafish caused the development of tumors with histology strongly resembling that of human Ewing’s sarcoma. The incidence of tumors increased in a p53 mutant background, suggesting that the p53 pathway suppresses EWS-FLI1-driven tumorigenesis. Gene expression profiling of the zebrafish tumors defined a set of genes that might be regulated by EWS-FLI1, including the zebrafish ortholog of a crucial EWS-FLI1 target gene in humans. Stable zebrafish transgenic lines expressing EWS-FLI1 under the control of the heat-shock promoter exhibit altered embryonic development and defective convergence and extension, suggesting that EWS-FLI1 interacts with conserved developmental pathways. These results indicate that functional targets of EWS-FLI1 that mediate tumorigenesis are conserved from zebrafish to human and provide a novel context in which to study the function of this fusion oncogene.

  5. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  6. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  7. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  8. Detection of EWS/FLI-1 fusion in non-Ewing soft tissue tumors.

    Science.gov (United States)

    Trancău, I O; Huică, R; Surcel, M; Munteanu, A; Ursaciuc, C

    2015-01-01

    EWS/FLI-1 fusion mainly appears in Ewing's sarcoma or the primitive neuroectodermal tumors and represents a genomic marker for these tumors. However, it can appear with lower frequency in other soft tissue tumors. The paper investigates the presence of EWS/FLI-1 fusion in clinically diagnosed sarcoma belonging to different non-Ewing connective tissue tumors in order to search for a possible new biomarker valuable for investigators. 20 patients with soft tissue tumors, who underwent surgery, were tested. Intra-operative samples of normal and tumor tissue were collected for histopathological diagnosis and genetics determinations. The patients' RNA from tumor and normal peritumoral tissue was extracted and EWS/FLI-1 fusion screened by quantitative real-time PCR. The relative expression of the fusion in the tumor sample was compared to the similar expression in normal tissue. The amplification in the threshold zone was shown by 5 samples (25%): 2 clear cell sarcoma, 1 fibrosarcoma, 1 malignant tumor of nerve sheath, 1 metastatic adenocarcinoma. We differentiated between the unspecific amplification and concluded that these are weak positive results. Genomic investigation may establish the tumor malignancy and its possible affiliation earlier than histopathology. It can support the screening of EWS/FLI-1 fusion in a larger variety of clinically diagnosed soft tissue tumors.

  9. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    Science.gov (United States)

    2017-12-01

    from Kyiv to Boryslav, a targeted bombing resulted in the successful 17 The Army Cyber Institute at West Point...electromagnetic ( EM ) emissions has proved extremely successful at the tactical level against Ukrainian forces. While tactical cyber looks at content, EW...against Ukrainian personnel. The use by Ukrainian forces of devices with EM broadcasting enabled adversary tracking of individual devices or volumes

  10. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  11. Characterization of the TIP4P-Ew water model: vapor pressure and boiling point.

    Science.gov (United States)

    Horn, Hans W; Swope, William C; Pitera, Jed W

    2005-11-15

    The liquid-vapor-phase equilibrium properties of the previously developed TIP4P-Ew water model have been studied using thermodynamic integration free-energy simulation techniques in the temperature range of 274-400 K. We stress that free-energy results from simulations need to be corrected in order to be compared to the experiment. This is due to the fact that the thermodynamic end states accessible through simulations correspond to fictitious substances (classical rigid liquids and classical rigid ideal gases) while experiments operate on real substances (liquids and real gases, with quantum effects). After applying analytical corrections the vapor pressure curve obtained from simulated free-energy changes is in excellent agreement with the experimental vapor pressure curve. The boiling point of TIP4P-Ew water under ambient pressure is found to be at 370.3+/-1.9 K, about 7 K higher than the boiling point of TIP4P water (363.7+/-5.1 K; from simulations that employ finite range treatment of electrostatic and Lennard-Jones interactions). This is in contrast to the approximately +15 K by which the temperature of the density maximum and the melting temperature of TIP4P-Ew are shifted relative to TIP4P, indicating that the temperature range over which the liquid phase of TIP4P-Ew is stable is narrower than that of TIP4P and resembles more that of real water. The quality of the vapor pressure results highlights the success of TIP4P-Ew in describing the energetic and entropic aspects of intermolecular interactions in liquid water.

  12. 11th Annual Mine Warfare Technology Symposium, May 6-8, 2014 - Monterey, CA

    OpenAIRE

    2014-01-01

    The Naval Postgraduate School (NPS), the Office of Naval Research (ONR), the Program Executive Office Littoral Combat Ships (PEO LCS), OPNAV (N95), and The Consortium for Robotics and Unmanned Systems Education and Research (CRUSER) are pleased to announce the ELEVENTH International Mine Warfare Technology Symposium in Monterey, California, May 6-8, 2014.

  13. Fluorescent discrimination between traces of chemical warfare agents and their mimics.

    Science.gov (United States)

    Díaz de Greñu, Borja; Moreno, Daniel; Torroba, Tomás; Berg, Alexander; Gunnars, Johan; Nilsson, Tobias; Nyman, Rasmus; Persson, Milton; Pettersson, Johannes; Eklind, Ida; Wästerby, Pär

    2014-03-19

    An array of fluorogenic probes is able to discriminate between nerve agents, sarin, soman, tabun, VX and their mimics, in water or organic solvent, by qualitative fluorescence patterns and quantitative multivariate analysis, thus making the system suitable for the in-the-field detection of traces of chemical warfare agents as well as to differentiate between the real nerve agents and other related compounds.

  14. EWS-FLI1 inhibits TNFα-induced NFκB-dependent transcription in Ewing sarcoma cells

    International Nuclear Information System (INIS)

    Lagirand-Cantaloube, Julie; Laud, Karine; Lilienbaum, Alain; Tirode, Franck; Delattre, Olivier; Auclair, Christian; Kryszke, Marie-Helene

    2010-01-01

    Research highlights: → EWS-FLI1 interferes with TNF-induced activation of NFκB in Ewing sarcoma cells. → EWS-FLI1 knockdown in Ewing sarcoma cells increases TNF-induced NFκB binding to DNA. → EWS-FLI1 reduces TNF-stimulated NFκB-dependent transcriptional activation. → Constitutive NFκB activity is not affected by EWS-FLI1. → EWS-FLI1 physically interacts with NFκB p65 in vivo. -- Abstract: Ewing sarcoma is primarily caused by a t(11;22) chromosomal translocation encoding the EWS-FLI1 fusion protein. To exert its oncogenic function, EWS-FLI1 acts as an aberrant transcription factor, broadly altering the gene expression profile of tumor cells. Nuclear factor-kappaB (NFκB) is a tightly regulated transcription factor controlling cell survival, proliferation and differentiation, as well as tumorigenesis. NFκB activity is very low in unstimulated Ewing sarcoma cells, but can be induced in response to tumor necrosis factor (TNF). We wondered whether NFκB activity could be modulated by EWS-FLI1 in Ewing sarcoma. Using a knockdown approach in Ewing sarcoma cells, we demonstrated that EWS-FLI1 has no influence on NFκB basal activity, but impairs TNF-induced NFκB-driven transcription, at least in part through inhibition of NFκB binding to DNA. We detected an in vivo physical interaction between the fusion protein and NFκB p65, which could mediate these effects. Our findings suggest that, besides directly controlling the activity of its primary target promoters, EWS-FLI1 can also indirectly influence gene expression in tumor cells by modulating the activity of key transcription factors such as NFκB.

  15. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  16. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  17. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  18. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  19. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  20. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  1. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  2. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    Science.gov (United States)

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  3. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  4. System architecture and operational analysis of medium displacement unmanned surface vehicle sea hunter as a surface warfare component of distributed lethality

    Science.gov (United States)

    2017-06-01

    systems would be easy to implement given that all they need is electrical power and a SATCOM feed so the human supervisor could arm the system and set...2 Figure 1. ACTUV during Initial Testing. Source: Jontz (2016). A. PURPOSE This thesis is a response to a general study topic request from the...based system engineering. For the purpose of this thesis , a specific system (the MDUSV) is presented as a solution. As such, there will not be the

  5. Junction region of EWS-FLI1 fusion protein has a dominant negative effect in Ewing's sarcoma in vitro.

    Science.gov (United States)

    Jully, Babu; Vijayalakshmi, Ramshankar; Gopal, Gopisetty; Sabitha, Kesavan; Rajkumar, Thangarajan

    2012-11-12

    Ewing's sarcoma is a malignancy characterized by a specific 11:22 chromosomal translocation which generates a novel EWS-FLI1 fusion protein functioning as an aberrant transcription factor. In the present study, we have further characterized the junction region of the EWS-FLI1 fusion protein. In-silico model of EWS-FLI1 fusion protein was analysed for ligand binding sites, and a putative region (amino acid (aa) 251-343 of the type 1 fusion protein) in the vicinity of the fusion junction was cloned and expressed using bacterial expression. The recombinant protein was characterized by Circular Dichroism (CD). We then expressed aa 251-280 ectopically in Ewing's sarcoma cell-line and its effect on cell proliferation, tumorigenicity and expression of EWS-FLI1 target genes were analysed. Our modelling analysis indicated that Junction region (aa 251-343) encompasses potential ligand biding sites in the EWS-FLI1 protein and when expressed in bacteria was present as soluble form. Ectopically expressing this region in Ewing's sarcoma cells inhibited tumorigenicity, and EWS-FLI1 target genes indicating a dominant negative biological effect. Junction region can be exploited further as target for drug development in future to specifically target EWS-FLI1 in Ewing's Sarcoma.

  6. China's Use of Cyber Warfare: Espionage Meets Strategic Deterrence

    Directory of Open Access Journals (Sweden)

    Magnus Hjortdal

    2011-01-01

    Full Text Available This article presents three reasons for states to use cyber warfare and shows that cyberspace is—and will continue to be—a decisive element in China's strategy to ascend in the international system. The three reasons are: deterrence through infiltration of critical infrastructure; military technological espionage to gain military knowledge; and industrial espionage to gain economic advantage. China has a greater interest in using cyberspace offensively than other actors, such as the United States, since it has more to gain from spying on and deterring the United States than the other way around. The article also documents China's progress in cyber warfare and shows how it works as an extension of its traditional strategic thinking and the current debate within the country. Several examples of cyber attacks traceable to China are also presented. This includes cyber intrusions on a nuclear arms laboratory, attacks on defense ministries (including the Joint Strike Fighter and an airbase and the U.S. electric grid, as well as the current Google affair, which has proved to be a small part of a broader attack that also targeted the U.S. Government. There are, however, certain constraints that qualify the image of China as an aggressive actor in cyberspace. Some believe that China itself is the victim of just as many attacks from other states. Furthermore, certain actors in the United States and the West have an interest in overestimating China's capabilities in cyberspace in order to maintain their budgets.

  7. The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks Through Multi-Level, Multi-Scale System Modeling and Model Based Technology

    National Research Council Canada - National Science Library

    Ye, Nong

    2004-01-01

    With the goal of protecting computer and networked systems from various attacks, the following intrusion detection techniques were developed and tested using the 1998 and 2000 MIT Lincoln Lab Evaluation Data...

  8. An Identification and Possible Method of Collection/Reporting of Under-Reported Small Business Utilization Data for the Space and Naval Warfare Systems Command

    National Research Council Canada - National Science Library

    Schweer, Mark

    2001-01-01

    ... current reporting system grants no credit. The areas of first-tier subcontracting, second tier subcontracting, Interagency acquisition, GSA FSS orders, indirect costs, Other Transactions, Micro-purchases and contracts...

  9. The Monitoring, Detection, Isolation and Assessment of Information Warfare Attacks Through Multi-Level, Multi-Scale System Modeling and Model Based Technology

    Science.gov (United States)

    2004-01-01

    login identity to the one under which the system call is executed, the parameters of the system call execution - file names including full path...Anomaly detection COAST-EIMDT Distributed on target hosts EMERALD Distributed on target hosts and security servers Signature recognition Anomaly...uses a centralized architecture, and employs an anomaly detection technique for intrusion detection. The EMERALD project [80] proposes a

  10. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  11. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  12. Fixing the EW scale in supersymmetric models after the Higgs discovery

    CERN Document Server

    Ghilencea, D M

    2013-01-01

    TeV-scale supersymmetry was originally introduced to solve the hierarchy problem and therefore fix the electroweak (EW) scale in the presence of quantum corrections. Numerical methods testing the SUSY models often report a good likelihood L (or chi^2=-2ln L) to fit the data {\\it including} the EW scale itself (m_Z^0) with a {\\it simultaneously} large fine-tuning i.e. a large variation of this scale under a small variation of the SUSY parameters. We argue that this is inconsistent and we identify the origin of this problem. Our claim is that the likelihood (or chi^2) to fit the data that is usually reported in such models does not account for the chi^2 cost of fixing the EW scale. When this constraint is implemented, the likelihood (or chi^2) receives a significant correction (delta_chi^2) that worsens the current data fits of SUSY models. We estimate this correction for the models: constrained MSSM (CMSSM), models with non-universal gaugino masses (NUGM) or higgs soft masses (NUHM1, NUHM2), the NMSSM and the ...

  13. Ewing's sarcoma: analysis of single nucleotide polymorphism in the EWS gene.

    Science.gov (United States)

    Silva, Deborah S B S; Sawitzki, Fernanda R; De Toni, Elisa C; Graebin, Pietra; Picanco, Juliane B; Abujamra, Ana Lucia; de Farias, Caroline B; Roesler, Rafael; Brunetto, Algemir L; Alho, Clarice S

    2012-11-10

    We aimed to investigate single nucleotide polymorphisms (SNPs) in the EWS gene breaking region in order to analyze Ewing's sarcoma susceptibility. The SNPs were investigated in a healthy subject population and in Ewing's sarcoma patients from Southern Brazil. Genotyping was performed by TaqMan® assay for allelic discrimination using Real-Time PCR. The analysis of incidence of SNPs or different SNP-arrangements revealed a higher presence of homozygote TT-rs4820804 in Ewing's sarcoma patients (p=0.02; Chi Square Test). About 300 bp from the rs4820804 SNP lies a palindromic hexamer (5'-GCTAGC-3') and three nucleotides (GTC), which were previously identified to be in close vicinity of the breakpoint junction in both EWS and FLI1 genes. This DNA segment surrounding the rs4820804 SNP is likely to indicate a breakpoint region. If the T-rs4820804 allele predisposes a DNA fragment to breakage, homozygotes (TT-rs4820804) would have double the chance of having a chromosome break, increasing the chances for a translocation to occur. In conclusion, the TT-rs4820804 EWS genotype can be associated with Ewing's sarcoma and the SNP rs4820804 can be a candidate marker to understand Ewing's sarcoma susceptibility. Copyright © 2012 Elsevier B.V. All rights reserved.

  14. Chemical warfare protection for the cockpit of future aircraft

    Science.gov (United States)

    Pickl, William C.

    1988-01-01

    Currently systems are being developed which will filter chemical and biological contaminants from crew station air. In order to maximize the benefits of these systems, a method of keeping the cockpit contaminant free during pilot ingress and egress is needed. One solution is to use a rectangular plastic curtain to seal the four edges of the canopy frame to the canopy sill. The curtain is stored in a tray which is recessed into the canopy sill and unfolds in accordion fashion as the canopy is raised. A two way zipper developed by Calspan could be used as an airlock between the pilot's oversuit and the cockpit. This system eliminates the pilot's need for heavy and restrictive CB gear because he would never be exposed to the chemical warfare environment.

  15. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  16. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  17. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  19. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  20. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  1. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  2. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  3. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    Science.gov (United States)

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  4. NLO QCD+EW predictions for V + jets including off-shell vector-boson decays and multijet merging

    Energy Technology Data Exchange (ETDEWEB)

    Kallweit, S. [Institut für Physik & PRISMA Cluster of Excellence,Johannes Gutenberg Universität, 55099 Mainz (Germany); Lindert, J.M. [Physik-Institut, Universität Zürich,Winterthurerstrasse 190, CH-8057 Zürich (Switzerland); Maierhöfer, P. [Institute for Particle Physics Phenomenology, Durham University,Durham DH1 3LE (United Kingdom); Physikalisches Institut, Albert-Ludwigs-Universität Freiburg,79104 Freiburg (Germany); Pozzorini, S.; Schönherr, M. [Physik-Institut, Universität Zürich,Winterthurerstrasse 190, CH-8057 Zürich (Switzerland)

    2016-04-05

    We present next-to-leading order (NLO) predictions including QCD and electroweak (EW) corrections for the production and decay of off-shell electroweak vector bosons in association with up to two jets at the 13 TeV LHC. All possible dilepton final states with zero, one or two charged leptons that can arise from off-shell W and Z bosons or photons are considered. All predictions are obtained using the automated implementation of NLO QCD+EW corrections in the OPENLOOPS matrix-element generator combined with the MUNICH and SHERPA Monte Carlo frameworks. Electroweak corrections play an especially important role in the context of BSM searches, due to the presence of large EW Sudakov logarithms at the TeV scale. In this kinematic regime, important observables such as the jet transverse momentum or the total transverse energy are strongly sensitive to multijet emissions. As a result, fixed-order NLO QCD+EW predictions are plagued by huge QCD corrections and poor theoretical precision. To remedy this problem we present an approximate method that allows for a simple and reliable implementation of NLO EW corrections in the MEPS@NLO multijet merging framework. Using this general approach we present an inclusive simulation of vector-boson production in association with jets that guarantees NLO QCD+EW accuracy in all phase-space regions involving up to two resolved jets.

  5. Preclinical Justification of pbi-shRNA EWS/FLI1 Lipoplex (LPX) Treatment for Ewing's Sarcoma.

    Science.gov (United States)

    Rao, Donald D; Jay, Christopher; Wang, Zhaohui; Luo, Xiuquan; Kumar, Padmasini; Eysenbach, Hilary; Ghisoli, Maurizio; Senzer, Neil; Nemunaitis, John

    2016-08-01

    The EWS/FLI1 fusion gene is well characterized as a driver of Ewing's sarcoma. Bi-shRNA EWS/FLI1 is a functional plasmid DNA construct that transcribes both siRNA and miRNA-like effectors each of which targets the identical type 1 translocation junction region of the EWS/FLI1 transcribed mRNA sequence. Previous preclinical and clinical studies confirm the safety of this RNA interference platform technology and consistently demonstrate designated mRNA and protein target knockdown at greater than 90% efficiency. We initiated development of pbi-shRNA EWS/FLI1 lipoplex (LPX) for the treatment of type 1 Ewing's sarcoma. Clinical-grade plasmid was manufactured and both sequence and activity verified. Target protein and RNA knockdown of 85-92% was demonstrated in vitro in type 1 human Ewing's sarcoma tumor cell lines with the optimal bi-shRNA EWS/FLI1 plasmid. This functional plasmid was placed in a clinically tested, liposomal (LP) delivery vehicle followed by in vivo verification of activity. Type 1 Ewing's sarcoma xenograft modeling confirmed dose related safety and tumor response to pbi-shRNA EWS/FLI1 LPX. Toxicology studies in mini-pigs with doses comparable to the demonstrated in vivo efficacy dose resulted in transient fever, occasional limited hypertension at low- and high-dose assessment and transient liver enzyme elevation at high dose. These results provide the justification to initiate clinical testing.

  6. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  7. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  8. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  9. Leach-SX-EW copper revalorization from overburden of abandoned copper mine Cerovo, Eastern Serbia

    Directory of Open Access Journals (Sweden)

    Stevanović Z.

    2009-01-01

    Full Text Available Hydrometallurgical processes for copper revalorization from overburden of abandoned mine Cerovo in Eastern Serbia were studied. Paper contain results of percolation leaching tests, performed with acidic mine waters accumulated in the bottom of the former open pit, followed by solvent extraction (SX and electrowinning (EW processes on achieved copper pregnant leach solutions. Usage of accumulated waste waters was objected to minimizing the environmental hazard due to uncontrolled leaking of these waters in nearby creeks and rivers. Chemical composition of acidic mine waters used for leaching tests was: (g/dm3: Cu - 0.201; Fe - 0.095; Mn - 0.041; Zn - 0.026; Ni - 0.0004; pH value - 3.3. Copper content in overburden sample used for leaching tests was 0.21% from which 64% were oxide copper minerals. In scope of leaching tests were examined influence of leaching solution pH values and iron (III concentration on copper recovery. It was established that for 120 hours of leaching on pH=1.5 without oxidant agents, copper concentration in pregnant leach solutions enriched up to 1.08g/dm3 which was enough for copper extraction from solution with SX-EW treatment. As extraction reagent in SX circuit was used LIX-984N in a kerosene diluent. Cathode current density in electrowinning cell was 220Am-2 while electrolyte temperature was kept on 50±2oC. Produced cathode copper at the end of SX-EW process has purity of 99.95% Cu.

  10. Adipogenesis stimulates the nuclear localization of EWS with an increase in its O-GlcNAc glycosylation in 3T3-L1 cells

    International Nuclear Information System (INIS)

    Li, Qiang; Kamemura, Kazuo

    2014-01-01

    Highlights: • The majority of EWS localizes stably in the cytosol in 3T3-L1 preadipocytes. • Adipogenic stimuli induce the nuclear localization of EWS. • Adipogenesis promotes O-GlcNAcylation of EWS. • O-GlcNAcylation stimulates the recruitment of EWS to the nuclear periphery. - Abstract: Although the Ewing sarcoma (EWS) proto-oncoprotein is found in the nucleus and cytosol and is associated with the cell membrane, the regulatory mechanisms of its subcellular localization are still unclear. Here we found that adipogenic stimuli induce the nuclear localization of EWS in 3T3-L1 cells. Tyrosine phosphorylation in the C-terminal PY-nuclear localization signal of EWS was negative throughout adipogenesis. Instead, an adipogenesis-dependent increase in O-linked β-N-acetylglucosamine (O-GlcNAc) glycosylation of EWS was observed. Pharmacological inactivation of O-GlcNAcase in preadipocytes promoted perinuclear localization of EWS. Our findings suggest that the nuclear localization of EWS is partly regulated by the glycosylation

  11. EWS Knockdown and Taxifolin Treatment Induced Differentiation and Removed DNA Methylation from p53 Promoter to Promote Expression of Puma and Noxa for Apoptosis in Ewing's Sarcoma.

    Science.gov (United States)

    Hossain, Mohammad Motarab; Ray, Swapan Kumar

    2014-10-01

    Ewing's sarcoma is a pediatric tumor that mainly occurs in soft tissues and bones. Malignant characteristics of Ewing's sarcoma are correlated with expression of EWS oncogene. We achieved knockdown of EWS expression using a plasmid vector encoding EWS short hairpin RNA (shRNA) to increase anti-tumor mechanisms of taxifolin (TFL), a new flavonoid, in human Ewing's sarcoma cells in culture and animal models. Immunofluorescence microscopy and flow cytometric analysis showed high expression of EWS in human Ewing's sarcoma SK-N-MC and RD-ES cell lines. EWS shRNA plus TFL inhibited 80% cell viability and caused the highest decreases in EWS expression at mRNA and protein levels in both cell lines. Knockdown of EWS expression induced morphological features of differentiation. EWS shRNA plus TFL caused more alterations in molecular markers of differentiation than either agent alone. EWS shRNA plus TFL caused the highest decreases in cell migration with inhibition of survival, angiogenic and invasive factors. Knockdown of EWS expression was associated with removal of DNA methylation from p53 promoter, promoting expression of p53, Puma, and Noxa. EWS shRNA plus TFL induced the highest amounts of apoptosis with activation of extrinsic and intrinsic pathways in both cell lines in culture. EWS shRNA plus TFL also inhibited growth of Ewing's sarcoma tumors in animal models due to inhibition of differentiation inhibitors and angiogenic and invasive factors and also induction of activation of caspase-3 for apoptosis. Collectively, knockdown of EWS expression increased various anti-tumor mechanisms of TFL in human Ewing's sarcoma in cell culture and animal models.

  12. Electronic Warfare and Radar Systems Engineering Handbook

    Science.gov (United States)

    2012-06-01

    Program GIG Global Information Grid GIGO Garbage In / Garbage Out GOCO Government Owned Contract Operated GOFO General Officer / Flag Officer...Usually, for economy , signals are sampled at the minimum rate required, with the result that the quantization noise introduced is white noise spread

  13. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  14. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  15. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  16. Fast neutron sensor for detection of explosives and chemical warfare agents

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Matika, Dario

    2010-01-01

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  17. Fast neutron sensor for detection of explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)], E-mail: valkovic@irb.hr; Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia)

    2010-04-15

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  18. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  19. Automation of NLO QCD and EW corrections with Sherpa and Recola

    Energy Technology Data Exchange (ETDEWEB)

    Biedermann, Benedikt; Denner, Ansgar; Pellen, Mathieu [Universitaet Wuerzburg, Institut fuer Theoretische Physik und Astrophysik, Wuerzburg (Germany); Braeuer, Stephan; Schumann, Steffen [Georg-August Universitaet Goettingen, II. Physikalisches Institut, Goettingen (Germany); Thompson, Jennifer M. [Universitaet Heidelberg, Institut fuer Theoretische Physik, Heidelberg (Germany)

    2017-07-15

    This publication presents the combination of the one-loop matrix-element generator Recola with the multipurpose Monte Carlo program Sherpa. Since both programs are highly automated, the resulting Sherpa +Recola framework allows for the computation of - in principle - any Standard Model process at both NLO QCD and EW accuracy. To illustrate this, three representative LHC processes have been computed at NLO QCD and EW: vector-boson production in association with jets, off-shell Z-boson pair production, and the production of a top-quark pair in association with a Higgs boson. In addition to fixed-order computations, when considering QCD corrections, all functionalities of Sherpa, i.e. particle decays, QCD parton showers, hadronisation, underlying events, etc. can be used in combination with Recola. This is demonstrated by the merging and matching of one-loop QCD matrix elements for Drell-Yan production in association with jets to the parton shower. The implementation is fully automatised, thus making it a perfect tool for both experimentalists and theorists who want to use state-of-the-art predictions at NLO accuracy. (orig.)

  20. EWS/FLI-l peptide-pulsed dendritic cells induces the antitumor immunity in a murine Ewing's sarcoma cell model.

    Science.gov (United States)

    Peng, Wei; Huang, Xunwu; Yang, Dazhi

    2014-08-01

    An increasing number of T-cell epitopes derived from various tumor-associated antigens have been reported, and they proved to play significant roles for tumor rejection both in vivo and in vitro. Over 85% of Ewing's sarcoma family of tumors (ESFTs) express tumor-specific chimeric protein EWS/FLI-1, making it an attractive target for therapeutic cytotoxic T-lymphocyte responses. Here, we identified a novel peptide epitope derived from the EWS/FLI-1 protein and demonstrated that effectors induced by the peptide could specifically secrete IFN-γ and lyse the tumor cell line of EWS/FLI-1-positive and HLA-matched cells. In addition, mice treated with dendritic cells pulsed with the EWS/FLI-1 epitope were able to reject a lethal tumor inoculation of the Ewing's sarcoma A673 cells. Therefore, these data provide evidence for the use of the EWS/FLI-l peptide epitope in T cell-based immunotherapeutic concepts against Ewing's sarcoma cell in vitro and in vivo. Copyright © 2014 Elsevier B.V. All rights reserved.

  1. BCL11B is up-regulated by EWS/FLI and contributes to the transformed phenotype in Ewing sarcoma.

    Directory of Open Access Journals (Sweden)

    Elizabeth T Wiles

    Full Text Available The EWS/FLI translocation product is the causative oncogene in Ewing sarcoma and acts as an aberrant transcription factor. EWS/FLI dysregulates gene expression during tumorigenesis by abnormally activating or repressing genes. The expression levels of thousands of genes are affected in Ewing sarcoma, however, it is unknown which of these genes contribute to the transformed phenotype. Here we characterize BCL11B as an up-regulated EWS/FLI target that is necessary for the maintenance of transformation in patient derived Ewing sarcoma cells lines. BCL11B, a zinc finger transcription factor, acts as a transcriptional repressor in Ewing's sarcoma and contributes to the EWS/FLI repressed gene signature. BCL11B repressive activity is mediated by the NuRD co-repressor complex. We further demonstrate that re-expression of SPRY1, a repressed target of BCL11B, limits the transformation capacity of Ewing sarcoma cells. These data define a new pathway downstream of EWS/FLI required for oncogenic maintenance in Ewing sarcoma.

  2. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    Science.gov (United States)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  3. Hsa-mir-145 is the top EWS-FLI1-repressed microRNA involved in a positive feedback loop in Ewing's sarcoma.

    Science.gov (United States)

    Ban, J; Jug, G; Mestdagh, P; Schwentner, R; Kauer, M; Aryee, D N T; Schaefer, K-L; Nakatani, F; Scotlandi, K; Reiter, M; Strunk, D; Speleman, F; Vandesompele, J; Kovar, H

    2011-05-05

    EWS-FLI1 is a chromosome translocation-derived chimeric transcription factor that has a central and rate-limiting role in the pathogenesis of Ewing's sarcoma. Although the EWS-FLI1 transcriptomic signature has been extensively characterized on the mRNA level, information on its impact on non-coding RNA expression is lacking. We have performed a genome-wide analysis of microRNAs affected by RNAi-mediated silencing of EWS-FLI1 in Ewing's sarcoma cell lines, and differentially expressed between primary Ewing's sarcoma and mesenchymal progenitor cells. Here, we report on the identification of hsa-mir-145 as the top EWS-FLI1-repressed microRNA. Upon knockdown of EWS-FLI1, hsa-mir-145 expression dramatically increases in all Ewing's sarcoma cell lines tested. Vice versa, ectopic expression of the microRNA in Ewing's sarcoma cell lines strongly reduced EWS-FLI1 protein, whereas transfection of an anti-mir to hsa-mir-145 increased the EWS-FLI1 levels. Reporter gene assays revealed that this modulation of EWS-FLI1 protein was mediated by the microRNA targeting the FLI1 3'-untranslated region. Mutual regulations of EWS-FLI1 and hsa-mir-145 were mirrored by an inverse correlation between their expression levels in four of the Ewing's sarcoma cell lines tested. Consistent with the role of EWS-FLI1 in Ewing's sarcoma growth regulation, forced hsa-mir-145 expression halted Ewing's sarcoma cell line growth. These results identify feedback regulation between EWS-FLI1 and hsa-mir-145 as an important component of the EWS-FLI1-mediated Ewing's sarcomagenesis that may open a new avenue to future microRNA-mediated therapy of this devastating malignant disease.

  4. High-temperature dynamic behavior in bulk liquid water: A molecular dynamics simulation study using the OPC and TIP4P-Ew potentials

    Science.gov (United States)

    Gabrieli, Andrea; Sant, Marco; Izadi, Saeed; Shabane, Parviz Seifpanahi; Onufriev, Alexey V.; Suffritti, Giuseppe B.

    2018-02-01

    Classical molecular dynamics simulations were performed to study the high-temperature (above 300 K) dynamic behavior of bulk water, specifically the behavior of the diffusion coefficient, hydrogen bond, and nearest-neighbor lifetimes. Two water potentials were compared: the recently proposed "globally optimal" point charge (OPC) model and the well-known TIP4P-Ew model. By considering the Arrhenius plots of the computed inverse diffusion coefficient and rotational relaxation constants, a crossover from Vogel-Fulcher-Tammann behavior to a linear trend with increasing temperature was detected at T* ≈ 309 and T* ≈ 285 K for the OPC and TIP4P-Ew models, respectively. Experimentally, the crossover point was previously observed at T* ± 315-5 K. We also verified that for the coefficient of thermal expansion α P ( T, P), the isobaric α P ( T) curves cross at about the same T* as in the experiment. The lifetimes of water hydrogen bonds and of the nearest neighbors were evaluated and were found to cross near T*, where the lifetimes are about 1 ps. For T T*, water behaves more like a simple liquid. The fact that T* falls within the biologically relevant temperature range is a strong motivation for further analysis of the phenomenon and its possible consequences for biomolecular systems.

  5. Evanescent wave cavity ring-down spectroscopy (EW-CRDS) as a probe of macromolecule adsorption kinetics at functionalized interfaces.

    Science.gov (United States)

    O'Connell, Michael A; de Cuendias, Anne; Gayet, Florence; Shirley, Ian M; Mackenzie, Stuart R; Haddleton, David M; Unwin, Patrick R

    2012-05-01

    Evanescent wave cavity ring-down spectroscopy (EW-CRDS) has been employed to study the interfacial adsorption kinetics of coumarin-tagged macromolecules onto a range of functionalized planar surfaces. Such studies are valuable in designing polymers for complex systems where the degree of interaction between the polymer and surface needs to be tailored. Three tagged synthetic polymers with different functionalities are examined: poly(acrylic acid) (PAA), poly(3-sulfopropyl methacrylate, potassium salt) (PSPMA), and a mannose-modified glycopolymer. Adsorption transients at the silica/water interface are found to be characteristic for each polymer, and kinetics are deduced from the initial rates. The chemistry of the adsorption interfaces has been varied by, first, manipulation of silica surface chemistry via the bulk pH, followed by surfaces modified by poly(L-glutamic acid) (PGA) and cellulose, giving five chemically different surfaces. Complementary atomic force microscopy (AFM) imaging has been used for additional surface characterization of adsorbed layers and functionalized interfaces to allow adsorption rates to be interpreted more fully. Adsorption rates for PSPMA and the glycopolymer are seen to be highly surface sensitive, with significantly higher rates on cellulose-modified surfaces, whereas PAA shows a much smaller rate dependence on the nature of the adsorption surface.

  6. Two-loop master integrals for the mixed EW-QCD virtual corrections to Drell-Yan scattering

    Energy Technology Data Exchange (ETDEWEB)

    Bonciani, Roberto [' ' La Sapienza' ' Univ., Rome (Italy). Dipt. di Fisica; INFN Sezione Roma (Italy); Di Vita, Stefano [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Mastrolia, Pierpaolo [Max-Planck-Institut fuer Physik, Muenchen (Germany); Padova Univ. (Italy). Dipt. di Fisica e Astronomia; INFN Sezione di Padova (Italy); Schubert, Ulrich [Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2016-04-15

    We present the calculation of the master integrals needed for the two-loop QCD x EW corrections to q+ anti q → l{sup -}+l{sup +} and q+ anti q{sup '} → l{sup -}+ anti ν, for massless external particles. We treat W and Z bosons as degenerate in mass. We identify three types of diagrams, according to the presence of massive internal lines: the no-mass type, the one-mass type, and the two-mass type, where all massive propagators, when occurring, contain the same mass value. We find a basis of 49 master integrals and evaluate them with the method of the differential equations. The Magnus exponential is employed to choose a set of master integrals that obeys a canonical system of differential equations. Boundary conditions are found either by matching the solutions onto simpler integrals in special kinematic configurations, or by requiring the regularity of the solution at pseudo-thresholds. The canonical master integrals are finally given as Taylor series around d=4 space-time dimensions, up to order four, with coefficients given in terms of iterated integrals, respectively up to weight four.

  7. Plasma flame for mass purification of contaminated air with chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Uhm, Han S.; Shin, Dong H.; Hong, Yong C.

    2006-01-01

    An elimination of airborne simulated chemical and biological warfare agents was carried out by making use of a plasma flame made of atmospheric plasma and a fuel-burning flame, which can purify the interior air of a large volume in isolated spaces such as buildings, public transportation systems, and military vehicles. The plasma flame generator consists of a microwave plasma torch connected in series to a fuel injector and a reaction chamber. For example, a reaction chamber, with the dimensions of a 22 cm diameter and 30 cm length, purifies an airflow rate of 5000 lpm contaminated with toluene (the simulated chemical agent) and soot from a diesel engine (the simulated aerosol for biological agents). Large volumes of purification by the plasma flame will free mankind from the threat of airborne warfare agents. The plasma flame may also effectively purify air that is contaminated with volatile organic compounds, in addition to eliminating soot from diesel engines as an environmental application

  8. Reactive skin decontamination lotion (RSDL) for the decontamination of chemical warfare agent (CWA) dermal exposure.

    Science.gov (United States)

    Schwartz, M D; Hurst, C G; Kirk, M A; Reedy, S J D; Braue, E H

    2012-08-01

    Rapid decontamination of the skin is the single most important action to prevent dermal absorption of chemical contaminants in persons exposed to chemical warfare agents (CWA) and toxic industrial chemicals (TICs) as a result of accidental or intentional release. Chemicals on the skin may be removed by mechanical means through the use of dry sorbents or water. Recent interest in decontamination systems which both partition contaminants away from the skin and actively neutralize the chemical has led to the development of several reactive decontamination solutions. This article will review the recently FDA-approved Reactive Skin Decontamination Lotion (RSDL) and will summarize the toxicity and efficacy studies conducted to date. Evidence of RSDL's superior performance against vesicant and organophosphorus chemical warfare agents compared to water, bleach, and dry sorbents, suggests that RSDL may have a role in mass human exposure chemical decontamination in both the military and civilian arenas.

  9. The Ecological Domain of Warfare

    Science.gov (United States)

    2004-06-01

    of military performance in terms of e.g., unpredictability, nonlinearity and self organized criticality. [4] The issues of complex interactions...WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Kockums AB,SE-371 82 Karlskrona,Sweden, , 8. PERFORMING ORGANIZATION REPORT...by the architechture for Open Computational Systems itself [Alberts & Hayes (2003)] Author: Jens-Olof Lindh, Security class: UNCLASSIFIED Status

  10. Postmodern Warfare: Beyond the Horizon

    Science.gov (United States)

    2013-06-01

    little else of its current citizens. Within the current system, Buzan describes five sectors of security: military, environmental , economic...Pakistani independence was a movement in which inhabitants of India used every tool available—the international discourse of World War II, legislative ...Juan Forero, “ Colombian rebels launch tirade as peace talks begin,” Washington Post 19 Oct 2012: A14. 47 United Nations Office on Drugs and Crime

  11. The Technology of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1979-01-01

    The present technical status of the nuclear weapon system and of the systems for their delivery is explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategy doctrines for winning rather than preventing nuclear war are developed. According to the counterforce strategy the retaliation capacity of the opponent is to be destroyed by a surprise attack. Moreover, plans for the tactical first-use of nuclear weapons have been accepted. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme case, decisions may be entirely left to machines, and man would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. A solution cannot be found on the level of technology, but only on that of practical peace policy. (author)

  12. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    Science.gov (United States)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  13. Communications, radar and electronic warfare

    CERN Document Server

    Graham, Adrian

    2010-01-01

    A practical guide to the principles of radio communications for both civilian and military applications In this book, the author covers both the civilian and military uses of technology, focusing particularly on the applications of radio propagation and prediction. Divided into two parts, the author introduces the basic theory of radio prediction before providing a step-by-step explanation of how this theory can be translated into real-life applications. In addition, the book presents up-to-date systems and methods to illustrate how these applications work in practice. This includes s

  14. EWS/FLI mediates transcriptional repression via NKX2.2 during oncogenic transformation in Ewing's sarcoma.

    Directory of Open Access Journals (Sweden)

    Leah A Owen

    2008-04-01

    Full Text Available EWS/FLI is a master regulator of Ewing's sarcoma formation. Gene expression studies in A673 Ewing's sarcoma cells have demonstrated that EWS/FLI downregulates more genes than it upregulates, suggesting that EWS/FLI, and/or its targets, function as transcriptional repressors. One critical EWS/FLI target, NKX2.2, is a transcription factor that contains both transcriptional activation and transcriptional repression domains, raising the possibility that it mediates portions of the EWS/FLI transcriptional signature. We now report that microarray analysis demonstrated that the transcriptional profile of NKX2.2 consists solely of downregulated genes, and overlaps with the EWS/FLI downregulated signature, suggesting that NKX2.2 mediates oncogenic transformation via transcriptional repression. Structure-function analysis revealed that the DNA binding and repressor domains in NKX2.2 are required for oncogenesis in Ewing's sarcoma cells, while the transcriptional activation domain is completely dispensable. Furthermore, blockade of TLE or HDAC function, two protein families thought to mediate the repressive function of NKX2.2, inhibited the transformed phenotype and reversed the NKX2.2 transcriptional profile in Ewing's sarcoma cells. Whole genome localization studies (ChIP-chip revealed that a significant portion of the NKX2.2-repressed gene expression signature was directly mediated by NKX2.2 binding. These data demonstrate that the transcriptional repressive function of NKX2.2 is necessary, and sufficient, for the oncogenic phenotype of Ewing's sarcoma, and suggest a therapeutic approach to this disease.

  15. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  16. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  17. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  18. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  19. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  20. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  1. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  2. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  3. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  4. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  5. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  6. The oncogenic properties of EWS/WT1 of desmoplastic small round cell tumors are unmasked by loss of p53 in murine embryonic fibroblasts

    International Nuclear Information System (INIS)

    Bandopadhayay, Pratiti; Thomas, David M; Algar, Elizabeth; Ekert, Paul G; Jabbour, Anissa M; Riffkin, Christopher; Salmanidis, Marika; Gordon, Lavinia; Popovski, Dean; Rigby, Lin; Ashley, David M; Watkins, David N

    2013-01-01

    Desmoplastic small round cell tumor (DSRCT) is characterized by the presence of a fusion protein EWS/WT1, arising from the t (11;22) (p13;q12) translocation. Here we examine the oncogenic properties of two splice variants of EWS/WT1, EWS/WT1-KTS and EWS/WT1 + KTS. We over-expressed both EWS/WT1 variants in murine embryonic fibroblasts (MEFs) of wild-type, p53 +/- and p53 -/- backgrounds and measured effects on cell-proliferation, anchorage-independent growth, clonogenicity after serum withdrawal, and sensitivity to cytotoxic drugs and gamma irradiation in comparison to control cells. We examined gene expression profiles in cells expressing EWS/WT1. Finally we validated our key findings in a small series of DSRCT. Neither isoform of EWS/WT1 was sufficient to transform wild-type MEFs however the oncogenic potential of both was unmasked by p53 loss. Expression of EWS/WT1 in MEFs lacking at least one allele of p53 enhanced cell-proliferation, clonogenic survival and anchorage-independent growth. EWS/WT1 expression in wild-type MEFs conferred resistance to cell-cycle arrest after irradiation and daunorubicin induced apoptosis. We show DSRCT commonly have nuclear localization of p53, and copy-number amplification of MDM2/MDMX. Expression of either isoform of EWS/WT1 induced characteristic mRNA expression profiles. Gene-set enrichment analysis demonstrated enrichment of WNT pathway signatures in MEFs expressing EWS/WT1 + KTS. Wnt-activation was validated in cell lines with over-expression of EWS/WT1 and in DSRCT. In conclusion, we show both isoforms of EWS/WT1 have oncogenic potential in MEFs with loss of p53. In addition we provide the first link between EWS/WT1 and Wnt-pathway signaling. These data provide novel insights into the function of the EWS/WT1 fusion protein which characterize DSRCT

  7. Results on the EW gauge boson and jet production (including sensitivity to PDFs)

    CERN Document Server

    Richter-Was, Elzbieta; The ATLAS collaboration

    2017-01-01

    The production of jets in association with vector bosons is an important process to study perturbative QCD in a multi-scale environment. The LHC collaborations have performed measurements of vector boson+jets cross sections, differential in several kinematic variables, in proton-proton collision data taken at center-of-mass energies of 8TeV and 13TeV. Measurements explored also extreme phase-space: EW production and collinear W emissions. Discussed is also precise measurement of leptons angular correlations for Z+j production at high pT. The measurements are compared to state-of-the art theory predictions and can be used to constrain the proton structure. In this context discussed are also high precision measurement of the differential W and Z boson cross-sections.

  8. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  9. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  10. Modular open RF architecture: extending VICTORY to RF systems

    Science.gov (United States)

    Melber, Adam; Dirner, Jason; Johnson, Michael

    2015-05-01

    Radio frequency products spanning multiple functions have become increasingly critical to the warfighter. Military use of the electromagnetic spectrum now includes communications, electronic warfare (EW), intelligence, and mission command systems. Due to the urgent needs of counterinsurgency operations, various quick reaction capabilities (QRCs) have been fielded to enhance warfighter capability. Although these QRCs were highly successfully in their respective missions, they were designed independently resulting in significant challenges when integrated on a common platform. This paper discusses how the Modular Open RF Architecture (MORA) addresses these challenges by defining an open architecture for multifunction missions that decomposes monolithic radio systems into high-level components with welldefined functions and interfaces. The functional decomposition maximizes hardware sharing while minimizing added complexity and cost due to modularization. MORA achieves significant size, weight and power (SWaP) savings by allowing hardware such as power amplifiers and antennas to be shared across systems. By separating signal conditioning from the processing that implements the actual radio application, MORA exposes previously inaccessible architecture points, providing system integrators with the flexibility to insert third-party capabilities to address technical challenges and emerging requirements. MORA leverages the Vehicular Integration for Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR)/EW Interoperability (VICTORY) framework. This paper concludes by discussing how MORA, VICTORY and other standards such as OpenVPX are being leveraged by the U.S. Army Research, Development, and Engineering Command (RDECOM) Communications Electronics Research, Development, and Engineering Center (CERDEC) to define a converged architecture enabling rapid technology insertion, interoperability and reduced SWaP.

  11. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  12. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  13. An Interaction with Ewing's Sarcoma Breakpoint Protein EWS Defines a Specific Oncogenic Mechanism of ETS Factors Rearranged in Prostate Cancer.

    Science.gov (United States)

    Kedage, Vivekananda; Selvaraj, Nagarathinam; Nicholas, Taylor R; Budka, Justin A; Plotnik, Joshua P; Jerde, Travis J; Hollenhorst, Peter C

    2016-10-25

    More than 50% of prostate tumors have a chromosomal rearrangement resulting in aberrant expression of an oncogenic ETS family transcription factor. However, mechanisms that differentiate the function of oncogenic ETS factors expressed in prostate tumors from non-oncogenic ETS factors expressed in normal prostate are unknown. Here, we find that four oncogenic ETS (ERG, ETV1, ETV4, and ETV5), and no other ETS, interact with the Ewing's sarcoma breakpoint protein, EWS. This EWS interaction was necessary and sufficient for oncogenic ETS functions including gene activation, cell migration, clonogenic survival, and transformation. Significantly, the EWS interacting region of ERG has no homology with that of ETV1, ETV4, and ETV5. Therefore, this finding may explain how divergent ETS factors have a common oncogenic function. Strikingly, EWS is fused to various ETS factors by the chromosome translocations that cause Ewing's sarcoma. Therefore, these findings link oncogenic ETS function in both prostate cancer and Ewing's sarcoma. Copyright © 2016 The Author(s). Published by Elsevier Inc. All rights reserved.

  14. User Guide for Unmanned Aerial System (UAS) Operations on the National Ranges

    Science.gov (United States)

    2007-11-01

    WARFARE CENTER WEAPONS DIVISION, PT. MUGU NAVAL AIR WARFARE CENTER WEAPONS DIVISION, CHINA LAKE NAVAL AIR WARFARE CENTER AIRCRAFT DIVISION, PATUXENT...with IFR Instrument Flight Rules MRTFB Major Range and Test Facility Base NAS National Airspace System NM nautical mile NTIA National...sectional charts, Instrument Flight Rules ( IFR ) enroute charts, and terminal area charts. The floor and ceiling, operating hours, and controlling

  15. Supramolecular chemistry and chemical warfare agents: from fundamentals of recognition to catalysis and sensing.

    Science.gov (United States)

    Sambrook, M R; Notman, S

    2013-12-21

    Supramolecular chemistry presents many possible avenues for the mitigation of the effects of chemical warfare agents (CWAs), including sensing, catalysis and sequestration. To-date, efforts in this field both to study fundamental interactions between CWAs and to design and exploit host systems remain sporadic. In this tutorial review the non-covalent recognition of CWAs is considered from first principles, including taking inspiration from enzymatic systems, and gaps in fundamental knowledge are indicated. Examples of synthetic systems developed for the recognition of CWAs are discussed with a focus on the supramolecular complexation behaviour and non-covalent approaches rather than on the proposed applications.

  16. Vesicants and nerve agents in chemical warfare. Decontamination and treatment strategies for a changed world.

    Science.gov (United States)

    Devereaux, Asha; Amundson, Dennis E; Parrish, J S; Lazarus, Angeline A

    2002-10-01

    Vesicants and nerve agents have been used in chemical warfare for ages. They remain a threat in today's altered political climate because they are relatively simple to produce, transport, and deploy. Vesicants, such as mustard and lewisite, can affect the skin, eyes, respiratory system, and gastrointestinal system. They leave affected persons at risk for long-term effects. Nerve agents, such as tabun, sarin, soman, and VX, hyperstimulate the muscarinic and nicotinic receptors of the nervous system. Physicians need to familiarize themselves with the clinical findings of such exposures and the decontamination and treatment strategies necessary to minimize injuries and deaths.

  17. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  18. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  19. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  20. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  1. EW[OIII] as an Orientation Indicator for Quasars: Implications for the Torus

    Energy Technology Data Exchange (ETDEWEB)

    Bisogni, Susanna [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA (United States); Osservatorio Astrofisico di Arcetri, INAF, Florence (Italy); Marconi, Alessandro; Risaliti, Guido [Osservatorio Astrofisico di Arcetri, INAF, Florence (Italy); Dipartimento di Fisica e Astronomia, Università degli Studi di Firenze, Florence (Italy); Lusso, Elisabeta, E-mail: susanna.bisogni@cfa.harvard.edu [Centre for Extragalactic Astronomy, Department of Physics, Durham University, Durham (United Kingdom)

    2017-11-21

    We present an analysis of the average spectral properties of 12,000 SDSS quasars as a function of accretion disc inclination, as measured from the equivalent width of the [OIII] 5007Å line. The use of this indicator on a large sample of quasars from the SDSS DR7 has proven the presence of orientation effects on the features of UV/optical spectra, confirming the presence of outflows in the NLR gas and that the geometry of the BLR is disc-like. Relying on the goodness of this indicator, we are now using it to investigate other bands/components of AGN. Specifically, the study of the UV/optical/IR SED of the same sample provides information on the obscuring “torus.” The SED shows a decrease of the IR fraction moving from face-on to edge-on sources, in agreement with models where the torus is co-axial with the accretion disc. Moreover, the fact we are able to observe the broad emission lines also in sources in an edge-on position, suggests that the torus is rather clumpy than smooth as in the Unified Model. The behavior of the SED as a function of EW[OIII] is in agreement with the predictions of the clumpy torus models as well.

  2. Rencontres de Moriond EW 2012: New physics further constrained by LHCb results

    CERN Multimedia

    Antonella Del Rosso

    2012-01-01

    Today, at the Rencontres de Moriond EW conference, the LHCb Collaboration presented a few important results. They confirm the Standard Model predictions with an unprecedented precision and put limits on possible deviations due to new physics.   LHCb is a precision experiment that looks for new physics by studying in particular some rare decays: yet undiscovered particles could leave their footprint by modifying the decay rate and other physics parameters. Deviations from values predicted by the Standard Model – the established set of physics theories that describes and encompasses a large variety of natural phenomena – could point scientists to the existence of new territories. An example is the decay of the so-called B0s meson – a particle made of a bottom anti-quark bound to a strange quark – into two muons. Theorists have calculated that, in the Standard Model, this type of decay should occur about 3 times in every billion (10-9) total decays of the par...

  3. A Comparison of Neutron-Based Non-Destructive Assessment Methods for Chemical Warfare Material and High Explosives

    International Nuclear Information System (INIS)

    Seabury, E. H.; Chichester, D. L.; Wharton, C. J.; Caffrey, A. J.

    2009-01-01

    Prompt Gamma Neutron Activation Analysis (PGNAA) systems employ neutrons as a probe to interrogate items, e.g. chemical warfare materiel-filled munitions. The choice of a neutron source in field-portable systems is determined by its ability to excite nuclei of interest, operational concerns such as radiological safety and ease-of-use, and cost. Idaho National Laboratory's PINS Chemical Assay System has traditionally used a 252 Cf isotopic neutron source, but recently a deuterium-tritium (DT) electronic neutron generator (ENG) has been tested as an alternate neutron source. This paper presents the results of using both of these neutron sources to interrogate chemical warfare materiel (CWM) and high explosive (HE) filled munitions.

  4. Junction region of EWS-FLI1 fusion protein has a dominant negative effect in Ewing’s Sarcoma in vitro

    International Nuclear Information System (INIS)

    Jully, Babu; Vijayalakshmi, Ramshankar; Gopal, Gopisetty; Sabitha, Kesavan; Rajkumar, Thangarajan

    2012-01-01

    Ewing’s sarcoma is a malignancy characterized by a specific 11:22 chromosomal translocation which generates a novel EWS-FLI1 fusion protein functioning as an aberrant transcription factor. In the present study, we have further characterized the junction region of the EWS-FLI1 fusion protein. In-silico model of EWS-FLI1 fusion protein was analysed for ligand binding sites, and a putative region (amino acid (aa) 251–343 of the type 1 fusion protein) in the vicinity of the fusion junction was cloned and expressed using bacterial expression. The recombinant protein was characterized by Circular Dichroism (CD). We then expressed aa 251–280 ectopically in Ewing’s sarcoma cell-line and its effect on cell proliferation, tumorigenicity and expression of EWS-FLI1 target genes were analysed. Our modelling analysis indicated that Junction region (aa 251–343) encompasses potential ligand biding sites in the EWS-FLI1 protein and when expressed in bacteria was present as soluble form. Ectopically expressing this region in Ewing’s sarcoma cells inhibited tumorigenicity, and EWS-FLI1 target genes indicating a dominant negative biological effect. Junction region can be exploited further as target for drug development in future to specifically target EWS-FLI1 in Ewing’s Sarcoma

  5. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  6. Cytotoxic characteristics of biodegradable EW10X04 Mg alloy after Nd coating and subsequent heat treatment

    Energy Technology Data Exchange (ETDEWEB)

    Katarivas Levy, Galit [Department of Materials Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105 (Israel); Ventura, Yvonne [Department of Biotechnology Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105 (Israel); Goldman, Jeremy [Biomedical Engineering Department, Michigan Technological University, Houghton, MI 49931 (United States); Vago, Razi [Department of Biotechnology Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105 (Israel); Aghion, Eli [Department of Materials Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105 (Israel)

    2016-05-01

    Porous Mg scaffolds are considered as potential bone growth promoting materials. Unfortunately, the high rate of biocorrosion inherent to Mg alloys may cause a premature loss of mechanical strength, excessive evolution of hydrogen gas, and a rapidly shifting surface topography, all of which may hinder the ability of native cells to attach and grow on the implant surface. Here we investigated the cell cytotoxicity effects during corrosion of a novel magnesium alloy, EW10X04 (Mg–1.2%Nd–0.5%Y–0.5%Zr–0.4%Ca), following diffusion coating (DC) and heat treatment to reduce the corrosion rate. Cells were exposed either to corrosion products or to the corroding scaffold surface, in vitro. The microstructure characterization of the scaffold surface was carried out by scanning electron microscopy (SEM) equipped with a Noran energy dispersive spectrometer (EDS). Phase analyses were obtained by X-ray diffraction (XRD). We found that cell viability, growth, and adhesion were all improved when cultured on the EW10X04 + DC surface or under corrosion product extracts due to lower corrosion rates relative to the EW10X04 control samples. It is therefore believed that the tested alloy after Nd coating and heat treatment may introduce a good balance between its biodegradation characteristics and cytotoxic effects towards cells. - Highlights: • The effects of a diffusion coating (DC) with Nd on cell cytotoxicity is shown. • A novel EW10X04 (Mg–1.2%Nd–0.5%Y–0.5%Zr–0.4%Ca) magnesium alloy with DC was tested. • Cell viability, growth, and adhesion were reduced on the control vs. DC surface. • The DC alloy may introduce a good balance between biodegradation and cytotoxicity.

  7. Cytotoxic characteristics of biodegradable EW10X04 Mg alloy after Nd coating and subsequent heat treatment

    International Nuclear Information System (INIS)

    Katarivas Levy, Galit; Ventura, Yvonne; Goldman, Jeremy; Vago, Razi; Aghion, Eli

    2016-01-01

    Porous Mg scaffolds are considered as potential bone growth promoting materials. Unfortunately, the high rate of biocorrosion inherent to Mg alloys may cause a premature loss of mechanical strength, excessive evolution of hydrogen gas, and a rapidly shifting surface topography, all of which may hinder the ability of native cells to attach and grow on the implant surface. Here we investigated the cell cytotoxicity effects during corrosion of a novel magnesium alloy, EW10X04 (Mg–1.2%Nd–0.5%Y–0.5%Zr–0.4%Ca), following diffusion coating (DC) and heat treatment to reduce the corrosion rate. Cells were exposed either to corrosion products or to the corroding scaffold surface, in vitro. The microstructure characterization of the scaffold surface was carried out by scanning electron microscopy (SEM) equipped with a Noran energy dispersive spectrometer (EDS). Phase analyses were obtained by X-ray diffraction (XRD). We found that cell viability, growth, and adhesion were all improved when cultured on the EW10X04 + DC surface or under corrosion product extracts due to lower corrosion rates relative to the EW10X04 control samples. It is therefore believed that the tested alloy after Nd coating and heat treatment may introduce a good balance between its biodegradation characteristics and cytotoxic effects towards cells. - Highlights: • The effects of a diffusion coating (DC) with Nd on cell cytotoxicity is shown. • A novel EW10X04 (Mg–1.2%Nd–0.5%Y–0.5%Zr–0.4%Ca) magnesium alloy with DC was tested. • Cell viability, growth, and adhesion were reduced on the control vs. DC surface. • The DC alloy may introduce a good balance between biodegradation and cytotoxicity.

  8. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  9. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  10. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  11. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  12. Morphoproteomic profiling of the mammalian target of rapamycin (mTOR) signaling pathway in desmoplastic small round cell tumor (EWS/WT1), Ewing's sarcoma (EWS/FLI1) and Wilms' tumor(WT1).

    Science.gov (United States)

    Subbiah, Vivek; Brown, Robert E; Jiang, Yunyun; Buryanek, Jamie; Hayes-Jordan, Andrea; Kurzrock, Razelle; Anderson, Pete M

    2013-01-01

    Desmoplastic small round cell tumor (DSRCT) is a rare sarcoma in adolescents and young adults. The hallmark of this disease is a EWS-WT1 translocation resulting from apposition of the Ewing's sarcoma (EWS) gene with the Wilms' tumor (WT1) gene. We performed morphoproteomic profiling of DSRCT (EWS-WT1), Ewing's sarcoma (EWS-FLI1) and Wilms' tumor (WT1) to better understand the signaling pathways for selecting future targeted therapies. This pilot study assessed patients with DSRCT, Wilms' tumor and Ewing's sarcoma. Morphoproteomics and immunohistochemical probes were applied to detect: p-mTOR (Ser2448); p-Akt (Ser473); p-ERK1/2 (Thr202/Tyr204); p-STAT3 (Tyr 705); and cell cycle-related analytes along with their negative controls. In DSRCT the PI3K/Akt/mTOR pathway is constitutively activated by p-Akt (Ser 473) expression in the nuclear compartment of the tumor cells and p-mTOR phosphorylated on Ser 2448, suggesting mTORC2 (rictor+mTOR) as the dominant form. Ewing's sarcoma had upregulated p-Akt and p-mTOR, predominantly mTORC2. In Wilm's tumor, the mTOR pathway is also activated with most tumor cells moderately expressing p-mTOR (Ser 2448) in plasmalemmal and cytoplasmic compartments. This coincides with the constitutive activation of one of the downstream effectors of the mTORC1 signaling pathway, namely p-p70S6K (Thr 389). There was constitutive activation of the Ras/Raf/ERK pathway p-ERK 1/2 (Thr202/Tyr204) expression in the Wilms tumor and metastatic Ewing's sarcoma, but not in the DSRCT. MORPHOPROTEOMIC TUMOR ANALYSES REVEALED CONSTITUTIVE ACTIVATION OF THE MTOR PATHWAY AS EVIDENCED BY: (a) expression of phosphorylated (p)-mTOR, p-p70S6K; (b) mTORC 2 in EWS and DSRCT; (c) ERK signaling was seen in the advanced setting indicating these as resistance pathways to IGF1R related therapies. This is the first morphoproteomic study of such pathways in these rare malignancies and may have potential therapeutic implications. Further study using morphoproteomic

  13. Optimal Partner Combination for Joint Distribution Alliance using Integrated Fuzzy EW-AHP and TOPSIS for Online Shopping

    Directory of Open Access Journals (Sweden)

    Yandong He

    2016-04-01

    Full Text Available With the globalization of online shopping, deterioration of the ecological environment and the increasing pressure of urban transportation, a novel logistics service mode—joint distribution (JD—was developed. Selecting the optimal partner combination is important to ensure the joint distribution alliance (JDA is sustainable and stable, taking into consideration conflicting criteria. In this paper, we present an integrated fuzzy entropy weight, fuzzy analytic hierarchy process (fuzzy EW-AHP and fuzzy technique for order preference by similarity to an ideal solution (TOPSIS approach to select the optimal partner combination of JDA. A three-phase approach is proposed. In the first phase, we identify partner combination evaluation criteria using an economy-society-environment-flexibility (ESEF framework from a perspective that considers sustainability. In the second phase, the criteria weights and criteria combination performance of different partner combinations were calculated by using an integrated fuzzy EW-AHP approach considering the objective and subjective factors of experts. In the third phase, the JDA partner combinations are ranked by employing fuzzy TOPSIS approach. The sensitivity analysis is considered for the optimal partner combination. Taking JDA in Chongqing for example, the results indicate the alternative partner combination 3 (PC3 is always ranked first no matter how the criteria weights change. It is effective and robust to apply the integrated fuzzy EW-AHP and TOPSIS approach to the partner selection of JDA.

  14. Flood early warning system: sensors and internet

    NARCIS (Netherlands)

    Pengel, B.E.; Krzhizhanovskaya, V.V.; Melnikova, N.B.; Shirshov, G.S.; Koelewijn, A.R.; Pyayt, A.L.; Mokhov, I.I.; Chavoshian, A.; Takeuchi, K.

    2013-01-01

    The UrbanFlood early warning system (EWS) is designed to monitor data from very large sensornetworks in flood defences such as embankments, dikes, levees, and dams. The EWS, based on the internet, uses real-time sensor information and Artificial Intelligence (AI) to immediately calculate the

  15. Differential transactivation by orphan nuclear receptor NOR1 and its fusion gene product EWS/NOR1: possible involvement of poly(ADP-ribose) polymerase I, PARP-1.

    Science.gov (United States)

    Ohkura, Naganari; Nagamura, Yuko; Tsukada, Toshihiko

    2008-10-15

    In extraskeletal myxoid chondrosarcoma, a chromosomal translocation creates a gene fusion between EWS and an orphan nuclear receptor, NOR1. The resulting fusion protein EWS/NOR1 has been believed to lead to malignant transformation by functioning as a transactivator for NOR1-target genes. By comparing the gene expression profiles of NOR1- and EWS/NOR1-overexpressing cells, we found that they largely shared up-regulated genes, but no significant correlation was observed with respect to the transactivation levels of each gene. In addition, the proteins associated with NOR1 and EWS/NOR1 were mostly the same in these cells. The results suggest that these proteins differentially transactivate overlapping target genes through a similar transcriptional machinery. To clarify the mechanisms underlying the transcriptional divergence between NOR1 and EWS/NOR1, we searched for alternatively associated proteins, and identified poly(ADP-ribose) polymerase I (PARP-1) as an NOR1-specific binding protein. Consistent with its binding properties, PARP-1 acted as a transcriptional repressor of NOR1, but not EWS/NOR1, in a luciferase reporter assay employing PARP-1(-/-) fibroblasts. Interestingly, suppressive activity of PARP-1 was observed in a DNA response element-specific manner, and in a subtype-specific manner toward the NR4A family (Nur77, Nurr1, and NOR1), suggesting that PARP-1 plays a role in the diversity of transcriptional regulation mediated by the NR4A family in normal cells. Altogether, our findings suggest that NOR1 and EWS/NOR1 regulate overlapping target genes differently by utilizing associated proteins, including PARP-1; and that EWS/NOR1 may acquire oncogenic activities by avoiding (or gaining) transcription factor-specific modulation by the associated proteins. (c) 2008 Wiley-Liss, Inc.

  16. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  17. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  18. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  19. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  20. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  1. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  2. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  3. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  4. Computational enzymology for degradation of chemical warfare agents: promising technologies for remediation processes

    Directory of Open Access Journals (Sweden)

    2017-03-01

    Full Text Available Chemical weapons are a major worldwide problem, since they are inexpensive, easy to produce on a large scale and difficult to detect and control. Among the chemical warfare agents, we can highlight the organophosphorus compounds (OP, which contain the phosphorus element and that have a large number of applications. They affect the central nervous system and can lead to death, so there are a lot of works in order to design new effective antidotes for the intoxication caused by them. The standard treatment includes the use of an anticholinergic combined to a central nervous system depressor and an oxime. Oximes are compounds that reactivate Acetylcholinesterase (AChE, a regulatory enzyme responsible for the transmission of nerve impulses, which is one of the molecular targets most vulnerable to neurotoxic agents. Increasingly, enzymatic treatment becomes a promising alternative; therefore, other enzymes have been studied for the OP degradation function, such as phosphotriesterase (PTE from bacteria, human serum paraoxonase 1 (HssPON1 and diisopropyl fluorophosphatase (DFPase that showed significant performances in OP detoxification. The understanding of mechanisms by which enzymes act is of extreme importance for the projection of antidotes for warfare agents, and computational chemistry comes to aid and reduce the time and costs of the process. Molecular Docking, Molecular Dynamics and QM/MM (quantum-mechanics/molecular-mechanics are techniques used to investigate the molecular interactions between ligands and proteins.

  5. The potential impact of developments in electronic technology on the future conduct of air warfare, volume 3

    Science.gov (United States)

    1986-12-01

    Advances in microelectronics have resulted in circuit densities many orders of magnitude greater than in current usage, making possible higher speed circuitry and greater storage capacity. RF techniques are also leading to monolithic microwave integrated circuits and microstrip antennas with corresponding reductions in size and weight. In addition, rapid advances are taking place in computer architecture and software that will provide improved information processing and control. This, coupled with progress in artificial intelligence and man-machine interface, offers promise of greatly improved battle management in the cockpit. The scale of changes is such that the nature of air warfare should be significantly affected over the next twenty years. This study examined the potential of electronic technology and potential benefits such as improvements in information processing, reduction in size and weight, increased reliability and maintainability; determined the applicability of such improvements to avionics and command and control systems and such functions as navigation and guidance, communications, surveillance, cockpit engineering and electronic warfare; and examined the impact on air warfare in the time period 2000 to 2010.

  6. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    International Nuclear Information System (INIS)

    Wilmsmeyer, Amanda R.; Morris, John R.; Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A.; Davis, Erin Durke

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications

  7. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces.

    Science.gov (United States)

    Wilmsmeyer, Amanda R; Gordon, Wesley O; Davis, Erin Durke; Mantooth, Brent A; Lalain, Teri A; Morris, John R

    2014-01-01

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  8. Multifunctional ultra-high vacuum apparatus for studies of the interactions of chemical warfare agents on complex surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Wilmsmeyer, Amanda R.; Morris, John R. [Department of Chemistry, Virginia Tech, Blacksburg, Virginia 24061 (United States); Gordon, Wesley O.; Mantooth, Brent A.; Lalain, Teri A. [Research and Technology Directorate, U.S. Army Edgewood Chemical Biological Center, Aberdeen Proving Ground, Maryland 21010 (United States); Davis, Erin Durke [OptiMetrics, Inc., Abingdon, Maryland 21009 (United States)

    2014-01-15

    A fundamental understanding of the surface chemistry of chemical warfare agents is needed to fully predict the interaction of these toxic molecules with militarily relevant materials, catalysts, and environmental surfaces. For example, rules for predicting the surface chemistry of agents can be applied to the creation of next generation decontaminants, reactive coatings, and protective materials for the warfighter. Here, we describe a multifunctional ultra-high vacuum instrument for conducting comprehensive studies of the adsorption, desorption, and surface chemistry of chemical warfare agents on model and militarily relevant surfaces. The system applies reflection-absorption infrared spectroscopy, x-ray photoelectron spectroscopy, and mass spectrometry to study adsorption and surface reactions of chemical warfare agents. Several novel components have been developed to address the unique safety and sample exposure challenges that accompany the research of these toxic, often very low vapor pressure, compounds. While results of vacuum-based surface science techniques may not necessarily translate directly to environmental processes, learning about the fundamental chemistry will begin to inform scientists about the critical aspects that impact real-world applications.

  9. Coseismic Strain Steps of the 2008 Wenchuan Earthquake Indicate EW Extension of Tibetan Plateau and Increased Hazard South to Epicenter

    Science.gov (United States)

    Fu, G.; Shen, X.; Tang, J.; Fukuda, Y.

    2008-12-01

    The 2008 Wenchuan earthquake (Ms8.0) occurred at the east edge of Tibetan Plateau. It is the biggest seismic disaster in China since the 1976 Tangshan earthquake. To determine the effects of the earthquake on the deformation field of Tibetan Plateau, we collect and analyze continuing strain data of three stations before and after the earthquake in Tibetan Plateau observed by capacitance-type bore-hole strainmeters (Chi, 1985). We collect strain data in NS, EW, NE-SW and NW-NS directions at each borehole. Then we deduce the co-seismic strain steps at time point 14:28 of May 12, 2008 (at this time point the earthquake occurred) with the data before and after the earthquake using the least squares method. Our observation shows that in Tibetan Plateau significant co-seismic strain steps are accompanied with the 2008 Wenchuan earthquake. Extension in EW direction is observed at interior and north Tibetan Plateau which indicates a rapid EW extension of the whole Plateau. Field investigation shows that the 2008 Wenchuan earthquake is a manifestation of eastward growth of the Tibetan Plateau (Dong et al., 2008). Eastwards growth of the Tibetan Plateau results naturally in the extension of the Plateau in EW direction. Our co-seismic strain observation agrees well with the conclusion from surface rupture investigation. The magnitude of co-seismic strain step equals to five times of average year extensional strain rate throughout the plateau interior. Shortening in SE- NW direction is observed at the east edge of the Plateau. As hints that the eastward extension of Tibetan Plateau is resisted by Sichuan rigid basin which increases the potential earthquake hazard around the observation station, manifests the declaration from co-seismic stress changes calculation (Persons et al., 2008). Our observed co-seismic strain steps are in total lager than theoretical calculations of dislocation theories which indicate that magnitude of the great earthquake should be bigger than 7.9. Due

  10. Next Generation Non-particulate Dry Nonwoven Pad for Chemical Warfare Agent Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Ramkumar, S S; Love, A; Sata, U R; Koester, C J; Smith, W J; Keating, G A; Hobbs, L; Cox, S B; Lagna, W M; Kendall, R J

    2008-05-01

    New, non-particulate decontamination materials promise to reduce both military and civilian casualties by enabling individuals to decontaminate themselves and their equipment within minutes of exposure to chemical warfare agents or other toxic materials. One of the most promising new materials has been developed using a needlepunching nonwoven process to construct a novel and non-particulate composite fabric of multiple layers, including an inner layer of activated carbon fabric, which is well-suited for the decontamination of both personnel and equipment. This paper describes the development of a composite nonwoven pad and compares efficacy test results for this pad with results from testing other decontamination systems. The efficacy of the dry nonwoven fabric pad was demonstrated specifically for decontamination of the chemical warfare blister agent bis(2-chloroethyl)sulfide (H or sulfur mustard). GC/MS results indicate that the composite fabric was capable of significantly reducing the vapor hazard from mustard liquid absorbed into the nonwoven dry fabric pad. The mustard adsorption efficiency of the nonwoven pad was significantly higher than particulate activated carbon (p=0.041) and was similar to the currently fielded US military M291 kit (p=0.952). The nonwoven pad has several advantages over other materials, especially its non-particulate, yet flexible, construction. This composite fabric was also shown to be chemically compatible with potential toxic and hazardous liquids, which span a range of hydrophilic and hydrophobic chemicals, including a concentrated acid, an organic solvent and a mild oxidant, bleach.

  11. Academic Training Lectures | Stuxnet and Cyber-Warfare | 13-14 January 2016

    CERN Multimedia

    2015-01-01

    Please note that the next series of Academic Training Lectures will take place on 13 and 14 January 2016. The lectures will be given by Gian Piero Siroli (Università e INFN, Bologna (IT))   Stuxnet and Cyber-Warfare (1/2)​ on Wednesday, 13 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438525/ Stuxnet and Cyber-Warfare (2/2) on Thursday, 14 January from 11 a.m. to 12 p.m. http://indico.cern.ch/event/438526/ at CERN, Council Chamber (503-1-001)  Description: The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran&...

  12. Cultural Competence and the Operational Commander: Moving Beyond Cultural Awareness into Culture-Centric Warfare

    National Research Council Canada - National Science Library

    Karcanes, James A

    2007-01-01

    .... Understanding the different levels of cultural awareness -- cultural consideration, cultural understanding, and cultural competence -- will help usher in a new focus on culture-centric warfare...

  13. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  14. Mass Spectrometric Determination of Chemical Warfare Agents in Indoor Sample Media Typically Collected During Forensic Investigations

    National Research Council Canada - National Science Library

    D'Agostino, P. A; Hancock, J. R; Chenier, C. L

    2005-01-01

    .... DRDC Suffield, in collaboration with the Royal Canadian Mounted Police, identified a need for analytical methods for chemical warfare agent identification in media, including flooring, wall surfaces...

  15. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    Science.gov (United States)

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  16. Development of Bicarbonate-Activated Peroxide as a Chemical and Biological Warfare Agent Decontaminant

    National Research Council Canada - National Science Library

    Richardson, David E

    2006-01-01

    ...) and other chemistry for the decontamination of chemical and biological warfare agents. The mechanism of formation of the active oxidant, peroxymonocarbonate, has been investigated in detail. New surfoxidants...

  17. Decontamination and Detoxification of Toxic Chemical Warfare Agents Using Polyurethane Sponges

    National Research Council Canada - National Science Library

    Gordon, Richard K; Gunduz, Alper T; Askins, LaTawnya Y; Strating, Simon J; Doctor, Bhupendra P; Clarkson, Edward D; Mitchelree, Larry W; Lukey, Brian; Railer, Roy; Schulz, Susan

    2003-01-01

    .... Another serious problem that may be encountered while caring for personnel contaminated with organophosphorus chemical warfare nerve agents is the possibility that there will be cross-contamination...

  18. Chemical warfare agent detection: a review of current trends and future perspective.

    Science.gov (United States)

    Pacsial-Ong, Eden Joy; Aguilar, Zoraida P

    2013-01-01

    The World Health Organization recommends countries to create a public health system that can respond to the deliberate release of chemical warfare agents (CWAs). Procedures for preparedness, response, decontamination protocols and medical countermeasures against CWA attacks are described. Known CWAs, including their properties and pharmacological consequences upon exposure, are tabulated and discussed. Requirements imposed on detection systems by various applications and environmental needs are presented in order to assess the devices for detection and identification of specific CWAs. The review surveys current and near-term detection technologies and equipments, as well as devices that are currently available to the military and civilian first responders. Brief technical discussions of several detection technologies are presented, with emphasis placed in the principles of detection. Finally, enabling technologies that form the basis for advanced sensing systems and devices are described.

  19. Tissue-based standoff biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  20. Cutaneous reactions in nuclear, biological and chemical warfare

    Directory of Open Access Journals (Sweden)

    Arora Sandeep

    2005-03-01

    Full Text Available Nuclear, biological and chemical warfare have in recent times been responsible for an increasing number of otherwise rare dermatoses. Many nations are now maintaining overt and clandestine stockpiles of such arsenal. With increasing terrorist threats, these agents of mass destruction pose a risk to the civilian population. Nuclear and chemical attacks manifest immediately while biological attacks manifest later. Chemical and biological attacks pose a significant risk to the attending medical personnel. The large scale of anticipated casualties in the event of such an occurrence would need the expertise of all physicians, including dermatologists, both military and civilian. Dermatologists are uniquely qualified in this respect. This article aims at presenting a review of the cutaneous manifestations in nuclear, chemical and biological warfare and their management.

  1. Mapping Vesta Mid-Latitude Quadrangle V-12EW: Mapping the Edge of the South Polar Structure

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.; Williams, D. A.; Hiesinger, H.; Garry, W. B.; Yingst, R.; Buczkowski, D.; McCord, T. B.; Jaumann, R.; Pieters, C. M.; Gaskell, R. W.; Neukum, G.; Schmedemann, N.; Marchi, S.; Nathues, A.; Le Corre, L.; Roatsch, T.; Preusker, F.; White, O. L.; DeSanctis, C.; Filacchione, G.; Raymond, C. A.; Russell, C. T.

    2011-12-01

    NASA's Dawn spacecraft arrived at the asteroid 4Vesta on July 15, 2011, and is now collecting imaging, spectroscopic, and elemental abundance data during its one-year orbital mission. As part of the geological analysis of the surface, a series of 15 quadrangle maps are being produced based on Framing Camera images (FC: spatial resolution: ~65 m/pixel) along with Visible & Infrared Spectrometer data (VIR: spatial resolution: ~180 m/pixel) obtained during the High-Altitude Mapping Orbit (HAMO). This poster presentation concentrates on our geologic analysis and mapping of quadrangle V-12EW. This quadrangle is dominated by the arcuate edge of the large 460+ km diameter south polar topographic feature first observed by HST (Thomas et al., 1997). Sparsely cratered, the portion of this feature covered in V-12EW is characterized by arcuate ridges and troughs forming a generalized arcuate pattern. Mapping of this terrain and the transition to areas to the north will be used to test whether this feature has an impact or other (e.g., internal) origin. We are also using FC stereo and VIR images to assess whether their are any compositional differences between this terrain and areas further to the north, and image data to evaluate the distribution and age of young impact craters within the map area. The authors acknowledge the support of the Dawn Science, Instrument and Operations Teams.

  2. Molecular dissection of the mechanism by which EWS/FLI expression compromises actin cytoskeletal integrity and cell adhesion in Ewing sarcoma

    Science.gov (United States)

    Chaturvedi, Aashi; Hoffman, Laura M.; Jensen, Christopher C.; Lin, Yi-Chun; Grossmann, Allie H.; Randall, R. Lor; Lessnick, Stephen L.; Welm, Alana L.; Beckerle, Mary C.

    2014-01-01

    Ewing sarcoma is the second-most-common bone cancer in children. Driven by an oncogenic chromosomal translocation that results in the expression of an aberrant transcription factor, EWS/FLI, the disease is typically aggressive and micrometastatic upon presentation. Silencing of EWS/FLI in patient-derived tumor cells results in the altered expression of hundreds to thousands of genes and is accompanied by dramatic morphological changes in cytoarchitecture and adhesion. Genes encoding focal adhesion, extracellular matrix, and actin regulatory proteins are dominant targets of EWS/FLI-mediated transcriptional repression. Reexpression of genes encoding just two of these proteins, zyxin and α5 integrin, is sufficient to restore cell adhesion and actin cytoskeletal integrity comparable to what is observed when the EWS/FLI oncogene expression is compromised. Using an orthotopic xenograft model, we show that EWS/FLI-induced repression of α5 integrin and zyxin expression promotes tumor progression by supporting anchorage-independent cell growth. This selective advantage is paired with a tradeoff in which metastatic lung colonization is compromised. PMID:25057021

  3. Egg white hybrid nanoflower (EW-hNF) with biomimetic polyphenol oxidase reactivity: Synthesis, characterization and potential use in decolorization of synthetic dyes.

    Science.gov (United States)

    Altinkaynak, Cevahir; Kocazorbaz, Ebru; Özdemir, Nalan; Zihnioglu, Figen

    2018-04-01

    In this study, for the first time, we described organic-inorganic hybrid nanoflowers using crude egg white as the organic component and copper (II) ions as the inorganic component under the mild conditions. The synthesized egg white-inorganic hybrid nanoflowers (EW-hNFs) were characterized using SEM, EDX, XRD and FTIR analysis. The biomimetic Polyphenol/Peroxidase like activities of synthesized egg white-inorganic hybrid nanoflowers (EW-hNFs) were determined by using various phenolics with or without H 2 O 2 . Optimum pH and temperature, kinetic parameters, reusability, pH and thermal stability of EW-hNFs were also studied. The most noteworthy aspect of our study is that synthesized EW-hNFs which consist of only egg white proteins, showed polyphenol oxidase activity. Furthermore, potential use of the EW-hNFs in the discoloration of the some synthetic dyes was also evaluated. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. General Use of UAS in EW Environment-EW Concepts and Tactics for Single or Multiple UAS Over the Net-Centric Battlefield

    Science.gov (United States)

    2009-09-01

    By Tiger and Flight Plan ..........................................193 Figure 124. Patriot to Be Destroyed By Puma and Flight Plan...systems, and its effectiveness depends on its ability to lock onto the heat source of low-flying fixed- and rotary-wing aircraft targets [33...different types of engines for different types of UAS: turbofans, two stroke , piston, rotary, turboprop, push and pull, electric. The lighter, smaller

  5. Just War and Postmodern Warfare: A German Case Study

    Science.gov (United States)

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  6. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  7. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    respectively. The avionics in Boeing’s 787 Dreamliner require approximately 6.5 million lines of code while the current S-Class Mercedes Benz requires over 20...leaders (demonstrated through outdated policy, theory, and doctrine) and the reality of warfare in 1914 (dictated by innovation, technology , and...or the guidelines to military action codified in doctrine? How are states using the latest technological innovations as violent instruments of

  8. Attacking the infrastructure: exploring potential uses of offensive information warfare

    OpenAIRE

    Elam, Donald Emmett.

    1996-01-01

    The world has entered the Third Wave; it has entered the Information Age. One of the fundamentals of this paradigm shift is the fact that information is power. The side that controls information more effectively will be victorious. Thus, countries and militaries must change their mentality in order to survive. A new form of conflict, Information Warfare, has been born. This new discipline is large, dynamic, and complex. The need exists for education among military officers and other concerned...

  9. Built to Outlast: Operational Approaches to Hybrid Warfare

    Science.gov (United States)

    2012-05-17

    29Robert T. Ames, Sun Tzu: The Art of War (New York: Ballantine Books, 1993), 78-80; Mao Tse -Tung, On Guerrilla Warfare, trans. Samuel B. Griffith...Chicago: University of Illinois Press, 1961), 25, 42.The works of Sun Tzu and Mao Tse -Tung both illustrate aspects of this concept. In a work...toreador’s cape, not the toreador himself. - Norman B. Hannah, The Key to Failure: Laos and the Vietnam War114 Against the backdrop of the Cold

  10. Warfare, genocide, and ethnic conflict: a Darwinian approach

    OpenAIRE

    Dimijian, Gregory G.

    2010-01-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth ...

  11. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue Kuizhi; Liu Wenlin; Li Guanxiong; Ji Jinzu; Yu Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  12. Annihilation Prediction for Lanchester-Type Models of Modern Warfare

    OpenAIRE

    Brown, G.G.; Taylor, J.

    1983-01-01

    Operations Research, 31, p.752. This paper introduces important new functions for analytic solution of Launch-ester-type equations of modern warfare for combat between two homogeneous forces modeled by power attrtition-rate coefficients with "no offset". Tabulations of these Lanchester-Clifford-Schlatii (or LCS) functions allow one to study this particular variable-coefficient model almost as easily and thoroughly as Lanchester's classic constant-coefficient one. LCS functions allow one ...

  13. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  14. Hungarys Alternative to Counter Hybrid Warfare - Small States Weaponized Citizenry

    Science.gov (United States)

    2017-06-09

    said “Resilience as a terminological and operational factor, will become the newest ‘ brand ’ and communication name for the Alliance.”70 He also...audiences to influence their emotions , motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and...so-called influence warfare. His study pinpointed the importance of emotion over rational facts in messages. Second, Edward Lucas and Ben Nimmo on

  15. Recent Advances in Decontamination of Chemical Warfare Agents

    OpenAIRE

    Abdul Wadood Khan; Sabna Kotta; Shahid Husain Ansari; Javed Ali; Rakesh Kumar Sharma

    2013-01-01

    The recent turmoil and volatile situation in many countries and the increased risk of terrorist activities have raised alarm bells for the field of defense against toxic chemical/materials. These situations poses threats to society as terrorists can take advantage of such situations to strike and cause public mayhem. A number of chemicals have the potential of being used as chemical warfare (CW) agents. CW agents could immediately kill or incapacitate the affected individuals even when they a...

  16. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    Science.gov (United States)

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  17. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    This thesis researches the intricacies of the art of influence in an unconventional warfare environment to develop a model of influence that can be utilized by Special Forces conducting unconventional warfare...

  18. Chemical warfare agents identification by thermal neutron detection

    International Nuclear Information System (INIS)

    Liu Boxue; Ai Xianyun; Tan Daoyuan; Zhang Dianqin

    2000-01-01

    The hydrogen concentration determination by thermal neutron detection is a non-destructive, fast and effective method to identify chemical warfare agents and TNT that contain different hydrogen fraction. When an isotropic neutron source is used to irradiate chemical ammunition, hydrogen atoms of the agent inside shell act as a moderator and slow down neutrons. The number of induced thermal neutrons depends mainly upon hydrogen content of the agent. Therefore measurement of thermal neutron influence can be used to determine hydrogen atom concentration, thereby to determine the chemical warfare agents. Under a certain geometry three calibration curves of count rate against hydrogen concentration were measured. According to the calibration curves, response of a chemical agent or TNT could be calculated. Differences of count rate among chemical agents and TNT for each kind of shells is greater than five times of standard deviations of count rate for any agent, so chemical agents or TNT could be identified correctly. Meanwhile, blast tube or liquid level of chemical warfare agent could affect the response of thermal neutron count rate, and thereby the result of identification. (author)

  19. Detection of SYT and EWS gene rearrangements by dual-color break-apart CISH in liquid-based cytology samples of synovial sarcoma and Ewing sarcoma/primitive neuroectodermal tumor.

    Science.gov (United States)

    Kumagai, Arisa; Motoi, Toru; Tsuji, Kaori; Imamura, Tetsuo; Fukusato, Toshio

    2010-08-01

    To improve cytologic diagnostic accuracy for translocation-associated sarcomas, we explored dual-color break-apart (dc) chromogenic in situ hybridization (CISH) on liquid-based cytology (LBC) samples of 2 prototypic sarcomas: synovial sarcoma (SS) and Ewing sarcoma/primitive neuroectodermal tumor (ES/PNET). LBC samples of 10 cases of SS and 9 cases of ES/PNET were subjected to dc-CISH using probes for the specifically rearranged genes in each tumor entity: SYT in SS and EWS in ES/PNET. Rearranged SYT was successfully detected in all SSs but not in any ES/PNETs. In contrast, EWS rearrangement was identified in all ES/PNETs but not in any SSs. These results were validated by dc-fluorescence in situ hybridization and reverse transcription-polymerase chain reaction. dc-CISH on LBC samples is a reliable modality to detect gene rearrangements in sarcomas. This system has a clear advantage over other methods, enabling simultaneous visualization of the genetic abnormality and well-preserved, nonoverlapping cytomorphologic features with clear background under bright-field microscope.

  20. Chemiresistor Devices for Chemical Warfare Agent Detection Based on Polymer Wrapped Single-Walled Carbon Nanotubes.

    Science.gov (United States)

    Fennell, John F; Hamaguchi, Hitoshi; Yoon, Bora; Swager, Timothy M

    2017-04-28

    Chemical warfare agents (CWA) continue to present a threat to civilian populations and military personnel in operational areas all over the world. Reliable measurements of CWAs are critical to contamination detection, avoidance, and remediation. The current deployed systems in United States and foreign militaries, as well as those in the private sector offer accurate detection of CWAs, but are still limited by size, portability and fabrication cost. Herein, we report a chemiresistive CWA sensor using single-walled carbon nanotubes (SWCNTs) wrapped with poly(3,4-ethylenedioxythiophene) (PEDOT) derivatives. We demonstrate that a pendant hexafluoroisopropanol group on the polymer that enhances sensitivity to a nerve agent mimic, dimethyl methylphosphonate, in both nitrogen and air environments to concentrations as low as 5 ppm and 11 ppm, respectively. Additionally, these PEDOT/SWCNT derivative sensor systems experience negligible device performance over the course of two weeks under ambient conditions.

  1. Inhibition of the oncogenic fusion protein EWS-FLI1 causes G2-M cell cycle arrest and enhanced vincristine sensitivity in Ewing's sarcoma.

    Science.gov (United States)

    Zöllner, Stefan K; Selvanathan, Saravana P; Graham, Garrett T; Commins, Ryan M T; Hong, Sung Hyeok; Moseley, Eric; Parks, Sydney; Haladyna, Jessica N; Erkizan, Hayriye V; Dirksen, Uta; Hogarty, Michael D; Üren, Aykut; Toretsky, Jeffrey A

    2017-10-03

    Ewing's sarcoma (ES) is a rare and highly malignant cancer that grows in the bones or surrounding tissues mostly affecting adolescents and young adults. A chimeric fusion between the RNA binding protein EWS and the ETS family transcription factor FLI1 (EWS-FLI1), which is generated from a chromosomal translocation, is implicated in driving most ES cases by modulation of transcription and alternative splicing. The small-molecule YK-4-279 inhibits EWS-FLI1 function and induces apoptosis in ES cells. We aimed to identify both the underlying mechanism of the drug and potential combination therapies that might enhance its antitumor activity. We tested 69 anticancer drugs in combination with YK-4-279 and found that vinca alkaloids exhibited synergy with YK-4-279 in five ES cell lines. The combination of YK-4-279 and vincristine reduced tumor burden and increased survival in mice bearing ES xenografts. We determined that independent drug-induced events converged to cause this synergistic therapeutic effect. YK-4-279 rapidly induced G 2 -M arrest, increased the abundance of cyclin B1, and decreased EWS-FLI1-mediated generation of microtubule-associated proteins, which rendered cells more susceptible to microtubule depolymerization by vincristine. YK-4-279 reduced the expression of the EWS-FLI1 target gene encoding the ubiquitin ligase UBE2C, which, in part, contributed to the increase in cyclin B1. YK-4-279 also increased the abundance of proapoptotic isoforms of MCL1 and BCL2, presumably through inhibition of alternative splicing by EWS-FLI1, thus promoting cell death in response to vincristine. Thus, a combination of vincristine and YK-4-279 might be therapeutically effective in ES patients. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  2. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    Science.gov (United States)

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  3. The Utility of Freedom: A Principal-Agent Model for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Lanchester Model of Guerrilla Warfare,‖ Operations Research 10, no. 6 (December 1962): 818–827; William A. Niskanen, ―Review: The Economics of Insurgency...http://galenet.galegroup.com/servlet/DDRS?locID=navalps. Deitchman, S. J. ―A Lanchester Model of Guerrilla Warfare.‖ Operations Research 10, no

  4. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  5. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    Science.gov (United States)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.; Mondloch, Joseph E.

    2017-04-18

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  6. Study on the identification method of chemical warfare agents with spectroscopy of neutron induced γ rays

    International Nuclear Information System (INIS)

    Liu Boxue; Li Yun; Li Xiangbao

    1996-01-01

    The paper briefly describes some non-destructive verification technologies of chemical warfare agents in-site, and some application of neutron induced gamma ray analysis, such as multi-elements analysis of coal, hidden explosive detection and identification of chemical agents. It also describes some problems in developing the portable isotopic neutron spectroscopy for non-destructive evaluation of chemical warfare agents

  7. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    Science.gov (United States)

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  8. Status of dental health in chemical warfare victims: The case of Isfahan, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Mottaghi

    2012-01-01

    Conclusion: Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  9. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Science.gov (United States)

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... any of the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Follow the...

  10. Dr. Jekyll and Mr. Hyde: The Two Faces of the FUS/EWS/TAF15 Protein Family

    Directory of Open Access Journals (Sweden)

    Heinrich Kovar

    2011-01-01

    Full Text Available FUS, EWS, and TAF15 form the FET family of RNA-binding proteins whose genes are found rearranged with various transcription factor genes predominantly in sarcomas and in rare hematopoietic and epithelial cancers. The resulting fusion gene products have attracted considerable interest as diagnostic and promising therapeutic targets. So far, oncogenic FET fusion proteins have been regarded as strong transcription factors that aberrantly activate or repress target genes of their DNA-binding fusion partners. However, the role of the transactivating domain in the context of the normal FET proteins is poorly defined, and, therefore, our knowledge on how FET aberrations impact on tumor biology is incomplete. Since we believe that a full understanding of aberrant FET protein function can only arise from looking at both sides of the coin, the good and the evil, this paper summarizes evidence for the central function of FET proteins in bridging RNA transcription, processing, transport, and DNA repair.

  11. Comparison of the lethal effects of chemical warfare nerve agents across multiple ages.

    Science.gov (United States)

    Wright, Linnzi K M; Lee, Robyn B; Vincelli, Nicole M; Whalley, Christopher E; Lumley, Lucille A

    2016-01-22

    Children may be inherently more vulnerable than adults to the lethal effects associated with chemical warfare nerve agent (CWNA) exposure because of their closer proximity to the ground, smaller body mass, higher respiratory rate, increased skin permeability and immature metabolic systems. Unfortunately, there have only been a handful of studies on the effects of CWNA in pediatric animal models, and more research is needed to confirm this hypothesis. Using a stagewise, adaptive dose design, we estimated the 24h median lethal dose for subcutaneous exposure to seven CWNA in both male and female Sprague-Dawley rats at six different developmental times. Perinatal (postnatal day [PND] 7, 14 and 21) and adult (PND 70) rats were more susceptible than pubertal (PND 28 and 42) rats to the lethal effects associated with exposure to tabun, sarin, soman and cyclosarin. Age-related differences in susceptibility were not observed in rats exposed to VM, Russian VX or VX. Published by Elsevier Ireland Ltd.

  12. Love-Wave Sensors Combined with Microfluidics for Fast Detection of Biological Warfare Agents

    Directory of Open Access Journals (Sweden)

    Daniel Matatagui

    2014-07-01

    Full Text Available The following paper examines a time-efficient method for detecting biological warfare agents (BWAs. The method is based on a system of a Love-wave immunosensor combined with a microfluidic chip which detects BWA samples in a dynamic mode. In this way a continuous flow-through of the sample is created, promoting the reaction between antigen and antibody and allowing a fast detection of the BWAs. In order to prove this method, static and dynamic modes have been simulated and different concentrations of BWA simulants have been tested with two immunoreactions: phage M13 has been detected using the mouse monoclonal antibody anti-M13 (AM13, and the rabbit immunoglobulin (Rabbit IgG has been detected using the polyclonal antibody goat anti-rabbit (GAR. Finally, different concentrations of each BWA simulants have been detected with a fast response time and a desirable level of discrimination among them has been achieved.

  13. Possible Long Term Effects of Chemical Warfare Using Visual Evoked Potentials

    Directory of Open Access Journals (Sweden)

    Abbas Riazi

    2014-09-01

    Full Text Available Some studies have already addressed the effects of occupational organic solvent exposure on the visually evoked potentials (VEPs. Visual system is an important target for Sulphur Mustard (SM toxicity. A number of Iranian victims of Sulphur Mustard (SM agent were apprehensive about the delay effect of SM on their vision and a possible delay effect of SM on their visual cortex. This investigation was performed on 34 individuals with a history of chemical exposure and a control group of 15 normal people. The Toennies electro-diagnosis device was used and its signals were saved as the latencies. The mean of N75, N140 and P100 of victims of chemical warfare (VCWs and control group indicated no significant results (P>0.05. The VCWs did not show any visual symptoms and there was no clear deficit in their VEPs.

  14. Coupling Geothermal Heat Pumps with Underground Seasonal Thermal Energy Storage (EW-201135)

    Science.gov (United States)

    2017-03-01

    with the addition of the adiabatic pads, a water supply connection and a drainage system . During the baseline data-logging period at MCLB-B3700, an... system . Rainwater and near surface water will always contain some oxygen due to the presence of atmospheric oxygen. Deep (100+ ft. deep) groundwater...loop Heat Exchangers (GHX) with closed loop systems or via direct ground water use with open-loop systems , which conventional GHP systems in the U.S

  15. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    Science.gov (United States)

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  16. Nanoparticle-based optical biosensors for the direct detection of organophosphate chemical warfare agents and pesticides

    International Nuclear Information System (INIS)

    Simonian, A.L.; Good, T.A.; Wang, S.-S.; Wild, J.R.

    2005-01-01

    Neurotoxic organophosphates (OP) have found widespread use in the environment for insect control. In addition, there is the increasing threat of use of OP based chemical warfare agents in both ground based warfare and terrorist attacks. Together, these trends necessitate the development of simple and specific methods for discriminative detection of ultra low quantities of OP neurotoxins. In our previous investigations a new biosensor for the direct detection of organophosphorus neurotoxins was pioneered. In this system, the enzymatic hydrolysis of OP neurotoxins by organophosphate hydrolase (OPH) generated two protons in each hydrolytic turnover through reactions in which P-X bonds are cleaved. The sensitivity of this biosensor was limited due to the potentiometric method of detection. Recently, it was reported that a change in fluorescence properties of a fluorophore in the vicinity of gold nanoparticles might be used for detection of nanomolar concentrations of DNA oligonucleotides. The detection strategy was based on the fact that an enhancement or quenching of fluorescence intensity is a function of the distances between the gold nanoparticle and fluorophore. While these reports have demonstrated the use of nanoparticle-based sensors for the detection of target DNA, we observed that the specificity of enzyme-substrate interactions could be exploited in similar systems. To test the feasibility of this approach, OPH-gold nanoparticle conjugates were prepared, then incubated with a fluorescent enzyme inhibitor or decoy. The fluorescence intensity of the decoy was sensitive to the proximity of the gold nanoparticle, and thus could be used to indicate that the decoy was bound to the OPH. Then different paraoxon concentrations were introduced to the OPH-nanoparticle-conjugate-decoy mixtures, and normalized ratio of fluorescence intensities were measured. The greatest sensitivity to paraoxon was obtained when decoys and OPH-gold nanoparticle conjugates were present at

  17. Olfaction Warfare: Odor as Sword and Shield

    Science.gov (United States)

    2013-03-01

    movies Rugrats Go Wild! (2003) and Spy Kids: All the Time in the World (2011). A modern version of a smell distributing system for cinemas is the...Odorvision system developed by the French company Olf-action and demonstrated at the Lisbon show in 2011. The smells are distributed from dispensers...mounted under the ceiling of the cinema . Another similar smell distributing system is SpotScents, developed by Media Information Science Laboratories

  18. Validation of an abbreviated Vitalpac™ Early Warning Score (ViEWS) in 75,419 consecutive admissions to a Canadian regional hospital.

    LENUS (Irish Health Repository)

    Kellett, John

    2012-03-01

    The early warning score derived from 198,755 vital sign sets in the Vitalpac™ database (ViEWS) has an area under the receiver operator characteristic curve (AUROC) for death of acute unselected medical patients within 24h of 88%.

  19. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  20. Getting the Next War Right: Beyond Population-centric Warfare

    Science.gov (United States)

    2010-06-01

    respectively: Che Guevara and Mao Tse -tung. Che’s foco theory, as we have discussed, advocates mobilizing from the top. The armed challenger chooses an...example, Thomas A. Marks, “Guerrillas in the Mist: Hmong Resistance Continues in Laos ,” Combat and Survival 8, no. 5 (August 1996), 4–11. 12 Theory and...Mao Tse -tung, On Guerrilla Warfare, trans. and ed. Samuel B. Grif!th (Mineola, NY: Dover Publications, 2005). The book is available from a wide

  1. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...... residues in connection with the installation of the pipelines. Novel exposure and toxicity assessments are presented and the risk is assessed. The overall conclusion is that there is a negligible acute added CWA risk towards the fish community from the installation of the pipelines....

  2. Fort Laurdale Branch, Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1998-01-01

    ...) facility located on the Eastern Seaboard. Here, NSWC and other research and development activities conduct full-scale trials of air, surface, and underwater weapon systems under a variety of oceanographic conditions...

  3. Submersible Combatant Concept for Improved Littoral Warfare

    National Research Council Canada - National Science Library

    Leadmon, John

    2004-01-01

    .... power projection in many areas of the world. This problem is especially evident in the littoral environment, where enemy forces may employ a host of access denial methods including submarines, mines, small boats, and undersea sensor systems...

  4. On Space Warfare: A Space Power Doctrine

    National Research Council Canada - National Science Library

    Lupton, David

    1998-01-01

    .... Nevertheless, the speech was promptly dubbed "Star Wars" because the space environment seems to be the most likely place to deploy a ballistic missile defense system, and several administration...

  5. 4-D COMMON OPERATIONAL PICTURE (COP) FOR MISSION ASSURANCE (4D COP) Task Order 0001: Air Force Research Laboratory (AFRL) Autonomy Collaboration in Intelligence, Surveillance, and Reconnaissance (ISR), Electronic Warfare (EW)/Cyber and Combat Identification (CID)

    Science.gov (United States)

    2016-10-27

    across disciplines that might yield significant benefits if their relationships were better understood. 9 Approved for public release; distribution is... benefit from reading a common narrative with detailed operational situations that might offer a tangible and memorable set of references that would...north to the ocean. This cold black knuckle of ancient rock was the tip of some submerged coastal mountain, and he liked to hike out to it and

  6. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    Science.gov (United States)

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; Pwarfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; PChemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  7. Technological Advancements in EW: A Way Forward for Royal Saudi Naval Force

    Science.gov (United States)

    2013-09-01

    ships ploughing through it, that you may seek His bounty and that you may be grateful." What distinguishes the naval forces from other branches of...effectiveness of enemy defense systems and their relevant weapons systems through soft kill actions such as confusion, distraction, deception or

  8. Psychic Warfare: Exploring the Mind Frontier

    Science.gov (United States)

    1988-05-01

    month later Anderson was bacrk reinforcing psychic skepticism. This time he began, "The brass hats are, indeed, dabbling in the dark arts." Other...Emotion Radiator Ray; (10) Antisubmarine Systems; (11) Teleporters (Prototype); (12) Force Generators: (13) Orthoframe Generators; (14) Quark /Antiquark

  9. Concepts for Conducting Warfare in Cyberspace

    Science.gov (United States)

    2018-04-20

    diagnose causes. Destruction attacks, though rare are attacks where machines are given instructions that physically destroy the machine. 17 Ibid, 21...a control system for one type of structure, such as a power plant , can be vastly different from that of another power plant , even one in the same

  10. 14th Annual Expeditionary Warfare Conference

    Science.gov (United States)

    2009-11-19

    the Network*  Spectrum of Effects: Non-kinetic, low-order, high-order neutralization  Forensics  Radiographic systems  Post Blast investigation...LOE 3.2: CLOC (light) part II (Dec ’09) • Refine prototypical comm suite IOT inform CAPSET V • Inclusion in ECO LOE 4 • Demand reduction (water

  11. Punishment sustains large-scale cooperation in prestate warfare

    Science.gov (United States)

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  12. Optronics, radar and RF EW: eyes and ears in the battlespace

    CSIR Research Space (South Africa)

    Mkwelo, S

    2015-10-01

    Full Text Available systems – effectively operating as the ‘in- house’ science and technology capability of the DOD • Research, development, test and evaluation that will enable the DOD to: o Be a knowledgeable buyer of defence systems o Be a knowledgeable user of defence... • Integrated platform protection capability • New area of research and development • Develop and build facility • Integrate simulation and modeling capability Thank you Special thanks to: Erlank Pienaar Christo Cloete Kevin Gopaul ...

  13. Brave New Warfare: Autonomy in Lethal UAVs

    Science.gov (United States)

    2011-03-01

    Ethics and Leadership : Present unmanned systems reduce the risk to our war-fighters by providing a sophisticated stand-off capability that supports...points out there is a conflicting dichotomy between Aristotelian virtue ethics and Kantian procedural ethics when understood in the context of the Just...of current required core courses in ethics and military leadership , replete with case studies and concrete scenarios that distinguish competently

  14. Protecting the United States Against Information Warfare

    Science.gov (United States)

    2000-04-01

    Information Systems Protection, An Invitation to a Dialogue, 2. ECommerce , "Business to Business to Consumer, Transaction Enabled Internet Solutions," n.d...available from <http://www.cplus.net/ ecommerce /estats.html>; Internet; accessed 7 February 2000. 7 Clinton, Defending America’s Cyberspace... ECommerce . "Business to Business to Consumer, Transaction Enabled Internet Solutions." n.d. Available from < http://www.cplus.net/ ecommerce

  15. Technology, Effects and Doctrines of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1981-01-01

    The development and the status of the nuclear weapons systems and of the systems for their delivery are explained. All these systems have made tremendous progress since the 1960s. Available destructive power now is literally millions of times larger than at the time of Hiroshima. Moreover, technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategic doctrines for winning rather than preventing nuclear war have come to the foreground. Plans for the tactical first-use of nuclear weapons have been accepted. Alternatively, the retaliation capacity of the opponent could be destroyed by surprise attack - The First Strike. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. This applies especially to a First Strike situation. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. In the extreme ease, decisions may be left entirely to machines, and men would not any more be included in decision-making. The increasing automatization leads to further escalation of insecurity for the whole world. Solutions for the principal problem of the world, war or peace, cannot be found On the level of technology, but only on that of practical policy of detente, disarmament, collaboration and reconciliation. (author)

  16. 1D Bi2S3 nanorod/2D e-WS2 nanosheet heterojunction photocatalyst for enhanced photocatalytic activity

    Science.gov (United States)

    Vattikuti, S. V. Prabhakar; Shim, Jaesool; Byon, Chan

    2018-02-01

    The development of high-activity, long-life, precious-metal-free photocatalysts for redox reactions in photoelectrochemical cells and fuel cells remains challenging. The synthesis of high-activity heterostructured photocatalysts is crucial for efficient energy conversion strategies. Herein, a novel photocatalyst based on 1D Bi2S3 nanorods self-assembled on 2D exfoliated tungsten disulfide (e-WS2) nanosheets has been developed for the degradation of methyl orange (MO) dye in aqueous solution. We demonstrate a novel and facile hydrothermal method for the synthesis of a Bi2S3 nanorod/e-WS2 nanosheet heterostructure. The photocatalytic properties of the heterostructure under visible light were investigated. Enhanced photocatalytic activity was attributed to the presence of strong surface active sites, as well as the specific morphology of the composite. We also observed the fast transfer of electron-hole pairs at the material interface. This work demonstrates a non-noble semiconductor photocatalyst for the degradation of pollutants and evolution of H2.

  17. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  18. Cerium oxide for the destruction of chemical warfare agents: A comparison of synthetic routes

    Czech Academy of Sciences Publication Activity Database

    Janos, P.; Henych, Jiří; Pelant, O.; Pilařová, V.; Vrtoch, L.; Kormunda, M.; Mazanec, K.; Štengl, Václav

    2016-01-01

    Roč. 304, MAR (2016), s. 259-268 ISSN 0304-3894 Institutional support: RVO:61388980 Keywords : Cerium oxide * Chemical warfare agents * Organophosphate compounds * Decontamination Subject RIV: CA - Inorganic Chemistry Impact factor: 6.065, year: 2016

  19. From Douhet to drones, air warfare, and the evolution of targeting

    NARCIS (Netherlands)

    Osinga, F.P.B.; Roorda, M.P.; Ducheine, P.A.L.; Schmitt, M.N.; Osinga, F.P.B.

    2016-01-01

    Through the prism of the experience of air warfare, this chapter identifies key factors that have shaped targeting. These include technological developments, organizational structures, and processes and inter-service competition for scarce resources. Moreover, targeting is informed by perspectives

  20. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  1. The Army Ground Forces Training for Mountain and Winter Warfare - Study No. 23

    National Research Council Canada - National Science Library

    Govan, Thomas

    1946-01-01

    This general study of the experiments in mountain and winter warfare training from 1940 to 1944 is designed as an introduction to the histories of the Mountain Training Center and The 10th Mountain...

  2. Electronic Warfare: Towed Decoys Could Improve Survivability of Current Navy Aircraft

    National Research Council Canada - National Science Library

    Aiken, Michael

    1997-01-01

    Traditionally, DOD'S combat aircraft have used on-board electronic warfare devices called jammers for self-protection against radar-controlled weapons, including missiles and anti-aircraft artillery...

  3. Optimizing Armed Forces Capabilities for Hybrid Warfare – New Challenge for Slovak Armed Forces

    Directory of Open Access Journals (Sweden)

    Peter PINDJÁK

    2015-09-01

    Full Text Available The paper deals with the optimization of military capabilities of the Slovak Armed Forces for conducting operations in a hybrid conflict, which represents one of the possible scenarios of irregular warfare. Whereas in the regular warfare adversaries intend to eliminate the centers of gravity of each other, most often command and control structures, in irregular conflicts, the center of gravity shifts towards the will and cognitive perception of the target population. Hybrid warfare comprises a thoroughly planned combination of conventional military approaches and kinetic operations with subversive, irregular activities, including information and cyber operations. These efforts are often accompanied by intensified activities of intelligence services, special operation forces, and even mercenary and other paramilitary groups. The development of irregular warfare capabilities within the Slovak Armed Forces will require a progressive transformation process that may turn the armed forces into a modern and adaptable element of power, capable of deployment in national and international crisis management operations.

  4. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data

    National Research Council Canada - National Science Library

    Stoker, Carol; Crawford, Alice

    2008-01-01

    ... (including morale and lack of mentoring), push both men and women out of the Navy. Nonetheless, the Navy s primary effort to improve retention has been to introduce the Surface Warfare Officer Continuation Pay (SWOCP...

  5. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  6. DRES Database of Methods for the Analysis of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    D'Agostino, Paul

    1997-01-01

    .... Update of the database continues as an ongoing effort and the DRES Database of Methods for the Analysis of Chemical Warfare Agents is available panel in hardcopy form or as a softcopy Procite or Wordperfect file...

  7. The Rapier or the Club: The Relationship between Attrition and Maneuver Warfare

    National Research Council Canada - National Science Library

    Springman, Jeffrey A

    2006-01-01

    ...? This project compares the relationship between attrition and maneuver warfare. The study considers whether there are times when wars of attrition should be fought, and whether there are conditions that force wars of attrition...

  8. Diagnosis of Exposure to Chemical Warfare Agents: A Comprehensive Literature Survey 1990-2005

    National Research Council Canada - National Science Library

    Noort, D

    2006-01-01

    This report is an update of TNO report PML 2003-A63. In this report an overview is presented of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e...

  9. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    Science.gov (United States)

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  10. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2006-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  11. Second NATO/SIBCA Exercise on Sampling of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wils, E

    1999-01-01

    In order to practise the sampling of chemical warfare agents under realistic conditions, the Netherlands participated successfully in the second NATO/SIBCA sampling exercise conducted in Poland on 1-3...

  12. The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.

    Directory of Open Access Journals (Sweden)

    Martina

    2014-06-01

    Full Text Available This article aims to provide a brief and comprehensive introduction to the issue of cyber warfare and to display the recent development in this area. Geographically, it focuses on the Middle East region, since the vast majority of the most important recent cyber attacks appeared just in there or were connected to it. The first part of the article tries to define the key notion of cyber warfare, compares it to the standard warfare and presents different types of cyber weapons that are known today. The second part points out examples of the most striking recent cyber attacks and uses them as evidences to demonstrate today's importance and dissemination of cyber warfare. Finally, the article sums up pros and cons of the cyber weapons and, in view of these, predicts a significant increase in their use in any future war conflicts.

  13. Improving Blood Monitoring of Enzymes as Biomarkers of Risk from Anticholinergic Pesticides and Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Wilson, Barry W

    2005-01-01

    Blood biomarkers are an important way to monitor exposure to anticholinergic pesticides and chemical warfare agents and to establish whether some personnel are at greater risk than others from exposure...

  14. Special Operations Forces: C-130 Upgrade Plan Could Help Fix Electronic Warfare Deficiencies

    National Research Council Canada - National Science Library

    1998-01-01

    In response to a concern that threats to the U.S. Special Operations Command's (USSOCOM) aircraft are increasing, while funds available for electronic warfare are decreasing, the General Accounting Office...

  15. Combinatorial Auction Theory Applied to the Selection of Surface Warfare Officer Retention Incentives

    National Research Council Canada - National Science Library

    Denmond, Constance M; Johnson, Derek N; Lewis, Chavius G; Zegley, Christopher R

    2007-01-01

    The purpose of this project is to investigate the potential retention and cost impacts of offering combinations of retention base incentives to members of the Surface Warfare Officer (SWO) community...

  16. Return on Investment Analysis of Information Warfare Systems

    National Research Council Canada - National Science Library

    Rios, Cesar G., Jr

    2005-01-01

    .... By analyzing the outputs of the subprocesses involved in the ICP in common units of change, a price per unit of output can be generated to allocate both cost and revenue at the subprocess level...

  17. Human Terrain Systems and the Moral Prosecution of Warfare

    Science.gov (United States)

    2011-10-01

    personal dignity, in particular, humiliating and degrading treatment.” While this seems prima facie obvious, it is not easy to discern what...these theaters is incorrect. Military commanders do not choose their wars, but they do have a constitutional duty to prosecute them. Just war...would fall under the noncombatant status and be subject to no military coercion. It is the moral soldier’s duty to discern between the two and act

  18. Naval Sea Systems Command > Home > Warfare Centers > NSWC Corona

    Science.gov (United States)

    . Richard A. Braunbeck III Capt. Stephen H. Murray, left, salutes his relief, Capt. Richard A. Braunbeck III -321 NORCO, Calif. (Dec. 7, 2016) Capt. Stephen H. Murray, commanding officer of Naval Surface... https ): Dewin Andujar (Virtual Reality); Nicholas Manning (Maritime Capture the Flag); Stephen O'Grady

  19. Project Guardian: Optimizing Electronic Warfare Systems for Ground Combat Vehicles

    National Research Council Canada - National Science Library

    Parks, Jack G; Jackson, William; Revello, James; Soltesz, James

    1995-01-01

    .... The study, Project Guardian, represents a new process for determining the optimum set of sensors and countermeasures for a specific vehicle class under the constraints of threat projection, combat...

  20. Electronic Warfare and Radar Systems Engineering Handbook. 4th Edition

    Science.gov (United States)

    2013-10-01

    Instantaneous Frequency Measurement IFR Instrument Flight Rules IG Inspector General IIR Imaging Infrared I-Level Intermediate Level of Repair (also...Review TS Top Secret TSS Tangential Sensitivity TSSAM Tri-Service Standoff Attack Weapon TT Target Track TTI Time To Impact /Intercept TTG Time-to-Go...missile time-of-flight, i.e. A missile shot at a target 36 NM away, may be only 12 NM away from the firing aircraft at missile impact . 4-8.5

  1. Cyber crime and cyber warfare with international cyber collaboration for RSA – preparing communities

    CSIR Research Space (South Africa)

    Grobler, M

    2012-03-01

    Full Text Available aspects come into play that may have an influence on the manner in which the military reacts to cyber attacks (Wilson 2007): ? new national security policy issues; ? consideration of psychological operations used to affect friendly nations... relationship between modern cyber space, cyber warfare and traditional legislation. As a starting point, cyber warfare is defined for the purpose of this article as the use of exploits in cyber space as a way to intentionally cause harm to people, assets...

  2. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    Science.gov (United States)

    2016-06-01

    W., & Scheaffer, R. L. (2008). Mathematical statistics with applications . Belmont, CA: Cengage Learning. 118 THIS PAGE INTENTIONALLY LEFT BLANK...WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT

  3. Gene Expression Responses to FUS, EWS, and TAF15 Reduction and Stress Granule Sequestration Analyses Identifies FET-Protein Non-Redundant Functions

    DEFF Research Database (Denmark)

    Blechingberg, Jenny; Luo, Yonglun; Bolund, Lars

    2012-01-01

    The FET family of proteins is composed of FUS/TLS, EWS/EWSR1, and TAF15 and possesses RNA- and DNA-binding capacities. The FET-proteins are involved in transcriptional regulation and RNA processing, and FET-gene deregulation is associated with development of cancer and protein granule formations...... in amyotrophic lateral sclerosis, frontotemporal lobar degeneration, and trinucleotide repeat expansion diseases. We here describe a comparative characterization of FET-protein localization and gene regulatory functions. We show that FUS and TAF15 locate to cellular stress granules to a larger extend than EWS....... FET-proteins have no major importance for stress granule formation and cellular stress responses, indicating that FET-protein stress granule association most likely is a downstream response to cellular stress. Gene expression analyses showed that the cellular response towards FUS and TAF15 reduction...

  4. Warfare, genocide, and ethnic conflict: a Darwinian approach.

    Science.gov (United States)

    Dimijian, Gregory G

    2010-07-01

    As the 21st century dawns, I reflect on the history of humankind with growing concern about the need to understand the underlying biological and cultural roots of ethnic conflict and warfare. In the many studies of human conflict, innate biological predispositions have been neglected. This article is the third part of a series of seminars for medical residents at the University of Texas Southwestern Medical School at Dallas (see http://adarwinstudygroup.org/). The series starts with in-depth coverage of Darwinian natural and sexual selection, with examples from the domestication of animals and plants and the crisis of antibiotic resistance. The series strives to show how biology has been neglected in the study of the we-they orientation of human behavior, with its devastating consequences. The subject material is profoundly disturbing, as it looks at "human nature" and contrasts the "dark side" of human behavior with the opposite, profoundly caring and loving side.

  5. Information Warfare on Social Media: A Brand Management Perspective

    Directory of Open Access Journals (Sweden)

    Kalpokas Ignas

    2017-06-01

    Full Text Available Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.

  6. Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2007-06-01

    Full Text Available Libicki, M.C. (2007. Conquest in Cyberspace: National Security and Information Warfare. New York: Cambridge University Press. 323 pages, ISBN: 978-0-521-69214-4 (paper, US$80Reviewed by Gary C. Kessler (gary.kessler@champlain.eduMany books -- and even movies ("Live Free or Die Hard" -- are based upon the premise of an impending information war. In these scenarios -- made all too plausible by the increased frequency with which we read about and experience major information security incidents -- a Bad Guy exploits known computer security vulnerabilities in order to control major national infrastructures via the Internet so as to reap financial, economic, and/or personal power.(see PDF for full review

  7. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents.

    Science.gov (United States)

    Štengl, Václav; Henych, Jiří; Janoš, Pavel; Skoumal, Miroslav

    2016-01-01

    Metal oxides have very important applications in many areas of chemistry, physics and materials science; their properties are dependent on the method of preparation, the morphology and texture. Nanostructured metal oxides can exhibit unique characteristics unlike those of the bulk form depending on their morphology, with a high density of edges, corners and defect surfaces. In recent years, methods have been developed for the preparation of metal oxide powders with tunable control of the primary particle size as well as of a secondary particle size: the size of agglomerates of crystallites. One of the many ways to take advantage of unique properties of nanostructured oxide materials is stoichiometric degradation of chemical warfare agents (CWAs) and volatile organic compounds (VOC) pollutants on their surfaces.

  8. Decontamination of biological warfare agents by a microwave plasma torch

    International Nuclear Information System (INIS)

    Lai, Wilson; Lai, Henry; Kuo, Spencer P.; Tarasenko, Olga; Levon, Kalle

    2005-01-01

    A portable arc-seeded microwave plasma torch running stably with airflow is described and applied for the decontamination of biological warfare agents. Emission spectroscopy of the plasma torch indicated that this torch produced an abundance of reactive atomic oxygen that could effectively oxidize biological agents. Bacillus cereus was chosen as a simulant of Bacillus anthracis spores for biological agent in the decontamination experiments. Decontamination was performed with the airflow rate of 0.393 l/s, corresponding to a maximum concentration of atomic oxygen produced by the torch. The experimental results showed that all spores were killed in less than 8 s at 3 cm distance, 12 s at 4 cm distance, and 16 s at 5 cm distance away from the nozzle of the torch

  9. Using cheminformatics to find simulants for chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Lavoie, J.; Srinivasan, Sree [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States); Nagarajan, R., E-mail: Ramanathan.Nagarajan@us.army.mil [Molecular Sciences and Engineering Team, U.S. Army Natick Soldier Research, Development and Engineering Center, 15 Kansas Street, Natick, MA 01760 (United States)

    2011-10-30

    Highlights: {yields} Summary of chemical warfare agent (CWA) simulants in current use. {yields} Application of method of molecular similarity to CWA and simulants. {yields} Quantitative metric for CWA-simulant similarity. {yields} Rank ordering of simulants in current use. {yields} Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  10. Using cheminformatics to find simulants for chemical warfare agents

    International Nuclear Information System (INIS)

    Lavoie, J.; Srinivasan, Sree; Nagarajan, R.

    2011-01-01

    Highlights: → Summary of chemical warfare agent (CWA) simulants in current use. → Application of method of molecular similarity to CWA and simulants. → Quantitative metric for CWA-simulant similarity. → Rank ordering of simulants in current use. → Potential of method to identify simulants for emerging agents. - Abstract: Direct experimentation with chemical warfare agents (CWA) to study important problems such as their permeation across protective barrier materials, decontamination of equipment and facilities, or the environmental transport and fate of CWAs is not feasible because of the obvious toxicity of the CWAs and associated restrictions on their laboratory use. The common practice is to use 'simulants,' namely, analogous chemicals that closely resemble the CWAs but are less toxic, with the expectation that the results attained for simulants can be correlated to how the CWAs would perform. Simulants have been traditionally chosen by experts, by means of intuition, using similarity in one or more physical properties (such as vapor pressure or aqueous solubility) or in the molecular structural features (such as functional groups) between the stimulant and the CWA. This work is designed to automate the simulant identification process backed by quantitative metrics, by means of chemical similarity search software routinely used in pharmaceutical drug discovery. The question addressed here is: By the metrics of such software, how similar are traditional simulants to CWAs? That is, what is the numerical 'distance' between each CWA and its customary simulants in the quantitative space of molecular descriptors? The answers show promise for finding close but less toxic simulants for the ever-increasing numbers of CWAs objectively and fast.

  11. Impact of size and distribution of installed PV power in E-W direction on the level in which selected consumers’ energy needs were met

    Directory of Open Access Journals (Sweden)

    Necka Krzysztof

    2018-01-01

    Full Text Available The aim of the study was to analyse the energy needs of selected consumers and to select the PV installed capacity in the east and west panels orientation (E-W. The analysis was carried out for two variants. The first concerned the impact of the installation power of a PV source on the contracted power in its symmetric east and west position. The second variant was the result of previous observations and studies of the authors of this paper. Thus, in this variant, the unbalanced power of PV E-W in relation to the S azimuth has been analyzed, taking into account the characteristics of the recipients' needs and the variation of the PV power installed. The analyses show that an increase in meeting the energy demand for two of the tested plants at symmetrical power distribution to the east and west occurred only when the installed power was increased to the level of approx. 1.4-1.6 of the contracted power. However, the power distribution in the E-W direction has a very strong effect on the energy amount that is generated in the power plant and cannot be used due to the lack of demand in the plant.

  12. EW-7197 eluting nano-fiber covered self-expandable metallic stent to prevent granulation tissue formation in a canine urethral model.

    Directory of Open Access Journals (Sweden)

    Kichang Han

    Full Text Available To evaluate an EW-7197-eluting nanofiber-covered stent (NFCS for suppressing granulation tissue formation after stent placement in a canine urethral model.All experiments were approved by the committee of animal research. A total of 12 NFCSs were placed in the proximal and distal urethras of six dogs. Dogs were divided into two groups with 3 dogs each. The control stent (CS group received NFCSs and the drug stent (DS group received EW-7197 (1000 μg-eluting NFCSs. All dogs were sacrificed 8 weeks after stent placement Histologic findings of the stented urethra were compared using the Mann-Whitney U test.Stent placement was technically successful in all dogs without procedure-related complications. On urethrographic analysis, the mean luminal diameter was significantly larger in the DS group than in the CS group at 4 and 8 weeks after stent placement (all p 0.05.The EW-7197-eluting NFCS is effective and safe for suppressing granulation tissue formation after stent placement in a canine urethral model.

  13. 75 FR 78688 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-12-16

    ... automated records maintained by Space and Warfare Systems Center Atlantic.'' * * * * * Retention and... Education and Training Records.'' * * * * * N07220-1 System name: Navy Standard Integrated Personnel System...), date of birth, education, training and qualifications, professional history, assignments, performance...

  14. Reliability and effectiveness of early warning systems for natural hazards: Concept and application to debris flow warning

    International Nuclear Information System (INIS)

    Sättele, Martina; Bründl, Michael; Straub, Daniel

    2015-01-01

    Early Warning Systems (EWS) are increasingly applied to mitigate the risks posed by natural hazards. To compare the effect of EWS with alternative risk reduction measures and to optimize their design and operation, their reliability and effectiveness must be quantified. In the present contribution, a framework approach to the evaluation of threshold-based EWS for natural hazards is presented. The system reliability is classically represented by the Probability of Detection (POD) and Probability of False Alarms (PFA). We demonstrate how the EWS effectiveness, which is a measure of risk reduction, can be formulated as a function of POD and PFA. To model the EWS and compute the reliability, we develop a framework based on Bayesian Networks, which is further extended to a decision graph, facilitating the optimization of the warning system. In a case study, the framework is applied to the assessment of an existing debris flow EWS. The application demonstrates the potential of the framework for identifying the important factors influencing the effectiveness of the EWS and determining optimal warning strategies and system configurations. - Highlights: • Warning systems are increasingly applied measures to reduce natural hazard risks. • Bayesian Networks (BN) are powerful tools to quantify warning system's reliability. • The effectiveness is defined to assess the optimality of warning systems. • By extending BNs to decision graphs, the optimal warning strategy is identified. • Sensors positioning significantly influence the effectiveness of warning systems

  15. Healthcare and warfare. Medical space, mission and apartheid in twentieth century northern Namibia.

    Science.gov (United States)

    Nord, Catharina

    2014-07-01

    In the year 1966, the first government hospital, Oshakati hospital, was inaugurated in northern South-West Africa. It was constructed by the apartheid regime of South Africa which was occupying the territory. Prior to this inauguration, Finnish missionaries had, for 65 years, provided healthcare to the indigenous people in a number of healthcare facilities of which Onandjokwe hospital was the most important. This article discusses these two agents' ideological standpoints. The same year, the war between the South-West African guerrillas and the South African state started, and continued up to 1988. The two hospitals became involved in the war; Oshakati hospital as a part of the South African war machinery, and Onandjokwe hospital as a 'terrorist hospital' in the eyes of the South Africans. The missionary Onandjokwe hospital was linked to the Lutheran church in South-West Africa, which became one of the main critics of the apartheid system early in the liberation war. Warfare and healthcare became intertwined with apartheid policies and aggression, materialised by healthcare provision based on strategic rationales rather than the people's healthcare needs. When the Namibian state took over a ruined healthcare system in 1990, the two hospitals were hubs in a healthcare landscape shaped by missionary ambitions, war and apartheid logic.

  16. Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar Surfaces of Living Plants Maintained in a Surety Hood

    Science.gov (United States)

    2016-09-01

    RAIN-INDUCED WASH-OFF OF CHEMICAL WARFARE AGENT (VX) FROM FOLIAR SURFACES OF LIVING PLANTS MAINTAINED IN A...Final 3. DATES COVERED (From - To) May 2014 – Sep 2015 4. TITLE AND SUBTITLE Rain-Induced Wash-Off of Chemical Warfare Agent (VX) from Foliar...galli Foliage Chemical warfare agent (CWA) O-ethyl-S-(2

  17. Acquisition and Development of System Command (SYSCOM) Technical Manuals

    National Research Council Canada - National Science Library

    2003-01-01

    ... (NAVSEA) and Space and Naval Warfare Systems Command (SPAWAR). TMs are the primary information source for technical training, installation, operation, testing, maintenance, and repair associated with NAVSEA/SPAWAR systems or equipment...

  18. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  19. Developing and testing an Early Warning System for Non Indigenous Species and Ballast Water Management

    Science.gov (United States)

    Magaletti, Erika; Garaventa, Francesca; David, Matej; Castriota, Luca; Kraus, Romina; Luna, Gian Marco; Silvestri, Cecilia; Forte, Cosmo; Bastianini, Mauro; Falautano, Manuela; Maggio, Teresa; Rak, Giulietta; Gollasch, Stephan

    2018-03-01

    This paper describes the methodological approach used for the development of an Early Warning System (EWS) for Non Indigenous Species (NIS) and ballast water management and summarizes the results obtained. The specific goals of the EWS are firstly to warn vessels to prevent loading of ballast water when critical biological conditions occur in ports and surrounding areas i.e. mass development or blooms of Harmful Aquatic Organisms and Pathogens (HAOP). Secondly, to warn environmental and health authorities when NIS or pathogens are present in ports or surrounding areas to enable an early response and an implementation of remediation measures. The EWS is designed to be used for implementing various parallel obligations, by taking into consideration different legal scopes, associated information and decision-making needs. The EWS was elaborated, tested in the Adriatic Sea and illustrated by two case studies. Although the EWS was developed with an Adriatic Sea focus, it is presented in a format so that it may be used as a model when establishing similar systems in other locations. The role of the various actors is discussed and recommendations on further developments of the EWS are presented. It was concluded that the EWS is a suitable tool to reduce the spread of potentially harmful and ballast water mediated species.

  20. Potential Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017

    Science.gov (United States)

    2018-02-01

    ARL-TR-8283 ● FEB 2018 US Army Research Laboratory Potential Science and Technology Game Changers for the Ground Warfare of 2050...Science and Technology Game Changers for the Ground Warfare of 2050: Selected Projections Made in 2017 by Alexander Kott Office of the Director...Brian Sadler Vehicle Technology Directorate, ARL Ananthram Swami Computational and Information Sciences Directorate, ARL Approved for

  1. Chemical warfare agent simulants for human volunteer trials of emergency decontamination: A systematic review.

    Science.gov (United States)

    James, Thomas; Wyke, Stacey; Marczylo, Tim; Collins, Samuel; Gaulton, Tom; Foxall, Kerry; Amlôt, Richard; Duarte-Davidson, Raquel

    2018-01-01

    Incidents involving the release of chemical agents can pose significant risks to public health. In such an event, emergency decontamination of affected casualties may need to be undertaken to reduce injury and possible loss of life. To ensure these methods are effective, human volunteer trials (HVTs) of decontamination protocols, using simulant contaminants, have been conducted. Simulants must be used to mimic the physicochemical properties of more harmful chemicals, while remaining non-toxic at the dose applied. This review focuses on studies that employed chemical warfare agent simulants in decontamination contexts, to identify those simulants most suitable for use in HVTs of emergency decontamination. Twenty-two simulants were identified, of which 17 were determined unsuitable for use in HVTs. The remaining simulants (n = 5) were further scrutinized for potential suitability according to toxicity, physicochemical properties and similarities to their equivalent toxic counterparts. Three suitable simulants, for use in HVTs were identified; methyl salicylate (simulant for sulphur mustard), diethyl malonate (simulant for soman) and malathion (simulant for VX or toxic industrial chemicals). All have been safely used in previous HVTs, and have a range of physicochemical properties that would allow useful inference to more toxic chemicals when employed in future studies of emergency decontamination systems. © 2017 Crown Copyright. Journal of Applied Toxicology published by John Wiley & Sons, Ltd.

  2. Biological and environmental hazards associated with exposure to chemical warfare agents: arsenicals.

    Science.gov (United States)

    Li, Changzhao; Srivastava, Ritesh K; Athar, Mohammad

    2016-08-01

    Arsenicals are highly reactive inorganic and organic derivatives of arsenic. These chemicals are very toxic and produce both acute and chronic tissue damage. On the basis of these observations, and considering the low cost and simple methods of their bulk syntheses, these agents were thought to be appropriate for chemical warfare. Among these, the best-known agent that was synthesized and weaponized during World War I (WWI) is Lewisite. Exposure to Lewisite causes painful inflammatory and blistering responses in the skin, lung, and eye. These chemicals also manifest systemic tissue injury following their cutaneous exposure. Although largely discontinued after WWI, stockpiles are still known to exist in the former Soviet Union, Germany, Italy, the United States, and Asia. Thus, access by terrorists or accidental exposure could be highly dangerous for humans and the environment. This review summarizes studies that describe the biological, pathophysiological, toxicological, and environmental effects of exposure to arsenicals, with a major focus on cutaneous injury. Studies related to the development of novel molecular pathobiology-based antidotes against these agents are also described. © 2016 New York Academy of Sciences.

  3. Antioxidants as potential medical countermeasures for chemical warfare agents and toxic industrial chemicals.

    Science.gov (United States)

    McElroy, Cameron S; Day, Brian J

    2016-01-15

    The continuing horrors of military conflicts and terrorism often involve the use of chemical warfare agents (CWAs) and toxic industrial chemicals (TICs). Many CWA and TIC exposures are difficult to treat due to the danger they pose to first responders and their rapid onset that can produce death shortly after exposure. While the specific mechanism(s) of toxicity of these agents are diverse, many are associated either directly or indirectly with increased oxidative stress in affected tissues. This has led to the exploration of various antioxidants as potential medical countermeasures for CWA/TIC exposures. Studies have been performed across a wide array of agents, model organisms, exposure systems, and antioxidants, looking at an almost equally diverse set of endpoints. Attempts at treating CWAs/TICs with antioxidants have met with mixed results, ranging from no effect to nearly complete protection. The aim of this commentary is to summarize the literature in each category for evidence of oxidative stress and antioxidant efficacy against CWAs and TICs. While there is great disparity in the data concerning methods, models, and remedies, the outlook on antioxidants as medical countermeasures for CWA/TIC management appears promising. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Chiral separation of G-type chemical warfare nerve agents via analytical supercritical fluid chromatography.

    Science.gov (United States)

    Kasten, Shane A; Zulli, Steven; Jones, Jonathan L; Dephillipo, Thomas; Cerasoli, Douglas M

    2014-12-01

    Chemical warfare nerve agents (CWNAs) are extremely toxic organophosphorus compounds that contain a chiral phosphorus center. Undirected synthesis of G-type CWNAs produces stereoisomers of tabun, sarin, soman, and cyclosarin (GA, GB, GD, and GF, respectively). Analytical-scale methods were developed using a supercritical fluid chromatography (SFC) system in tandem with a mass spectrometer for the separation, quantitation, and isolation of individual stereoisomers of GA, GB, GD, and GF. Screening various chiral stationary phases (CSPs) for the capacity to provide full baseline separation of the CWNAs revealed that a Regis WhelkO1 (SS) column was capable of separating the enantiomers of GA, GB, and GF, with elution of the P(+) enantiomer preceding elution of the corresponding P(-) enantiomer; two WhelkO1 (SS) columns had to be connected in series to achieve complete baseline resolution. The four diastereomers of GD were also resolved using two tandem WhelkO1 (SS) columns, with complete baseline separation of the two P(+) epimers. A single WhelkO1 (RR) column with inverse stereochemistry resulted in baseline separation of the GD P(-) epimers. The analytical methods described can be scaled to allow isolation of individual stereoisomers to assist in screening and development of countermeasures to organophosphorus nerve agents. © 2014 The Authors. Chirality published by John Wiley Periodicals, Inc.

  5. Poly High Internal Phase Emulsion for the Immobilization of Chemical Warfare Agents.

    Science.gov (United States)

    Wright, Alexander J; Main, Marcus J; Cooper, Nicholas J; Blight, Barry A; Holder, Simon J

    2017-09-20

    We report a facile method for the absorption (characterized by the weight/weight swelling degree, Q) of a variety of chemical warfare agents (CWAs); including sulfur mustard (HD) (Q = 40) and V-series (VM, VX, i-Bu-VX, n-Bu-VX) of nerve agents (Q ≥ 45) and a simulant, methyl benzoate (Q = 55), through the use of a poly(styrene-co-vinyl benzyl chloride-co-divinylbenzene) lightly cross-linked poly high internal phase emulsion (polyHIPE). By varying the vinyl benzyl chloride (VBC) content and the volume of the internal phase of the precursor emulsion it is demonstrated that absorption is facilitated both by the swelling of the polymer and the uptake of liquid in the pores. In particular the sample prepared from a 95% internal emulsion water content showed rapid swelling (<5 min to total absorption) and the ability to swell both from a monolithic state and from a compressed state, making these systems ideal practical candidates for the rapid immobilization of CWAs.

  6. Biological and environmental hazards associated with exposure to chemical warfare agents: arsenicals

    Science.gov (United States)

    Li, Changzhao; Srivastava, Ritesh K.; Athar, Mohammad

    2016-01-01

    Arsenicals are highly reactive inorganic and organic derivatives of arsenic. These chemicals are very toxic and produce both acute and chronic tissue damage. Based on these observations, and considering the low cost and simple methods of their bulk syntheses, these agents were thought to be appropriate for chemical warfare. Among these, the most known agent synthesized and weaponized during World War I (WWI) is Lewisite. Exposure to Lewisite causes painful inflammatory and blistering responses in the skin, lung, and eye. These chemicals also manifest systemic tissue injury following their cutaneous exposure. Although largely discontinued after WWI, their stockpiles are still known to exist in the former Soviet Union, Germany, Italy, the United States, and Asia. Thus, their access by terrorists or accidental exposure could be highly dangerous for humans and the environment. This review summarizes studies which describe the biological, pathophysiological, toxicological, and environmental effects of exposure to arsenicals, with a major focus on cutaneous injury. Studies related to the development of novel molecular pathobiology–based antidotes against these agents are also described. PMID:27636894

  7. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy`s Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  8. Naval Undersea Warfare Center Division Newport utilities metering, Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, D.M.

    1992-11-01

    Pacific Northwest Laboratory developed this report for the US Navy's Naval Undersea Warfare Center Division Newport, Rhode Island (NUWC). The purpose of the report was to review options for metering electricity and steam used in the NUWC compound, and to make recommendations to NUWC for implementation under a follow-on project. An additional NUWC concern is a proposed rate change by the servicing utility, Newport Electric, which would make a significant shift from consumption to demand billing, and what effect that rate change would have on the NUWC utility budget. Automated, remote reading meters are available which would allow NUWC to monitor its actual utility consumption and demand for both the entire NUWC compound and by end-use in individual buildings. Technology is available to perform the meter reads and manipulate the data using a personal computer with minimal staff requirement. This is not meant to mislead the reader into assuming that there is no requirement for routine preventive maintenance. All equipment requires routine maintenance to maintain its accuracy. While PNL reviewed the data collected during the site visit, however, it became obvious that significant opportunities exist for reducing the utility costs other than accounting for actual consumption and demand. Unit costs for both steam and electricity are unnecessarily high, and options are presented in this report for reducing them. Additionally, NUWC has an opportunity to undertake a comprehensive energy resource management program to significantly reduce its energy demand, consumption, and costs.

  9. Simulation-based planning for theater air warfare

    Science.gov (United States)

    Popken, Douglas A.; Cox, Louis A., Jr.

    2004-08-01

    Planning for Theatre Air Warfare can be represented as a hierarchy of decisions. At the top level, surviving airframes must be assigned to roles (e.g., Air Defense, Counter Air, Close Air Support, and AAF Suppression) in each time period in response to changing enemy air defense capabilities, remaining targets, and roles of opposing aircraft. At the middle level, aircraft are allocated to specific targets to support their assigned roles. At the lowest level, routing and engagement decisions are made for individual missions. The decisions at each level form a set of time-sequenced Courses of Action taken by opposing forces. This paper introduces a set of simulation-based optimization heuristics operating within this planning hierarchy to optimize allocations of aircraft. The algorithms estimate distributions for stochastic outcomes of the pairs of Red/Blue decisions. Rather than using traditional stochastic dynamic programming to determine optimal strategies, we use an innovative combination of heuristics, simulation-optimization, and mathematical programming. Blue decisions are guided by a stochastic hill-climbing search algorithm while Red decisions are found by optimizing over a continuous representation of the decision space. Stochastic outcomes are then provided by fast, Lanchester-type attrition simulations. This paper summarizes preliminary results from top and middle level models.

  10. Back to the future: aerial warfare in Libya

    Directory of Open Access Journals (Sweden)

    João Paulo Nunes Vicente

    2013-05-01

    Full Text Available A century after the first air bomb mission, a new intervention in the same geographic space has made evident the changes in Airpower. The Aerial Warfare in Libya has radically changed the civil war, complying with a UN mission to protect Libyan population, imposing a no-fly zone and an arms embargo. Therefore, Operation Unified Protector became one of the most successful campaigns in the history of NATO. We aim to assess the operational efficiency of Airpower in the conflict in Libya, focusing on the challenges of a War essentially Aerial. Despite the military results and the fact that some political objectives were met, we can identify some concerning trends that, if not shifted, may negatively influence future NATO operations. We do not aim to draw general and universal conclusions on the strategic value of Airpower based on the analysis of a specific case. Above all, we focus on identifying some lessons which have influenced OUP operational efficiency. Thus, we must analyze some factors, such as the scope of objectives, the type of opposing action and aerial strategy used by the coalition and then focus on the challenges arising from the OUP.

  11. Prevalence of Asthma in Children of Chemical Warfare Victims

    Science.gov (United States)

    Mirsadraee, Majid; Mozaffari, Abolfazl; Attaran, Davood

    2011-01-01

    Objective Exposure of DNA to sulfur mustard gas may increase the inheritance of asthma in chemical warfare victims' (CWV) offspring. The objective of this study was to determine the prevalence of asthma in children of CWV and compare it to asthmatic children in the general population. Methods Four hundred and nine children from 130 CWV fathers and 440 children from 145 asthmatic parents from two cities in Iran participated in this study. The prevalence of asthma was determined by standard questionnaire released for epidemiological survey of asthma in children and compared between two groups. Findings The prevalence of asthma in the CWV group was 15%; this was not significantly different from the control group (12.5%). The children of the CWV group reported a significantly greater incidence of wheezing (1.2±3.1 attacks) per year, but the control group reported more severe attacks leading to speech difficulties (3%) and coughing (7%). Regression analysis showed that with increasing family size in the control group, the number of subjects suffering from asthmatic symptoms decreases significantly (r=0.86, P=0.001). Conclusion Chemical agents may increase the prevalence of asthma in the offspring of CWV. PMID:23056804

  12. Studies on residue-free decontaminants for chemical warfare agents.

    Science.gov (United States)

    Wagner, George W

    2015-03-17

    Residue-free decontaminants based on hydrogen peroxide, which decomposes to water and oxygen in the environment, are examined as decontaminants for chemical warfare agents (CWA). For the apparent special case of CWA on concrete, H2O2 alone, without any additives, effectively decontaminates S-2-(diisopropylamino)ethyl O-ethyl methylphosphonothioate (VX), pinacolyl methylphosphorofluoridate (GD), and bis(2-choroethyl) sulfide (HD) in a process thought to involve H2O2 activation by surface-bound carbonates/bicarbonates (known H2O2 activators for CWA decontamination). A plethora of products are formed during the H2O2 decontamination of HD on concrete, and these are characterized by comparison to synthesized authentic compounds. As a potential residue-free decontaminant for surfaces other than concrete (or those lacking adsorbed carbonate/bicarbonate) H2O2 activation for CWA decontamination is feasible using residue-free NH3 and CO2 as demonstrated by reaction studies for VX, GD, and HD in homogeneous solution. Although H2O2/NH3/CO2 ("HPAC") decontaminants are active for CWA decontamination in solution, they require testing on actual surfaces of interest to assess their true efficacy for surface decontamination.

  13. NATO Advanced Research Workshop on Fluorescence and other Optical Properties of Biological Particles for Biological Warfare Agent Sensors

    CERN Document Server

    Hoekstra, Alfons; Videen, Gorden; Optics of Biological Particles

    2007-01-01

    This book covers the optics of single biological particles, both theory and experiment, with emphasis on Elastic Light Scattering and Fluorescence. It deals with the optics of bacteria (bio-aerosols), marine particles (selected phytoplankton communities) and red and white blood cells. Moreover, there are dedicated chapters on a general theory for scattering by a cell, and modelling and simulation of scattering by inhomogeneous biological cells. Finally, one chapter is dedicated to astro-biological signatures, discussing the possibilities for detecting non-terrestrial biological material. The volume has up-to-date discussions on new experimental and numerical techniques, and many examples of applications of these techniques in real-life systems, as used to detect and characterize e.g. biological warfare agents or human blood cells.

  14. Wearable Atmospheric Pressure Plasma Fabrics Produced by Knitting Flexible Wire Electrodes for the Decontamination of Chemical Warfare Agents

    Science.gov (United States)

    Jung, Heesoo; Seo, Jin Ah; Choi, Seungki

    2017-01-01

    One of the key reasons for the limited use of atmospheric pressure plasma (APP) is its inability to treat non-flat, three-dimensional (3D) surface structures, such as electronic devices and the human body, because of the rigid electrode structure required. In this study, a new APP system design—wearable APP (WAPP)—that utilizes a knitting technique to assemble flexible co-axial wire electrodes into a large-area plasma fabric is presented. The WAPP device operates in ambient air with a fully enclosed power electrode and grounded outer electrode. The plasma fabric is flexible and lightweight, and it can be scaled up for larger areas, making it attractive for wearable APP applications. Here, we report the various plasma properties of the WAPP device and successful test results showing the decontamination of toxic chemical warfare agents, namely, mustard (HD), soman (GD), and nerve (VX) agents.

  15. Impact of size and distribution of installed PV power in E-W direction on the level in which selected consumers’ energy needs were met

    OpenAIRE

    Necka Krzysztof; Latala Hubert; Kurpaska Sławomir; Knaga Jarosław; Karbowniczakʼ Anna

    2018-01-01

    The aim of the study was to analyse the energy needs of selected consumers and to select the PV installed capacity in the east and west panels orientation (E-W). The analysis was carried out for two variants. The first concerned the impact of the installation power of a PV source on the contracted power in its symmetric east and west position. The second variant was the result of previous observations and studies of the authors of this paper. Thus, in this variant, the unbalanced power of PV ...

  16. The United States and biological warfare: secrets from the early cold war and Korea.

    Science.gov (United States)

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  17. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    Science.gov (United States)

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  18. Development of Calcomp compatible interface library 'piflib' on X Window System

    International Nuclear Information System (INIS)

    Tanabe, Hidenobu; Yokokawa, Mitsuo; Onuma, Yoshio.

    1993-05-01

    Graphics processing at JAERI mainly has been executed on mainframe computers with Calcomp compatible graphics libraries. With spread of engineering workstations (EWS), it is important that those enormous graphics softwares be able to be carried out on EWS. The Calcomp compatible interface library 'piflib' has been developed on the X Window System, which is the most popular window environments on EWS. In this report, specifications of the library 'piflib' and its usages are presented. The cooperative processing with mainframe computers is also described. (author)

  19. Skeletal evidence for Inca warfare from the Cuzco region of Peru.

    Science.gov (United States)

    Andrushko, Valerie A; Torres, Elva C

    2011-11-01

    This article addresses the bioarchaeological evidence for Inca warfare through an analysis of 454 adult skeletons from 11 sites in the Inca capital region of Cuzco, Peru. These 11 sites span almost 1000 years (AD 600-1532), which allows for a comparison of the evidence for warfare before the Inca came to power (Middle Horizon AD 600-1000), during the time of Inca ascendency in the Late Intermediate Period (AD 1000-1400), and after the Inca came to power and expanded throughout the Cuzco region and beyond (Inca Imperial Period, AD 1400-1532). The results indicate that 100 of 454 adults (22.0%) showed evidence of cranial trauma. Of these, 23 individuals had major cranial injuries suggestive of warfare, consisting of large, complete, and/or perimortem fractures. There was scant evidence for major injuries during the Middle Horizon (2.8%, 1/36) and Late Intermediate Period (2.5%, 5/199), suggesting that warfare was not prevalent in the Cuzco region before and during the Inca rise to power. Only in the Inca Imperial Period was there a significant rise in major injuries suggestive of warfare (7.8%, 17/219). Despite the significant increase in Inca times, the evidence for major cranial injuries was only sporadically distributed at Cuzco periphery sites and was entirely absent at Cuzco core sites. These findings suggest that while the Inca used warfare as a mechanism for expansion in the Cuzco region, it was only one part of a complex expansion strategy that included economic, political, and ideological means to gain and maintain control. Copyright © 2011 Wiley-Liss, Inc.

  20. Mechanism of injury and microbiological flora of the geographical location are essential for the prognosis in soldiers with serious warfare injuries

    DEFF Research Database (Denmark)

    Wetterslev, Mik; Rose-Larsen, Katrine; Hansen-Schwartz, Jacob

    2013-01-01

    patients survived to discharge and two patients died. DISCUSSION: Explosion was the most frequent cause of injury in all cases and caused damage to several organ systems. Infections after combat injuries are a major problem because of the different microbiological profile. CONCLUSION: The use of explosives...... has been and remains a substantial part of warfare, and this review has showed us that the knowledge of the mechanism of injury is indeed essential, and that intelligence on the microbiological flora of the geographical location of the conflict is essential. FUNDING: not relevant. TRIAL REGISTRATION...

  1. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Potok, Thomas E [ORNL

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are not the necessary requirements for insurgents to efficiently attain their objective.

  2. Tissue-based water quality biosensors for detecting chemical warfare agents

    Science.gov (United States)

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  3. Secure Automated Microgrid Energy System

    Science.gov (United States)

    2016-12-01

    O&M Operations and Maintenance PSO Power System Optimization PV Photovoltaic RAID Redundant Array of Independent Disks RBAC Role...elements of the initial study and operational power system model (feeder size , protective devices, generation sources, controllable loads, transformers...EW-201340) Secure Automated Microgrid Energy System December 2016 This document has been cleared for public release; Distribution Statement A

  4. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  5. Enhanced toxic cloud knockdown spray system for decontamination applications

    Science.gov (United States)

    Betty, Rita G [Rio Rancho, NM; Tucker, Mark D [Albuquerque, NM; Brockmann, John E [Albuquerque, NM; Lucero, Daniel A [Albuquerque, NM; Levin, Bruce L [Tijeras, NM; Leonard, Jonathan [Albuquerque, NM

    2011-09-06

    Methods and systems for knockdown and neutralization of toxic clouds of aerosolized chemical or biological warfare (CBW) agents and toxic industrial chemicals using a non-toxic, non-corrosive aqueous decontamination formulation.

  6. (Review of) Reno, William. 2011. Warfare in Independent Africa. Cambridge: Cambridge University Press

    DEFF Research Database (Denmark)

    Hagmann, Tobias

    2013-01-01

    Warfare in Independent Africa is Reno’s bold attempt to analyze the modern history of African insurgencies. The book tackles this task through the prism of five generations of rebel, which left their mark on the continent; anti-colonial rebels, majority rule rebels, reform rebels, warlord rebels ...... and parochial rebels....

  7. A Communitarian Critique of the Warfare State: Implications for the Twenty-First-Century University

    Science.gov (United States)

    Theobald, Paul; Knotwell, Jim

    2007-01-01

    This article contends that the relatively recent academic movement known as communitarianism can serve as a policy guide that could work catalytically on American cultural development of the sort that would loosen the tight military-industrial connection and in so doing aid the dismantling of the "warfare state." After chronicling the development…

  8. An Empirical Examination of the Warfare Metaphor with Respect to Pre-Service Elementary Teachers

    Science.gov (United States)

    Cobern, William W.; Loving, Cathleen C.; Davis, Edward B.; Terpstra, Jeff

    2013-01-01

    Since its origination in the late nineteenth century, the warfare metaphor has been used to characterize the relationship between science and religion, especially orthodox Christianity. Though thoroughly discredited by historians of science, the ideological descendants of Thomas Huxley, who spoke of science in quasi-religious terms, have kept the…

  9. The influence of the Ratel infantry fighting vehicle on mobile warfare ...

    African Journals Online (AJOL)

    This article traces the story of how the author and a number of daring young commanders and soldiers had cast aside military textbooks in developing their own military doctrine for mobile warfare, South African style. It is clear that the Ratel infantry fighting vehicle had wielded huge influence on the development and ...

  10. Above the Influence: The Strategic Effects of Airpower in Irregular Warfare

    Science.gov (United States)

    2010-06-01

    INDOCHINA. . . . . . . . . . . . . . . . . . . . . 105 APPENDIX B: MAP OF LAOS . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 APPENDIX...perspectives. These perspectives involve the use of airpower in North Vietnam, South Vietnam, and Laos . The overarching political endstate or...Nagl, ―Principles, Imperatives, and Paradoxes of Counterinsurgency,‖ 50; Mao Tse -Tung, Problems of Strategy in Guerrilla Warfare, 215-216; Gray

  11. Emerging Threat to America: Non-State Entities Fighting Fourth Generation Warfare in Mexico

    Science.gov (United States)

    2010-09-01

    warfare in Juarez, Mexico contrasts with the “peaceful” cities of Ciudad Acuña and Piedras Negras controlled by the Zetas who demonstrate 4GW tactics...Vulliamy, 2009). Within the cities of Acuna and Piedra Negras where one Pack Virus (the Zetas) has effective control of these limited geographic

  12. Laboratory analysis of chemical warfare agents, adducts, and metabolites in biomedial samples

    NARCIS (Netherlands)

    Schans, M.J. van der

    2015-01-01

    Chemical warfare agents (CWAs) are the most toxic compounds ever produced. To develop medical countermeasures against the effects of these agents, analytical procedures to analyze these agents in biological matrices are essential for a better understanding of the toxicological process. The need for

  13. On modeling of the evaporation of chemical warfare agents on the ground

    NARCIS (Netherlands)

    Westin, S.N.; Winter, S.; Karlsson, E.; Hin, A.; Oeseburg, F.

    1998-01-01

    A model for evaporation of chemical warfare agents on the ground has been developed. The process of evaporation is described in three steps: (1) the immediate drop enlargement due to impact momentum is modeled using an empirical correlation from technical literature; (2) further enlargement caused

  14. Diagnosis of exposure to chemical warfare agents: An essential tool to counteract chemical terrorism

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Bikker, F.J.; Benschop, H.P.

    2009-01-01

    Methods to analyze chemical warfare agents (CW-agents) and their decomposition products in environmental samples were developed over the last decades. In contrast herewith, procedures for analysis in biological samples have only recently been developed. Retrospective detection of exposure to

  15. Mass spectrometry in identification of ecotoxicants including chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Lebedev, Albert T.

    2005-01-01

    Mass spectrometry is a unique tool to detect and identify trace levels of organic and bioorganic compounds as well as microorganisms in the environment. The range of potential chemical warfare (CW) and biological warfare (BW) agents is very broad. An important advantage of mass spectrometry over other techniques involves potential for full spectrum detection of chemical and biological agents including mid-spectrum materials (i.e. bioactive peptides, toxins, etc.) for which biological approaches are inadequate. Being very fast (seconds and minutes), extremely sensitive (zeptomoles 10 -21 ), and informative (detailed qualitative and quantitative composition of mixtures containing hundreds of chemicals), mass spectrometry is a principal analytical tool at the sites of destruction of CW. Due to its unique features, mass spectrometry is applied not only for the detection of CW agents, but for the analysis of products of metabolism and degradation of these agents in organisms or environment as well. The present paper deals with some examples of successful application of mass spectrometry for the analyses of ecotoxicants, chemical warfare agents, explosives, and microorganisms including biology warfare agents

  16. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    Science.gov (United States)

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  17. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    Science.gov (United States)

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  18. Zirconium doped nano-dispersed oxides of Fe, Al and Zn for destruction of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Houšková, Vendula; Bakardjieva, Snejana; Murafa, Nataliya; Maříková, Monika; Opluštil, F.; Němec, T.

    2010-01-01

    Roč. 61, č. 11 (2010), s. 1080-1088 ISSN 1044-5803 Institutional research plan: CEZ:AV0Z40320502 Keywords : warfare agents * nano-dispersed oxides * homogeneous hydrolysis Subject RIV: CA - Inorganic Chemistry Impact factor: 1.496, year: 2010

  19. Ge 4+ doped TiO 2 for stoichiometric degradation of warfare agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Matys Grygar, Tomáš; Opluštil, F.; Němec, T.

    2012-01-01

    Roč. 227, AUGUST (2012), s. 62-67 ISSN 0304-3894 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : germanium * homogeneous hydrolysis * titania * urea * warfare agent degradation Subject RIV: CA - Inorganic Chemistry Impact factor: 3.925, year: 2012

  20. Analysis of the Threat of Genetically Modified Organisms for Biological Warfare

    Science.gov (United States)

    2011-05-01

    biological warfare. The primary focus of the framework are those aspects of the technology directly affecting humans by inducing virulent infectious disease...applications. Simple organisms such as fruit flies have been used to study the effects of genetic changes across generations. Transgenic mice are...Analysis * Multi-cell pathogens * Toxins (Chemical products of living cells.) * Fungi (Robust organism; no genetic manipulation needed

  1. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    Science.gov (United States)

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  2. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    International Nuclear Information System (INIS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-01-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented

  3. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    Science.gov (United States)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  4. Evolution of war and cyber attacks in the concept of conventional warfare

    Directory of Open Access Journals (Sweden)

    Huseyin Kuru

    2018-01-01

    Full Text Available Humanity have witnessed many confrontations of states whose interests challenge at some points and their struggle to neutralize problems in battlefield. While war was perceived as a way of eliminating deadlocks for some parties, some considered it as one of the international policy materials. The definition and content of conventional warfare have been subject to change for centuries, while the new weapons and technologies have been developed by human beings that it has brought constant change in the law of war and at the same time more lethal and devastating consequences. The struggle for superiority in international relations played an impulsive role in the development of weapons used in the battlefield. Countries have used their labor and financial resources to improve their military skills. Beginning with stones and sticks in the battlefield, this struggle has reached the point of using the next generation satellite controlled unmanned and armed aircrafts and having nuclear weapons has become more deterrent than using them. The struggle between strong countries and the limited countries in terms of technology and armed groups that do not have enough technology and skills completely changed the definition of conventional warfare. This fight has led Asymmetric warfare born which can turn commercial airline planes full of innocent people into a weapon like September-11 attacks. In this study, the historical development and the change in the content of the warfare were briefly explained and then cyber-attacks in the concept of the fourth generation warfare was analyzed taking into account of prominent attacks.

  5. Dynamics of positional warfare malaria: Finland and Korea compared.

    Science.gov (United States)

    Huldén, Lena; Huldén, Larry

    2008-09-08

    A sudden outbreak of vivax malaria among Finnish troops in SE-Finland and along the front line in Hanko peninsula in the southwest occurred in 1941 during World War II. The common explanation has been an invasion of infective Anopheles mosquitoes from the Russian troops crossing the front line between Finland and Soviet Union. A revised explanation is presented based on recent studies of Finnish malaria. The exact start of the epidemic and the phenology of malaria cases among the Finnish soldiers were reanalyzed. The results were compared with the declining malaria in Finland. A comparison with a corresponding situation starting in the 1990's in Korea was performed. The malaria cases occurred in July in 1941 when it was by far too early for infective mosquitoes to be present. The first Anopheles mosquitoes hatched at about the same time as the first malaria cases were observed among the Finnish soldiers. It takes about 3-6 weeks for the completion of the sporogony in Finland. The new explanation is that soldiers in war conditions were suddenly exposed to uninfected mosquitoes and those who still were carriers of hypnozoites developed relapses triggered by these mosquitoes. It is estimated that about 0.5% of the Finnish population still were carriers of hypnozoites in the 1940's. A corresponding outbreak of vivax malaria in Korea in the 1990's is similarly interpreted as relapses from activated hypnozoites among Korean soldiers. The significance of the mosquito induced relapses is emphasized by two benefits for the Plasmodium. There is a synchronous increase of gametocytes when new mosquitoes emerge. It also enables meiotic recombination between different strains of the Plasmodium. The malaria peak during the positional warfare in the 1940's was a short outbreak during the last phase of declining indigenous malaria in Finland. The activation of hypnozoites among a large number of soldiers and subsequent medication contributed to diminishing the reservoir of malaria

  6. Methods of Advanced Wound Management for Care of Combined Traumatic and Chemical Warfare Injuries

    Science.gov (United States)

    Graham, John S.; Gerlach, Travis W.; Logan, Thomas P.; Bonar, James P.; Fugo, Richard J.; Lee, Robyn B.; Coatsworth, Matthew A.

    2008-01-01

    Objective: Chemical warfare agents are potential threats to military personnel and civilians. The potential for associated traumatic injuries is significant. Damage control surgery could expose medical personnel to agents contaminating the wounds. The objectives of this study were to demonstrate efficacy of surgical decontamination and assess exposure risk to attending personnel. Methods: Weanling pigs were randomly assigned to 2 of 4 debridement tools (scalpel, Bovie® knife, Fugo Blade®, and Versajet™ Hydrosurgery System). Penetrating traumatic wounds were created over the shoulder and thigh and then exposed to liquid sulfur mustard (HD) for 60 minutes. Excisional debridement of the injuries was performed while vapors over each site were collected. Gas chromatography was used to measure HD in samples of collected vapors. Unbound HD was quantified in presurgical wound swabs, excised tissues, and peripheral tissue biopsies following solvent extraction. Results: Excisional debridement produced agent-free wound beds (surgical decontamination). A significant amount of HD vapor was detected above the surgical fields with each tool. Apart from the Versajet™ producing significantly lower levels of HD detected over thigh wounds compared with those treated using the scalpel, there were no differences in the amount of agent detected among the tools. All measured levels significantly exceeded established safety limits. Vesicating levels of unbound HD were extracted from excised tissue. There was no measured lateral spreading of HD beyond the surgical margins. Conclusions: There is significant occupational exposure risk to HD during surgical procedures designed to stabilize agent-contaminated wounds. If appropriate protective measures are taken, surgical decontamination is both effective and safe. PMID:18716652

  7. Advances in toxicology and medical treatment of chemical warfare nerve agents

    Science.gov (United States)

    2012-01-01

    Organophosphorous (OP) Nerve agents (NAs) are known as the deadliest chemical warfare agents. They are divided into two classes of G and V agents. Most of them are liquid at room temperature. NAs chemical structures and mechanisms of actions are similar to OP pesticides, but their toxicities are higher than these compounds. The main mechanism of action is irreversible inhibition of Acetyl Choline Esterase (AChE) resulting in accumulation of toxic levels of acetylcholine (ACh) at the synaptic junctions and thus induces muscarinic and nicotinic receptors stimulation. However, other mechanisms have recently been described. Central nervous system (CNS) depression particularly on respiratory and vasomotor centers may induce respiratory failure and cardiac arrest. Intermediate syndrome after NAs exposure is less common than OP pesticides poisoning. There are four approaches to detect exposure to NAs in biological samples: (I) AChE activity measurement, (II) Determination of hydrolysis products in plasma and urine, (III) Fluoride reactivation of phosphylated binding sites and (IV) Mass spectrometric determination of cholinesterase adducts. The clinical manifestations are similar to OP pesticides poisoning, but with more severity and fatalities. The management should be started as soon as possible. The victims should immediately be removed from the field and treatment is commenced with auto-injector antidotes (atropine and oximes) such as MARK I kit. A 0.5% hypochlorite solution as well as novel products like M291 Resin kit, G117H and Phosphotriesterase isolated from soil bacterias, are now available for decontamination of NAs. Atropine and oximes are the well known antidotes that should be infused as clinically indicated. However, some new adjuvant and additional treatment such as magnesium sulfate, sodium bicarbonate, gacyclidine, benactyzine, tezampanel, hemoperfusion, antioxidants and bioscavengers have recently been used for OP NAs poisoning. PMID:23351280

  8. Locus-specific microemulsion catalysts for sulfur mustard (HD) chemical warfare agent decontamination.

    Science.gov (United States)

    Fallis, Ian A; Griffiths, Peter C; Cosgrove, Terence; Dreiss, Cecile A; Govan, Norman; Heenan, Richard K; Holden, Ian; Jenkins, Robert L; Mitchell, Stephen J; Notman, Stuart; Platts, Jamie A; Riches, James; Tatchell, Thomas

    2009-07-22

    The rates of catalytic oxidative decontamination of the chemical warfare agent (CWA) sulfur mustard (HD, bis(2-chlororethyl) sulfide) and a range (chloroethyl) sulfide simulants of variable lipophilicity have been examined using a hydrogen peroxide-based microemulsion system. SANS (small-angle neutron scattering), SAXS (small-angle X-ray scattering), PGSE-NMR (pulsed-gradient spin-echo NMR), fluorescence quenching, and electrospray mass spectroscopy (ESI-MS) were implemented to examine the distribution of HD, its simulants, and their oxidation/hydrolysis products in a model oil-in-water microemulsion. These measurements not only present a means of interpreting decontamination rates but also a rationale for the design of oxidation catalysts for these toxic materials. Here we show that by localizing manganese-Schiff base catalysts at the oil droplet-water interface or within the droplet core, a range of (chloroethyl) sulfides, including HD, spanning some 7 orders of octanol-water partition coefficient (K(ow)), may be oxidized with equal efficacy using dilute (5 wt. % of aqueous phase) hydrogen peroxide as a noncorrosive, environmentally benign oxidant (e.g., t(1/2) (HD) approximately 18 s, (2-chloroethyl phenyl sulfide, C(6)H(5)SCH(2)CH(2)Cl) approximately 15 s, (thiodiglycol, S(CH(2)CH(2)OH)(2)) approximately 19 s {20 degrees C}). Our observations demonstrate that by programming catalyst lipophilicity to colocalize catalyst and substrate, the inherent compartmentalization of the microemulsion can be exploited to achieve enhanced rates of reaction or to exert control over product selectivity. A combination of SANS, ESI-MS and fluorescence quenching measurements indicate that the enhanced catalytic activity is due to the locus of the catalyst and not a result of partial hydrolysis of the substrate.

  9. Binding affinity and decontamination of dermal decontamination gel to model chemical warfare agent simulants.

    Science.gov (United States)

    Cao, Yachao; Elmahdy, Akram; Zhu, Hanjiang; Hui, Xiaoying; Maibach, Howard

    2018-05-01

    Six chemical warfare agent simulants (trimethyl phosphate, dimethyl adipate, 2-chloroethyl methyl sulfide, diethyl adipate, chloroethyl phenyl sulfide and diethyl sebacate) were studied in in vitro human skin to explore relationship between dermal penetration/absorption and the mechanisms of simulant partitioning between stratum corneum (SC) and water as well as between dermal decontamination gel (DDGel) and water. Both binding affinity to and decontamination of simulants using DDGel were studied. Partition coefficients of six simulants between SC and water (Log P SC/w ) and between DDGel and water (Log P DDGel/w ) were determined. Results showed that DDGel has a similar or higher binding affinity to each simulant compared to SC. The relationship between Log P octanol/water and Log P SC/w as well as between Log P octanol/water and Log P DDGel/w demonstrated that partition coefficient of simulants correlated to their lipophilicity or hydrophilicity. Decontamination efficiency results with DDGel for these simulants were consistent with binding affinity results. Amounts of percentage dose of chemicals in DDGel of trimethyl phosphate, dimethyl adipate, 2-chloroethyl methyl sulfide, diethyl adipate, chloroethyl phenyl sulfide and diethyl sebacate were determined to be 61.15, 85.67, 75.91, 53.53, 89.89 and 76.58, with corresponding amounts absorbed in skin of 0.96, 0.65, 1.68, 0.72, 0.57 and 1.38, respectively. In vitro skin decontamination experiments coupled with a dermal absorption study demonstrated that DDGel can efficiently remove chemicals from skin surface, back-extract from the SC, and significantly reduced chemical penetration into skin or systemic absorption for all six simulants tested. Therefore, DDGel offers a great potential as a NextGen skin Decon platform technology for both military and civilian use. Copyright © 2018 John Wiley & Sons, Ltd.

  10. Cost Effectiveness Analysis of the "Sea to SWOS" Training Initiative on the Surface Warfare Officer Qualification Process

    National Research Council Canada - National Science Library

    Gavino, Christopher

    2002-01-01

    ... (combat effectiveness) while the quantitative analysis shows additional costs to the Navy Personnel Command and savings in training costs for the Naval Education and Training Command and OPNAV N76, the Surface Warfare Resource Sponsor...

  11. An Assessment of the Effectiveness of Computer-based Training for Newly Commissioned Surface Warfare Division Officers

    National Research Council Canada - National Science Library

    Bowman, William R; Crawford, Alice M; Mehay, Stephen; Stoker, Carol; Paynter, Robert

    2008-01-01

    ...) on-board an officer's ship. The study relied on a variety of analytical techniques, including a literature review of CBT and OJT training, interviews and focus groups with junior and senior surface warfare officers...

  12. Special Forces and the Art of Influence: A Grassroots Approach to Psychological Operations in an Unconventional Warfare Environment

    National Research Council Canada - National Science Library

    Thomas, II, Joel W

    2006-01-01

    .... The research was based on several premises: (1) the strategic utility of Special Forces (SF) lies in its ability to influence a target audience in an unconventional warfare (UW) environment; (2...

  13. Chromatography and mass spectrometry of chemical warfare agents, toxins and related compounds: state of the art and future prospects

    NARCIS (Netherlands)

    Kientz, C.E.

    1998-01-01

    Methods for the identification of chemical warfare agents, toxins, bioregulators and related products are frequently reported in literature. These methods are often based on instrumental analysis using chromatography (gas and liquid) and mass spectrometry. Here, these instrumental techniques are

  14. The Need for a USAF Information Warfare(IW) Strategy for Military Operations Other Than War (MOOTW)

    National Research Council Canada - National Science Library

    Butler, Bradley

    1996-01-01

    .... Two areas having an impact on the answer to this question but not normally examined together are information warfare and the broad area of military operations short of large scale conventional combat...

  15. Analysis on Joint Operational Capability in the Condition of Information and Psychological Warfares%信息心理对抗条件下联合作战能力分析

    Institute of Scientific and Technical Information of China (English)

    闫家传; 秦伟; 陈璐; 张仁友

    2011-01-01

    In the information age, operational capabilities of troops include firepower, defense power, maintainance power, information power and many other factors, and the warfares between the opponents represent force confrontation, psychological confrontation, information warfares and many other complex forms. Based on the quantity analysis of joint operational capability, mutual functional mechanism of information, psychology and combat power is analyzed, and three feedback loops of operational confrontation, information warfares and psychological warfares are educed, and then system dynamical models are established, and effects on joint operational capability by information, psychology and other factors are deduced in the prospect of quantity.%信息化条件下作战,部队的作战能力表现为包括火力、防护力、保障力、信息力等多种因素的联合作战能力,作战双方的对抗表现为兵力对抗,心理对抗,信息对抗等多种复杂的形式.在联合作战能力量化分析基础上,分析了信息、心理和战斗力相互作用机制,得出了战斗对抗、信息对抗、心理对抗3个反馈回路环,并据此建立了系统动力学模型,从定量的角度分析了信息、心理等因素对联合作战能力的影响.

  16. EWS/FLI1 regulates EYA3 in Ewing's sarcoma via modulation of microRNA-708, resulting in increased cell survival and chemoresistance

    Science.gov (United States)

    Robin, Tyler P; Smith, Anna; McKinsey, Erin; Reaves, Lisa; Jedlicka, Paul; Ford, Heide L.

    2012-01-01

    Ewing's sarcoma is an aggressive pediatric cancer of the bone and soft tissue, in which patients whose tumors have a poor histological response to initial chemotherapy have a poor overall prognosis. Therefore, it is important to identify molecules involved in resistance to chemotherapy. Herein, we demonstrate that the DNA-repair protein and transcriptional cofactor, EYA3, is highly expressed in Ewing's sarcoma tumor samples and cell lines compared with mesenchymal stem cells, the presumed cell of origin of Ewing's sarcoma, and that it is regulated by the EWS/FLI1 fusion protein transcription factor. We further demonstrate that EWS/FLI1 mediates upregulation of EYA3 via repression of miR-708, a microRNA that targets the EYA3 3′UTR, rather than by binding the EYA3 promoter directly. Importantly, we demonstrate that high levels of EYA3 significantly correlate with low levels of miR-708 in Ewing's sarcoma samples, suggesting that this miR-mediated mechanism of EYA3 regulation holds true in human cancers. Because EYA proteins are important for cell survival during development, we examine, and demonstrate, that loss of EYA3 decreases survival of Ewing's sarcoma cells. Most importantly, knockdown of EYA3 in Ewing's sarcoma cells leads to sensitization to DNA-damaging chemotherapeutics used in the treatment of Ewing's sarcoma, and as expected, after chemotherapeutic treatment, EYA3 knockdown cells repair DNA damage less effectively than their control counterparts. These studies identify EYA3 as a novel mediator of chemoresistance in Ewing's sarcoma and define the molecular mechanisms of both EYA3 overexpression and of EYA3-mediated chemoresistance. PMID:22723308

  17. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    Science.gov (United States)

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  18. Application of Cyclostationary Signal Selectivity to the Carry-On Multi-Platform GPS Assisted Time Difference of Arrival System

    National Research Council Canada - National Science Library

    Streight, David

    1997-01-01

    .... The Applied Research Lab at the University of Texas at Austin (ARL:UT) has developed a prototype TDOA system, the Carry-on Multi-platform GPS Assisted Time Difference of Arrival System for the Naval Information Warfare Activity...

  19. Tuning the Morphology and Activity of Electrospun Polystyrene/UiO-66-NH2 Metal-Organic Framework Composites to Enhance Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Epps, Thomas H

    2017-09-20

    This work investigates the processing-structure-activity relationships that ultimately facilitate the enhanced performance of UiO-66-NH 2 metal-organic frameworks (MOFs) in electrospun polystyrene (PS) fibers for chemical warfare agent detoxification. Key electrospinning processing parameters including solvent type (dimethylformamide [DMF]) vs DMF/tetrahydrofuran [THF]), PS weight fraction in solution, and MOF weight fraction relative to PS were varied to optimize MOF incorporation into the fibers and ultimately improve composite performance. It was found that composites spun from pure DMF generally resulted in MOF crystal deposition on the surface of the fibers, while composites spun from DMF/THF typically led to MOF crystal deposition within the fibers. For cases in which the MOF was incorporated on the periphery of the fibers, the composites generally demonstrated better gas uptake (e.g., nitrogen, chlorine) because of enhanced access to the MOF pores. Additionally, increasing both the polymer and MOF weight percentages in the electrospun solutions resulted in larger diameter fibers, with polymer concentration having a more pronounced effect on fiber size; however, these larger fibers were generally less efficient at gas separations. Overall, exploring the electrospinning parameter space resulted in composites that outperformed previously reported materials for the detoxification of the chemical warfare agent, soman. The data and strategies herein thus provide guiding principles applicable to the design of future systems for protection and separations as well as a wide range of environmental remediation applications.

  20. A Comparison of Predictive Thermo and Water Solvation Property Prediction Tools and Experimental Data for Selected Traditional Chemical Warfare Agents and Simulants II: COSMO RS and COSMOTherm

    Science.gov (United States)

    2017-04-01

    SELECTED TRADITIONAL CHEMICAL WARFARE AGENTS AND SIMULANTS II: COSMO-RS AND COSMOTHERM ECBC-TR-1454 Jerry B. Cabalo RESEARCH AND TECHNOLOGY...Traditional Chemical Warfare Agents and Simulants II: COSMO-RS and COSMOTherm 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER CB10115...in the ADF 2012 suite of programs for the physico- chemical properties of a set of traditional chemical warfare agents and selected simulants. To

  1. User interface prototype for geospatial early warning systems - a tsunami showcase

    Science.gov (United States)

    Hammitzsch, M.; Lendholt, M.; Esbrí, M. Á.

    2012-03-01

    The command and control unit's graphical user interface (GUI) is a central part of early warning systems (EWS) for man-made and natural hazards. The GUI combines and concentrates the relevant information of the system and offers it to human operators. It has to support operators successfully performing their tasks in complex workflows. Most notably in critical situations when operators make important decisions in a limited amount of time, the command and control unit's GUI has to work reliably and stably, providing the relevant information and functionality with the required quality and in time. The design of the GUI application is essential in the development of any EWS to manage hazards effectively. The design and development of such GUI is performed repeatedly for each EWS by various software architects and developers. Implementations differ based on their application in different domains. But similarities designing and equal approaches implementing GUIs of EWS are not quite harmonized enough with related activities and do not exploit possible synergy effects. Thus, the GUI's implementation of an EWS for tsunamis is successively introduced, providing a generic approach to be applied in each EWS for man-made and natural hazards.

  2. User interface prototype for geospatial early warning systems – a tsunami showcase

    Directory of Open Access Journals (Sweden)

    M. Hammitzsch

    2012-03-01

    Full Text Available The command and control unit's graphical user interface (GUI is a central part of early warning systems (EWS for man-made and natural hazards. The GUI combines and concentrates the relevant information of the system and offers it to human operators. It has to support operators successfully performing their tasks in complex workflows. Most notably in critical situations when operators make important decisions in a limited amount of time, the command and control unit's GUI has to work reliably and stably, providing the relevant information and functionality with the required quality and in time.

    The design of the GUI application is essential in the development of any EWS to manage hazards effectively. The design and development of such GUI is performed repeatedly for each EWS by various software architects and developers. Implementations differ based on their application in different domains. But similarities designing and equal approaches implementing GUIs of EWS are not quite harmonized enough with related activities and do not exploit possible synergy effects. Thus, the GUI's implementation of an EWS for tsunamis is successively introduced, providing a generic approach to be applied in each EWS for man-made and natural hazards.

  3. Applicability of a septic tank/engineered wetland coupled system in the treatment and recycling of wastewater from a small community.

    Science.gov (United States)

    Mbuligwe, Stephen E

    2005-01-01

    A septic tank (ST)/engineered wetland coupled system used to treat and recycle wastewater from a small community in Dar es Salaam, Tanzania was monitored to assess its performance. The engineered wetland system (EWS) had two parallel units each with two serial beds packed with different sizes of media and vegetated differently. The larger-sized medium bed was upstream and was planted with Phragmites (reeds) and the smaller-sized medium bed was downstream and was planted with Typha (cattails). The ST/EWS coupled system was able to remove ammonia by an average of 60%, nitrate by 71%, sulfate by 55%, chemical oxygen demand by 91%, and fecal coliform as well as total coliform by almost 100%. The effluent from the ST/EWS coupled system is used for irrigation. Notably, users of the recycled irrigation water do not harbor any negative feelings about it. This study demonstrates that it is possible to treat and recycle domestic wastewater using ST/ EWS coupled systems. The study also brings attention to the fact that an ST/EWS coupled system has operation and maintenance (O&M) needs that must be fulfilled for its effectiveness and acceptability. These include removal of unwanted weeds, harvesting of wetland plants when the EWS becomes unappealingly bushy, and routine repair.

  4. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  5. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    Science.gov (United States)

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  6. Textile/metal-organic-framework composites as self-detoxifying filters for chemical-warfare agents.

    Science.gov (United States)

    López-Maya, Elena; Montoro, Carmen; Rodríguez-Albelo, L Marleny; Aznar Cervantes, Salvador D; Lozano-Pérez, A Abel; Cenís, José Luis; Barea, Elisa; Navarro, Jorge A R

    2015-06-01

    The current technology of air-filtration materials for protection against highly toxic chemicals, that is, chemical-warfare agents, is mainly based on the broad and effective adsorptive properties of hydrophobic activated carbons. However, adsorption does not prevent these materials from behaving as secondary emitters once they are contaminated. Thus, the development of efficient self-cleaning filters is of high interest. Herein, we report how we can take advantage of the improved phosphotriesterase catalytic activity of lithium alkoxide doped zirconium(IV) metal-organic framework (MOF) materials to develop advanced self-detoxifying adsorbents of chemical-warfare agents containing hydrolysable P-F, P-O, and C-Cl bonds. Moreover, we also show that it is possible to integrate these materials onto textiles, thereby combining air-permeation properties of the textiles with the self-detoxifying properties of the MOF material. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. Ultrasensitive detection of explosives and chemical warfare agents by low-pressure photoionization mass spectrometry.

    Science.gov (United States)

    Sun, Wanqi; Liang, Miao; Li, Zhen; Shu, Jinian; Yang, Bo; Xu, Ce; Zou, Yao

    2016-08-15

    On-spot monitoring of threat agents needs high sensitive instrument. In this study, a low-pressure photoionization mass spectrometer (LPPI-MS) was employed to detect trace amounts of vapor-phase explosives and chemical warfare agent mimetics under ambient conditions. Under 10-s detection time, the limits of detection of 2,4-dinitrotoluene, nitrotoluene, nitrobenzene, and dimethyl methyl phosphonate were 30, 0.5, 4, and 1 parts per trillion by volume, respectively. As compared to those obtained previously with PI mass spectrometric techniques, an improvement of 3-4 orders of magnitude was achieved. This study indicates that LPPI-MS will open new opportunities for the sensitive detection of explosives and chemical warfare agents. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Metal-organic frameworks for the removal of toxic industrial chemicals and chemical warfare agents.

    Science.gov (United States)

    Bobbitt, N Scott; Mendonca, Matthew L; Howarth, Ashlee J; Islamoglu, Timur; Hupp, Joseph T; Farha, Omar K; Snurr, Randall Q

    2017-06-06

    Owing to the vast diversity of linkers, nodes, and topologies, metal-organic frameworks can be tailored for specific tasks, such as chemical separations or catalysis. Accordingly, these materials have attracted significant interest for capture and/or detoxification of toxic industrial chemicals and chemical warfare agents. In this paper, we review recent experimental and computational work pertaining to the capture of several industrially-relevant toxic chemicals, including NH 3 , SO 2 , NO 2 , H 2 S, and some volatile organic compounds, with particular emphasis on the challenging issue of designing materials that selectively adsorb these chemicals in the presence of water. We also examine recent research on the capture and catalytic degradation of chemical warfare agents such as sarin and sulfur mustard using metal-organic frameworks.

  9. Basic features of the predictive tools of early warning systems for water-related natural hazards: examples for shallow landslides

    Directory of Open Access Journals (Sweden)

    R. Greco

    2017-12-01

    Full Text Available To manage natural risks, an increasing effort is being put in the development of early warning systems (EWS, namely, approaches facing catastrophic phenomena by timely forecasting and alarm spreading throughout exposed population. Research efforts aimed at the development and implementation of effective EWS should especially concern the definition and calibration of the interpretative model. This paper analyses the main features characterizing predictive models working in EWS by discussing their aims and their features in terms of model accuracy, evolutionary stage of the phenomenon at which the prediction is carried out and model architecture. Original classification criteria based on these features are developed throughout the paper and shown in their practical implementation through examples of flow-like landslides and earth flows, both of which are characterized by rapid evolution and quite representative of many applications of EWS.

  10. Basic features of the predictive tools of early warning systems for water-related natural hazards: examples for shallow landslides

    Science.gov (United States)

    Greco, Roberto; Pagano, Luca

    2017-12-01

    To manage natural risks, an increasing effort is being put in the development of early warning systems (EWS), namely, approaches facing catastrophic phenomena by timely forecasting and alarm spreading throughout exposed population. Research efforts aimed at the development and implementation of effective EWS should especially concern the definition and calibration of the interpretative model. This paper analyses the main features characterizing predictive models working in EWS by discussing their aims and their features in terms of model accuracy, evolutionary stage of the phenomenon at which the prediction is carried out and model architecture. Original classification criteria based on these features are developed throughout the paper and shown in their practical implementation through examples of flow-like landslides and earth flows, both of which are characterized by rapid evolution and quite representative of many applications of EWS.

  11. Assessing the Role of Surgical Strike Operations in Support of a Special Warfare Campaign

    Science.gov (United States)

    2017-06-09

    classic example of special warfare in action is the use of Special Forces soldiers to facilitate the Northern Alliance’s overthrow of the Taliban...Finally, the tempo of surgical strike operations must be taken into account. Renowned British counterinsurgent of the Boer War, Charles Callwell...December 2016, accessed 15 December 2016, http://edition.cnn.com/2010/ WORLD /asiapcf/10/09/ afghanistan.british.worker.death/index.html?hpt=T2. 43 camps

  12. The Alpini Effect: Why the US Army Should Train Units for Mountain Warfare

    Science.gov (United States)

    2014-05-22

    practical knowledge of the ground, and are very little adapted for mountain warfare.”20 The concept of infantry forces trained in mountain combat was...spearheaded the word of mouth campaign as he said, “It is easier to train a skier to be a soldier than to train a soldier to be a skier .” 30...author’s knowledge from professional experience 51 at Camp Carson from 1942-1944 and the US

  13. Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution

    Science.gov (United States)

    2017-05-25

    north.51 Washington urged Lee “to push for Philadelphia. The force I have with me is infinitely ...would attend the passage of the River by a march through Jersey,” he wrote, “I propose to invade Pennsylvania by sea , and from this arrangement...Hybrid Warfare Dilemmas in the Middle Colonies during the American Revolution A Monograph by MAJ William C. Murray II US Army

  14. Cognitive Depth and Hybrid Warfare: Exploring the Nature of Unique Time, Space, and Logic Frames

    Science.gov (United States)

    2017-05-25

    upon an earlier research monograph by William J. Nemeth at the Naval Post-Graduate School. In “Future War and Chechnya : A Case for Hybrid War,” Nemeth...8 William, Nemeth, Future War and Chechnya : A Case for Hybrid Warfare (Monterey: Naval Postgraduate School, June 2002) 2-3. 7...does.10 Yet, using Chechnya and the Chechnian Wars as an example of a hybrid society and hybrid wars, Nemeth’s view limits the concept in terms of

  15. The Equipment of Czech Firefighters for the Detection and Field Analyses of Chemical Warfare Agents

    Directory of Open Access Journals (Sweden)

    Jana Krykorkova

    2014-05-01

    Full Text Available This paper describes the requirements for the devices of detection, chemical reconnaissance and field analyses of chemical warfare agents (CWA and divides them into simple devices of detection, universal detectors, selective analyzers, multi-component analyzers and mobile laboratories. It also describes the devices of detection available within the Fire and Rescue Service of the Czech Republic (FRS CR and compares them with some prospective trends of further development.

  16. Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare

    Science.gov (United States)

    2012-06-01

    observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to

  17. Mass spectrometric study of selected precursors and degradation products of chemical warfare agents

    Czech Academy of Sciences Publication Activity Database

    Papoušková, B.; Bednář, P.; Fryšová, I.; Stýskala, J.; Hlaváč, J.; Barták, P.; Ulrichová, J.; Jirkovský, Jaromír; Lemr, K.

    2007-01-01

    Roč. 42, č. 12 (2007), s. 1550-1561 ISSN 1076-5174 Grant - others:The Organization for the Prohibition of Chemical Weapons (NL) L/ICA/ICB/84322/04 Institutional research plan: CEZ:AV0Z40400503 Source of funding: V - iné verejné zdroje Keywords : mass spectrometry * chemical warfare agent * high performance liquid chromatography * LC/MS Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.062, year: 2007

  18. From the Decomposition of Chemical Warfare Agents to the Decontamination of Cytostatics

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Šťastný, Martin; Janoš, P.; Mazanec, K.; Perez-Diaz, J. L.; Štenglová Netíková, I. R.

    2018-01-01

    Roč. 57, č. 6 (2018), s. 2114-2122 ISSN 0888-5885 EU Projects: European Commission(XE) 312804 - COUNTERFOG Grant - others:NATO(US) SPS984599 Program:Science for Peace and Security Institutional support: RVO:61388980 Keywords : Chemical warfare agents * Degradation * Metal oxide sorbents Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 2.843, year: 2016

  19. On Pecuniary Resiliency, Early Warning, and Market Imitation under Unrestricted Warfare

    Science.gov (United States)

    2015-09-17

    combatants, and civilians. The term was first used by American analysts in 1989 as Lind et . al . [37] to describe the return of warfare to a decentralized...Century. New York: Free, 1988 . Print. [22] Gould , Stephen, and Eldredge Niles. “Punctuated Equilibria: The Tempo and Mode of Evolution Reconsidered...able to take a punch.” He specifically argues that Al Qaeda and other terrorist organizations have limited resources to plan and carry out attacks and

  20. Bits or Shots in Combat? The Generalized Deitchman Model of Guerrilla Warfare

    OpenAIRE

    Kress, Moshe; MacKay, Niall J.

    2013-01-01

    Operations Research Letters, accepted. We generalize Deitchman's guerrilla warfare model to account for trade-off between intelligence ('bits') and firepower ('shots'). Intelligent targeting leads to aimed fire, absence of intelligence leads to unaimed fire, dependent on targets' density. We propose a new Lanchester-type model that mixes aimed with unaimed fire, the balance between these being determined by quality of information. We derive the model's conserved quantity, and use it ...