WorldWideScience

Sample records for weapon assignment algorithm

  1. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    evaluation and weapon assignment in maritime combat scenarios. Lloyd also acts as a liaison for the Weapons and Combat Systems Division with the ANZAC...positively identified a number of targets as threats, whether they are an enemy ship (i.e., specifically, its weapon launcher systems) or a directed

  2. applying reinforcement learning to the weapon assignment problem

    African Journals Online (AJOL)

    ismith

    Carlo (MC) control algorithm with exploring starts (MCES), and an off-policy ..... closest to the threat should fire (that weapon also had the highest probability to ... Monte Carlo ..... “Reinforcement learning: Theory, methods and application to.

  3. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    ... stands within the context of a ground based air defence system (GBADS) at the turn of the twenty first century. However, much of the contents of the paper maye generalized to military environments other than a GBADS one. Keywords: Threat evaluation, weapon assignment, decision support. ORiON Vol. 23 (2) 2007: pp.

  4. A multiobjective approach towards weapon assignment in a ground ...

    African Journals Online (AJOL)

    A typical ground-based air defence (GBAD) environment comprises defended assets on the ground which require protection from enemy aircraft entering the defended airspace. ... of computerised threat evaluation and weapon assignment (TEWA) decision support systems (DSSs) within the context of a GBAD system.

  5. An algorithm for ranking assignments using reoptimization

    DEFF Research Database (Denmark)

    Pedersen, Christian Roed; Nielsen, Lars Relund; Andersen, Kim Allan

    2008-01-01

    We consider the problem of ranking assignments according to cost in the classical linear assignment problem. An algorithm partitioning the set of possible assignments, as suggested by Murty, is presented where, for each partition, the optimal assignment is calculated using a new reoptimization...... technique. Computational results for the new algorithm are presented...

  6. A New Approach to Weapon-Target Assignment in Cooperative Air Combat

    Directory of Open Access Journals (Sweden)

    Yi-zhe Chang

    2017-01-01

    Full Text Available A new approach to solving weapon-target assignment (WTA problem is proposed in this paper. Firstly, relative superiority that lays the foundation for assignment is calculated based on the combat power energy of the fighters. Based on the relative superiority, WTA problem is formulated. Afterwards, a hybrid algorithm consisting of improved artificial fish swarm algorithm (AFSA and improved harmony search (HS is introduced and furthermore applied to solve the assignment formulation. Finally, the proposed approach is validated by eight representative benchmark functions and two concrete cooperative air combat examples. The results show that the approach proposed in this paper achieves good performances in solving WTA problem in cooperative air combat.

  7. Dynamic traffic assignment : genetic algorithms approach

    Science.gov (United States)

    1997-01-01

    Real-time route guidance is a promising approach to alleviating congestion on the nations highways. A dynamic traffic assignment model is central to the development of guidance strategies. The artificial intelligence technique of genetic algorithm...

  8. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  9. applying reinforcement learning to the weapon assignment problem

    African Journals Online (AJOL)

    ismith

    In his 2007 book, The Utility of Force – The Art of War in the Modern. World, General Rupert Smith ..... WA is a resource-management process during which weapons are allocated to engage threats in the ... strategy (the policy). If the threat was ...

  10. Ant Colony Algorithm and Simulation for Robust Airport Gate Assignment

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2014-01-01

    Full Text Available Airport gate assignment is core task for airport ground operations. Due to the fact that the departure and arrival time of flights may be influenced by many random factors, the airport gate assignment scheme may encounter gate conflict and many other problems. This paper aims at finding a robust solution for airport gate assignment problem. A mixed integer model is proposed to formulate the problem, and colony algorithm is designed to solve this model. Simulation result shows that, in consideration of robustness, the ability of antidisturbance for airport gate assignment scheme has much improved.

  11. Reducing health risk assigned to organic emissions from a chemical weapons incinerator.

    Science.gov (United States)

    Laman, David M; Weiler, B Douglas; Skeen, Rodney S

    2013-03-01

    Organic emissions from a chemical weapons incinerator have been characterized with an improved set of analytical methods to reduce the human health risk assigned to operations of the facility. A gas chromatography/mass selective detection method with substantially reduced detection limits has been used in conjunction with scanning electron microscopy/energy dispersive X-ray spectrometry and Fourier transform infrared microscopy to improve the speciation of semi-volatile and non-volatile organics emitted from the incinerator. The reduced detection limits have allowed a significant reduction in the assumed polycyclic aromatic hydrocarbon (PAH) and aminobiphenyl (ABP) emission rates used as inputs to the human health risk assessment for the incinerator. A mean factor of 17 decrease in assigned human health risk is realized for six common local exposure scenarios as a result of the reduced PAH and ABP detection limits.

  12. ZAP: a distributed channel assignment algorithm for cognitive radio networks

    OpenAIRE

    Junior , Paulo Roberto ,; Fonseca , Mauro; Munaretto , Anelise; Viana , Aline ,; Ziviani , Artur

    2011-01-01

    Abstract We propose ZAP, an algorithm for the distributed channel assignment in cognitive radio (CR) networks. CRs are capable of identifying underutilized licensed bands of the spectrum, allowing their reuse by secondary users without interfering with primary users. In this context, efficient channel assignment is challenging as ideally it must be simple, incur acceptable communication overhead, provide timely response, and be adaptive to accommodate frequent changes in the network. Another ...

  13. Fast and Rigorous Assignment Algorithm Multiple Preference and Calculation

    Directory of Open Access Journals (Sweden)

    Ümit Çiftçi

    2010-03-01

    Full Text Available The goal of paper is to develop an algorithm that evaluates students then places them depending on their desired choices according to dependant preferences. The developed algorithm is also used to implement software. The success and accuracy of the software as well as the algorithm are tested by applying it to ability test at Beykent University. This ability test is repeated several times in order to fill all available places at Fine Art Faculty departments in every academic year. It has been shown that this algorithm is very fast and rigorous after application of 2008-2009 and 2009-20010 academic years.Key Words: Assignment algorithm, student placement, ability test

  14. ZAP: a distributed channel assignment algorithm for cognitive radio networks

    Directory of Open Access Journals (Sweden)

    Munaretto Anelise

    2011-01-01

    Full Text Available Abstract We propose ZAP, an algorithm for the distributed channel assignment in cognitive radio (CR networks. CRs are capable of identifying underutilized licensed bands of the spectrum, allowing their reuse by secondary users without interfering with primary users. In this context, efficient channel assignment is challenging as ideally it must be simple, incur acceptable communication overhead, provide timely response, and be adaptive to accommodate frequent changes in the network. Another challenge is the optimization of network capacity through interference minimization. In contrast to related work, ZAP addresses these challenges with a fully distributed approach based only on local (neighborhood knowledge, while significantly reducing computational costs and the number of messages required for channel assignment. Simulations confirm the efficiency of ZAP in terms of (i the performance tradeoff between different metrics and (ii the fast achievement of a suitable assignment solution regardless of network size and density.

  15. Asymmetry in some common assignment algorithms: the dispersion factor solution

    OpenAIRE

    T de la Barra; B Pérez

    1986-01-01

    Many common assignment algorithms are based on Dial's original design to determine the paths that trip makers will follow from a given origin to destination centroids. The purpose of this paper is to show that the rules that have to be applied result in two unwanted properties. The first is that trips assigned from an origin centroid i to a destination j can be dramatically different to those resulting from centroid j to centroid i , even if the number of trips is the same and the network is ...

  16. Algorithms for selecting informative marker panels for population assignment.

    Science.gov (United States)

    Rosenberg, Noah A

    2005-11-01

    Given a set of potential source populations, genotypes of an individual of unknown origin at a collection of markers can be used to predict the correct source population of the individual. For improved efficiency, informative markers can be chosen from a larger set of markers to maximize the accuracy of this prediction. However, selecting the loci that are individually most informative does not necessarily produce the optimal panel. Here, using genotypes from eight species--carp, cat, chicken, dog, fly, grayling, human, and maize--this univariate accumulation procedure is compared to new multivariate "greedy" and "maximin" algorithms for choosing marker panels. The procedures generally suggest similar panels, although the greedy method often recommends inclusion of loci that are not chosen by the other algorithms. In seven of the eight species, when applied to five or more markers, all methods achieve at least 94% assignment accuracy on simulated individuals, with one species--dog--producing this level of accuracy with only three markers, and the eighth species--human--requiring approximately 13-16 markers. The new algorithms produce substantial improvements over use of randomly selected markers; where differences among the methods are noticeable, the greedy algorithm leads to slightly higher probabilities of correct assignment. Although none of the approaches necessarily chooses the panel with optimal performance, the algorithms all likely select panels with performance near enough to the maximum that they all are suitable for practical use.

  17. Applying reinforcement learning to the weapon assignment problem in air defence

    CSIR Research Space (South Africa)

    Mouton, H

    2011-12-01

    Full Text Available . The techniques investigated in this article were two methods from the machine-learning subfield of reinforcement learning (RL), namely a Monte Carlo (MC) control algorithm with exploring starts (MCES), and an off-policy temporal-difference (TD) learning...

  18. A Method Based on Dial's Algorithm for Multi-time Dynamic Traffic Assignment

    Directory of Open Access Journals (Sweden)

    Rongjie Kuang

    2014-03-01

    Full Text Available Due to static traffic assignment has poor performance in reflecting actual case and dynamic traffic assignment may incurs excessive compute cost, method of multi-time dynamic traffic assignment combining static and dynamic traffic assignment balances factors of precision and cost effectively. A method based on Dial's logit algorithm is proposed in the article to solve the dynamic stochastic user equilibrium problem in dynamic traffic assignment. Before that, a fitting function that can proximately reflect overloaded traffic condition of link is proposed and used to give corresponding model. Numerical example is given to illustrate heuristic procedure of method and to compare results with one of same example solved by other literature's algorithm. Results show that method based on Dial's algorithm is preferable to algorithm from others.

  19. A branch-and-cut algorithm for the Time Window Assignment Vehicle Routing Problem

    NARCIS (Netherlands)

    K. Dalmeijer (Kevin); R. Spliet (Remy)

    2016-01-01

    textabstractThis paper presents a branch-and-cut algorithm for the Time Window Assignment Vehicle Routing Problem (TWAVRP), the problem of assigning time windows for delivery before demand volume becomes known. A novel set of valid inequalities, the precedence inequalities, is introduced and

  20. Thermal weapon sights with integrated fire control computers: algorithms and experiences

    Science.gov (United States)

    Rothe, Hendrik; Graswald, Markus; Breiter, Rainer

    2008-04-01

    The HuntIR long range thermal weapon sight of AIM is deployed in various out of area missions since 2004 as a part of the German Future Infantryman system (IdZ). In 2007 AIM fielded RangIR as upgrade with integrated laser Range finder (LRF), digital magnetic compass (DMC) and fire control unit (FCU). RangIR fills the capability gaps of day/night fire control for grenade machine guns (GMG) and the enhanced system of the IdZ. Due to proven expertise and proprietary methods in fire control, fast access to military trials for optimisation loops and similar hardware platforms, AIM and the University of the Federal Armed Forces Hamburg (HSU) decided to team for the development of suitable fire control algorithms. The pronounced ballistic trajectory of the 40mm GMG requires most accurate FCU-solutions specifically for air burst ammunition (ABM) and is most sensitive to faint effects like levelling or firing up/downhill. This weapon was therefore selected to validate the quality of the FCU hard- and software under relevant military conditions. For exterior ballistics the modified point mass model according to STANAG 4355 is used. The differential equations of motions are solved numerically, the two point boundary value problem is solved iteratively. Computing time varies according to the precision needed and is typical in the range from 0.1 - 0.5 seconds. RangIR provided outstanding hit accuracy including ABM fuze timing in various trials of the German Army and allied partners in 2007 and is now ready for series production. This paper deals mainly with the fundamentals of the fire control algorithms and shows how to implement them in combination with any DSP-equipped thermal weapon sights (TWS) in a variety of light supporting weapon systems.

  1. Automated sequence-specific protein NMR assignment using the memetic algorithm MATCH

    International Nuclear Information System (INIS)

    Volk, Jochen; Herrmann, Torsten; Wuethrich, Kurt

    2008-01-01

    MATCH (Memetic Algorithm and Combinatorial Optimization Heuristics) is a new memetic algorithm for automated sequence-specific polypeptide backbone NMR assignment of proteins. MATCH employs local optimization for tracing partial sequence-specific assignments within a global, population-based search environment, where the simultaneous application of local and global optimization heuristics guarantees high efficiency and robustness. MATCH thus makes combined use of the two predominant concepts in use for automated NMR assignment of proteins. Dynamic transition and inherent mutation are new techniques that enable automatic adaptation to variable quality of the experimental input data. The concept of dynamic transition is incorporated in all major building blocks of the algorithm, where it enables switching between local and global optimization heuristics at any time during the assignment process. Inherent mutation restricts the intrinsically required randomness of the evolutionary algorithm to those regions of the conformation space that are compatible with the experimental input data. Using intact and artificially deteriorated APSY-NMR input data of proteins, MATCH performed sequence-specific resonance assignment with high efficiency and robustness

  2. A Parallel Biological Optimization Algorithm to Solve the Unbalanced Assignment Problem Based on DNA Molecular Computing.

    Science.gov (United States)

    Wang, Zhaocai; Pu, Jun; Cao, Liling; Tan, Jian

    2015-10-23

    The unbalanced assignment problem (UAP) is to optimally resolve the problem of assigning n jobs to m individuals (m applied mathematics, having numerous real life applications. In this paper, we present a new parallel DNA algorithm for solving the unbalanced assignment problem using DNA molecular operations. We reasonably design flexible-length DNA strands representing different jobs and individuals, take appropriate steps, and get the solutions of the UAP in the proper length range and O(mn) time. We extend the application of DNA molecular operations and simultaneity to simplify the complexity of the computation.

  3. Automated backbone assignment of labeled proteins using the threshold accepting algorithm

    International Nuclear Information System (INIS)

    Leutner, Michael; Gschwind, Ruth M.; Liermann, Jens; Schwarz, Christian; Gemmecker, Gerd; Kessler, Horst

    1998-01-01

    The sequential assignment of backbone resonances is the first step in the structure determination of proteins by heteronuclear NMR. For larger proteins, an assignment strategy based on proton side-chain information is no longer suitable for the use in an automated procedure. Our program PASTA (Protein ASsignment by Threshold Accepting) is therefore designed to partially or fully automate the sequential assignment of proteins, based on the analysis of NMR backbone resonances plus C β information. In order to overcome the problems caused by peak overlap and missing signals in an automated assignment process, PASTA uses threshold accepting, a combinatorial optimization strategy, which is superior to simulated annealing due to generally faster convergence and better solutions. The reliability of this algorithm is shown by reproducing the complete sequential backbone assignment of several proteins from published NMR data. The robustness of the algorithm against misassigned signals, noise, spectral overlap and missing peaks is shown by repeating the assignment with reduced sequential information and increased chemical shift tolerances. The performance of the program on real data is finally demonstrated with automatically picked peak lists of human nonpancreatic synovial phospholipase A 2 , a protein with 124 residues

  4. Simulated annealing algorithm for solving chambering student-case assignment problem

    Science.gov (United States)

    Ghazali, Saadiah; Abdul-Rahman, Syariza

    2015-12-01

    The problem related to project assignment problem is one of popular practical problem that appear nowadays. The challenge of solving the problem raise whenever the complexity related to preferences, the existence of real-world constraints and problem size increased. This study focuses on solving a chambering student-case assignment problem by using a simulated annealing algorithm where this problem is classified under project assignment problem. The project assignment problem is considered as hard combinatorial optimization problem and solving it using a metaheuristic approach is an advantage because it could return a good solution in a reasonable time. The problem of assigning chambering students to cases has never been addressed in the literature before. For the proposed problem, it is essential for law graduates to peruse in chambers before they are qualified to become legal counselor. Thus, assigning the chambering students to cases is a critically needed especially when involving many preferences. Hence, this study presents a preliminary study of the proposed project assignment problem. The objective of the study is to minimize the total completion time for all students in solving the given cases. This study employed a minimum cost greedy heuristic in order to construct a feasible initial solution. The search then is preceded with a simulated annealing algorithm for further improvement of solution quality. The analysis of the obtained result has shown that the proposed simulated annealing algorithm has greatly improved the solution constructed by the minimum cost greedy heuristic. Hence, this research has demonstrated the advantages of solving project assignment problem by using metaheuristic techniques.

  5. A robust algorithm to solve the signal setting problem considering different traffic assignment approaches

    Directory of Open Access Journals (Sweden)

    Adacher Ludovica

    2017-12-01

    Full Text Available In this paper we extend a stochastic discrete optimization algorithm so as to tackle the signal setting problem. Signalized junctions represent critical points of an urban transportation network, and the efficiency of their traffic signal setting influences the overall network performance. Since road congestion usually takes place at or close to junction areas, an improvement in signal settings contributes to improving travel times, drivers’ comfort, fuel consumption efficiency, pollution and safety. In a traffic network, the signal control strategy affects the travel time on the roads and influences drivers’ route choice behavior. The paper presents an algorithm for signal setting optimization of signalized junctions in a congested road network. The objective function used in this work is a weighted sum of delays caused by the signalized intersections. We propose an iterative procedure to solve the problem by alternately updating signal settings based on fixed flows and traffic assignment based on fixed signal settings. To show the robustness of our method, we consider two different assignment methods: one based on user equilibrium assignment, well established in the literature as well as in practice, and the other based on a platoon simulation model with vehicular flow propagation and spill-back. Our optimization algorithm is also compared with others well known in the literature for this problem. The surrogate method (SM, particle swarm optimization (PSO and the genetic algorithm (GA are compared for a combined problem of global optimization of signal settings and traffic assignment (GOSSTA. Numerical experiments on a real test network are reported.

  6. Application of a fast sorting algorithm to the assignment of mass spectrometric cross-linking data.

    Science.gov (United States)

    Petrotchenko, Evgeniy V; Borchers, Christoph H

    2014-09-01

    Cross-linking combined with MS involves enzymatic digestion of cross-linked proteins and identifying cross-linked peptides. Assignment of cross-linked peptide masses requires a search of all possible binary combinations of peptides from the cross-linked proteins' sequences, which becomes impractical with increasing complexity of the protein system and/or if digestion enzyme specificity is relaxed. Here, we describe the application of a fast sorting algorithm to search large sequence databases for cross-linked peptide assignments based on mass. This same algorithm has been used previously for assigning disulfide-bridged peptides (Choi et al., ), but has not previously been applied to cross-linking studies. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. A fuzzy logic algorithm to assign confidence levels to heart and respiratory rate time series

    International Nuclear Information System (INIS)

    Liu, J; McKenna, T M; Gribok, A; Reifman, J; Beidleman, B A; Tharion, W J

    2008-01-01

    We have developed a fuzzy logic-based algorithm to qualify the reliability of heart rate (HR) and respiratory rate (RR) vital-sign time-series data by assigning a confidence level to the data points while they are measured as a continuous data stream. The algorithm's membership functions are derived from physiology-based performance limits and mass-assignment-based data-driven characteristics of the signals. The assigned confidence levels are based on the reliability of each HR and RR measurement as well as the relationship between them. The algorithm was tested on HR and RR data collected from subjects undertaking a range of physical activities, and it showed acceptable performance in detecting four types of faults that result in low-confidence data points (receiver operating characteristic areas under the curve ranged from 0.67 (SD 0.04) to 0.83 (SD 0.03), mean and standard deviation (SD) over all faults). The algorithm is sensitive to noise in the raw HR and RR data and will flag many data points as low confidence if the data are noisy; prior processing of the data to reduce noise allows identification of only the most substantial faults. Depending on how HR and RR data are processed, the algorithm can be applied as a tool to evaluate sensor performance or to qualify HR and RR time-series data in terms of their reliability before use in automated decision-assist systems

  8. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  9. A Temporal Domain Decomposition Algorithmic Scheme for Large-Scale Dynamic Traffic Assignment

    Directory of Open Access Journals (Sweden)

    Eric J. Nava

    2012-03-01

    This paper presents a temporal decomposition scheme for large spatial- and temporal-scale dynamic traffic assignment, in which the entire analysis period is divided into Epochs. Vehicle assignment is performed sequentially in each Epoch, thus improving the model scalability and confining the peak run-time memory requirement regardless of the total analysis period. A proposed self-turning scheme adaptively searches for the run-time-optimal Epoch setting during iterations regardless of the characteristics of the modeled network. Extensive numerical experiments confirm the promising performance of the proposed algorithmic schemes.

  10. Performance of multiobjective computational intelligence algorithms for the routing and wavelength assignment problem

    Directory of Open Access Journals (Sweden)

    Jorge Patiño

    2016-01-01

    Full Text Available This paper presents an evaluation performance of computational intelligence algorithms based on the multiobjective theory for the solution of the Routing and Wavelength Assignment problem (RWA in optical networks. The study evaluates the Firefly Algorithm, the Differential Evolutionary Algorithm, the Simulated Annealing Algorithm and two versions of the Particle Swarm Optimization algorithm. The paper provides a description of the multiobjective algorithms; then, an evaluation based on the performance provided by the multiobjective algorithms versus mono-objective approaches when dealing with different traffic loads, different numberof wavelengths and wavelength conversion process over the NSFNet topology is presented. Simulation results show that monoobjective algorithms properly solve the RWA problem for low values of data traffic and low number of wavelengths. However, the multiobjective approaches adapt better to online traffic when the number of wavelengths available in the network increases as well as when wavelength conversion is implemented in the nodes.

  11. An efficient randomized algorithm for contact-based NMR backbone resonance assignment.

    Science.gov (United States)

    Kamisetty, Hetunandan; Bailey-Kellogg, Chris; Pandurangan, Gopal

    2006-01-15

    Backbone resonance assignment is a critical bottleneck in studies of protein structure, dynamics and interactions by nuclear magnetic resonance (NMR) spectroscopy. A minimalist approach to assignment, which we call 'contact-based', seeks to dramatically reduce experimental time and expense by replacing the standard suite of through-bond experiments with the through-space (nuclear Overhauser enhancement spectroscopy, NOESY) experiment. In the contact-based approach, spectral data are represented in a graph with vertices for putative residues (of unknown relation to the primary sequence) and edges for hypothesized NOESY interactions, such that observed spectral peaks could be explained if the residues were 'close enough'. Due to experimental ambiguity, several incorrect edges can be hypothesized for each spectral peak. An assignment is derived by identifying consistent patterns of edges (e.g. for alpha-helices and beta-sheets) within a graph and by mapping the vertices to the primary sequence. The key algorithmic challenge is to be able to uncover these patterns even when they are obscured by significant noise. This paper develops, analyzes and applies a novel algorithm for the identification of polytopes representing consistent patterns of edges in a corrupted NOESY graph. Our randomized algorithm aggregates simplices into polytopes and fixes inconsistencies with simple local modifications, called rotations, that maintain most of the structure already uncovered. In characterizing the effects of experimental noise, we employ an NMR-specific random graph model in proving that our algorithm gives optimal performance in expected polynomial time, even when the input graph is significantly corrupted. We confirm this analysis in simulation studies with graphs corrupted by up to 500% noise. Finally, we demonstrate the practical application of the algorithm on several experimental beta-sheet datasets. Our approach is able to eliminate a large majority of noise edges and to

  12. AN EVOLUTIONARY ALGORITHM FOR CHANNEL ASSIGNMENT PROBLEM IN WIRELESS MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Yee Shin Chia

    2012-12-01

    Full Text Available The channel assignment problem in wireless mobile network is the assignment of appropriate frequency spectrum to incoming calls while maintaining a satisfactory level of electromagnetic compatibility (EMC constraints. An effective channel assignment strategy is important due to the limited capacity of frequency spectrum in wireless mobile network. Most of the existing channel assignment strategies are based on deterministic methods. In this paper, an adaptive genetic algorithm (GA based channel assignment strategy is introduced for resource management and to reduce the effect of EMC interferences. The most significant advantage of the proposed optimization method is its capability to handle both the reassignment of channels for existing calls as well as the allocation of channel to a new incoming call in an adaptive process to maximize the utility of the limited resources. It is capable to adapt the population size to the number of eligible channels for a particular cell upon new call arrivals to achieve reasonable convergence speed. The MATLAB simulation on a 49-cells network model for both uniform and nonuniform call traffic distributions showed that the proposed channel optimization method can always achieve a lower average new incoming call blocking probability compared to the deterministic based channel assignment strategy.

  13. An O(NlogN Algorithm for Region Definition Using Channels/Switchboxes and Ordering Assignment

    Directory of Open Access Journals (Sweden)

    Jin-Tai Yan

    1996-01-01

    Full Text Available For a building block placement, the routing space can be further partitioned into channels and switchboxes. In general, the definition of switchboxes releases the cyclic channel precedence constraints and further yields a safe routing ordering process. However, switchbox routing is more difficult than channel routing. In this paper, an O(NlogN region definition and ordering assignment (RDAOA algorithm is proposed to minimize the number of switchboxes for the routing phase, where N is the number of vertices in a channel precedence graph. Several examples have been tested on the proposed algorithm, and the experimental results are listed and compared.

  14. A Parallel Biological Optimization Algorithm to Solve the Unbalanced Assignment Problem Based on DNA Molecular Computing

    Directory of Open Access Journals (Sweden)

    Zhaocai Wang

    2015-10-01

    Full Text Available The unbalanced assignment problem (UAP is to optimally resolve the problem of assigning n jobs to m individuals (m < n, such that minimum cost or maximum profit obtained. It is a vitally important Non-deterministic Polynomial (NP complete problem in operation management and applied mathematics, having numerous real life applications. In this paper, we present a new parallel DNA algorithm for solving the unbalanced assignment problem using DNA molecular operations. We reasonably design flexible-length DNA strands representing different jobs and individuals, take appropriate steps, and get the solutions of the UAP in the proper length range and O(mn time. We extend the application of DNA molecular operations and simultaneity to simplify the complexity of the computation.

  15. Research on spatial Model and analysis algorithm for nuclear weapons' damage effects

    International Nuclear Information System (INIS)

    Liu Xiaohong; Meng Tao; Du Maohua; Wang Weili; Ji Wanfeng

    2011-01-01

    In order to realize the three dimension visualization of nuclear weapons' damage effects. Aiming at the characteristics of the damage effects data, a new model-MRPCT model is proposed, and this model can carry out the modeling of the three dimension spatial data of the nuclear weapons' damage effects. For the sake of saving on the memory, linear coding method is used to store the MRPCT model. On the basis of Morton code, spatial analysis of the damage effects is completed. (authors)

  16. Analyzing the multiple-target-multiple-agent scenario using optimal assignment algorithms

    Science.gov (United States)

    Kwok, Kwan S.; Driessen, Brian J.; Phillips, Cynthia A.; Tovey, Craig A.

    1997-09-01

    This work considers the problem of maximum utilization of a set of mobile robots with limited sensor-range capabilities and limited travel distances. The robots are initially in random positions. A set of robots properly guards or covers a region if every point within the region is within the effective sensor range of at least one vehicle. We wish to move the vehicles into surveillance positions so as to guard or cover a region, while minimizing the maximum distance traveled by any vehicle. This problem can be formulated as an assignment problem, in which we must optimally decide which robot to assign to which slot of a desired matrix of grid points. The cost function is the maximum distance traveled by any robot. Assignment problems can be solved very efficiently. Solution times for one hundred robots took only seconds on a silicon graphics crimson workstation. The initial positions of all the robots can be sampled by a central base station and their newly assigned positions communicated back to the robots. Alternatively, the robots can establish their own coordinate system with the origin fixed at one of the robots and orientation determined by the compass bearing of another robot relative to this robot. This paper presents example solutions to the multiple-target-multiple-agent scenario using a matching algorithm. Two separate cases with one hundred agents in each were analyzed using this method. We have found these mobile robot problems to be a very interesting application of network optimization methods, and we expect this to be a fruitful area for future research.

  17. Analyzing the multiple-target-multiple-agent scenario using optimal assignment algorithms

    International Nuclear Information System (INIS)

    Kwok, K.S.; Driessen, B.J.; Phillips, C.A.; Tovey, C.A.

    1997-01-01

    This work considers the problem of maximum utilization of a set of mobile robots with limited sensor-range capabilities and limited travel distances. The robots are initially in random positions. A set of robots properly guards or covers a region if every point within the region is within the effective sensor range of at least one vehicle. The authors wish to move the vehicles into surveillance positions so as to guard or cover a region, while minimizing the maximum distance traveled by any vehicle. This problem can be formulated as an assignment problem, in which they must optimally decide which robot to assign to which slot of a desired matrix of grid points. The cost function is the maximum distance traveled by any robot. Assignment problems can be solved very efficiently. Solutions times for one hundred robots took only seconds on a Silicon Graphics Crimson workstation. The initial positions of all the robots can be sampled by a central base station and their newly assigned positions communicated back to the robots. Alternatively, the robots can establish their own coordinate system with the origin fixed at one of the robots and orientation determined by the compass bearing of another robot relative to this robot. This paper presents example solutions to the multiple-target-multiple-agent scenario using a matching algorithm. Two separate cases with one hundred agents in each were analyzed using this method. They have found these mobile robot problems to be a very interesting application of network optimization methods, and they expect this to be a fruitful area for future research

  18. A Biogeography-Based Optimization Algorithm Hybridized with Tabu Search for the Quadratic Assignment Problem.

    Science.gov (United States)

    Lim, Wee Loon; Wibowo, Antoni; Desa, Mohammad Ishak; Haron, Habibollah

    2016-01-01

    The quadratic assignment problem (QAP) is an NP-hard combinatorial optimization problem with a wide variety of applications. Biogeography-based optimization (BBO), a relatively new optimization technique based on the biogeography concept, uses the idea of migration strategy of species to derive algorithm for solving optimization problems. It has been shown that BBO provides performance on a par with other optimization methods. A classical BBO algorithm employs the mutation operator as its diversification strategy. However, this process will often ruin the quality of solutions in QAP. In this paper, we propose a hybrid technique to overcome the weakness of classical BBO algorithm to solve QAP, by replacing the mutation operator with a tabu search procedure. Our experiments using the benchmark instances from QAPLIB show that the proposed hybrid method is able to find good solutions for them within reasonable computational times. Out of 61 benchmark instances tested, the proposed method is able to obtain the best known solutions for 57 of them.

  19. A Biogeography-Based Optimization Algorithm Hybridized with Tabu Search for the Quadratic Assignment Problem

    Science.gov (United States)

    Lim, Wee Loon; Wibowo, Antoni; Desa, Mohammad Ishak; Haron, Habibollah

    2016-01-01

    The quadratic assignment problem (QAP) is an NP-hard combinatorial optimization problem with a wide variety of applications. Biogeography-based optimization (BBO), a relatively new optimization technique based on the biogeography concept, uses the idea of migration strategy of species to derive algorithm for solving optimization problems. It has been shown that BBO provides performance on a par with other optimization methods. A classical BBO algorithm employs the mutation operator as its diversification strategy. However, this process will often ruin the quality of solutions in QAP. In this paper, we propose a hybrid technique to overcome the weakness of classical BBO algorithm to solve QAP, by replacing the mutation operator with a tabu search procedure. Our experiments using the benchmark instances from QAPLIB show that the proposed hybrid method is able to find good solutions for them within reasonable computational times. Out of 61 benchmark instances tested, the proposed method is able to obtain the best known solutions for 57 of them. PMID:26819585

  20. Evaluation of the Jonker-Volgenant-Castanon (JVC) assignment algorithm for track association

    Science.gov (United States)

    Malkoff, Donald B.

    1997-07-01

    The Jonker-Volgenant-Castanon (JVC) assignment algorithm was used by Lockheed Martin Advanced Technology Laboratories (ATL) for track association in the Rotorcraft Pilot's Associate (RPA) program. RPA is Army Aviation's largest science and technology program, involving an integrated hardware/software system approach for a next generation helicopter containing advanced sensor equipments and applying artificial intelligence `associate' technologies. ATL is responsible for the multisensor, multitarget, onboard/offboard track fusion. McDonnell Douglas Helicopter Systems is the prime contractor and Lockheed Martin Federal Systems is responsible for developing much of the cognitive decision aiding and controls-and-displays subsystems. RPA is scheduled for flight testing beginning in 1997. RPA is unique in requiring real-time tracking and fusion for large numbers of highly-maneuverable ground (and air) targets in a target-dense environment. It uses diverse sensors and is concerned with a large area of interest. Target class and identification data is tightly integrated with spatial and kinematic data throughout the processing. Because of platform constraints, processing hardware for track fusion was quite limited. No previous experience using JVC in this type environment had been reported. ATL performed extensive testing of the JVC, concentrating on error rates and run- times under a variety of conditions. These included wide ranging numbers and types of targets, sensor uncertainties, target attributes, differing degrees of target maneuverability, and diverse combinations of sensors. Testing utilized Monte Carlo approaches, as well as many kinds of challenging scenarios. Comparisons were made with a nearest-neighbor algorithm and a new, proprietary algorithm (the `Competition' algorithm). The JVC proved to be an excellent choice for the RPA environment, providing a good balance between speed of operation and accuracy of results.

  1. A new automated assign and analysing method for high-resolution rotationally resolved spectra using genetic algorithms

    NARCIS (Netherlands)

    Meerts, W.L.; Schmitt, M.

    2006-01-01

    This paper describes a numerical technique that has recently been developed to automatically assign and fit high-resolution spectra. The method makes use of genetic algorithms (GA). The current algorithm is compared with previously used analysing methods. The general features of the GA and its

  2. Particle swarm optimization algorithm for optimizing assignment of blood in blood banking system.

    Science.gov (United States)

    Olusanya, Micheal O; Arasomwan, Martins A; Adewumi, Aderemi O

    2015-01-01

    This paper reports the performance of particle swarm optimization (PSO) for the assignment of blood to meet patients' blood transfusion requests for blood transfusion. While the drive for blood donation lingers, there is need for effective and efficient management of available blood in blood banking systems. Moreover, inherent danger of transfusing wrong blood types to patients, unnecessary importation of blood units from external sources, and wastage of blood products due to nonusage necessitate the development of mathematical models and techniques for effective handling of blood distribution among available blood types in order to minimize wastages and importation from external sources. This gives rise to the blood assignment problem (BAP) introduced recently in literature. We propose a queue and multiple knapsack models with PSO-based solution to address this challenge. Simulation is based on sets of randomly generated data that mimic real-world population distribution of blood types. Results obtained show the efficiency of the proposed algorithm for BAP with no blood units wasted and very low importation, where necessary, from outside the blood bank. The result therefore can serve as a benchmark and basis for decision support tools for real-life deployment.

  3. Particle Swarm Optimization Algorithm for Optimizing Assignment of Blood in Blood Banking System

    Science.gov (United States)

    Olusanya, Micheal O.; Arasomwan, Martins A.; Adewumi, Aderemi O.

    2015-01-01

    This paper reports the performance of particle swarm optimization (PSO) for the assignment of blood to meet patients' blood transfusion requests for blood transfusion. While the drive for blood donation lingers, there is need for effective and efficient management of available blood in blood banking systems. Moreover, inherent danger of transfusing wrong blood types to patients, unnecessary importation of blood units from external sources, and wastage of blood products due to nonusage necessitate the development of mathematical models and techniques for effective handling of blood distribution among available blood types in order to minimize wastages and importation from external sources. This gives rise to the blood assignment problem (BAP) introduced recently in literature. We propose a queue and multiple knapsack models with PSO-based solution to address this challenge. Simulation is based on sets of randomly generated data that mimic real-world population distribution of blood types. Results obtained show the efficiency of the proposed algorithm for BAP with no blood units wasted and very low importation, where necessary, from outside the blood bank. The result therefore can serve as a benchmark and basis for decision support tools for real-life deployment. PMID:25815046

  4. Flexible weapons architecture design

    Science.gov (United States)

    Pyant, William C., III

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilian casualties. This thesis shows that the architecture design factors of damage mechanism, fusing, weapons weight, guidance, and propulsion are significant in enhancing weapon performance objectives, and would benefit from modularization. Additionally, this thesis constructs an algorithm that can be used to design a weapon set for a particular target class based on these modular components.

  5. Resonance assignment of the NMR spectra of disordered proteins using a multi-objective non-dominated sorting genetic algorithm

    International Nuclear Information System (INIS)

    Yang, Yu; Fritzsching, Keith J.; Hong, Mei

    2013-01-01

    A multi-objective genetic algorithm is introduced to predict the assignment of protein solid-state NMR (SSNMR) spectra with partial resonance overlap and missing peaks due to broad linewidths, molecular motion, and low sensitivity. This non-dominated sorting genetic algorithm II (NSGA-II) aims to identify all possible assignments that are consistent with the spectra and to compare the relative merit of these assignments. Our approach is modeled after the recently introduced Monte-Carlo simulated-annealing (MC/SA) protocol, with the key difference that NSGA-II simultaneously optimizes multiple assignment objectives instead of searching for possible assignments based on a single composite score. The multiple objectives include maximizing the number of consistently assigned peaks between multiple spectra (“good connections”), maximizing the number of used peaks, minimizing the number of inconsistently assigned peaks between spectra (“bad connections”), and minimizing the number of assigned peaks that have no matching peaks in the other spectra (“edges”). Using six SSNMR protein chemical shift datasets with varying levels of imperfection that was introduced by peak deletion, random chemical shift changes, and manual peak picking of spectra with moderately broad linewidths, we show that the NSGA-II algorithm produces a large number of valid and good assignments rapidly. For high-quality chemical shift peak lists, NSGA-II and MC/SA perform similarly well. However, when the peak lists contain many missing peaks that are uncorrelated between different spectra and have chemical shift deviations between spectra, the modified NSGA-II produces a larger number of valid solutions than MC/SA, and is more effective at distinguishing good from mediocre assignments by avoiding the hazard of suboptimal weighting factors for the various objectives. These two advantages, namely diversity and better evaluation, lead to a higher probability of predicting the correct

  6. Resonance assignment of the NMR spectra of disordered proteins using a multi-objective non-dominated sorting genetic algorithm.

    Science.gov (United States)

    Yang, Yu; Fritzsching, Keith J; Hong, Mei

    2013-11-01

    A multi-objective genetic algorithm is introduced to predict the assignment of protein solid-state NMR (SSNMR) spectra with partial resonance overlap and missing peaks due to broad linewidths, molecular motion, and low sensitivity. This non-dominated sorting genetic algorithm II (NSGA-II) aims to identify all possible assignments that are consistent with the spectra and to compare the relative merit of these assignments. Our approach is modeled after the recently introduced Monte-Carlo simulated-annealing (MC/SA) protocol, with the key difference that NSGA-II simultaneously optimizes multiple assignment objectives instead of searching for possible assignments based on a single composite score. The multiple objectives include maximizing the number of consistently assigned peaks between multiple spectra ("good connections"), maximizing the number of used peaks, minimizing the number of inconsistently assigned peaks between spectra ("bad connections"), and minimizing the number of assigned peaks that have no matching peaks in the other spectra ("edges"). Using six SSNMR protein chemical shift datasets with varying levels of imperfection that was introduced by peak deletion, random chemical shift changes, and manual peak picking of spectra with moderately broad linewidths, we show that the NSGA-II algorithm produces a large number of valid and good assignments rapidly. For high-quality chemical shift peak lists, NSGA-II and MC/SA perform similarly well. However, when the peak lists contain many missing peaks that are uncorrelated between different spectra and have chemical shift deviations between spectra, the modified NSGA-II produces a larger number of valid solutions than MC/SA, and is more effective at distinguishing good from mediocre assignments by avoiding the hazard of suboptimal weighting factors for the various objectives. These two advantages, namely diversity and better evaluation, lead to a higher probability of predicting the correct assignment for a

  7. Redundant and fault-tolerant algorithms for real-time measurement and control systems for weapon equipment.

    Science.gov (United States)

    Li, Dan; Hu, Xiaoguang

    2017-03-01

    Because of the high availability requirements from weapon equipment, an in-depth study has been conducted on the real-time fault-tolerance of the widely applied Compact PCI (CPCI) bus measurement and control system. A redundancy design method that uses heartbeat detection to connect the primary and alternate devices has been developed. To address the low successful execution rate and relatively large waste of time slices in the primary version of the task software, an improved algorithm for real-time fault-tolerant scheduling is proposed based on the Basic Checking available time Elimination idle time (BCE) algorithm, applying a single-neuron self-adaptive proportion sum differential (PSD) controller. The experimental validation results indicate that this system has excellent redundancy and fault-tolerance, and the newly developed method can effectively improve the system availability. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  8. Due Date Assignment in a Dynamic Job Shop with the Orthogonal Kernel Least Squares Algorithm

    Science.gov (United States)

    Yang, D. H.; Hu, L.; Qian, Y.

    2017-06-01

    Meeting due dates is a key goal in the manufacturing industries. This paper proposes a method for due date assignment (DDA) by using the Orthogonal Kernel Least Squares Algorithm (OKLSA). A simulation model is built to imitate the production process of a highly dynamic job shop. Several factors describing job characteristics and system state are extracted as attributes to predict job flow-times. A number of experiments under conditions of varying dispatching rules and 90% shop utilization level have been carried out to evaluate the effectiveness of OKLSA applied for DDA. The prediction performance of OKLSA is compared with those of five conventional DDA models and back-propagation neural network (BPNN). The experimental results indicate that OKLSA is statistically superior to other DDA models in terms of mean absolute lateness and root mean squares lateness in most cases. The only exception occurs when the shortest processing time rule is used for dispatching jobs, the difference between OKLSA and BPNN is not statistically significant.

  9. A model and solving algorithm of combination planning for weapon equipment based on Epoch-era analysis method

    Science.gov (United States)

    Wang, Meng; Zhang, Huaiqiang; Zhang, Kan

    2017-10-01

    Focused on the circumstance that the equipment using demand in the short term and the development demand in the long term should be made overall plans and took into consideration in the weapons portfolio planning and the practical problem of the fuzziness in the definition of equipment capacity demand. The expression of demand is assumed to be an interval number or a discrete number. With the analysis method of epoch-era, a long planning cycle is broke into several short planning cycles with different demand value. The multi-stage stochastic programming model is built aimed at maximize long-term planning cycle demand under the constraint of budget, equipment development time and short planning cycle demand. The scenario tree is used to discretize the interval value of the demand, and genetic algorithm is designed to solve the problem. At last, a case is studied to demonstrate the feasibility and effectiveness of the proposed mode.

  10. A Branch-and-Price algorithm for stable workforce assignments with hierarchical skills

    NARCIS (Netherlands)

    Firat, M.; Briskorn, D.; Laugier, A.

    2016-01-01

    This paper deals with assigning hierarchically skilled technicians to jobs by considering preferences. We investigate stability definitions in multi-skill workforce assignments stemming from the notion of blocking pairs as stated in the Marriage model of Gale–Shapley. We propose a Branch-and-Price

  11. CASA: An Efficient Automated Assignment of Protein Mainchain NMR Data Using an Ordered Tree Search Algorithm

    International Nuclear Information System (INIS)

    Wang Jianyong; Wang Tianzhi; Zuiderweg, Erik R. P.; Crippen, Gordon M.

    2005-01-01

    Rapid analysis of protein structure, interaction, and dynamics requires fast and automated assignments of 3D protein backbone triple-resonance NMR spectra. We introduce a new depth-first ordered tree search method of automated assignment, CASA, which uses hand-edited peak-pick lists of a flexible number of triple resonance experiments. The computer program was tested on 13 artificially simulated peak lists for proteins up to 723 residues, as well as on the experimental data for four proteins. Under reasonable tolerances, it generated assignments that correspond to the ones reported in the literature within a few minutes of CPU time. The program was also tested on the proteins analyzed by other methods, with both simulated and experimental peaklists, and it could generate good assignments in all relevant cases. The robustness was further tested under various situations

  12. Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET) Management

    OpenAIRE

    Abd El–Naser A. Mohammed; Ahmed Nabih Zaki Rashed; Osama S. Fragallah; Mohamed G. El-Abyad

    2013-01-01

    In simple wavelength-division multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and wavelength assignment problem involves finding a route (routing) and assigning a wavelength to each request. This paper has presented the WDM technology is being exten...

  13. An Evaluation of the WSSC (Weapon System Support Cost) Cost Allocation Algorithms. II. Installation Support.

    Science.gov (United States)

    1983-06-01

    S XX3OXX, or XX37XX is found. As a result, the following two host-financed tenant support accounts currently will be treated as unit operations costs ... Horngren , Cost Accounting : A Managerial Emphasis, Prentice-Hall Inc., Englewood Cliffs, NJ, 1972. 10. D. B. Levine and J. M. Jondrow, "The...WSSC COST ALLOCATION Technical Report ~ALGORITHMS II: INSTALLATION SUPPORT 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR( S ) 9. CONTRACT OR GRANT NUMBER

  14. Whether and How to Select Inertia and Acceleration of Discrete Particle Swarm Optimization Algorithm: A Study on Channel Assignment

    Directory of Open Access Journals (Sweden)

    Min Jin

    2014-01-01

    Full Text Available There is recently a great deal of interest and excitement in understanding the role of inertia and acceleration in the motion equation of discrete particle swarm optimization (DPSO algorithms. It still remains unknown whether the inertia section should be abandoned and how to select the appropriate acceleration in order for DPSO to show the best convergence performance. Adopting channel assignment as a case study, this paper systematically conducts experimental filtering research on this issue. Compared with other channel assignment schemes, the proposed scheme and the selection of inertia and acceleration are verified to have the advantage to channel assignment in three respects of convergence rate, convergence speed, and the independency of the quality of initial solution. Furthermore, the experimental result implies that DSPO might have the best convergence performance when its motion equation includes an inertia section in a less medium weight, a bigger acceleration coefficient for global-search optimum, and a smaller acceleration coefficient for individual-search optimum.

  15. Incorporating a modified uniform crossover and 2-exchange neighborhood mechanism in a discrete bat algorithm to solve the quadratic assignment problem

    Directory of Open Access Journals (Sweden)

    Mohammed Essaid Riffi

    2017-11-01

    Full Text Available The bat algorithm is one of the recent nature-inspired algorithms, which has been emerged as a powerful search method for solving continuous as well as discrete problems. The quadratic assignment problem is a well-known NP-hard problem in combinatorial optimization. The goal of this problem is to assign n facilities to n locations in such a way as to minimize the assignment cost. For that purpose, this paper introduces a novel discrete variant of bat algorithm to deal with this combinatorial optimization problem. The proposed algorithm was evaluated on a set of benchmark instances from the QAPLIB library and the performance was compared to other algorithms. The empirical results of exhaustive experiments were promising and illustrated the efficacy of the suggested approach.

  16. Optimization of the test intervals of a nuclear safety system by genetic algorithms, solution clustering and fuzzy preference assignment

    International Nuclear Information System (INIS)

    Zio, E.; Bazzo, R.

    2010-01-01

    In this paper, a procedure is developed for identifying a number of representative solutions manageable for decision-making in a multiobjective optimization problem concerning the test intervals of the components of a safety system of a nuclear power plant. Pareto Front solutions are identified by a genetic algorithm and then clustered by subtractive clustering into 'families'. On the basis of the decision maker's preferences, each family is then synthetically represented by a 'head of the family' solution. This is done by introducing a scoring system that ranks the solutions with respect to the different objectives: a fuzzy preference assignment is employed to this purpose. Level Diagrams are then used to represent, analyze and interpret the Pareto Fronts reduced to the head-of-the-family solutions

  17. Binary Bees Algorithm - bioinspiration from the foraging mechanism of honeybees to optimize a multiobjective multidimensional assignment problem

    Science.gov (United States)

    Xu, Shuo; Ji, Ze; Truong Pham, Duc; Yu, Fan

    2011-11-01

    The simultaneous mission assignment and home allocation for hospital service robots studied is a Multidimensional Assignment Problem (MAP) with multiobjectives and multiconstraints. A population-based metaheuristic, the Binary Bees Algorithm (BBA), is proposed to optimize this NP-hard problem. Inspired by the foraging mechanism of honeybees, the BBA's most important feature is an explicit functional partitioning between global search and local search for exploration and exploitation, respectively. Its key parts consist of adaptive global search, three-step elitism selection (constraint handling, non-dominated solutions selection, and diversity preservation), and elites-centred local search within a Hamming neighbourhood. Two comparative experiments were conducted to investigate its single objective optimization, optimization effectiveness (indexed by the S-metric and C-metric) and optimization efficiency (indexed by computational burden and CPU time) in detail. The BBA outperformed its competitors in almost all the quantitative indices. Hence, the above overall scheme, and particularly the searching history-adapted global search strategy was validated.

  18. Optimal density assignment to 2D diode array detector for different dose calculation algorithms in patient specific VMAT QA

    International Nuclear Information System (INIS)

    Park, So Yeon; Park, Jong Min; Choi, Chang Heon; Chun, MinSoo; Han, Ji Hye; Cho, Jin Dong; Kim, Jung In

    2017-01-01

    The purpose of this study is to assign an appropriate density to virtual phantom for 2D diode array detector with different dose calculation algorithms to guarantee the accuracy of patient-specific QA. Ten VMAT plans with 6 MV photon beam and ten VMAT plans with 15 MV photon beam were selected retrospectively. The computed tomography (CT) images of MapCHECK2 with MapPHAN were acquired to design the virtual phantom images. For all plans, dose distributions were calculated for the virtual phantoms with four different materials by AAA and AXB algorithms. The four materials were polystyrene, 455 HU, Jursinic phantom, and PVC. Passing rates for several gamma criteria were calculated by comparing the measured dose distribution with calculated dose distributions of four materials. For validation of AXB modeling in clinic, the mean percentages of agreement in the cases of dose difference criteria of 1.0% and 2.0% for 6 MV were 97.2%±2.3%, and 99.4%±1.1%, respectively while those for 15 MV were 98.5%±0.85% and 99.8%±0.2%, respectively. In the case of 2%/2 mm, all mean passing rates were more than 96.0% and 97.2% for 6 MV and 15 MV, respectively, regardless of the virtual phantoms of different materials and dose calculation algorithms. The passing rates in all criteria slightly increased for AXB as well as AAA when using 455 HU rather than polystyrene. The virtual phantom which had a 455 HU values showed high passing rates for all gamma criteria. To guarantee the accuracy of patent-specific VMAT QA, each institution should fine-tune the mass density or HU values of this device

  19. Optimal density assignment to 2D diode array detector for different dose calculation algorithms in patient specific VMAT QA

    Energy Technology Data Exchange (ETDEWEB)

    Park, So Yeon; Park, Jong Min; Choi, Chang Heon; Chun, MinSoo; Han, Ji Hye; Cho, Jin Dong; Kim, Jung In [Dept. of Radiation Oncology, Seoul National University Hospital, Seoul (Korea, Republic of)

    2017-03-15

    The purpose of this study is to assign an appropriate density to virtual phantom for 2D diode array detector with different dose calculation algorithms to guarantee the accuracy of patient-specific QA. Ten VMAT plans with 6 MV photon beam and ten VMAT plans with 15 MV photon beam were selected retrospectively. The computed tomography (CT) images of MapCHECK2 with MapPHAN were acquired to design the virtual phantom images. For all plans, dose distributions were calculated for the virtual phantoms with four different materials by AAA and AXB algorithms. The four materials were polystyrene, 455 HU, Jursinic phantom, and PVC. Passing rates for several gamma criteria were calculated by comparing the measured dose distribution with calculated dose distributions of four materials. For validation of AXB modeling in clinic, the mean percentages of agreement in the cases of dose difference criteria of 1.0% and 2.0% for 6 MV were 97.2%±2.3%, and 99.4%±1.1%, respectively while those for 15 MV were 98.5%±0.85% and 99.8%±0.2%, respectively. In the case of 2%/2 mm, all mean passing rates were more than 96.0% and 97.2% for 6 MV and 15 MV, respectively, regardless of the virtual phantoms of different materials and dose calculation algorithms. The passing rates in all criteria slightly increased for AXB as well as AAA when using 455 HU rather than polystyrene. The virtual phantom which had a 455 HU values showed high passing rates for all gamma criteria. To guarantee the accuracy of patent-specific VMAT QA, each institution should fine-tune the mass density or HU values of this device.

  20. Robust species taxonomy assignment algorithm for 16S rRNA NGS reads: application to oral carcinoma samples

    Directory of Open Access Journals (Sweden)

    Nezar Noor Al-Hebshi

    2015-09-01

    Full Text Available Background: Usefulness of next-generation sequencing (NGS in assessing bacteria associated with oral squamous cell carcinoma (OSCC has been undermined by inability to classify reads to the species level. Objective: The purpose of this study was to develop a robust algorithm for species-level classification of NGS reads from oral samples and to pilot test it for profiling bacteria within OSCC tissues. Methods: Bacterial 16S V1-V3 libraries were prepared from three OSCC DNA samples and sequenced using 454's FLX chemistry. High-quality, well-aligned, and non-chimeric reads ≥350 bp were classified using a novel, multi-stage algorithm that involves matching reads to reference sequences in revised versions of the Human Oral Microbiome Database (HOMD, HOMD extended (HOMDEXT, and Greengene Gold (GGG at alignment coverage and percentage identity ≥98%, followed by assignment to species level based on top hit reference sequences. Priority was given to hits in HOMD, then HOMDEXT and finally GGG. Unmatched reads were subject to operational taxonomic unit analysis. Results: Nearly, 92.8% of the reads were matched to updated-HOMD 13.2, 1.83% to trusted-HOMDEXT, and 1.36% to modified-GGG. Of all matched reads, 99.6% were classified to species level. A total of 228 species-level taxa were identified, representing 11 phyla; the most abundant were Proteobacteria, Bacteroidetes, Firmicutes, Fusobacteria, and Actinobacteria. Thirty-five species-level taxa were detected in all samples. On average, Prevotella oris, Neisseria flava, Neisseria flavescens/subflava, Fusobacterium nucleatum ss polymorphum, Aggregatibacter segnis, Streptococcus mitis, and Fusobacterium periodontium were the most abundant. Bacteroides fragilis, a species rarely isolated from the oral cavity, was detected in two samples. Conclusion: This multi-stage algorithm maximizes the fraction of reads classified to the species level while ensuring reliable classification by giving priority to the

  1. A genetic algorithm for finding good balanced sequences in a customer assignment problem with no state information

    NARCIS (Netherlands)

    Hordijk, W.; Hordijk, A.; Heidergott, B.F.

    2015-01-01

    In this paper, we study the control problem of optimal assignment of tasks to servers in a multi-server queue with inhomogeneous servers. In order to improve the performance of the system, we use a periodic deterministic sequence of job assignments to servers called a billiard sequence. We then use

  2. FindFoci: a focus detection algorithm with automated parameter training that closely matches human assignments, reduces human inconsistencies and increases speed of analysis.

    Directory of Open Access Journals (Sweden)

    Alex D Herbert

    Full Text Available Accurate and reproducible quantification of the accumulation of proteins into foci in cells is essential for data interpretation and for biological inferences. To improve reproducibility, much emphasis has been placed on the preparation of samples, but less attention has been given to reporting and standardizing the quantification of foci. The current standard to quantitate foci in open-source software is to manually determine a range of parameters based on the outcome of one or a few representative images and then apply the parameter combination to the analysis of a larger dataset. Here, we demonstrate the power and utility of using machine learning to train a new algorithm (FindFoci to determine optimal parameters. FindFoci closely matches human assignments and allows rapid automated exploration of parameter space. Thus, individuals can train the algorithm to mirror their own assignments and then automate focus counting using the same parameters across a large number of images. Using the training algorithm to match human assignments of foci, we demonstrate that applying an optimal parameter combination from a single image is not broadly applicable to analysis of other images scored by the same experimenter or by other experimenters. Our analysis thus reveals wide variation in human assignment of foci and their quantification. To overcome this, we developed training on multiple images, which reduces the inconsistency of using a single or a few images to set parameters for focus detection. FindFoci is provided as an open-source plugin for ImageJ.

  3. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  4. An integrated multi-population genetic algorithm for multi-vehicle task assignment in a drift field

    NARCIS (Netherlands)

    Bai, Xiaoshan; Yan, Weisheng; Ge, Shuzhi Sam; Cao, Ming

    This paper investigates the task assignment problem for a team of autonomous aerial/marine vehicles driven by constant thrust and maneuvering in a planar lateral drift field. The aim is to minimize the total traveling time in order to guide the vehicles to deliver a number of customized sensors to a

  5. A branch-and-price algorithm to solve the integrated berth allocation and yard assignment problem in bulk ports

    DEFF Research Database (Denmark)

    Robenek, Tomáš; Umang, Nitish; Bierlaire, Michel

    2014-01-01

    In this research, two crucial optimization problems of berth allocation and yard assignment in the context of bulk ports are studied. We discuss how these problems are interrelated and can be combined and solved as a single large scale optimization problem. More importantly we highlight the diffe...

  6. Droop assignment algorithm for the inertial control of a DFIG-based wind power plant for supporting the grid frequency

    DEFF Research Database (Denmark)

    Lee, Jinsik; Kang, Yong Cheol; Muljadi, Edward

    2014-01-01

    In a wind power plant (WPP) consisting of multiple wind generators (WGs), the wind speed of WGs at the downstream side decreases due to the wake effect, and thus their rotor speeds are smaller than those of the upstream WGs because of an MPPT operation. Therefore, WGs in a WPP have different amount......, while the same gains of the ROCOF loop are set for all WGs. In addition, the wake wind speed arriving at the WG is calculated by considering the wind direction and cumulative impacts of multiple shadowing. The performance of the algorithm was investigated under various wind conditions using an EMTP...... simulator. The results clearly indicate that the algorithm successfully improves the frequency nadir because WGs with higher wind speeds temporarily releases more kinetic energy....

  7. Tuning and performance evaluation of PID controller for superheater steam temperature control of 200 MW boiler using gain phase assignment algorithm

    Science.gov (United States)

    Begum, A. Yasmine; Gireesh, N.

    2018-04-01

    In superheater, steam temperature is controlled in a cascade control loop. The cascade control loop consists of PI and PID controllers. To improve the superheater steam temperature control the controller's gains in a cascade control loop has to be tuned efficiently. The mathematical model of the superheater is derived by sets of nonlinear partial differential equations. The tuning methods taken for study here are designed for delay plus first order transfer function model. Hence from the dynamical model of the superheater, a FOPTD model is derived using frequency response method. Then by using Chien-Hrones-Reswick Tuning Algorithm and Gain-Phase Assignment Algorithm optimum controller gains has been found out based on the least value of integral time weighted absolute error.

  8. Antisatellite weapons

    International Nuclear Information System (INIS)

    Garwin, R.L.; Gottfried, K.; Hafner, D.L.

    1984-01-01

    The authors take issue with the assessment that the advent of antisatellite weapons implies that the beneficial role of satellites in arms control, confidence building, and conflict resolution has been judged less important than their ability to support actual military operations. They argue that there is still an opportunity to negotiate a militarily significant and verifiable constraint on the growth of antisatellite technology that would be in the security interest of the US and the world as a whole. They base their opinion on an assessment of the roles of the existing military satellites and their vulnerability to antisatellite weapons and the probable impact of antisatellite weapons on various kinds of crisis and conflict. 10 figures, 1 table

  9. Flexible weapons architecture design

    OpenAIRE

    Pyant, William C.

    2015-01-01

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilia...

  10. Algorithms

    Indian Academy of Sciences (India)

    polynomial) division have been found in Vedic Mathematics which are dated much before Euclid's algorithm. A programming language Is used to describe an algorithm for execution on a computer. An algorithm expressed using a programming.

  11. Dynamic Sequence Assignment.

    Science.gov (United States)

    1983-12-01

    D-136 548 DYNAMIIC SEQUENCE ASSIGNMENT(U) ADVANCED INFORMATION AND 1/2 DECISION SYSTEMS MOUNTAIN YIELW CA C A 0 REILLY ET AL. UNCLSSIIED DEC 83 AI/DS...I ADVANCED INFORMATION & DECISION SYSTEMS Mountain View. CA 94040 84 u ,53 V,..’. Unclassified _____ SCURITY CLASSIFICATION OF THIS PAGE REPORT...reviews some important heuristic algorithms developed for fas- ter solution of the sequence assignment problem. 3.1. DINAMIC MOGRAMUNIG FORMULATION FOR

  12. Algorithms

    Indian Academy of Sciences (India)

    to as 'divide-and-conquer'. Although there has been a large effort in realizing efficient algorithms, there are not many universally accepted algorithm design paradigms. In this article, we illustrate algorithm design techniques such as balancing, greedy strategy, dynamic programming strategy, and backtracking or traversal of ...

  13. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  14. Chemical Weapons Convention

    National Research Council Canada - National Science Library

    1997-01-01

    On April 29, 1997, the Convention on the Prohibition of the Development, Production, Stockpiling, and Use of Chemical Weapons and on Their Destruction, known as the Chemical Weapons Convention (CWC...

  15. The weapons effect.

    Science.gov (United States)

    Benjamin, Arlin James; Bushman, Brad J

    2018-02-01

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain why the weapons effect occurs. This model postulates that exposure to weapons increases aggressive thoughts and hostile appraisals, thus explaining why weapons facilitate aggressive behavior. Data from meta-analytic reviews are consistent with the General Aggression Model. These findings have important practical as well as theoretical implications. They suggest that the link between weapons and aggression is very strong in semantic memory, and that merely seeing a weapon can make people more aggressive. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Algorithms

    Indian Academy of Sciences (India)

    ticians but also forms the foundation of computer science. Two ... with methods of developing algorithms for solving a variety of problems but ... applications of computers in science and engineer- ... numerical calculus are as important. We will ...

  17. The weapons effect

    NARCIS (Netherlands)

    Benjamin, Arlin James; Bushman, Brad J.

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain

  18. Algorithms

    Indian Academy of Sciences (India)

    algorithm design technique called 'divide-and-conquer'. One of ... Turtle graphics, September. 1996. 5. ... whole list named 'PO' is a pointer to the first element of the list; ..... Program for computing matrices X and Y and placing the result in C *).

  19. Algorithms

    Indian Academy of Sciences (India)

    algorithm that it is implicitly understood that we know how to generate the next natural ..... Explicit comparisons are made in line (1) where maximum and minimum is ... It can be shown that the function T(n) = 3/2n -2 is the solution to the above ...

  20. Optimization of amino acid type-specific 13C and 15N labeling for the backbone assignment of membrane proteins by solution- and solid-state NMR with the UPLABEL algorithm

    International Nuclear Information System (INIS)

    Hefke, Frederik; Bagaria, Anurag; Reckel, Sina; Ullrich, Sandra Johanna; Dötsch, Volker; Glaubitz, Clemens; Güntert, Peter

    2011-01-01

    We present a computational method for finding optimal labeling patterns for the backbone assignment of membrane proteins and other large proteins that cannot be assigned by conventional strategies. Following the approach of Kainosho and Tsuji (Biochemistry 21:6273–6279 (1982)), types of amino acids are labeled with 13 C or/and 15 N such that cross peaks between 13 CO(i – 1) and 15 NH(i) result only for pairs of sequentially adjacent amino acids of which the first is labeled with 13 C and the second with 15 N. In this way, unambiguous sequence-specific assignments can be obtained for unique pairs of amino acids that occur exactly once in the sequence of the protein. To be practical, it is crucial to limit the number of differently labeled protein samples that have to be prepared while obtaining an optimal extent of labeled unique amino acid pairs. Our computer algorithm UPLABEL for optimal unique pair labeling, implemented in the program CYANA and in a standalone program, and also available through a web portal, uses combinatorial optimization to find for a given amino acid sequence labeling patterns that maximize the number of unique pair assignments with a minimal number of differently labeled protein samples. Various auxiliary conditions, including labeled amino acid availability and price, previously known partial assignments, and sequence regions of particular interest can be taken into account when determining optimal amino acid type-specific labeling patterns. The method is illustrated for the assignment of the human G-protein coupled receptor bradykinin B2 (B 2 R) and applied as a starting point for the backbone assignment of the membrane protein proteorhodopsin.

  1. A note on ranking assignments using reoptimization

    DEFF Research Database (Denmark)

    Pedersen, Christian Roed; Nielsen, L.R.; Andersen, K.A.

    2005-01-01

    We consider the problem of ranking assignments according to cost in the classical linear assignment problem. An algorithm partitioning the set of possible assignments, as suggested by Murty, is presented where, for each partition, the optimal assignment is calculated using a new reoptimization...

  2. Automated error-tolerant macromolecular structure determination from multidimensional nuclear Overhauser enhancement spectra and chemical shift assignments: improved robustness and performance of the PASD algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Kuszewski, John J.; Thottungal, Robin Augustine [National Institutes of Health, Imaging Sciences Laboratory, Center for Information Technology (United States); Clore, G. Marius [National Institutes of Health, Laboratory of Chemical Physics, National Institute of Diabetes and Digestive and Kidney Diseases (United States)], E-mail: mariusc@mail.nih.gov; Schwieters, Charles D. [National Institutes of Health, Imaging Sciences Laboratory, Center for Information Technology (United States)], E-mail: Charles.Schwieters@nih.gov

    2008-08-15

    We report substantial improvements to the previously introduced automated NOE assignment and structure determination protocol known as PASD (Kuszewski et al. (2004) J Am Chem Soc 26:6258-6273). The improved protocol includes extensive analysis of input spectral data to create a low-resolution contact map of residues expected to be close in space. This map is used to obtain reasonable initial guesses of NOE assignment likelihoods which are refined during subsequent structure calculations. Information in the contact map about which residues are predicted to not be close in space is applied via conservative repulsive distance restraints which are used in early phases of the structure calculations. In comparison with the previous protocol, the new protocol requires significantly less computation time. We show results of running the new PASD protocol on six proteins and demonstrate that useful assignment and structural information is extracted on proteins of more than 220 residues. We show that useful assignment information can be obtained even in the case in which a unique structure cannot be determined.

  3. Algorithms

    Indian Academy of Sciences (India)

    will become clear in the next article when we discuss a simple logo like programming language. ... Rod B may be used as an auxiliary store. The problem is to find an algorithm which performs this task. ... No disks are moved from A to Busing C as auxiliary rod. • move _disk (A, C);. (No + l)th disk is moved from A to C directly ...

  4. Identification of nuclear weapons

    Science.gov (United States)

    Mihalczo, J.T.; King, W.T.

    1987-04-10

    A method and apparatus for non-invasively indentifying different types of nuclear weapons is disclosed. A neutron generator is placed against the weapon to generate a stream of neutrons causing fissioning within the weapon. A first detects the generation of the neutrons and produces a signal indicative thereof. A second particle detector located on the opposite side of the weapon detects the fission particles and produces signals indicative thereof. The signals are converted into a detected pattern and a computer compares the detected pattern with known patterns of weapons and indicates which known weapon has a substantially similar pattern. Either a time distribution pattern or noise analysis pattern, or both, is used. Gamma-neutron discrimination and a third particle detector for fission particles adjacent the second particle detector are preferably used. The neutrons are generated by either a decay neutron source or a pulled neutron particle accelerator.

  5. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    of their nonstrategic nuclear weapons and eliminate many of them. These 1991 announcements, coming after the abortive coup in Moscow in July 1991...of these weapons. The abortive coup in Moscow in August 1991 had also caused alarms about the strength of central control over nuclear weapons...assure other allies of the U.S. commitment to their security, but these assurances do not necessarily include legally binding commitments to retaliate

  6. Chemical and biological weapons

    International Nuclear Information System (INIS)

    Harris, E.D.

    1991-01-01

    This paper discusses the prospects of the multilateral negotiations aimed at achieving a complete and total ban on chemical weapons the Chemical Weapons convention (CWC). The control of the proliferation of chemical weapons is no longer just on East-West issue; it is also an issue of concern in Third World Countries, and in some of the wealthier middle eastern nations, such as Kuwait

  7. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1992-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  8. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  9. An Initial Seed Selection Algorithm for K-means Clustering of Georeferenced Data to Improve Replicability of Cluster Assignments for Mapping Application

    OpenAIRE

    Khan, Fouad

    2016-01-01

    K-means is one of the most widely used clustering algorithms in various disciplines, especially for large datasets. However the method is known to be highly sensitive to initial seed selection of cluster centers. K-means++ has been proposed to overcome this problem and has been shown to have better accuracy and computational efficiency than k-means. In many clustering problems though -such as when classifying georeferenced data for mapping applications- standardization of clustering methodolo...

  10. ASIGNACIÓN DE SUPERVISORES FORESTALES: RESOLUCIÓN MEDIANTE UN ALGORITMO TABU SEARCH ASSIGNMENT OF FOREST SUPERVISORS: RESOLUTION BY MEANS OF A TABU SEARCH ALGORITHM

    Directory of Open Access Journals (Sweden)

    Lorena Pradenas Rojas

    2008-12-01

    Full Text Available En este estudio se presenta un modelo matemático para un problema genérico de asignación de personal. Se implementa y evalúa un procedimiento de solución mediante la metaheurística Tabu Search. El algoritmo propuesto es usado para resolver un caso real de asignación de supervisores forestales. Los resultados muestran que el algoritmo desarrollado es eficiente en la resolución de este tipo de problema y tiene un amplio rango de aplicación para otras situaciones reales.This study presents a mathematical model for a generic problem of staff allocation. A solution is implemented and evaluated by means of the Tabu Search metaheuristic. The proposed algorithm is used to solve a real case of forestry supervisors' allocation. The results show that the developed algorithm is efficient solving this kind of problems and that it has a wide range of application for other real situations.

  11. Applying reinforcement learning to the weapon assignment problem ...

    African Journals Online (AJOL)

    A combination of the techniques investigated and tested in this work, together with other techniques in Artificial Intelligence (AI) and modern computational techniques, may hold the key to relieving the burden of the decision-maker and aiding in better decision-making under pressure. The techniques investigated in this ...

  12. A multiobjective approach towards weapon assignment in a ground ...

    African Journals Online (AJOL)

    This section is devoted to an illustration of the working of the bi-objective WA ... altitude in an attempt at avoiding radar detection and initially their flight paths do ..... Suppose that it is sunny weather conditions, but with a very strong cross wind.

  13. A tri-objective, dynamic weapon assignment model for surface ...

    African Journals Online (AJOL)

    2015-05-11

    May 11, 2015 ... metaheuristic for solving the vehicle routing problem with time .... them the dynamic programming formulation by Bradford [3] in 1961, the nonlinear pro- ..... The concept of multi-objective optimisation naturally gives rise to the ...

  14. Utilizing Joint Routing and Capacity Assignment Algorithms to Achieve Inter- and Intra-Group Delay Fairness in Multi-Rate Multicast Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yean-Fu Wen

    2013-03-01

    Full Text Available Recent advance in wireless sensor network (WSN applications such as the Internet of Things (IoT have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  15. Utilizing joint routing and capacity assignment algorithms to achieve inter- and intra-group delay fairness in multi-rate multicast wireless sensor networks.

    Science.gov (United States)

    Lin, Frank Yeong-Sung; Hsiao, Chiu-Han; Lin, Leo Shih-Chang; Wen, Yean-Fu

    2013-03-14

    Recent advance in wireless sensor network (WSN) applications such as the Internet of Things (IoT) have attracted a lot of attention. Sensor nodes have to monitor and cooperatively pass their data, such as temperature, sound, pressure, etc. through the network under constrained physical or environmental conditions. The Quality of Service (QoS) is very sensitive to network delays. When resources are constrained and when the number of receivers increases rapidly, how the sensor network can provide good QoS (measured as end-to-end delay) becomes a very critical problem. In this paper; a solution to the wireless sensor network multicasting problem is proposed in which a mathematical model that provides services to accommodate delay fairness for each subscriber is constructed. Granting equal consideration to both network link capacity assignment and routing strategies for each multicast group guarantees the intra-group and inter-group delay fairness of end-to-end delay. Minimizing delay and achieving fairness is ultimately achieved through the Lagrangean Relaxation method and Subgradient Optimization Technique. Test results indicate that the new system runs with greater effectiveness and efficiency.

  16. Nuclear weapons free zones

    International Nuclear Information System (INIS)

    Stahl, K.

    1990-01-01

    The article analyses the concept and problems of the two nuclear weapons free zones in Latin America and in the South Pacific established by the Treaty of Tlatelolco and the Treaty of Rarotonga. So far the nuclear weapons states except China have refused to sign the additional protocols of the Treaties or have signed them only with considerable provisos. Therefore they don't fully recognize the nuclear weapons free status of those zones, or they don't recognize it at all. Both Treaties contain no provisions to regulate the transit of nuclear weapons through the zones. This allows de facto the stationing of nuclear weapons in the military bases of the US which are located within the nuclear weapons free zone of Latin America. The Treaty of Tlatelolco contains also the right of the states, party to the Treaty, to explode nuclear devices for peaceful purposes. Since peaceful and military nuclear explosions cannot be distinguished technically, this right could also undermine the nuclear weapons free status of the region. Important nuclear threshold countries like Argentina and Brazil have furthermore refrained from putting the Treaty into force. (orig.) [de

  17. Global strike hypersonic weapons

    Science.gov (United States)

    Lewis, Mark J.

    2017-11-01

    Beginning in the 1940's, the United States has pursued the development of hypersonic technologies, enabling atmospheric flight in excess of five times the speed of sound. Hypersonic flight has application to a range of military and civilian applications, including commercial transport, space access, and various weapons and sensing platforms. A number of flight tests of hypersonic vehicles have been conducted by countries around the world, including the United States, Russia, and China, that could lead the way to future hypersonic global strike weapon systems. These weapons would be especially effective at penetrating conventional defenses, and could pose a significant risk to national security.

  18. Nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1992-04-01

    In addition to long-standing safety and environmental problems plaguing the nuclear weapons complex, this paper reports that the Department of Energy (DOE) faces a major new challenge-how to reconfigure the weapons complex to meet the nation's defense needs in the 21st century. Key decisions still need to be made about the size of the complex; where, if necessary, to relocate various operations; what technologies to use for new tritium production; and what to do with excess weapons-grade material. The choices confronting DOE and Congress are difficult given the conflicting demands for limited resources

  19. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  20. Defining Weapons of Mass Destruction

    Science.gov (United States)

    2012-01-01

    Cyprus, Liberia, Malta, Marshall Islands , Mongolia, Panama, and St. Vin- cent and the Grenadines, according to a State Department summary available...1972 Biological and Toxin Weapons Convention, and the 1993 Chemical Weapons Convention. As such, NBC weapons represent a group of weapons that the...Development, Produc- tion and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction contains two references to WMD

  1. [Chemical weapons and chemical terrorism].

    Science.gov (United States)

    Nakamura, Katsumi

    2005-10-01

    Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.

  2. Making weapons, talking peace

    International Nuclear Information System (INIS)

    York, H.F.

    1987-01-01

    The memoirs of the author traces his life from his first-year graduate studies in physics at the University of Rochester in 1942 to his present position as Director of the University of California's Institute on Global Conflict and Cooperation. The part of his life involved in making weapons extends from 1942 to 1961. During this period, he worked with E.O. Lawrence on the Manhattan Project and served as director of Livermore after it became the Atomic Energy Commission's second nuclear weapons laboratory. He also served on many government advisory boards and commissions dealing with nuclear and other weapons. In 1961, the combination of a heart attack and changes in administration in Washington led York too return to the University of California for the talking peace portion of his life. He has since become a public exponent of arms control and disarmament and the futility of seeking increased security through more and better nuclear weapons. York's explanation of his move from making weapons to talking peace leaves the reader with a puzzle

  3. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  4. Wounds and weapons

    International Nuclear Information System (INIS)

    Vogel, H.; Dootz, B.

    2007-01-01

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports

  5. Trends in causes of death among children under 5 in Bangladesh, 1993-2004: an exercise applying a standardized computer algorithm to assign causes of death using verbal autopsy data

    Directory of Open Access Journals (Sweden)

    Walker Neff

    2011-08-01

    Full Text Available Abstract Background Trends in the causes of child mortality serve as important global health information to guide efforts to improve child survival. With child mortality declining in Bangladesh, the distribution of causes of death also changes. The three verbal autopsy (VA studies conducted with the Bangladesh Demographic and Health Surveys provide a unique opportunity to study these changes in child causes of death. Methods To ensure comparability of these trends, we developed a standardized algorithm to assign causes of death using symptoms collected through the VA studies. The original algorithms applied were systematically reviewed and key differences in cause categorization, hierarchy, case definition, and the amount of data collected were compared to inform the development of the standardized algorithm. Based primarily on the 2004 cause categorization and hierarchy, the standardized algorithm guarantees comparability of the trends by only including symptom data commonly available across all three studies. Results Between 1993 and 2004, pneumonia remained the leading cause of death in Bangladesh, contributing to 24% to 33% of deaths among children under 5. The proportion of neonatal mortality increased significantly from 36% (uncertainty range [UR]: 31%-41% to 56% (49%-62% during the same period. The cause-specific mortality fractions due to birth asphyxia/birth injury and prematurity/low birth weight (LBW increased steadily, with both rising from 3% (2%-5% to 13% (10%-17% and 10% (7%-15%, respectively. The cause-specific mortality rates decreased significantly due to neonatal tetanus and several postneonatal causes (tetanus: from 7 [4-11] to 2 [0.4-4] per 1,000 live births (LB; pneumonia: from 26 [20-33] to 15 [11-20] per 1,000 LB; diarrhea: from 12 [8-17] to 4 [2-7] per 1,000 LB; measles: from 5 [2-8] to 0.2 [0-0.7] per 1,000 LB; injury: from 11 [7-17] to 3 [1-5] per 1,000 LB; and malnutrition: from 9 [6-13] to 5 [2-7]. Conclusions

  6. Class Schedule Assignment Based on Students Learning Rhythms Using A Genetic Algorithm Asignación de horarios de clase basado en los ritmos de aprendizaje de los estudiantes usando un algoritmo genético

    Directory of Open Access Journals (Sweden)

    Victor F. Suarez Chilma

    2013-03-01

    Full Text Available The objective of this proposal is to implement a school day agenda focused on the learning rhythms of students of elementary and secondary schools using a genetic algorithm. The methodology of this proposal takes into account legal requirements and constraints on the assignment of teachers and classrooms in public educational institutions in Colombia. In addition, this proposal provides a set of constraints focused on cognitive rhythms and subjects are scheduled at the most convenient times according to the area of knowledge. The genetic algorithm evolves through a process of mutation and selection and builds a total solution based on the best solutions for each group. Sixteen groups in a school are tested and the results of class schedule assignments are presented. The quality of the solution obtained through the established approach is validated by comparing the results to the solutions obtained using another algorithm.El objetivo de esta propuesta es implementar un horario escolar que tenga en cuenta los ritmos de aprendizaje en los estudiantes de educación primaria y secundaria, utilizando un algoritmo genético. La metodología considera los requerimientos legales y las restricciones necesarias para la asignación de maestros y aulas en instituciones educativas públicas de Colombia. Adicionalmente, se establecen un conjunto de restricciones relacionadas con el enfoque en los ritmos cognitivos, determinando las horas de la jornada en las que es más conveniente la ubicación de ciertas materias de acuerdo al área del conocimiento al que pertenecen. El algoritmo genético evoluciona mediante un proceso de mutación y selección, a través del cual se construye una solución completa a partir de la búsqueda de las mejores soluciones por grupo. Se presentan los resultados de las pruebas realizadas para la asignación de una institución con 16 grupos. La calidad de las soluciones obtenidas de acuerdo al enfoque establecido es validada

  7. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  8. Weapons and hope

    International Nuclear Information System (INIS)

    Dyson, F.

    1984-01-01

    The British-born physicist presents a full-blown critique of US weapons policy. His careful evaluation of opposing views leads him to endorse a live-and-let-live concept of arms control, which would reject both assured destruction and first use of nuclear weapons in favor of abolishing them. Dyson's faith in the humane progress of military technology and his tolerance of dangerous conventional weapons will not please dovish readers, while his denunciation of military idolatry and his support of a nuclear freeze will disappoint some hawks. Along with moving personal memories of war and pacifism, the most original sections of the book are the author's insightful comments about the Soviet Union and the issue of verification

  9. Nuclear weapons in Europe

    International Nuclear Information System (INIS)

    Pierre, A.J.

    1984-01-01

    In this introduction to ''Nuclear Weapons in Europe'', the author summarized the views of two Americans and two Europeans, whose articles make up the volume. The introduction explains the different assumptions of the four authors before discussing their views on the military and political rationales for a nuclear force in the North Atlantic Treaty Organization (NATO) and the debate over battlefield nuclear weapons, conventional defense, and arms control proposals and talks. The four contributors whose views are analyzed are William G. Hyland, Lawrence D. Freeman, Paul C. Warnke, and Karstan D. Voight. The introduction notes that the agreements and differences do not fall strictly on American versus European dividing lines

  10. Beyond the nuclear weapon

    International Nuclear Information System (INIS)

    Quinlan, M.

    2001-01-01

    Since the end of the cold war, many people called for the elimination of nuclear weapons. That this decision seems difficult to realize because of the world political environment. Meanwhile the reduction of the nuclear weapons costs and risks believes more than ever a challenge of the international relations and more particularly in the proliferation domain. In this perspective the proliferation fight strategies need to be studied with a special interest in the domain of the alternatives and the possibilities of synergy. (A.L.B.)

  11. Nuclear power and nuclear weapons

    International Nuclear Information System (INIS)

    Vaughen, V.C.A.

    1983-01-01

    The proliferation of nuclear weapons and the expanded use of nuclear energy for the production of electricity and other peaceful uses are compared. The difference in technologies associated with nuclear weapons and nuclear power plants are described

  12. The solution of target assignment problem in command and control decision-making behaviour simulation

    Science.gov (United States)

    Li, Ni; Huai, Wenqing; Wang, Shaodan

    2017-08-01

    C2 (command and control) has been understood to be a critical military component to meet an increasing demand for rapid information gathering and real-time decision-making in a dynamically changing battlefield environment. In this article, to improve a C2 behaviour model's reusability and interoperability, a behaviour modelling framework was proposed to specify a C2 model's internal modules and a set of interoperability interfaces based on the C-BML (coalition battle management language). WTA (weapon target assignment) is a typical C2 autonomous decision-making behaviour modelling problem. Different from most WTA problem descriptions, here sensors were considered to be available resources of detection and the relationship constraints between weapons and sensors were also taken into account, which brought it much closer to actual application. A modified differential evolution (MDE) algorithm was developed to solve this high-dimension optimisation problem and obtained an optimal assignment plan with high efficiency. In case study, we built a simulation system to validate the proposed C2 modelling framework and interoperability interface specification. Also, a new optimisation solution was used to solve the WTA problem efficiently and successfully.

  13. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  14. Computational Aspects of Assigning Agents to a Line

    DEFF Research Database (Denmark)

    Aziz, Haris; Hougaard, Jens Leth; Moreno-Ternero, Juan D.

    2017-01-01

    -egalitarian assignments. The approach relies on an algorithm which is shown to be faster than general purpose algorithms for the assignment problem. We also extend the approach to probabilistic assignments and explore the computational features of existing, as well as new, methods for this setting....

  15. Computational aspects of assigning agents to a line

    DEFF Research Database (Denmark)

    Aziz, Haris; Hougaard, Jens Leth; Moreno-Ternero, Juan D.

    2017-01-01

    -egalitarian assignments. The approach relies on an algorithm which is shown to be faster than general purpose algorithms for the assignment problem. We also extend the approach to probabilistic assignments and explore the computational features of existing, as well as new, methods for this setting....

  16. Asynchronous data-driven classification of weapon systems

    International Nuclear Information System (INIS)

    Jin, Xin; Mukherjee, Kushal; Gupta, Shalabh; Ray, Asok; Phoha, Shashi; Damarla, Thyagaraju

    2009-01-01

    This communication addresses real-time weapon classification by analysis of asynchronous acoustic data, collected from microphones on a sensor network. The weapon classification algorithm consists of two parts: (i) feature extraction from time-series data using symbolic dynamic filtering (SDF), and (ii) pattern classification based on the extracted features using the language measure (LM) and support vector machine (SVM). The proposed algorithm has been tested on field data, generated by firing of two types of rifles. The results of analysis demonstrate high accuracy and fast execution of the pattern classification algorithm with low memory requirements. Potential applications include simultaneous shooter localization and weapon classification with soldier-wearable networked sensors. (rapid communication)

  17. Does Britain need nuclear weapons?

    International Nuclear Information System (INIS)

    Hill, C.R.; Pease, R.S.; Peierls, R.E.; Rotblat, J.

    1995-01-01

    This report from the British Pugwash Group follows up a detailed international study of the desirability and feasibility of a world free from nuclear weapons with an analysis of issues particular to British nuclear weapons and the associated defense policies. United Kingdom nuclear weapons are reviewed historically, as are the nuclear weapons policies of other countries. A critique of present government policy is presented, with alternative uses for nuclear weapons in the post-Cold war world. The document concludes with a summary of the text and suggests how a British government could move towards global nuclear disarmament. (UK)

  18. Ionitriding of Weapon Components

    Science.gov (United States)

    1974-01-01

    and documented tho production sequences required for the case- hardening of AISI 4140 and Nitralloy 13514 steels. Determination of processina...depths were established experimentally for Nitralloy 135M and for AISI 4140 steels. These steels are commonly used for the manufacture of nitrlded...weapons components. A temperature of 050F, upper limit for lonitrlding, was selected for the Nitralloy 135M to keep treatment times short. Since AISI 4140

  19. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons

    International Nuclear Information System (INIS)

    Blix, H.; Journe, V.

    2010-01-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  20. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  1. Multidepot UAV Routing Problem with Weapon Configuration and Time Window

    Directory of Open Access Journals (Sweden)

    Tianren Zhou

    2018-01-01

    Full Text Available In recent wars, there is an increasing trend that unmanned aerial vehicles (UAVs are utilized to conduct military attacking missions. In this paper, we investigate a novel multidepot UAV routing problem with consideration of weapon configuration in the UAV and the attacking time window of the target. A mixed-integer linear programming model is developed to jointly optimize three kinds of decisions: the weapon configuration strategy in the UAV, the routing strategy of target, and the allocation strategy of weapons to targets. An adaptive large neighborhood search (ALNS algorithm is proposed for solving the problem, which is tested by randomly generated instances covering the small, medium, and large sizes. Experimental results confirm the effectiveness and robustness of the proposed ALNS algorithm.

  2. Nuclear power and weapons proliferation

    International Nuclear Information System (INIS)

    Greenwood, T.; Rathjens, C.W.; Ruina, J.

    1977-01-01

    The relationship between nuclear weapons development and nuclear electric power is examined. A brief description of nuclear weapons design is first given. This is then followed by a discussion of various aspects of nuclear power technology and of how they affect a nuclear weapon programme. These include fuel cycles, chemical reprocessing of spent fuel, uranium enrichment, and the control of dissemination of nuclear technology. In conclusion there is a discussion of possible political and institutional controls for limiting nuclear proliferation. (U.K.)

  3. Political accountability and autonomous weapons

    Directory of Open Access Journals (Sweden)

    James Igoe Walsh

    2015-09-01

    Full Text Available Autonomous weapons would have the capacity to select and attack targets without direct human input. One important objection to the introduction of such weapons is that they will make it more difficult to identify and hold accountable those responsible for undesirable outcomes such as mission failures and civilian casualties. I hypothesize that individuals can modify their attribution of responsibility in predicable ways to accommodate this new technology. The results of a survey experiment are consistent with this; subjects continue to find responsible and hold accountable political and military leaders when autonomous weapons are used, but also attribute responsibility to the designers and programmers of such weapons.

  4. Nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1991-03-01

    In this book, GAO characterizes DOE's January 1991 Nuclear Weapons Complex Reconfiguration Study as a starting point for reaching agreement on solutions to many of the complex's safety and environmental problems. Key decisions still need to be made about the size of the complex, where to relocate plutonium operations, what technologies to use for new tritium production, and what to do with excess plutonium. The total cost for reconfiguring and modernizing the complex is still uncertain, and some management issues remain unresolved. Congress faces a difficult task in making test decisions given the conflicting demands for scarce resources in a time of growing budget deficits and war in the Persian Gulf

  5. Nuclear weapons industry

    International Nuclear Information System (INIS)

    Bertsch, K.A.; Shaw, L.S.

    1984-01-01

    This unique study was written specifically as a reference source for institutional investors concerned about the threat posed to their stock portfolios by the debate over nuclear arms production. The authors focus their analysis on the 26 leading companies in the field. The perspective is neutral and refreshing. Background information on strategic policy, arms control and disarmament, and the influence of the industry on defense policy and the economy is presented rationally. The study also discusses the economic significance of both the conversion from military to civilian production and nuclear freeze initiatives. An appendix contains a fact-filled guide to nuclear weapon systems

  6. Anti-3D Weapon Model Detection for Safe 3D Printing Based on Convolutional Neural Networks and D2 Shape Distribution

    Directory of Open Access Journals (Sweden)

    Giao N. Pham

    2018-03-01

    Full Text Available With the development of 3D printing, weapons are easily printed without any restriction from the production managers. Therefore, anti-3D weapon model detection is necessary issue in safe 3D printing to prevent the printing of 3D weapon models. In this paper, we would like to propose an anti-3D weapon model detection algorithm to prevent the printing of anti-3D weapon models for safe 3D printing based on the D2 shape distribution and an improved convolutional neural networks (CNNs. The purpose of the proposed algorithm is to detect anti-3D weapon models when they are used in 3D printing. The D2 shape distribution is computed from random points on the surface of a 3D weapon model and their geometric features in order to construct a D2 vector. The D2 vector is then trained by improved CNNs. The CNNs are used to detect anti-3D weapon models for safe 3D printing by training D2 vectors which have been constructed from the D2 shape distribution of 3D weapon models. Experiments with 3D weapon models proved that the D2 shape distribution of 3D weapon models in the same class is the same. Training and testing results also verified that the accuracy of the proposed algorithm is higher than the conventional works. The proposed algorithm is applied in a small application, and it could detect anti-3D weapon models for safe 3D printing.

  7. Effects of the use of ABC weapons

    International Nuclear Information System (INIS)

    Karl-Rueckert, E.

    1980-01-01

    The effects of ABC-weapons are presented. The various classes of chemical weapons and their effects are discussed. It is pointed out that there is hardly a means of protection against these weapons. (MG) [de

  8. Pakistan's Nuclear Weapons: Proliferation and Security Issues

    National Research Council Canada - National Science Library

    Kerr, Paul; Nikitin, Mary B

    2007-01-01

    Pakistan's nuclear arsenal consists of approximately 60 nuclear warheads. Pakistan continues fissile material production for weapons, and is adding to its weapons production facilities and delivery vehicles...

  9. Rays as weapons

    International Nuclear Information System (INIS)

    Vogel, H.

    2007-01-01

    Purpose: Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. Method: The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. Results: In the center of the explosion of a nuclear bomb, the temperature rises to 100 Mio deg.C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 deg. C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage

  10. Plagiarism-Proofing Assignments

    Science.gov (United States)

    Johnson, Doug

    2004-01-01

    Mr. Johnson has discovered that the higher the level of student engagement and creativity, the lower the probability of plagiarism. For teachers who would like to see such desirable results, he describes the characteristics of assignments that are most likely to produce them. Two scenarios of types of assignments that avoid plagiarism are…

  11. Nuclear weapons complex

    International Nuclear Information System (INIS)

    Peach, J.D.

    1991-02-01

    In this paper, GAO provides its views on DOE's January 1991 Nuclear Weapons Complex Reconfiguration Study. GAO believes that DOE's new reconfiguration study provides a starting point for reaching agreement on solutions to many of the complex's problems. Key decisions still need to be made about the size of the complex, where to relocate plutonium operations, what technologies should be used for new tritium production, and what to do with excess plutonium. The total cost for reconfiguring and modernizing is still uncertain and some management issues remain unresolved. Congress faces a difficult task in making these decisions given the conflicting demands for scare resources in a time of growing budget deficits and war in the Persian Gulf

  12. Atomic Weapons Establishment Bill

    International Nuclear Information System (INIS)

    Clark, Alan; Dalyell, Tam; Haynes, Frank

    1990-01-01

    The Bill debated concerns the government's proposal for the future organisations of the atomic weapons establishment in the United Kingdom. The proposals arise from a full review carried out in 1989 and include points raised by the Select Committee on the Trident programme. Studies of productivity, pay and conditions, information systems and long term manufacturing strategy have been started to enable recommendations of the reorganisation of the establishments to be made. The details of the Bill were debated for just over two hours. The debate is reported verbatim. The main issues were over the principle of contractorisation, possible staff redundancies, conditions of employment, safety and security. The proposal that the Bill be read a second time was carried. (UK)

  13. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne

    2016-01-01

    able to reinvigorate democratic processes by changing inequalities in the landscape of political representation among interest groups. The level of resources held by the interest groups acts as the single most consistent predictor of both the range and volume of their social media use. Interest groups......Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...... on the sparse existing literature on interest groups and social media in a quantitative, structural analysis of both the range and volume of social media use examining a data set of groups active in European Union lobbying. Despite the positive expectations, we find limited evidence that social media have been...

  14. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  15. One of My Favorite Assignments: Automated Teller Machine Simulation.

    Science.gov (United States)

    Oberman, Paul S.

    2001-01-01

    Describes an assignment for an introductory computer science class that requires the student to write a software program that simulates an automated teller machine. Highlights include an algorithm for the assignment; sample file contents; language features used; assignment variations; and discussion points. (LRW)

  16. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  17. Verifying a nuclear weapon`s response to radiation environments

    Energy Technology Data Exchange (ETDEWEB)

    Dean, F.F.; Barrett, W.H.

    1998-05-01

    The process described in the paper is being applied as part of the design verification of a replacement component designed for a nuclear weapon currently in the active stockpile. This process is an adaptation of the process successfully used in nuclear weapon development programs. The verification process concentrates on evaluating system response to radiation environments, verifying system performance during and after exposure to radiation environments, and assessing system survivability.

  18. Fair Package Assignment

    Science.gov (United States)

    Lahaie, Sébastien; Parkes, David C.

    We consider the problem of fair allocation in the package assignment model, where a set of indivisible items, held by single seller, must be efficiently allocated to agents with quasi-linear utilities. A fair assignment is one that is efficient and envy-free. We consider a model where bidders have superadditive valuations, meaning that items are pure complements. Our central result is that core outcomes are fair and even coalition-fair over this domain, while fair distributions may not even exist for general valuations. Of relevance to auction design, we also establish that the core is equivalent to the set of anonymous-price competitive equilibria, and that superadditive valuations are a maximal domain that guarantees the existence of anonymous-price competitive equilibrium. Our results are analogs of core equivalence results for linear prices in the standard assignment model, and for nonlinear, non-anonymous prices in the package assignment model with general valuations.

  19. My Favorite Assignment.

    Science.gov (United States)

    ABCA Bulletin, 1983

    1983-01-01

    Describes three assignments for enticing business communication students to undertake library research: an analysis of a Fortune 500 company, a career choice report, and a report on an organization that offers potential employment. (AEA)

  20. Historical WBAN ID Assignments

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — 4"x6" index cards represent the first written assignments of Weather Bureau Army Navy (WBAN) station identifier numbers by the National Climatic Data Center....

  1. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  2. Non-Lethal Chemical Weapons

    National Research Council Canada - National Science Library

    Weilacher, Lester A

    2003-01-01

    Little more than a month after terrorists took control of four passenger aircraft in the United States and unleashed the horror of 9/11, 50 Chechen terrorists armed with automatic weapons and carrying...

  3. USAF Weapon System Evaluation Program

    National Research Council Canada - National Science Library

    1999-01-01

    During this task period, Schafer Corporation provided engineering services and analysis to the USAF at Eglin AFB, Florida in direct support of the USAF Air-to-Surface Weapon System Evaluation Program (WSEP...

  4. A parametric visualization software for the assignment problem

    Directory of Open Access Journals (Sweden)

    Papamanthou Charalampos

    2005-01-01

    Full Text Available In this paper we present a parametric visualization software used to assist the teaching of the Network Primal Simplex Algorithm for the assignment problem (AP. The assignment problem is a special case of the balanced transportation problem. The main functions of the algorithm and design techniques are also presented. Through this process, we aim to underline the importance and necessity of using such educational methods in order to improve the teaching of Computer Algorithms.

  5. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  6. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  7. The return of nuclear weapons

    International Nuclear Information System (INIS)

    Calvez, Jean-Yves

    2005-01-01

    Written after the 2005 NPT review conference, this article first recalls the early stages of nuclear proliferation: acquisition of nuclear weapons by Great-Britain, USSR, France and China, and creation of the NPT in 1970. The author briefly evokes some weaknesses and violations of this treaty: emergence of new nuclear powers (India, Pakistan, Israel) and of nuclear weapon programmes (Iran, North Korea). He outlines the lack of true rules to impede countries to develop nuclear weapons, and then states that the only solution seems to be a simple abolition of these weapons. This option is notably supported by the Catholic Church as outlined and recalled here. The author discusses the situation of this abolition option, and notices that, even though NPT members committed themselves on this way, some also decided to develop new and smaller weapons. Then, it becomes always more difficult to persuade countries not to possess these weapons. The author finally discusses the issues of terrorism threat in relationship to the miniaturisation process, and regrets the lack of commitment in an abolition process

  8. Capacity constrained assignment in spatial databases

    DEFF Research Database (Denmark)

    U, Leong Hou; Yiu, Man Lung; Mouratidis, Kyriakos

    2008-01-01

    large to fit in main memory. Motivated by this fact, we propose efficient algorithms for optimal assignment that employ novel edge-pruning strategies, based on the spatial properties of the problem. Additionally, we develop approximate (i.e., suboptimal) CCA solutions that provide a trade-off between...

  9. Generalised Assignment Matrix Methodology in Linear Programming

    Science.gov (United States)

    Jerome, Lawrence

    2012-01-01

    Discrete Mathematics instructors and students have long been struggling with various labelling and scanning algorithms for solving many important problems. This paper shows how to solve a wide variety of Discrete Mathematics and OR problems using assignment matrices and linear programming, specifically using Excel Solvers although the same…

  10. FLEET ASSIGNMENT MODELLING

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available The article is devoted to the airline scheduling process and methods of its modeling. This article describes the main stages of airline scheduling process (scheduling, fleet assignment, revenue management, operations, their features and interactions. The main part of scheduling process is fleet assignment. The optimal solution of the fleet assignment problem enables airlines to increase their incomes up to 3 % due to quality improving of connections and execution of the planned number of flights operated by less number of aircraft than usual or planned earlier. Fleet assignment of scheduling process is examined and Conventional Leg-Based Fleet Assignment Model is analyzed. Finally strong and weak aspects of the model (SWOT are released and applied. The article gives a critical analysis of FAM model, with the purpose of identi- fying possible options and constraints of its use (for example, in cases of short-term and long-term planning, changing the schedule or replacing the aircraft, as well as possible ways to improve the model.

  11. Algorithms for Port-of-Entry Inspection

    National Research Council Canada - National Science Library

    Roberts, Fred S

    2007-01-01

    .... The percentage at some ports has now risen to 6%, but this is still a very small percentage. The purpose of this project was to develop decision support algorithms that help to optimally intercept illicit materials and weapons...

  12. Inferential backbone assignment for sparse data

    International Nuclear Information System (INIS)

    Vitek, Olga; Bailey-Kellogg, Chris; Craig, Bruce; Vitek, Jan

    2006-01-01

    This paper develops an approach to protein backbone NMR assignment that effectively assigns large proteins while using limited sets of triple-resonance experiments. Our approach handles proteins with large fractions of missing data and many ambiguous pairs of pseudoresidues, and provides a statistical assessment of confidence in global and position-specific assignments. The approach is tested on an extensive set of experimental and synthetic data of up to 723 residues, with match tolerances of up to 0.5 ppm for C α and C β resonance types. The tests show that the approach is particularly helpful when data contain experimental noise and require large match tolerances. The keys to the approach are an empirical Bayesian probability model that rigorously accounts for uncertainty in the data at all stages in the analysis, and a hybrid stochastic tree-based search algorithm that effectively explores the large space of possible assignments

  13. Task assignment and coaching

    NARCIS (Netherlands)

    Dominguez-Martinez, S.

    2009-01-01

    An important task of a manager is to motivate her subordinates. One way in which a manager can give incentives to junior employees is through the assignment of tasks. How a manager allocates tasks in an organization, provides information to the junior employees about his ability. Without coaching

  14. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  15. Space weapon technology and policy

    Science.gov (United States)

    Hitchens, Theresa

    2017-11-01

    The military use of space, including in support of nuclear weapons infrastructure, has greatly increased over the past 30 years. In the current era, rising geopolitical tensions between the United States and Russia and China have led to assumptions in all three major space powers that warfighting in space now is inevitable, and possible because of rapid technological advancements. New capabilities for disrupting and destroying satellites include radio-frequency jamming, the use of lasers, maneuverable space objects and more capable direct-ascent anti-satellite weapons. This situation, however, threatens international security and stability among nuclear powers. There is a continuing and necessary role for diplomacy, especially the establishment of normative rules of behavior, to reduce risks of misperceptions and crisis escalation, including up to the use of nuclear weapons. U.S. policy and strategy should seek a balance between traditional military approaches to protecting its space assets and diplomatic tools to create a more secure space environment.

  16. Personnel dose assignment practices

    International Nuclear Information System (INIS)

    Fix, J.J.

    1993-04-01

    Implementation of DOE N 5480.6 Radiological Control Manual Article 511(3) requirements, to minimize the assignment of personnel dosimeters, should be done only under a broader context ensuring that capabilities are in place to monitor and record personnel exposure both for compliance and for potential litigation. As noted in NCRP Report No. 114, personnel dosimetry programs are conducted to meet four major objectives: radiation safety program control and evaluation; regulatory compliance; epidemiological research; and litigation. A change to Article 511(3) is proposed that would require that minimizing the assignment of personnel dosimeters take place only following full evaluation of overall capabilities (e.g., access control, area dosimetry, etc.) to meet the NCRP objectives

  17. Scaffolding students’ assignments

    DEFF Research Database (Denmark)

    Slot, Marie Falkesgaard

    2013-01-01

    This article discusses scaffolding in typical student assignments in mother tongue learning materials in upper secondary education in Denmark and the United Kingdom. It has been determined that assignments do not have sufficient scaffolding end features to help pupils understand concepts and build...... objects. The article presents the results of empirical research on tasks given in Danish and British learning materials. This work is based on a further development of my PhD thesis: “Learning materials in the subject of Danish” (Slot 2010). The main focus is how cognitive models (and subsidiary explicit...... learning goals) can help students structure their argumentative and communica-tive learning processes, and how various multimodal representations can give more open-ended learning possibilities for collaboration. The article presents a short introduction of the skills for 21st century learning and defines...

  18. Task assignment and coaching

    OpenAIRE

    Dominguez-Martinez, S.

    2009-01-01

    An important task of a manager is to motivate her subordinates. One way in which a manager can give incentives to junior employees is through the assignment of tasks. How a manager allocates tasks in an organization, provides information to the junior employees about his ability. Without coaching from a manager, the junior employee only has information about his past performance. Based on his past performance, a talented junior who has performed a difficult task sometimes decides to leave the...

  19. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  20. Weapons engineering tritium facility overview

    Energy Technology Data Exchange (ETDEWEB)

    Najera, Larry [Los Alamos National Laboratory

    2011-01-20

    Materials provide an overview of the Weapons Engineering Tritium Facility (WETF) as introductory material for January 2011 visit to SRS. Purpose of the visit is to discuss Safety Basis, Conduct of Engineering, and Conduct of Operations. WETF general description and general GTS program capabilities are presented in an unclassified format.

  1. Biological effects of nuclear weapons

    International Nuclear Information System (INIS)

    Frischauf, H.

    1983-01-01

    Prompt and delayed biological effects of nuclear weapons are discussed. The response to excess pressure on man is estimated, the acute radiation syndrome caused by different radiation doses and cancerogenous and genetic effects are described. Medical care after a nuclear explosion would be difficult and imperfect. (M.J.)

  2. Non-Lethal Weapons Program

    Science.gov (United States)

    Sheets Frequently Asked Questions Non-Lethal Weapons FAQs Active Denial System FAQs Human Electro -Muscular Incapacitation FAQs Related Links Business Opportunities Contact JNLWD Congressional Engagement , Wednesday, Sept 20, 2017. The Active Denial System, blunt-impact munitions, dazzling lasers, LRAD 100X

  3. Prerequisites for a nuclear weapons convention

    International Nuclear Information System (INIS)

    Liebert, W.

    1999-01-01

    A Nuclear Weapons Convention (NWC) would prohibit the research, development, production, testing, stockpiling, transfer, use and threat of use of nuclear weapons and would serve their total elimination.' In this fashion it follows the model laid out by the biological and chemical weapons conventions. The NWC would encompass a few other treaties and while replacing them should learn from their experiences. The Nuclear Weapons Convention should at some given point in the future replace the Non-Proliferation Treaty (NPT) and so resolve its contradictions and shortcomings. The main objectives of an NWC Would be: reduction of the nuclear arsenals of the 'five' nuclear weapons powers down to zero within a set of fixed periods of time; elimination of stockpiles of weapons-usable materials and, where existent, nuclear warheads in de-facto nuclear weapon and threshold states; providing assurance that all states will retain their non-nuclear status forever

  4. Disposition of excess weapons plutonium from dismantled weapons

    International Nuclear Information System (INIS)

    Jardine, L.J.

    1997-01-01

    With the end of the Cold War and the implementation of various nuclear arms reduction agreements, US and Russia have been actively dismantling tens of thousands of nuclear weapons. As a result,large quantities of fissile materials, including more than 100 (tonnes?) of weapons-grade Pu, have become excess to both countries' military needs. To meet nonproliferation goals and to ensure the irreversibility of nuclear arms reductions, this excess weapons Pu must be placed in secure storage and then, in timely manner, either used in nuclear reactors as fuel or discarded in geologic repositories as solid waste. This disposition in US and Russia must be accomplished in a safe, secure manner and as quickly as practical. Storage of this Pu is a prerequisite to any disposition process, but the length of storage time is unknown. Whether by use as fuel or discard as solid waste, disposition of that amount of Pu will require decades--and perhaps longer, if disposition operations encounter delays. Neither US nor Russia believes that long-term secure storage is a substitute for timely disposition of excess Pu, but long-term, safe, secure storage is a critical element of all excess Pu disposition activities

  5. International agreements on nuclear weapons

    International Nuclear Information System (INIS)

    Dombey, N.

    1982-01-01

    The satellite detection of a nuclear explosion in the South Atlantic and Israel's destruction of a research reactor in Iraq make it essential to strengthen existing monitoring and enforcement programs to prevent proliferation. While there was no reliable evidence that either South Africa or Iraq was violating non-proliferation agreements, worst case scenarios can demonstrate to unfriendly countries that South Africa had diverted fuel to test a nuclear weapon and that Iraq is intending to produce weapons-grade plutonium 239. The situation can be improved by formulating better terms and conditions for internationalizing access to materials. Nuclear suppliers need to agree on terms that will assure their customers that contracts for civil programs will be honored. The International Atomic Energy Agency (IAEA), which includes both nuclear suppliers and customers, could achieve stronger agreements that take into account recent technological advances that will expand enrichment and reprocessing activities. 23 references, 1 figure

  6. Atomic Weapons Establishment Bill [Money

    International Nuclear Information System (INIS)

    Bennett, A.F.; Cryer, Bob; Carlisle, Kenneth; Dean, Paul.

    1990-01-01

    The debate concerns the authorisation of payment of the money required to reorganise the atomic weapons establishment in the United Kingdom provided for in the Atomic Weapons Establishment Bill in progress through Parliament. In the Bill the contractorisation of the establishment is recommended and some sort of Government owned company operated scheme set up. The debate lasted about half an hour and is reported verbatim. The issues raised concerned the actual sums likely to be incurred in the formation of a Company to carry out the designated activities of the Bill. These are connected with the research, development, production or maintenance of nuclear devices and the premises needed. The government spokesman suggested the sums required to support the Bill would not be large and the resolution was agreed to without a vote. (UK)

  7. Three results on frequency assignment in linear cellular networks

    Czech Academy of Sciences Publication Activity Database

    Chrobak, M.; Sgall, Jiří

    2010-01-01

    Roč. 411, č. 1 (2010), s. 131-137 ISSN 0304-3975 R&D Projects: GA MŠk(CZ) 1M0545; GA AV ČR IAA100190902 Keywords : frequency assignment * approximation algorithms * online algorithms Subject RIV: BA - General Mathematics Impact factor: 0.838, year: 2010 http://www.sciencedirect.com/science/article/pii/S0304397509006574

  8. Effects of Directed Energy Weapons

    Science.gov (United States)

    1994-01-01

    S. Feld, Ronald E. McNair, and Stephen R. Wilk, “The Physics of Karate,” Scientific American 240, 150 (April, 1979). 103. See Kittel (note 18...References 1. Figure 4–1 was adapted from Stephen Cheung and Frederic H. Levien, Microwaves Made Simple: Principles and Applications. (Dedham, MA: Artech...Physics (New York: MC- Graw Hill, 1965). Effects of Directed Energy Weapons 258 16. The physical meaning of this integral is that the propagation path

  9. Physical effects of thermonuclear weapons

    International Nuclear Information System (INIS)

    Rotblat, J.

    1984-01-01

    The detonation of nuclear weapons gives rise to the following: blast wave; thermal wave; initial radiation (neutrons and gamma-rays); local radioactive fallout; global radioactive fallout; electromagnetic pulse; atmospheric disturbances. Some of these phenomena became known only as a result of the use or testing of bombs and are not as yet fully understood. They produce physical or biological effects or both, almost all of which are directly detrimental to human health. Some are likely to damage the environment

  10. Flexible taxonomic assignment of ambiguous sequencing reads

    Directory of Open Access Journals (Sweden)

    Jansson Jesper

    2011-01-01

    Full Text Available Abstract Background To characterize the diversity of bacterial populations in metagenomic studies, sequencing reads need to be accurately assigned to taxonomic units in a given reference taxonomy. Reads that cannot be reliably assigned to a unique leaf in the taxonomy (ambiguous reads are typically assigned to the lowest common ancestor of the set of species that match it. This introduces a potentially severe error in the estimation of bacteria present in the sample due to false positives, since all species in the subtree rooted at the ancestor are implicitly assigned to the read even though many of them may not match it. Results We present a method that maps each read to a node in the taxonomy that minimizes a penalty score while balancing the relevance of precision and recall in the assignment through a parameter q. This mapping can be obtained in time linear in the number of matching sequences, because LCA queries to the reference taxonomy take constant time. When applied to six different metagenomic datasets, our algorithm produces different taxonomic distributions depending on whether coverage or precision is maximized. Including information on the quality of the reads reduces the number of unassigned reads but increases the number of ambiguous reads, stressing the relevance of our method. Finally, two measures of performance are described and results with a set of artificially generated datasets are discussed. Conclusions The assignment strategy of sequencing reads introduced in this paper is a versatile and a quick method to study bacterial communities. The bacterial composition of the analyzed samples can vary significantly depending on how ambiguous reads are assigned depending on the value of the q parameter. Validation of our results in an artificial dataset confirm that a combination of values of q produces the most accurate results.

  11. Job Assignments under Moral Hazard

    DEFF Research Database (Denmark)

    Koch, Alexander; Nafziger, Julia

    Inefficient job assignments are usually explained with incomplete information about employees' abilities or contractual imperfections. We show that inefficient assignments arise even without uncertainty about the employee's ability and with complete contracts. Building on this result we provide...

  12. Solving multiconstraint assignment problems using learning automata.

    Science.gov (United States)

    Horn, Geir; Oommen, B John

    2010-02-01

    This paper considers the NP-hard problem of object assignment with respect to multiple constraints: assigning a set of elements (or objects) into mutually exclusive classes (or groups), where the elements which are "similar" to each other are hopefully located in the same class. The literature reports solutions in which the similarity constraint consists of a single index that is inappropriate for the type of multiconstraint problems considered here and where the constraints could simultaneously be contradictory. This feature, where we permit possibly contradictory constraints, distinguishes this paper from the state of the art. Indeed, we are aware of no learning automata (or other heuristic) solutions which solve this problem in its most general setting. Such a scenario is illustrated with the static mapping problem, which consists of distributing the processes of a parallel application onto a set of computing nodes. This is a classical and yet very important problem within the areas of parallel computing, grid computing, and cloud computing. We have developed four learning-automata (LA)-based algorithms to solve this problem: First, a fixed-structure stochastic automata algorithm is presented, where the processes try to form pairs to go onto the same node. This algorithm solves the problem, although it requires some centralized coordination. As it is desirable to avoid centralized control, we subsequently present three different variable-structure stochastic automata (VSSA) algorithms, which have superior partitioning properties in certain settings, although they forfeit some of the scalability features of the fixed-structure algorithm. All three VSSA algorithms model the processes as automata having first the hosting nodes as possible actions; second, the processes as possible actions; and, third, attempting to estimate the process communication digraph prior to probabilistically mapping the processes. This paper, which, we believe, comprehensively reports the

  13. Contact replacement for NMR resonance assignment.

    Science.gov (United States)

    Xiong, Fei; Pandurangan, Gopal; Bailey-Kellogg, Chris

    2008-07-01

    Complementing its traditional role in structural studies of proteins, nuclear magnetic resonance (NMR) spectroscopy is playing an increasingly important role in functional studies. NMR dynamics experiments characterize motions involved in target recognition, ligand binding, etc., while NMR chemical shift perturbation experiments identify and localize protein-protein and protein-ligand interactions. The key bottleneck in these studies is to determine the backbone resonance assignment, which allows spectral peaks to be mapped to specific atoms. This article develops a novel approach to address that bottleneck, exploiting an available X-ray structure or homology model to assign the entire backbone from a set of relatively fast and cheap NMR experiments. We formulate contact replacement for resonance assignment as the problem of computing correspondences between a contact graph representing the structure and an NMR graph representing the data; the NMR graph is a significantly corrupted, ambiguous version of the contact graph. We first show that by combining connectivity and amino acid type information, and exploiting the random structure of the noise, one can provably determine unique correspondences in polynomial time with high probability, even in the presence of significant noise (a constant number of noisy edges per vertex). We then detail an efficient randomized algorithm and show that, over a variety of experimental and synthetic datasets, it is robust to typical levels of structural variation (1-2 AA), noise (250-600%) and missings (10-40%). Our algorithm achieves very good overall assignment accuracy, above 80% in alpha-helices, 70% in beta-sheets and 60% in loop regions. Our contact replacement algorithm is implemented in platform-independent Python code. The software can be freely obtained for academic use by request from the authors.

  14. For a convention for nuclear weapon elimination

    International Nuclear Information System (INIS)

    2008-03-01

    This document contains two texts linked with the project of an international convention for the elimination of nuclear weapons (the text of this project has been sent to the UN General Secretary and is part of an international campaign to abolish nuclear weapons, ICAN). These two texts are contributions presented in London at the Global Summit for a Nuclear Weapon-free World. The first one calls into question the deterrence principle and the idea of a nuclear weapon-based security. It calls for different forms of action to promote a nuclear weapon-free world. The second text stresses the role and the responsibility of states with nuclear weapons in nuclear disarmament and in the reinforcement of the nuclear non proliferation treaty (NPT)

  15. Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program

    National Research Council Canada - National Science Library

    1998-01-01

    We performed the audit in response to allegations made to the Defense Hotline concerning conflicts of interest among members of the Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program...

  16. Neutron weapons. War prevention by credible deterrence

    International Nuclear Information System (INIS)

    1981-11-01

    The neutron bomb has prompted fierce and controversial public discussions which are more emotional than based on facts. Unaware of the factual repercussions this weapon has, it has been described as the most inhumane weapon ever. By saying so, the public is wrongly informed and is made feel insecure. The following contributions made by competent authorities may be used for getting to the point, pointing out that the neutron bomb is primarily a defensive weapon. (orig.) [de

  17. New Weapons and the Arms Race

    Science.gov (United States)

    Tsipis, Kosta

    1983-10-01

    In speaking about technologies that could further animate the weapons competition between the United States and the U.S.S.R., it would be useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, adn can best be described by the tasks that they can perform rather than any specific weapons application. Let me begin with the latter class.

  18. Do Weapons Facilitate Adolescent Delinquency? An Examination of Weapon Carrying and Delinquency Among Adolescents.

    Science.gov (United States)

    Emmert, Amanda D; Hall, Gina Penly; Lizotte, Alan J

    2018-03-01

    This article examines whether weapon carrying influences the frequency and variety of violent, property, and drug delinquency adolescents commit through fixed-effects analyses of data from the Rochester Youth Development Study (RYDS). We conclude that weapon carrying contributes to violent, substance, and property delinquency, and delinquent behaviors learned during weapon carrying continue to affect substance and property delinquency long after carrying has ceased.

  19. Nuclear weapons non proliferation treaty

    International Nuclear Information System (INIS)

    1969-01-01

    Taking into account the devastation that a nuclear war would inflict upon mankind, and the resulting need to do all that is in our power to keep such a tragedy from occuring, as well as to implement measures to safeguard all the peoples' safety, each State that owns nuclear weapons and that is a part of the Treaty pledges not to trade nuclear weapons, other explosive devices nor the control over such instruments to any other entity whatsoever, wether directly or indirectly. Likewise, all States that does not posses any nuclear weaponry and that are part of the Treaty, in turn pledge not to receive from any other entity nuclear weaponry or other explosive devices in trade, wether directly or indirectly; not to manufacture or otherwise acquire this fashion of weaponry and not to request or accept any help whatsoever in the manufacturing of nuclear weaponry or related devices. The present Treaty remains open to the subscription of other countries, on July 26, 1968, with Mexico as one of the signatory countries

  20. Weapons of mass destruction, WMD

    International Nuclear Information System (INIS)

    Vogel, H.

    2007-01-01

    Purpose: Since the invasion into Iraq in 2003, weapons of mass destruction (WMD), have come to general notice; they include today chemical, biological, and atomic/nuclear weapons, (CW, BW, and AW). Radiological findings shall be described. Material and methods: X-ray findings of victims of WMD are described. From CW, own observations are reported. Examples of (possible) X-ray findings of victims of BW are described. AW may induce radiation disease. Results: Exposure to sulfur-lost induces severe bronchitis; if the radiograph shows pulmonary infiltrations, the prognosis is bad; a late consequence maybe bronchiectasis. BW can be based on bacteria, virus or toxins. An approach of the X-ray findings for BW victims is based on the assumption that the disease induced by BW has the same (or a similar) clinic and radiology as that induced by the original microorganism or by the unchanged toxism. This approximation may have its limits, if the germ or toxin has been modified. In survivors of AW, the radiology is probably that of victims of thermal radiation and blast. Conclusion: WMD seem to be a real or a possible threat. They can be used in war, in terrorist attacks, in crime, and in action of secret services. In case that WMD are employed, X-ray diagnostic will be used to evaluate the prognosis (triage) and the risk of infection

  1. Weapons of mass destruction, WMD

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, D-20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de

    2007-08-15

    Purpose: Since the invasion into Iraq in 2003, weapons of mass destruction (WMD), have come to general notice; they include today chemical, biological, and atomic/nuclear weapons, (CW, BW, and AW). Radiological findings shall be described. Material and methods: X-ray findings of victims of WMD are described. From CW, own observations are reported. Examples of (possible) X-ray findings of victims of BW are described. AW may induce radiation disease. Results: Exposure to sulfur-lost induces severe bronchitis; if the radiograph shows pulmonary infiltrations, the prognosis is bad; a late consequence maybe bronchiectasis. BW can be based on bacteria, virus or toxins. An approach of the X-ray findings for BW victims is based on the assumption that the disease induced by BW has the same (or a similar) clinic and radiology as that induced by the original microorganism or by the unchanged toxism. This approximation may have its limits, if the germ or toxin has been modified. In survivors of AW, the radiology is probably that of victims of thermal radiation and blast. Conclusion: WMD seem to be a real or a possible threat. They can be used in war, in terrorist attacks, in crime, and in action of secret services. In case that WMD are employed, X-ray diagnostic will be used to evaluate the prognosis (triage) and the risk of infection.

  2. Algorithmic approach to diagram techniques

    International Nuclear Information System (INIS)

    Ponticopoulos, L.

    1980-10-01

    An algorithmic approach to diagram techniques of elementary particles is proposed. The definition and axiomatics of the theory of algorithms are presented, followed by the list of instructions of an algorithm formalizing the construction of graphs and the assignment of mathematical objects to them. (T.A.)

  3. Weapons material and the commercial fuel cycle

    International Nuclear Information System (INIS)

    Steyn, J.J.

    1993-01-01

    In 1991, the United States and the former USSR had arsenals of ∼18,000 and 27,200 nuclear weapons, respectively. Approximately 10,000 of the US and 13,000 of the former USSR weapons were in the strategic category, and the remainder were tactical weapons. The dramatic changes in the political climate between the United States and the republics of the former USSR have resulted in the signing of the Strategic Arms Reduction Treaty (START I and II), agreements to substantially reduce nuclear weapons arsenals. Tactical weapons have already been collected in Russia, and strategic weapons are to be collected by the end of 1994. The major issues in accomplishing the treaty reductions appear to be funding, transport safety, storage capacity, and political issues between Russia and Ukraine because the latter seems to be using its weapons for political leverage on other matters. Collectively, the US and former USSR warhead stockpiles contain tremendous inventories of high-enriched uranium and weapons-grade plutonium which if converted to light water reactor fuel would equate to an enormous economic supply of natural uranium, conversion services, and enrichment separative work. The potential for this material entering the light water reactor fuel marketplace was enhanced in July 1992, when the two US industrial companies, Nuclear Fuel Services and Allied-Signal, announced that they had reached a preliminary agreement with the Russian ministry, Minatom, and the Russian Academay of Sciences to convert Russian high-enriched uranium to low-enriched uranium

  4. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  5. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  6. Consequences of the Use of Neutron Weapons

    International Nuclear Information System (INIS)

    Ilijas, B.

    1998-01-01

    In modern conceptions of the use of nuclear weapons there is a significant role of so called enhanced radiation weapons, also known as neutron weapons. Its most important feature is that all other effects (blast, thermal) are minimized in favour of neutron radiation. Because of the great penetrative capability and biological efficiency, neutron beam is ideal weapon against people in shelters and armoured vehicles. Material goods stay saved and also there is no significant long- term radioactive contamination. After the use of this weapons, which is possible even for tactical tasks on limited area, one must count with great number of people irradiated with doses in wide range - from those enough for instantaneous incapacitation to those which cause only long-term effects. For the purpose of maximal efficiency in this situation, it is necessary to work out plans for dosimetric control, first aid, transport and medical treatment of irradiated people (soldiers and civilians) in war conditions. (author)

  7. Nuclear experts and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Mueller, H.

    1979-01-01

    In Germany the issue of nuclear weapons proliferation has attracted scant attention. Most potential nuclear weapon states are important trade partners of the FRG and, since further proliferation of nuclear weapons could worsen conflicts involving these, it should be in the FRG's interest to limit proliferation. The security of the FRG is also dependent on the common interest of the great powers to avoid nuclear war. The contradictory positions of Usa and the USSR on nuclear weapons policy regarding themselves and non-nuclear weapon states encourages less developed countries to see nuclear weaponry as useful. The NPT and IAEA safeguards have only limited inhibiting effect. The nuclear export policy of the FRG has been dominated by short term economic advantage, neglecting the negative long term effects of decreased political stability. The FRG should formulate a policy based on self-restraint, positive stimuli and extension of controls, using its economic strength to deter proliferation. (JIW)

  8. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  9. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    Science.gov (United States)

    2016-03-01

    come under fire from multiple sources simultaneously. These threats would be engaged in a numbers game , seeking to saturate the battlespace with many...optimization extension that uses the Python modeling language. B. TEST SCENARIO The following test scenario was developed to validate the models...Adaptive rapid response to swarming threats Concept Briefing. Presented at Naval Postgraduate School, Monterey, CA. Python [Computer Software]. (2015

  10. A demand assignment control in international business satellite communications network

    Science.gov (United States)

    Nohara, Mitsuo; Takeuchi, Yoshio; Takahata, Fumio; Hirata, Yasuo

    An experimental system is being developed for use in an international business satellite (IBS) communications network based on demand-assignment (DA) and TDMA techniques. This paper discusses its system design, in particular from the viewpoints of a network configuration, a DA control, and a satellite channel-assignment algorithm. A satellite channel configuration is also presented along with a tradeoff study on transmission rate, HPA output power, satellite resource efficiency, service quality, and so on.

  11. Evaluation of Dynamic Channel and Power Assignment for Cognitive Networks

    Energy Technology Data Exchange (ETDEWEB)

    Syed A. Ahmad; Umesh Shukla; Ryan E. Irwin; Luiz A. DaSilva; Allen B. MacKenzie

    2011-03-01

    In this paper, we develop a unifying optimization formulation to describe the Dynamic Channel and Power Assignment (DCPA) problem and evaluation method for comparing DCPA algorithms. DCPA refers to the allocation of transmit power and frequency channels to links in a cognitive network so as to maximize the total number of feasible links while minimizing the aggregate transmit power. We apply our evaluation method to five algorithms representative of DCPA used in literature. This comparison illustrates the tradeoffs between control modes (centralized versus distributed) and channel/power assignment techniques. We estimate the complexity of each algorithm. Through simulations, we evaluate the effectiveness of the algorithms in achieving feasible link allocations in the network, as well as their power efficiency. Our results indicate that, when few channels are available, the effectiveness of all algorithms is comparable and thus the one with smallest complexity should be selected. The Least Interfering Channel and Iterative Power Assignment (LICIPA) algorithm does not require cross-link gain information, has the overall lowest run time, and highest feasibility ratio of all the distributed algorithms; however, this comes at a cost of higher average power per link.

  12. Non proliferation of nuclear weapons?

    International Nuclear Information System (INIS)

    Le Guelte, Georges

    2015-10-01

    After having evoked the behaviour of nuclear countries regarding the development of nuclear weapons and uranium procurement, or nuclear programmes after the Second World War until nowadays, the author presents the non proliferation Treaty (NPT) as a construction at the service of super-powers. He comments and discusses the role of the IAEA control system and its evolutions: a control limited to declared installations, an export control with the spectre of plutonium, a control system thwarted by some technological innovations, information systems coming in, and an additional protocol related to the application of guarantees. He comments the evolution of the context from a bipolar world to a world without pole which raises the issue of how to have commitments respected: description of the role and practice of non proliferation during the Cold War, after the Cold War, and in a world without governance

  13. Nuclear energy and nuclear weapons

    International Nuclear Information System (INIS)

    Robertson, J.A.L.

    1983-06-01

    We all want to prevent the use of nuclear weapons. The issue before us is how best to achieve this objective; more specifically, whether the peaceful applications of nuclear energy help or hinder, and to what extent. Many of us in the nuclear industry are working on these applications from a conviction that without peaceful nuclear energy the risk of nuclear war would be appreciably greater. Others, however, hold the opposite view. In discussing the subject, a necessary step in allaying fears is understanding some facts, and indeed facing up to some unpalatable facts. When the facts are assessed, and a balance struck, the conclusion is that peaceful nuclear energy is much more part of the solution to preventing nuclear war than it is part of the problem

  14. AWRE: Atomic Weapons Research Establishment

    International Nuclear Information System (INIS)

    1983-01-01

    This reviews the work of AWRE at Aldermaston and Foulness. The main programme is nuclear and is concerned with the design and development of warheads for strategic and tactical nuclear weapons for the British nuclear deterrent, including those for the Royal Navy's missile carrying submarine fleet. The work is described grouped as design physics, development and materials. Services to these groups and to the whole establishment are provided by Engineering, Safety and Administration. The work ranges from long-term fundamental research, the development of technology, design, prototype development to the environmental testing of engineered products. In materials research the emphasis is on plutonium, uranium and beryllium, on high explosives and a wide range of inorganic and organic materials. The physics of the earth's crust is studied to aid detection of underground nuclear explosions. Reactor research facilities include the two reactors, Herald and Viper. (U.K.)

  15. Interactive visual exploration and refinement of cluster assignments.

    Science.gov (United States)

    Kern, Michael; Lex, Alexander; Gehlenborg, Nils; Johnson, Chris R

    2017-09-12

    With ever-increasing amounts of data produced in biology research, scientists are in need of efficient data analysis methods. Cluster analysis, combined with visualization of the results, is one such method that can be used to make sense of large data volumes. At the same time, cluster analysis is known to be imperfect and depends on the choice of algorithms, parameters, and distance measures. Most clustering algorithms don't properly account for ambiguity in the source data, as records are often assigned to discrete clusters, even if an assignment is unclear. While there are metrics and visualization techniques that allow analysts to compare clusterings or to judge cluster quality, there is no comprehensive method that allows analysts to evaluate, compare, and refine cluster assignments based on the source data, derived scores, and contextual data. In this paper, we introduce a method that explicitly visualizes the quality of cluster assignments, allows comparisons of clustering results and enables analysts to manually curate and refine cluster assignments. Our methods are applicable to matrix data clustered with partitional, hierarchical, and fuzzy clustering algorithms. Furthermore, we enable analysts to explore clustering results in context of other data, for example, to observe whether a clustering of genomic data results in a meaningful differentiation in phenotypes. Our methods are integrated into Caleydo StratomeX, a popular, web-based, disease subtype analysis tool. We show in a usage scenario that our approach can reveal ambiguities in cluster assignments and produce improved clusterings that better differentiate genotypes and phenotypes.

  16. Fourth and Fifth Amendment issues raised by Chemical Weapons Convention inspections

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A. [Argonne National Lab., IL (United States). Economics and Law Section

    1994-10-21

    The Chemical Weapons Convention (CWC) offers a unique challenge to the United States system of constitutional law. This discussion is about the Fourth and Fifth Amendment issues raised by the CWC and about how federal implementing legislation can allow verification inspections to take place in the United States under the Chemical Weapons Convention while remaining in compliance with the Constitution. By implementing legislation, the author means a federal statute that would be enacted separately from Senate approval of the Convention itself. Although implementing legislation is a relatively unusual accompaniment to a treaty, it will be necessary to the CWC, and the Administration has submitted a bill that was under consideration in the last Congress and presumably will be reintroduced early next year. The Fourth and Fifth Amendment problems posed by the CWC arise from the verification inspection scheme embodied in the treaty. The CWC depends heavily on on-site inspections to verify compliance with its key requirements. These include destroying all chemicals weapons stockpiles and bringing potential chemical weapons precursors under international control. The Convention contains four distinct kinds of inspections: systematic inspections of chemical weapons storage and destruction facilities, routine inspections of various declared facilities, challenge inspections, and a variant on challenge inspections in cases of alleged use of chemical weapons. All inspections are supposed to be only as intrusive as necessary to carry out the Convention. These inspections will be carried out by inspectors employed by the Organization for the Prohibition of Chemical Weapons (OPCW), located in The Hague, which is responsible for enforcing the Convention. Generally, the inspected State Party is permitted to assign observers to accompany the inspectors.

  17. Characterising the online weapons trafficking on cryptomarkets.

    Science.gov (United States)

    Rhumorbarbe, Damien; Werner, Denis; Gilliéron, Quentin; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin

    2018-02-01

    Weapons related webpages from nine cryptomarkets were manually duplicated in February 2016. Information about the listings (i.e. sales proposals) and vendors' profiles were extracted to draw an overview of the actual online trafficking of weapons. Relationships between vendors were also inferred through the analysis of online digital traces and content similarities. Weapons trafficking is mainly concentrated on two major cryptomarkets. Besides, it accounts for a very small proportion of the illicit trafficking on cryptomarkets compared to the illicit drugs trafficking. Among all weapon related listings (n=386), firearms only account for approximately 25% of sales proposal since the proportion of non-lethal and melee weapons is important (around 46%). Based on the recorded pseudonyms, a total of 96 vendor profiles were highlighted. Some pseudonyms were encountered on several cryptomarkets, suggesting that some vendors may manage accounts on different markets. This hypothesis was strengthened by comparing pseudonyms to online traces such as PGP keys, images and profiles descriptions. Such a method allowed to estimate more accurately the number of vendors offering weapons across cryptomarkets. Finally, according to the gathered data, the extent of the weapons trafficking on the cryptomarkets appear to be limited compared to other illicit goods. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Assessment as a Strategic Weapon.

    Science.gov (United States)

    Alfred, Richard L.

    2000-01-01

    Sets forth eight rules for using assessment to allow community colleges to create a distinctive image: create a "brand identity," differentiate the institution from competitors, big picture goals, total institution performance, priority assigned to stakeholders, measuring intangible benefits, continuous customer touch, and urgency for action.…

  19. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  20. Game theory and traffic assignment.

    Science.gov (United States)

    2013-09-01

    Traffic assignment is used to determine the number of users on roadway links in a network. While this problem has : been widely studied in transportation literature, its use of the concept of equilibrium has attracted considerable interest : in the f...

  1. UOP LDR 300 All Assignments New

    OpenAIRE

    ADMIN

    2018-01-01

    UOP LDR 300 All Assignments New Check this A+ tutorial guideline at http://www.ldr300assignment.com/ldr-300-uop/ldr-300-all-assignments-latest For more classes visit http://www.ldr300assignment.com LDR 300 Week 1 Assignment Leadership Assessment (2 Papers) LDR 300 Week 2 Assignment Leadership Theories Matrix (2 Set) LDR 300 Week 2 Assignment Formulating Leadership Part I (2 Papers) LDR 300 Week 3 Assignment Interaction and Influence Amo...

  2. Bugs and gas: Agreements banning chemical and biological weapons

    Science.gov (United States)

    Mikulak, Robert P.

    2017-11-01

    The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.

  3. Democracy, public opinion, and nuclear weapons

    International Nuclear Information System (INIS)

    Russett, B.

    1989-01-01

    To the degree that people's fears of nuclear war are deep and pervasive, they become subject to manipulation by cynical or politically utopian promises, whether those promises be to abolish nuclear weapons from the earth or to create a leakproof peace shield (SDI). But the basic yearning for protection could also be mobilized to support serious arms reduction and arms control agreements. Nuclear weapons provide the basis for a vivid form of symbolic politics, perhaps equivalent in foreign policy considerations to the Korean and Vietnam wars during their durations, and in similar ways (although not necessarily as severe) as unemployment does among domestic policy issues. This paper presents survey research directed specifically at the role of public opinion on nuclear imagery (difference between expectation of nuclear war versus any kind of weapon war; willingness to spend on nuclear weapons versus conventional ones or general defense spending) can help in understanding these phenomena

  4. North Korea's Nuclear Weapons: Latest Developments

    National Research Council Canada - National Science Library

    Nikitin, Mary B

    2007-01-01

    .... The Six-Party Talks include the United States, South Korea, Japan, China, Russia, and North Korea, and were begun in August 2003 to attempt to resolve the current crisis over North Korean nuclear weapons...

  5. Directed-Energy Weapons: Invisible and Invincible?

    National Research Council Canada - National Science Library

    Deveci, Bayram M

    2007-01-01

    ... capacity, low operational cost, reduced logistic support, a nearly unlimited magazine, and wide area coverage for offensive and defensive purposes, seem to be at the forefront of the next revolution in military weapons...

  6. Health and environmental effects of nuclear weapons

    International Nuclear Information System (INIS)

    1993-01-01

    This report briefly reviews previous WHO work on the health consequences of nuclear war and concentrates on current information about the effects of nuclear weapons on health, and related environmental problems. 15 refs

  7. Peaceful uses of nuclear weapon plutonium

    International Nuclear Information System (INIS)

    Burtak, F.

    1996-01-01

    In 1993, the U.S.A. and the CIS signed Start 2 (the Strategic Arms Reduction Treaty) in which they committed themselves the reduce their nuclear weapon arsenals to a fraction of that of 1991. For forty-five years the antagonism between the superpowers had been a dominating factor in world history, determining large areas of social life. When Start 2 will have been completed in 2003, some 200 t of weapon grade plutonium and some 2000 t of highly enriched uranium (Heu) will arise from dismantling nuclear weapons. In the absence of the ideological ballast of the debate about Communism versus Capitalism of the past few decades there is a chance of the grave worldwide problem of safe disposal and utilization of this former nuclear weapon material being solved. Under the heading of 'swords turned into plowshares', plutonium and uranium could be used for peaceful electricity generation. (orig.) [de

  8. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  9. Oil and influence: the oil weapon examined

    Energy Technology Data Exchange (ETDEWEB)

    Maull, H

    1975-01-01

    The term ''oil weapon'' as used here signifies any manipulation of the price and/or supply of oil by exporting nations with the intention of changing the political behavior of the consumer nations. The political potential of the oil price is fairly restricted so, in effect, the supply interruptions are of prime concern. Manipulating price does, in principle, offer the possibilities of both conferring rewards and inflicting sanctions. Oil could be sold on preferential prices and terms. A precondition for using the oil weapon successfully would be the ability to cause real and serious damage to the consumer countries. Four damaging potentials for using the oil weapon could include its application by: (1) one producer against one consumer; (2) one producer against all consumers; (3) a group of producers against one consumer; and (4) by a group of producers against all consumers. It is concluded that the oil weapon will continue to be a force in the international system. (MCW)

  10. Weapons dismantlement issues in independent Ukraine

    International Nuclear Information System (INIS)

    Zack, N.R.

    1995-01-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993 in Kiev, Ukraine, titled, ''Toward a Nuclear-Free Future--Barriers and Problems.'' It brought together Ukrainians, Belarusians and Americans to discuss the legal, political, economic, technical, and safeguards and security dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, the Ukrainian Parliament's nonapproval of START 1, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues. This paper will highlight and detail the issues, concerns and possible impacts of the Ukraine's dismantlement of its nuclear weapons

  11. Perceived popularity of adolescents who use weapons in violence and adolescents who only carry weapons.

    Science.gov (United States)

    Wallace, Lacey N

    2017-01-01

    Prior research has found that persistently delinquent youth or more violent youth were less popular than their less delinquent peers (Young, 2013). However, recent research has also found that weapon carrying is associated with being more popular in adolescence (Dijkstra et al., 2010). The present paper examines the perceived popularity of adolescents who carry weapons in comparison to those who both carry and use weapons in acts of violence or threatened violence. Data consist of two waves from the National Longitudinal Study of Adolescent to Adult Health. Analyses use OLS regression with lagged predictors. This paper found no differences in number of friends between weapon carriers and weapon users. However, among both male and female gang members, those who did not use or carry weapons (abstainers) named significantly fewer friends than weapon users. Among females, weapon abstainers both named and were named by significantly more people than weapon users. These differences were not observed for males. Implications of these results and directions for future research are discussed.

  12. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    Tyson, Rhianna

    2005-01-01

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  13. The Uncertain Consequences of Nuclear Weapons Use

    Science.gov (United States)

    2015-04-15

    this genre is the venerable, and classified, official “bible” of nuclear weapons effects, Capabilities of Nuclear Weapons. Widely referred to by...weekly comic Shukan Shonen Jampu and was later made into several film versions, a television drama series, and ten books, which follow Gen’s...civilized behavior. The film , distributed internationally and shown on Soviet television, was widely discussed in the United States and both depressed

  14. Weapon plutonium in accelerator driven power system

    International Nuclear Information System (INIS)

    Shvedov, O.V.; Murin, B.P.; Kochurov, B.P.; Shubin, Yu.M.; Volk, V.I.; Bogdanov, P.V.

    1997-01-01

    Accelerator Driven Systems are planned to be developed for the use (or destruction) of dozens of tons of weapon-grade Plutonium (W-Pu) resulted from the reducing of nuclear weapons. In the paper are compared the parameters of various types of accelerators, the physical properties of various types of targets and blankets, and the results of fuel cycle simulation. Some economical aspects are also discussed

  15. Responsibilities of the nuclear-weapon states

    International Nuclear Information System (INIS)

    Wang Jun

    1994-01-01

    The responsibilities of Nuclear Weapon States are presented by a straightforward analysis together with the ways in which they could fulfill them. The complete undertaking of all the commitments by the Nuclear Weapon States may take a long time. However they do not have a single excuse to neglect such a historic opportunity to do their best to provide a genuinely secure world environment for the international community, of which they too are members

  16. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Figure 17: Examples of Knowledge Scorecards 61 Page vi GAO-17-333SP Assessments of Selected Weapon Programs...programs. Page 61 GAO-17-333SP Assessments of Selected Weapon Programs Figure 17: Examples of Knowledge Scorecards Pursuant to a...had direct access to the USD AT&L and other senior acquisition officials, and some approval authorities were delegated to lower levels. For example

  17. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  18. Nuclear power without nuclear weapons

    International Nuclear Information System (INIS)

    Kaiser, K.; Klein, F.J.

    1982-01-01

    In this study leading experts summarize the work of a working group meeting during several years, and they represent the state of the art of the international discussion about the non-proliferation of nuclear weapons. The technical basis of proliferation, the relations between energy policy and nuclear energy, as well as the development of the non-proliferation system up to the present are thoroughly studied. Special attention is paid to the further development of the instruments of the non-proliferation policy, and approaches and ways to improving the control of the fuel cycle, e.g. by means of multinational methods or by improving the control requirements are analyzed. Also the field of positive inducements and negative sanctions to prevent the proliferation as well as the question of ensured supply are elucidated in detail. A further section then analyzes the functions of the international organizations active in this field and the nuclear policy of the most important western industrial nations, the RGW-states and the threshold countries of the Third World. This volume pays special attention to the nuclear policy of the Federal Republic of Germany and to the possibilities and necessities of a further development of the non-proliferation policy. (orig.) [de

  19. Electroshock weapons can be lethal!

    Science.gov (United States)

    Lundquist, Marjorie

    2008-03-01

    Electroshock weapons (EWs)-stun guns, tasers, riot shields-are electroconductive devices designed to safely incapacitate healthy men neuromuscularly, so they are called nonlethal or less-lethal. EW firms seeking large nonmilitary markets targeted law enforcement and corrections personnel, who began using EWs in prisons/jails and on public patrol in 1980 in the USA. This shifted the EW-shocked population from healthy soldiers to a heterogeneous mix of both sexes, ages 6-92, in a wide variety of health conditions! An EW operates by disrupting normal physiological processes, producing transient effects in healthy people. But if a person's health is sufficiently compromised, the margin of safety can be lost, resulting in death or permanent health problems. 325 people have died after EW shock since 1980. Did the EW cause these deaths? Evidence indicates that EWs do play a causal role in most such deaths. EWs can be lethal for people in diabetic shock^1 (hypoglycemia), which may be why Robert Dziekanski-a Polish immigrant to Canada-died so quickly after he was tasered at Vancouver Airport: not having eaten for over 10 hours, he likely was severely hypoglycemic. The EW death rate in North America is 30 times higher than need be, because EW users have not been properly trained to use EWs on a heterogeneous population safely! ^1J. Clinical Engineering 30(3):111(2005).

  20. Imaging of Nuclear Weapon Trainers

    Energy Technology Data Exchange (ETDEWEB)

    Schwellenbach, David [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-12-06

    The Configurable Muon Tracker (CMT) is an adaptation of the existing drift tube detector commercially available from Decision Sciences International Corporation (DSIC). NSTec engineered the CMT around commercially available drift tube assemblies to make a detector that is more versatile than previous drift tube assemblies. The CMT became operational in February 2013. Traditionally, cosmic-ray muon trackers rely on near-vertical trajectory muons for imaging. Since there are scenarios where imaging using vertical trajectory muons is not practical, NSTec designed the CMT specifically for quick configurability to track muons from any trajectory. The CMT was originally designed to be changed from vertical imaging mode to horizontal imaging mode in a few hours with access to a crane or other lifting equipment. In FY14, locations for imaging weapon trainers and SNM were identified and it was determined that lifting equipment would not typically be available in experimental areas. The CMT was further modified and a portable lifting system was developed to allow reconfiguration of the CMT without access to lifting equipment at the facility. This system was first deployed at Los Alamos National Laboratory’s W-division, where several trainers were imaged in both horizontal and vertical modes. Real-time images have been compared in both modes showing that imaging can be done in both modes with the expected longer integration time for horizontal mode. Further imaging and post processing of the data is expected to continue into early FY15.

  1. Weapons workers: Ruin or revival?

    International Nuclear Information System (INIS)

    Ustinov, A.

    1995-01-01

    The formidable task of restructuring the former Soviet Union's economic system depends largely on it success in converting a defense industry that once employed 11 million Soviet workers to peaceful pursuits, says Artiom Ustinov, a researcher in the U.S. and Canada Institute in Moscow. open-quotes Governments could convert defense facilities into those that develop and manufacture products that people desperately need and want,close quotes says Ustinov. Unfortunately, such a transformation cannot happen quickly because the former Soviet Union lacks a high-tech sector into which former weapons workers can migrate. An even more serious problem stems from a traditional isolation from world markets. Civilian manufacturing in the former Soviet Union, which was never forced to meet international standards for quality and performance, has been marked by inferior products. open-quotes With financial support, a well-defined program, incentives, and retraining, the military research labs could find themselves in a better position to release their huge potential for creative rather than destructive purposes,close quotes Ustinov concludes

  2. Maintaining non-nuclear weapon status

    International Nuclear Information System (INIS)

    Muller, H.

    1991-01-01

    Among the some 170 sovereign states in the world, five are legally recognized as nuclear weapon states (NWS) under the terms of the 1968 Non-Proliferation Treaty (NPT). Six countries (Argentina, Brazil, India, Israel, Pakistan, and South Africa) are counted as threshold states: they possess sizeable unsafeguarded nuclear facilities or have passed the brink of a nuclear test or of clandestine weapon production. Six other countries (Iran, Iraq, Libya, Taiwan, and North and South Korea) have been suspected periodically of either considering the nuclear weapon option or of working secretly on the development of weapons. Thus, about 150 non-nuclear weapon states (NNWS) remain which neither possess nuclear weapons nor strive to acquire them. These states are distributed throughout the globe and encompass highly industrialized as well as underdeveloped countries, liberal democracies, socialist states, sheikdoms and dictatorships. Some NNWS face acute military threats; other are far removed from the quarrels of the world, as in the case of some remote fortunate islands. Furthermore, NNWS may be members of nuclear-umbrella alliances or may have opted for a policy of neutrality or non-alignment

  3. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  4. China's mixed signals on nuclear weapons

    International Nuclear Information System (INIS)

    Fieldhouse, R.

    1991-01-01

    Ultimately, it is nuclear whether the Chinese leadership has made up its collective mind on practical nuclear weapons. It is known from Chinese official sources, including articles in Communist Party and military publications and histories of the Chinese nuclear program, that an internal debate has proceeded for more than two decades, punctuated by occasional nuclear exercises or low-yield warhead tests. But China presumably has less reason now to pursue development of tactical nuclear weapons than in previous decades: relations with the Soviet Union have improved and military confrontation has eased; China's relations with India and Vietnam are also improving. The decision may already have been made, however, and the weapons built. The mystery surrounding Chinese tactical nuclear weapons is itself interesting, but it is also symbolic of the difficulty of understanding China's nuclear weapons program and policies. The West has accumulated a considerable body of knowledge about China's nuclear forces, especially historical material. But important aspects of China's nuclear behavior and its future as a nuclear power are hard to discern. A key question is China's future role in the spread of nuclear-capable weapons to other countries. China might add to international efforts to stem the proliferation of nuclear related technology, or it might become the world's missile merchant. It could make a constructive contribution to arms control efforts in general, or it could act as a spoiler

  5. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  6. Small Arms - Hand and Shoulder Weapons and Machine Guns

    Science.gov (United States)

    2016-06-24

    weapon barrels between firing trials is permitted. A locally fabricated rack can be used for barrels that are detached from the weapon; the air should...Lubricating oil, weapons MIL-L-14107 (LAW) 19. Hydraulic fluid, petroleum base MIL-H-5606 20. Hydraulic fluid, fire - resistant MIL-H-46170...weapon from the test environment to perform maintenance. 4.20.8 Smoke . a. Background. The smoke cloud accumulated during weapon firing can

  7. A Stone Resource Assignment Model under the Fuzzy Environment

    Directory of Open Access Journals (Sweden)

    Liming Yao

    2012-01-01

    to tackle a stone resource assignment problem with the aim of decreasing dust and waste water emissions. On the upper level, the local government wants to assign a reasonable exploitation amount to each stone plant so as to minimize total emissions and maximize employment and economic profit. On the lower level, stone plants must reasonably assign stone resources to produce different stone products under the exploitation constraint. To deal with inherent uncertainties, the object functions and constraints are defuzzified using a possibility measure. A fuzzy simulation-based improved simulated annealing algorithm (FS-ISA is designed to search for the Pareto optimal solutions. Finally, a case study is presented to demonstrate the practicality and efficiency of the model. Results and a comparison analysis are presented to highlight the performance of the optimization method, which proves to be very efficient compared with other algorithms.

  8. Study on store-space assignment based on logistic AGV in e-commerce goods to person picking pattern

    Science.gov (United States)

    Xu, Lijuan; Zhu, Jie

    2017-10-01

    This paper studied on the store-space assignment based on logistic AGV in E-commerce goods to person picking pattern, and established the store-space assignment model based on the lowest picking cost, and design for store-space assignment algorithm after the cluster analysis based on similarity coefficient. And then through the example analysis, compared the picking cost between store-space assignment algorithm this paper design and according to item number and storage according to ABC classification allocation, and verified the effectiveness of the design of the store-space assignment algorithm.

  9. Adaptive protection algorithm and system

    Science.gov (United States)

    Hedrick, Paul [Pittsburgh, PA; Toms, Helen L [Irwin, PA; Miller, Roger M [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  10. Humanitarian Algorithms : A Codified Key Safety Switch Protocol for Lethal Autonomy

    OpenAIRE

    Nyagudi, Nyagudi Musandu

    2014-01-01

    With the deployment of lethal autonomous weapons, there is the requirement that any such platform complies with the precepts of International Humanitarian Law. Humanitarian Algorithms[9: p. 9] ensure that lethal autonomous weapon systems perform military/security operations, within the confines of International Humanitarian Law. Unlike other existing techniques of regulating lethal autonomy this scheme advocates for an approach that enables Machine Learning. Lethal autonomous weapons must be ...

  11. Nuclear Weapons in Russia's approach to conflict

    International Nuclear Information System (INIS)

    Johnson, Dave

    2016-11-01

    President Putin has moved nuclear weapons to the foreground of the European security landscape. New risks and dangers arise from the apparent coupling of nuclear weapons capabilities with Moscow's revanchist and irredentist foreign and defence policies toward its neighbours. Nuclear weapons are the central feature and capstone capability in Russia's evolving concept of strategic deterrence and are important tools for achieving Russia's geopolitical aims. Russian thinking on the role and place of nuclear weapons in upholding national security and in achieving strategic aims is reflected in military policy, force structure and posture, and exercises and operations. Russia's political and military leaders are not only re-conceptualising the role of nuclear weapons. They are also building the military capabilities that can credibly threaten the calibrated employment of nuclear weapons for deterrence, de-escalation and war-fighting from the regional to large-scale and global levels of conflict. New and still developing concepts for the employment of conventional long-range precision weapons in tandem with nuclear weapons for regional deterrence and containment of local and regional conflicts add volatility to the regional tensions and uncertainties created by recent Russian aggression. Russia's reliance upon integrated conventional and nuclear capabilities in reasserting its influence in its perceived sphere of special interest, intended to contain conflicts at a manageable level, could actually increase the risk of the potential employment of nuclear weapons. NATO nations collectively, and the three NATO nuclear powers (Great Britain, France, and the United States) individually, have recognized this new reality and have begun to adapt to it. In that context, the aim of this paper is to elaborate a clearer understanding of the place and role of nuclear weapons in Russia's approach to conflict, based on nuclear-related policy statements and military-theoretical writing

  12. Vulnerability assessment of a space based weapon platform electronic system exposed to a thermonuclear weapon detonation

    Science.gov (United States)

    Perez, C. L.; Johnson, J. O.

    Rapidly changing world events, the increased number of nations with inter-continental ballistic missile capability, and the proliferation of nuclear weapon technology will increase the number of nuclear threats facing the world today. Monitoring these nation's activities and providing an early warning and/or intercept system via reconnaissance and surveillance satellites and space based weapon platforms is a viable deterrent against a surprise nuclear attack. However, the deployment of satellite and weapon platform assets in space will subject the sensitive electronic equipment to a variety of natural and man-made radiation environments. These include Van Allen Belt protons and electrons; galactic and solar flare protons; and neutrons, gamma rays, and x-rays from intentionally detonated fission and fusion weapons. In this paper, the MASH vl.0 code system is used to estimate the dose to the critical electronics components of an idealized space based weapon platform from neutron and gamma-ray radiation emitted from a thermonuclear weapon detonation in space. Fluence and dose assessments were performed for the platform fully loaded, and in several stages representing limited engagement scenarios. The results indicate vulnerabilities to the Command, Control, and Communication bay instruments from radiation damage for a nuclear weapon detonation for certain source/platform orientations. The distance at which damage occurs will depend on the weapon yield (n,(gamma)/kiloton) and size (kilotons).

  13. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  14. Effective Homework Assignments. Research Brief

    Science.gov (United States)

    Cooper, Harris

    2008-01-01

    Perhaps more than any question other than "How much time should students spend doing homework?" parents and educators want to know, "What kinds of homework assignments are most effective?" Clearly, the answers to this question vary according to many factors, especially the developmental level of students and the topic area. Generally, answers are…

  15. Assigning agents to a line

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moreno-Ternero, Juan D.; Østerdal, Lars Peter Raahave

    2014-01-01

    minimizing modification of the classic random priority method to solve this class of problems. We also provide some logical relations in our setting among standard axioms in the literature on assignment problems, and explore the robustness of our results to several extensions of our setting....

  16. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  17. Does nuclear power lead to nuclear weapons

    International Nuclear Information System (INIS)

    Prawitz, J.

    1977-01-01

    It is pointed out that 'reactor grade' plutonium usually contains about 30 % Pu240 and is unsuitable for weapons. While it is possible to obtain an explosion, it is more difficult to initiate one and its effect, which will be considerably less than with bomb grade plutonium, is difficult to predict. The critical mass will be larger and more cooling required. The proliferation problem is then discussed and the four aspects, vertical, horizontal, sub-national and revolutionary, mentioned. In connection with nuclear power it is the second and third aspects which are of interest. In discussing the possibility of terrorist groups obtaining plutonium, a study by the Swedish Defence Research Institute is quoted as estimating that 10-20 qualified specialists and several years secret preparation would be necessary to make a nuclear weapon. Other authors, e.g. Ted Taylor, have maintained that it would be much easier, but examples of 'student designs' are primitive and unlikely to detonate. Even so, it is emphasised that safeguards and physical security are necessary. Horizontal proliferation is a more real problem and the NPT and IAEA safeguards are discussed in this connection. In conclusion the question of whether the proliferation of nuclear weapons via nuclear power can be prevented cannot be answered with a clear yes or no. Certain states may use nuclear weapon potential as a bargaining factor. However the decision to acquire nuclear weapons is political and while a nuclear power industry would be of help, it would not be decisively so. (JIW)

  18. Nuclear weapons research in Sweden. The co-operation between civilian and military research, 1947 - 1972

    International Nuclear Information System (INIS)

    Jonter, Thomas

    2002-05-01

    The Swedish nuclear weapons research began as early as 1945, shortly after the first atomic bombs fell over Japan. The assignment to look into the new weapon of mass destruction went to the Swedish National Defence Research Establishment (FOA). Admittedly, the main aim of the research initiated at that time was to find out how Sweden could best protect itself against a nuclear weapon attack. However, from the outset FOA was interested in investigating the possibilities of manufacturing what was then called an atomic bomb. A co-operation between FOA and AB Atomenergi (AE), which was created in 1947 in order to be responsible for the industrial development of civilian nuclear energy, was initiated. AE made several technical investigations within this co-operation regarding choice of reactors and preconditions for a production of weapons-grade plutonium. The first purpose of this report is therefore to investigate how this co-operation emerged and what consequences it had for the project to produce basic information for the Swedish manufacture of nuclear weapons. In general terms, the finding of this report is that FOA was responsible for the overall nuclear weapons research. For this reason, FOA was in charge of the construction of the nuclear device and the studies of its effects. Additionally, AE should deliver basic information of a possible production of weapons-grade plutonium and investigate the possibilities of a production or a procurement of inspection-free heavy water (i.e. without inspections by the supplying country). AE should also build a reprocessing plant and manufacture fuel elements to be used in the reactors for a production of weapons-grade plutonium. Furthermore, it is important to emphasise that both FOA and AE conducted plutonium research. The reason why FOA conducted this research was that the plutonium had to be in metallic form in order to be used in a nuclear weapons device. Therefore, FOA carried out research with the purpose of producing

  19. Nuclear weapons research in Sweden. The co-operation between civilian and military research, 1947 - 1972

    Energy Technology Data Exchange (ETDEWEB)

    Jonter, Thomas [Uppsala Univ. (Sweden). Dept. of History

    2002-05-01

    The Swedish nuclear weapons research began as early as 1945, shortly after the first atomic bombs fell over Japan. The assignment to look into the new weapon of mass destruction went to the Swedish National Defence Research Establishment (FOA). Admittedly, the main aim of the research initiated at that time was to find out how Sweden could best protect itself against a nuclear weapon attack. However, from the outset FOA was interested in investigating the possibilities of manufacturing what was then called an atomic bomb. A co-operation between FOA and AB Atomenergi (AE), which was created in 1947 in order to be responsible for the industrial development of civilian nuclear energy, was initiated. AE made several technical investigations within this co-operation regarding choice of reactors and preconditions for a production of weapons-grade plutonium. The first purpose of this report is therefore to investigate how this co-operation emerged and what consequences it had for the project to produce basic information for the Swedish manufacture of nuclear weapons. In general terms, the finding of this report is that FOA was responsible for the overall nuclear weapons research. For this reason, FOA was in charge of the construction of the nuclear device and the studies of its effects. Additionally, AE should deliver basic information of a possible production of weapons-grade plutonium and investigate the possibilities of a production or a procurement of inspection-free heavy water (i.e. without inspections by the supplying country). AE should also build a reprocessing plant and manufacture fuel elements to be used in the reactors for a production of weapons-grade plutonium. Furthermore, it is important to emphasise that both FOA and AE conducted plutonium research. The reason why FOA conducted this research was that the plutonium had to be in metallic form in order to be used in a nuclear weapons device. Therefore, FOA carried out research with the purpose of producing

  20. A Bio-Inspired Approach to Traffic Network Equilibrium Assignment Problem.

    Science.gov (United States)

    Zhang, Xiaoge; Mahadevan, Sankaran

    2018-04-01

    Finding an equilibrium state of the traffic assignment plays a significant role in the design of transportation networks. We adapt the path finding mathematical model of slime mold Physarum polycephalum to solve the traffic equilibrium assignment problem. We make three contributions in this paper. First, we propose a generalized Physarum model to solve the shortest path problem in directed and asymmetric graphs. Second, we extend it further to resolve the network design problem with multiple source nodes and sink nodes. At last, we demonstrate that the Physarum solver converges to the user-optimized (Wardrop) equilibrium by dynamically updating the costs of links in the network. In addition, convergence of the developed algorithm is proved. Numerical examples are used to demonstrate the efficiency of the proposed algorithm. The superiority of the proposed algorithm is demonstrated in comparison with several other algorithms, including the Frank-Wolfe algorithm, conjugate Frank-Wolfe algorithm, biconjugate Frank-Wolfe algorithm, and gradient projection algorithm.

  1. Nuclear weapons headed for the trash

    International Nuclear Information System (INIS)

    Arkin, W.M.; Durrant, D.; Kristensen, H.

    1991-01-01

    Whether he intended it or not, Bush has taken steps that mean the beginning of the end for nuclear weapons. His proposals significantly reduce the numbers of nuclear weapons and the burdens associated with deploying and controlling them. And although he retains many of the options for continuing and regenerating the nuclear arsenal, he has exposed the fact that there are no longer any grand justifications or doctrinal needs for nuclear weapons - and that the nuclear machine is choking on its economic, political, environmental, and human contradictions. The initiatives fundamentally altered the nuclear stance of both nations. Yet, as momentous as the changes were, they were set in motion in an almost businesslike manner. Neither leader truly framed the moves as an end to the nuclear age. But they didn't need to. The steps they have taken practically guarantee it

  2. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  3. Safeguarding nuclear weapon: Usable materials in Russia

    International Nuclear Information System (INIS)

    Cochran, T.

    1998-01-01

    Both the United States and Russia are retaining as strategic reserves more plutonium and HEU for potential reuse as weapons, than is legitimately needed. Both have engaged in discussions and have programs in various stages of development to dispose of excess plutonium and HEU. These fissile material disposition programs will take decades to complete. In the interim there will be, as there is now, hundreds of tons of separated weapon-usable fissile material stored in tens of thousands of transportable canisters, each containing from a few to several tons of kgs of weapon-usable fissile material. This material must be secured against theft and unauthorized use. To have high confidence that the material is secure, one must establish criteria against which the adequacy of the protective systems can be judged. For example, one finds such criteria in US Nuclear Regulatory Commission (USNRC) regulations for the protection of special nuclear materials

  4. The medical consequences of nuclear weapons

    International Nuclear Information System (INIS)

    Humphrey, J.; Hartog, M.; Middleton, H.

    1982-01-01

    A pamphlet has been produced by the Medical Campaign Against Nuclear Weapons (MCANW) and by the Medical Association for the Prevention of War (MAPW) to bring the catastrophic effects that the use of nuclear weapons would entail to the attention of the general public, politicians and members of the medical profession. It describes the medical consequences of the effects of blast, heat and ionizing radiation from nuclear weapons, including details from the Hiroshima and Nagasaki atomic bombings. The medical consequences of a nuclear attack including consideration of the casualties, care of the injured, psychological effects and the outcome are also discussed. It is concluded that if for none other than purely medical reasons, nuclear warfare must never be allowed to happen. (UK)

  5. Single machine scheduling with slack due dates assignment

    Science.gov (United States)

    Liu, Weiguo; Hu, Xiangpei; Wang, Xuyin

    2017-04-01

    This paper considers a single machine scheduling problem in which each job is assigned an individual due date based on a common flow allowance (i.e. all jobs have slack due date). The goal is to find a sequence for jobs, together with a due date assignment, that minimizes a non-regular criterion comprising the total weighted absolute lateness value and common flow allowance cost, where the weight is a position-dependent weight. In order to solve this problem, an ? time algorithm is proposed. Some extensions of the problem are also shown.

  6. Australia - a nuclear weapons testing ground

    International Nuclear Information System (INIS)

    Dobbs, Michael.

    1993-01-01

    Between 1952 and 1958 Britain conducted five separate nuclear weapons trials in Australia. Australia had the uninhabited wide open spaces and the facilities which such tests need and Britain was able to use its special relationship with Australia to get agreement to conduct atomic tests in Australia and establish a permanent test site at Maralinga. Other non-nuclear tests were conducted between 1953-1963. The story of Britain's involvement in atomic weapons testing in Australia is told through its postal history. Both official and private covers are used to show how the postal communications were established and maintained throughout the test years. (UK)

  7. Nuclear weapon testing and the monkey business

    International Nuclear Information System (INIS)

    Murthy, M.S.S.

    1978-01-01

    Reasons for India's total ban on the export of rhesus monkeys to U.S. have been explained. The major reason is that some of the animals were used in nuclear weapon related radiation experiments. This was a clear violation of a stricture in the agreement about supply of monkeys. The stricture prohibited the use of animals for research concerning military operations, including nuclear weapon testing. It is pleaded that a strict enforcement of strictures rather than a total ban on the export of monkeys would be better in the interest of advancement of knowledge in human medicine and disease control. (M.G.B.)

  8. A nuclear-weapon-free Middle East

    International Nuclear Information System (INIS)

    Jortner, Joshua

    1986-01-01

    The paper examines the issue of nuclear-weapon States involvement in regional conflicts, and whether such a conflict in the Middle East could trigger a nuclear war between the Super-Powers. Comments on the Middle Eastern situation are given, along with a discussion of the Non-Proliferation Treaty (NPT) and the Middle East, Israel and the NPT, and the nuclear potential in Arab countries. The proposal, by Israel, of a nuclear weapon-free zone in the Middle East is outlined. (UK)

  9. Algorithming the Algorithm

    DEFF Research Database (Denmark)

    Mahnke, Martina; Uprichard, Emma

    2014-01-01

    Imagine sailing across the ocean. The sun is shining, vastness all around you. And suddenly [BOOM] you’ve hit an invisible wall. Welcome to the Truman Show! Ever since Eli Pariser published his thoughts on a potential filter bubble, this movie scenario seems to have become reality, just with slight...... changes: it’s not the ocean, it’s the internet we’re talking about, and it’s not a TV show producer, but algorithms that constitute a sort of invisible wall. Building on this assumption, most research is trying to ‘tame the algorithmic tiger’. While this is a valuable and often inspiring approach, we...

  10. Modified Firefly Algorithm

    Directory of Open Access Journals (Sweden)

    Surafel Luleseged Tilahun

    2012-01-01

    Full Text Available Firefly algorithm is one of the new metaheuristic algorithms for optimization problems. The algorithm is inspired by the flashing behavior of fireflies. In the algorithm, randomly generated solutions will be considered as fireflies, and brightness is assigned depending on their performance on the objective function. One of the rules used to construct the algorithm is, a firefly will be attracted to a brighter firefly, and if there is no brighter firefly, it will move randomly. In this paper we modify this random movement of the brighter firefly by generating random directions in order to determine the best direction in which the brightness increases. If such a direction is not generated, it will remain in its current position. Furthermore the assignment of attractiveness is modified in such a way that the effect of the objective function is magnified. From the simulation result it is shown that the modified firefly algorithm performs better than the standard one in finding the best solution with smaller CPU time.

  11. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  12. Implementing the chemical weapons convention

    International Nuclear Information System (INIS)

    Kellman, B.; Tanzman, E. A.

    1999-01-01

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  13. Nuclear Weapons Enterprise Transformation - A Sustainable Approach

    International Nuclear Information System (INIS)

    O'Brien, K H

    2005-01-01

    Nuclear weapons play an essential role in United States (U.S.) National Security Policy and a succession of official reviews has concluded that nuclear weapons will continue to have a role for the foreseeable future. Under the evolving U.S. government policy, it is clear that role will be quite different from what it was during the Cold War. The nuclear-weapons stockpile as well as the nuclear-weapons enterprise needs to continue to change to reflect this evolving role. Stockpile reductions in the early 1990s and the Stockpile Stewardship Program (SSP), established after the cessation of nuclear testing in 1992, began this process of change. Further evolution is needed to address changing security environments, to enable further reductions in the number of stockpiled weapons, and to create a nuclear enterprise that is cost effective and sustainable for the long term. The SSP has successfully maintained the U.S. nuclear stockpile for more than a decade, since the end of nuclear testing. Current plans foresee maintaining warheads produced in the 1980s until about 2040. These warheads continue to age and they are expensive to refurbish. The current Life Extension Program plans for these legacy warheads are straining both the nuclear-weapons production and certification infrastructure making it difficult to respond rapidly to problems or changes in requirements. Furthermore, refurbishing and preserving Cold-War-era nuclear weapons requires refurbishing and preserving an infrastructure geared to support old technology. Stockpile Stewardship could continue this refurbishment approach, but an alternative approach could be considered that is more focused on sustainable technologies, and developing a more responsive nuclear weapons infrastructure. Guided by what we have learned from SSP during the last decade, the stewardship program can be evolved to address this increasing challenge using its computational and experimental tools and capabilities. This approach must start

  14. Biological and Chemical Weapons: Criminal Sanctions and Federal Regulations

    National Research Council Canada - National Science Library

    Garcia, Michael J

    2004-01-01

    The Biological Weapons Convention and the Chemical Weapons Convention, both of which have been signed and ratified by the United States, obligate signatory parties to enact legislation or otherwise...

  15. High-Energy Laser Weapon Integration with Ground Vehicles

    National Research Council Canada - National Science Library

    Hafften, Michael; Stratton, Robert

    2004-01-01

    .... The architecture of an electric, solid-state HEL weapon system would likely be based upon a hybrid electric vehicle that provides a common electrical power source for the propulsion and weapon subsystems...

  16. The future of nuclear weapons in Europe workshop summary

    International Nuclear Information System (INIS)

    Larsen, J.A.; Garrity, P.J.

    1991-12-01

    A summary is presented of a workshop that addressed the future of nuclear weapons in Europe. The workshop topics included the evolving European security environment; the Soviet Union, Eastern Europe, and nuclear weapons; the United States, NATO, and nuclear weapons; and Western Europe and nuclear weapons. The workshop, held at Los Alamos July 26, 1991, was sponsored by the Center for National Security Studies of the Los Alamos National Laboratory

  17. PARETO OPTIMAL SOLUTIONS FOR MULTI-OBJECTIVE GENERALIZED ASSIGNMENT PROBLEM

    Directory of Open Access Journals (Sweden)

    S. Prakash

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: The Multi-Objective Generalized Assignment Problem (MGAP with two objectives, where one objective is linear and the other one is non-linear, has been considered, with the constraints that a job is assigned to only one worker – though he may be assigned more than one job, depending upon the time available to him. An algorithm is proposed to find the set of Pareto optimal solutions of the problem, determining assignments of jobs to workers with two objectives without setting priorities for them. The two objectives are to minimise the total cost of the assignment and to reduce the time taken to complete all the jobs.

    AFRIKAANSE OPSOMMING: ‘n Multi-doelwit veralgemeende toekenningsprobleem (“multi-objective generalised assignment problem – MGAP” met twee doelwitte, waar die een lineêr en die ander nielineêr is nie, word bestudeer, met die randvoorwaarde dat ‘n taak slegs toegedeel word aan een werker – alhoewel meer as een taak aan hom toegedeel kan word sou die tyd beskikbaar wees. ‘n Algoritme word voorgestel om die stel Pareto-optimale oplossings te vind wat die taaktoedelings aan werkers onderhewig aan die twee doelwitte doen sonder dat prioriteite toegeken word. Die twee doelwitte is om die totale koste van die opdrag te minimiseer en om die tyd te verminder om al die take te voltooi.

  18. A Statistical Programme Assignment Model

    DEFF Research Database (Denmark)

    Rosholm, Michael; Staghøj, Jonas; Svarer, Michael

    When treatment effects of active labour market programmes are heterogeneous in an observable way  across the population, the allocation of the unemployed into different programmes becomes a particularly  important issue. In this paper, we present a statistical model designed to improve the present...... duration of unemployment spells may result if a statistical programme assignment model is introduced. We discuss several issues regarding the  plementation of such a system, especially the interplay between the statistical model and  case workers....

  19. Atomic Energy Authority (Weapons Group) Act 1973

    International Nuclear Information System (INIS)

    1973-01-01

    This Act, which came into force on 6th March 1973 and modified Section 2 of the Atomic Energy Authority Act 1954 in respect of the Authority's power to do work on explosive nuclear devices, made provision for the transfer to the Secretary of State for Defence of the Weapons Group of the Atomic Energy Authority. (NEA) [fr

  20. Foreign trade legislation, war weapons control legislation

    International Nuclear Information System (INIS)

    Hucko, E.M.

    1993-01-01

    The volume contains, in addition to an introduction into the matter, the texts of the Foreign Trade Act (FTA), the War Weapons Control Act and all relevant ordinances. Foreign trade transactions of the Federal Republic of Germany are essentially, but not exclusively, governed by the FTA. They are strongly influenced by the legislation of the European Communities which in the form of directives are immediately effective here, and in the form of guidelines oblige the German lawgiver or ordinance giver to translate them into practice, mostly by appropriate modifications of the foreign trade ordinance, the import and export lists. It is not the war weapons which are the problem, but the so-called dual-use goods, namely articles, technologies and knowledge which, as a rule, serve civil purposes, which, however, may be used also to produce weapons, in particular ABC weapons or rockets. Nowadays we are concerned about several third-world states which are obsessed by the wish to build their own atomic bomb. (orig./HSCH) [de

  1. Health and environmental effects of nuclear weapons

    International Nuclear Information System (INIS)

    1995-08-01

    Since 1981 WHO has been studying and reporting on the effects of nuclear war on health and health services. This report provides information on the subject and refers to earlier related work of WHO. It forms the basis for a request from WHO to the International Court of Justice regarding the legality of the use of nuclear weapons. 15 refs

  2. The Control of Chemical and Biological Weapons.

    Science.gov (United States)

    Alexander, Archibald S.; And Others

    This book is composed of four papers prepared to illuminate the problem areas which might arise if the policies of the 1925 Geneva Protocol and other measures to limit chemical and biological weapons are ratified by the United States Senate. The papers included are: Legal Aspects of the Geneva Protocol of 1925; The Use of Herbicides in War: A…

  3. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  4. The monitoring and verification of nuclear weapons

    International Nuclear Information System (INIS)

    Garwin, Richard L.

    2014-01-01

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers

  5. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  6. Burning weapons-grade plutonium in reactors

    International Nuclear Information System (INIS)

    Newman, D.F.

    1993-06-01

    As a result of massive reductions in deployed nuclear warheads, and their subsequent dismantlement, large quantities of surplus weapons- grade plutonium will be stored until its ultimate disposition is achieved in both the US and Russia. Ultimate disposition has the following minimum requirements: (1) preclude return of plutonium to the US and Russian stockpiles, (2) prevent environmental damage by precluding release of plutonium contamination, and (3) prevent proliferation by precluding plutonium diversion to sub-national groups or nonweapons states. The most efficient and effective way to dispose of surplus weapons-grade plutonium is to fabricate it into fuel and use it for generation of electrical energy in commercial nuclear power plants. Weapons-grade plutonium can be used as fuel in existing commercial nuclear power plants, such as those in the US and Russia. This recovers energy and economic value from weapons-grade plutonium, which otherwise represents a large cost liability to maintain in safeguarded and secure storage. The plutonium remaining in spent MOX fuel is reactor-grade, essentially the same as that being discharged in spent UO 2 fuels. MOX fuels are well developed and are currently used in a number of LWRs in Europe. Plutonium-bearing fuels without uranium (non-fertile fuels) would require some development. However, such non-fertile fuels are attractive from a nonproliferation perspective because they avoid the insitu production of additional plutonium and enhance the annihilation of the plutonium inventory on a once-through fuel cycle

  7. Find and neutralize clandestine nuclear weapons

    International Nuclear Information System (INIS)

    Canavan, G.H.

    1997-09-01

    The objective of finding nuclear material at entry portals is to provide a secure perimeter as large as a weapon damage radius so that operations could be conducted within it relatively unencumbered. The objective of wide area search for nuclear material to provide a safe zone of similar dimensions in an area in which it is not possible to maintain a secure perimeter, to provide assurance for civilians living at an area at risk, or to provide rapid, wide area search of regions that could conceal nuclear threats to forces in the field. This rapid, wide-area, and confident detection of nuclear materials is the essential first step in developing the ability to negate terrorist nuclear assemblies or weapons. The ability to detect and negate nuclear materials are necessary to prevent the forced, massive evacuation of urban populations or the disruption of military operations in response to terrorist threats. This paper describes the limitations to current sensors used for nuclear weapon detection and discusses a novel approach to nuclear weapon detection using a combination of directional information (imaging) and gamma ray energy (color) to produce a gamma ray color camera

  8. Stability issues in reconstitution by weapon addition

    Energy Technology Data Exchange (ETDEWEB)

    Canavan, G.H.

    1997-08-01

    Reconstitution of strategic forces by the unilateral uploading of additional weapons from initially symmetric modest force levels reduces first strike stability. These changes are quantified and traced to changes in first and second strike costs in a model of missile exchanges in which both strikes are optimized analytically.

  9. The disposition of weapon grade plutonium: costs and tradeoffs

    International Nuclear Information System (INIS)

    Weida, W.J.

    1996-01-01

    This paper explores some of the economic issues surrounding a major area of expenditures now facing the nuclear powers: the disposition of weapon-grade plutonium either through 'burning' in nuclear reactors for power generation or by other means. Under the current budgeting philosophy in the United States, programs managed by the Department of Energy (DOE) tend to compete with one another for the total funds assigned to that agency. For example, in the FY1995 DOE budget a tradeoff was made between increased funding for nuclear weapons and reduced funding for site cleanup. No matter which disposition alternative is chosen, if disposition funds are controlled by the DOE in the US or by a government agency in any other country, disposition is likely to compete directly or indirectly with other alternatives for energy funding. And if they are subsidized by any government, research into plutonium as reactor fuel or the operations associated with such use are likely to consume funds that might otherwise be available to support sustainable energy alternatives. When all costs are considered, final waste disposal costs will be incurred whatever disposal option is taken. These costs could potentially be offset by doing something profitable with the plutonium prior to final storage, but this paper has shown that finding a profitable use for plutonium is unlikely. Thus, the more probable case is one where the costs of basic waste storage are increased by whatever costs are associated with the disposition option chosen. The factors most likely to significantly increase costs appear to arise from four areas: (1) The level of subsidization in the 'profitable' parts of the disposition program. (2) Those items (such as reprocessing) that increase the volume of waste and thus, the cost of waste disposal. (3) The cost of security and its direct relationship to the number of times plutonium is handled or moved. (4) The cost of research and development of new and unproven methods of

  10. The spread of nuclear weapons among nations: militarization or development

    International Nuclear Information System (INIS)

    Khan, A.Q.

    1986-01-01

    The paper reviews nuclear proliferation among nations. Nuclear weapons promotion and proliferation are discussed, including both motivation and lack of motivation to manufacture nuclear weapons. The failure of the Non-Proliferation Treaty is examined with respect to vertical and horizontal proliferation, and the containment of horizontal proliferation. Risks of nuclear war by accident are outlined, as well as nuclear weapon development. (UK)

  11. Nuclear Weapons and U.S. National Security: A Need for Weapons Programs?

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2003-01-01

    .... nuclear weapons that goes beyond the concept of deterrence from the Cold War. It also identified a new targeting strategy that would seek to threaten specific capabilities in adversary nations...

  12. [Consequences learned from the use of chemical weapons during the First World War for the modern military medicine].

    Science.gov (United States)

    Belskikh, A N; Basharin, V A; Chepur, S V; Khalimov, Yu Sh; Markizova, N F

    2015-08-01

    The article describes the way medical service dealed with problems resulted from the use of chemical weapons during the First World War (1914-1918). It was revealed that many of the abovementioned problems remain unsolved up to the present moment. It is stated the existence of the threat of use of chemical weapons in modem military conflicts, which expands the area of responsibility for medical chemical protection. The authors proved necessity and algorithm of the training system, considered as a part of medical protection in case of adverse factors of chemical nature.

  13. The risk of nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1994-01-01

    During the later years the risks of nuclear proliferation have again become a major topic of interest. This is primarily due to the acute problems caused by Iraq, North Korea, and the 3 new states of the former USSR, Ukraine, Kazakhstan and Belarus. Analysis shows that security problems and prestige are the two most important motives, when the risks of proliferation are considered. But motives are not enough. To produce nuclear weapons a number of technological requirements must also be fulfilled. The country must be able to produce almost pure fissile material, i.e. 235 U or 239 Pu. It must also be able to solve a number of metallurgical, explosive, ignition, physics and other problems. These are in particular non-trivial, if a implosion weapon is to be designed. A review is made of the nuclear facilities in a number of the countries which have been suggested as possible future nuclear weapons countries. In particular facilities which can produce almost pure fissile materials, 235 U and 239 Pu, are considered. The possibility of nuclear terrorists have often been discussed in the media. However, it seems very unlikely that even a major terrorist or mafia organization will be able to solve all the weapons design problems, even if they could steal the fissile material. It is finally discussed what can be done to reduce the risk of further nuclear proliferation. Political pressure can be brought to bear on countries outside the NPT to join it, but it can be counter-productive, and sometimes the countries that are able to exert such pressure, are not willing to do so for other political reasons. The problem of countries which are party to the NPT, but which are believed to acquire nuclear weapons capability in violation of the treaty, can be countered by unannounced inspections of non-declared facilities. However, such inspections can only be meaningfully performed if the necessary intelligence is available. (EG)

  14. DNATCO: assignment of DNA conformers at dnatco.org.

    Science.gov (United States)

    Černý, Jiří; Božíková, Paulína; Schneider, Bohdan

    2016-07-08

    The web service DNATCO (dnatco.org) classifies local conformations of DNA molecules beyond their traditional sorting to A, B and Z DNA forms. DNATCO provides an interface to robust algorithms assigning conformation classes called NTC: to dinucleotides extracted from DNA-containing structures uploaded in PDB format version 3.1 or above. The assigned dinucleotide NTC: classes are further grouped into DNA structural alphabet NTA: , to the best of our knowledge the first DNA structural alphabet. The results are presented at two levels: in the form of user friendly visualization and analysis of the assignment, and in the form of a downloadable, more detailed table for further analysis offline. The website is free and open to all users and there is no login requirement. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  15. Integrated project scheduling and staff assignment with controllable processing times.

    Science.gov (United States)

    Fernandez-Viagas, Victor; Framinan, Jose M

    2014-01-01

    This paper addresses a decision problem related to simultaneously scheduling the tasks in a project and assigning the staff to these tasks, taking into account that a task can be performed only by employees with certain skills, and that the length of each task depends on the number of employees assigned. This type of problems usually appears in service companies, where both tasks scheduling and staff assignment are closely related. An integer programming model for the problem is proposed, together with some extensions to cope with different situations. Additionally, the advantages of the controllable processing times approach are compared with the fixed processing times. Due to the complexity of the integrated model, a simple GRASP algorithm is implemented in order to obtain good, approximate solutions in short computation times.

  16. Integrated Project Scheduling and Staff Assignment with Controllable Processing Times

    Directory of Open Access Journals (Sweden)

    Victor Fernandez-Viagas

    2014-01-01

    Full Text Available This paper addresses a decision problem related to simultaneously scheduling the tasks in a project and assigning the staff to these tasks, taking into account that a task can be performed only by employees with certain skills, and that the length of each task depends on the number of employees assigned. This type of problems usually appears in service companies, where both tasks scheduling and staff assignment are closely related. An integer programming model for the problem is proposed, together with some extensions to cope with different situations. Additionally, the advantages of the controllable processing times approach are compared with the fixed processing times. Due to the complexity of the integrated model, a simple GRASP algorithm is implemented in order to obtain good, approximate solutions in short computation times.

  17. An Optimization Method of Passenger Assignment for Customized Bus

    OpenAIRE

    Yang Cao; Jian Wang

    2017-01-01

    This study proposes an optimization method of passenger assignment on customized buses (CB). Our proposed method guarantees benefits to passengers by balancing the elements of travel time, waiting time, delay, and economic cost. The optimization problem was solved using a Branch and Bound (B&B) algorithm based on the shortest path for the selected stations. A simulation-based evaluation of the proposed optimization method was conducted. We find that a CB service can save 38.33% in average tra...

  18. Using HL7 in hospital staff assignments.

    Science.gov (United States)

    Unluturk, Mehmet S

    2014-02-01

    Hospital staff assignments are the instructions that allocate the hospital staff members to the hospital beds. Currently, hospital administrators make the assignments without accessing the information regarding the occupancy of the hospital beds and the acuity of the patient. As a result, administrators cannot distinguish between occupied and unoccupied beds, and may therefore assign staff to unoccupied beds. This gives rise to uneven and inefficient staff assignments. In this paper, the hospital admission-discharge-transfer (ADT) system is employed both as a data source and an assignment device to create staff assignments. When the patient data is newly added or modified, the ADT system updates the assignment software client with the relevant data. Based on the relevant data, the assignment software client is able to construct staff assignments in a more efficient way. © 2013 Elsevier Ltd. All rights reserved.

  19. Sound algorithms

    OpenAIRE

    De Götzen , Amalia; Mion , Luca; Tache , Olivier

    2007-01-01

    International audience; We call sound algorithms the categories of algorithms that deal with digital sound signal. Sound algorithms appeared in the very infancy of computer. Sound algorithms present strong specificities that are the consequence of two dual considerations: the properties of the digital sound signal itself and its uses, and the properties of auditory perception.

  20. Genetic algorithms

    Science.gov (United States)

    Wang, Lui; Bayer, Steven E.

    1991-01-01

    Genetic algorithms are mathematical, highly parallel, adaptive search procedures (i.e., problem solving methods) based loosely on the processes of natural genetics and Darwinian survival of the fittest. Basic genetic algorithms concepts are introduced, genetic algorithm applications are introduced, and results are presented from a project to develop a software tool that will enable the widespread use of genetic algorithm technology.

  1. Integrated assignment and path planning

    Science.gov (United States)

    Murphey, Robert A.

    2005-11-01

    A surge of interest in unmanned systems has exposed many new and challenging research problems across many fields of engineering and mathematics. These systems have the potential of transforming our society by replacing dangerous and dirty jobs with networks of moving machines. This vision is fundamentally separate from the modern view of robotics in that sophisticated behavior is realizable not by increasing individual vehicle complexity, but instead through collaborative teaming that relies on collective perception, abstraction, decision making, and manipulation. Obvious examples where collective robotics will make an impact include planetary exploration, space structure assembly, remote and undersea mining, hazardous material handling and clean-up, and search and rescue. Nonetheless, the phenomenon driving this technology trend is the increasing reliance of the US military on unmanned vehicles, specifically, aircraft. Only a few years ago, following years of resistance to the use of unmanned systems, the military and civilian leadership in the United States reversed itself and have recently demonstrated surprisingly broad acceptance of increasingly pervasive use of unmanned platforms in defense surveillance, and even attack. However, as rapidly as unmanned systems have gained acceptance, the defense research community has discovered the technical pitfalls that lie ahead, especially for operating collective groups of unmanned platforms. A great deal of talent and energy has been devoted to solving these technical problems, which tend to fall into two categories: resource allocation of vehicles to objectives, and path planning of vehicle trajectories. An extensive amount of research has been conducted in each direction, yet, surprisingly, very little work has considered the integrated problem of assignment and path planning. This dissertation presents a framework for studying integrated assignment and path planning and then moves on to suggest an exact

  2. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  3. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  4. Nuclear power and atomic weapons. Chapter 7

    International Nuclear Information System (INIS)

    1978-01-01

    Following a brief historical introduction the concept of proliferation, vertical horizontal and subnational, is presented, and its relationship to nuclear power discussed. The risk of nuclear weapon proliferation, based on political decision, motivation and costs, is related to access to enriched uranium, plutonium and uranium 233. The possibilities for diversion and theft from nuclear facilities are discussed. International measures to prevent proliferation, the Non-Proliferation Treaty (NPT)and the IAEA safeguards system, are described and discussed. Measures which may be enacted against countries which break the NPT are discussed. Restrictions on international nuclear trude, both multilateral and unilateral, are also discussed, especially those at present, or shortly to be, enforced by USA, Canada and Australia. The International Nuclear Feel Cycle Evaluation (INFCE) is briefly presented. The physical protection of nuclear materials is also discussed. Finally the basc principles of nuclear weapons are briefly presented. (JIW)

  5. Nuclear power and atomic weapons. Chapter 7

    International Nuclear Information System (INIS)

    1978-01-01

    Following a brief historical introduction the concept of proliferation, vertical and horizontal and subnational, is presented, and its relationship to nuclear power discussed. The risk of nuclear weapon proliferation, based on political decision motivation and costs, is related to access to enriched uranium, plutonium and uranium 233. The possibilities for diversion and theft from nuclear facilities are discussed. International measures to prevent proliferation, the Non-Proliferation Treaty (NPT) and the IAEA safeguards system, are described and discussed. Measures which may be enacted against countries which break the NPT are discussed. Restrictions on international nuclear trade, both multilateral and unilateral, are also discussed, especially those at present, or shortly to be, enforced by USA, Canada and Australia. The International Nuclear Fuel Cycle Evaluation (INFCE) is briefly presented. The physical protection of nuclear materials is also discussed. Finally the basic principles of nuclear weapons are briefly presented. (JIW)

  6. Low yield nuclear weapons and nuclear terrorism

    International Nuclear Information System (INIS)

    Rodionov, S.

    1999-01-01

    It is unlikely that anybody would imagine the route to a nuclear-weapon-free world as a straight and unimpeded one. At the moment, there is a fading interest in the possibility of the concerted bilateral reduction of the US and Russian nuclear weapon stockpiles. The reason is evident: these powers demonstrate quite different approaches to two large political campaigns initiated in American political circles, namely NATO expansion to the East, and the attack on Anti-Ballistic-Missile (ABM) Treaty. Russia considers these initiatives as provocative in content and high-handed in the form. The West argues that Russian response is unjustified and insists on the peaceful nature of its plans?

  7. Is there any future for nuclear weapons?

    International Nuclear Information System (INIS)

    Heisbourg, F.

    2011-01-01

    Nuclear weapons occupy a paradoxal place both in the collective imagination and in the historical reality: on the one hand everybody dreads the apocalypse horror, and on the other hand, dissuasion appears as an unchanging and quite comfortable situation. However, the world has become multipolar in this domain as well. The geopolitical map is reconstructing. Doctrinal revisions, initiatives against nuclear weapons proliferation, and nuclear disarmament measures are now on the agenda. The best foreign and French experts examine for the first time the consequences of these evolutions. They analyse in particular the split up risks and the potential consequences of a nuclear conflict in regions where atomic arms have become a key-component of the strategic landscape: Middle-Est, Far-East, Southern Asia. The choices France and its allies will have to face are examined as well. (J.S.)

  8. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  9. Nuclear power and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Apold, A.

    1978-01-01

    The theme of Dr. Marshall's lecture was that it is, from the viewpoint of prevention of proliferation of nuclear weapons,preferable to use plutonium as a fuel in FBR reactors rather than store it in what, in effect, would be plutonium mines. The true threat of proliferation lies in uranium enrichment. The FBR reactor is misunderstood and the US policy is not against breeders as such. Safeguards against the misuse of plutonium by leaving a residue of radioactivity after reprocessing is quite feasible, despite certain practical problems and extra costs. Weapon proliferation is subject to political objectives and intentions. Definite proposals are, (a) a limited number of reprocessing centres, (b) an accelerated development of FBR reactors, (c) a new FBR fuel cycle, (d) stop storage of spent thermal reactor fuel, (e) reinforced safeguards. (JIW)

  10. Nuclear weapons Latin American Proscription Treaty

    International Nuclear Information System (INIS)

    1967-01-01

    Military descentralization of Latin America will constitute a measure that will keep its peoples from squandering in nuclear weapons out of their limited resources and will protect them from eventually being attacked in such fashion within their territories. This constitutes a considerable contribution award avoiding proliferation of nuclear weapons as well as a giant step towards general and complete disarmament. It will also constitute evidence that Latin America, faithful to its universalist tradition, not only must make a greater effort towards proscribing from its territories the treat of a nuclear war, but also must use all its resources to persevere in its struggle for welfare and progress of its peoples, cooperating along with the rest of the world to achieve the ideals of mankind as a whole

  11. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  12. Automated solid-state NMR resonance assignment of protein microcrystals and amyloids

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Elena [Goethe University Frankfurt am Main, Center for Biomolecular Magnetic Resonance, Institute of Biophysical Chemistry (Germany); Gath, Julia [ETH Zurich, Physical Chemistry (Switzerland); Habenstein, Birgit [UMR 5086 CNRS/Universite de Lyon 1, Institut de Biologie et Chimie des Proteines (France); Ravotti, Francesco; Szekely, Kathrin; Huber, Matthias [ETH Zurich, Physical Chemistry (Switzerland); Buchner, Lena [Goethe University Frankfurt am Main, Center for Biomolecular Magnetic Resonance, Institute of Biophysical Chemistry (Germany); Boeckmann, Anja, E-mail: a.bockmann@ibcp.fr [UMR 5086 CNRS/Universite de Lyon 1, Institut de Biologie et Chimie des Proteines (France); Meier, Beat H., E-mail: beme@ethz.ch [ETH Zurich, Physical Chemistry (Switzerland); Guentert, Peter, E-mail: guentert@em.uni-frankfurt.de [Goethe University Frankfurt am Main, Center for Biomolecular Magnetic Resonance, Institute of Biophysical Chemistry (Germany)

    2013-07-15

    Solid-state NMR is an emerging structure determination technique for crystalline and non-crystalline protein assemblies, e.g., amyloids. Resonance assignment constitutes the first and often very time-consuming step to a structure. We present ssFLYA, a generally applicable algorithm for automatic assignment of protein solid-state NMR spectra. Application to microcrystals of ubiquitin and the Ure2 prion C-terminal domain, as well as amyloids of HET-s(218-289) and {alpha}-synuclein yielded 88-97 % correctness for the backbone and side-chain assignments that are classified as self-consistent by the algorithm, and 77-90 % correctness if also assignments classified as tentative by the algorithm are included.

  13. Automated solid-state NMR resonance assignment of protein microcrystals and amyloids

    International Nuclear Information System (INIS)

    Schmidt, Elena; Gath, Julia; Habenstein, Birgit; Ravotti, Francesco; Székely, Kathrin; Huber, Matthias; Buchner, Lena; Böckmann, Anja; Meier, Beat H.; Güntert, Peter

    2013-01-01

    Solid-state NMR is an emerging structure determination technique for crystalline and non-crystalline protein assemblies, e.g., amyloids. Resonance assignment constitutes the first and often very time-consuming step to a structure. We present ssFLYA, a generally applicable algorithm for automatic assignment of protein solid-state NMR spectra. Application to microcrystals of ubiquitin and the Ure2 prion C-terminal domain, as well as amyloids of HET-s(218–289) and α-synuclein yielded 88–97 % correctness for the backbone and side-chain assignments that are classified as self-consistent by the algorithm, and 77–90 % correctness if also assignments classified as tentative by the algorithm are included

  14. Managing voluntary turnover through challenging assignments

    NARCIS (Netherlands)

    Preenen, P.T.Y.; de Pater, I.E.; van Vianen, A.E.M.; Keijzer, L.

    2011-01-01

    This study examines employees’ challenging assignments as manageable means to reduce turnover intentions, job search behaviors, and voluntary turnover. Results indicate that challenging assignments are negatively related to turnover intentions and job search behaviors and that these relationships

  15. Managing voluntary turnover through challenging assignments

    NARCIS (Netherlands)

    Preenen, P.T.Y.; Pater, I.E. de; Vianen, A.E.M. van; Keijzer, L.

    2011-01-01

    This study examines employees' challenging assignments as manageable means to reduce turnover intentions, job search behaviors, and voluntary turnover. Results indicate that challenging assignments are negatively related to turnover intentions and job search behaviors and that these relationships

  16. Imprecise Probability Methods for Weapons UQ

    Energy Technology Data Exchange (ETDEWEB)

    Picard, Richard Roy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vander Wiel, Scott Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-13

    Building on recent work in uncertainty quanti cation, we examine the use of imprecise probability methods to better characterize expert knowledge and to improve on misleading aspects of Bayesian analysis with informative prior distributions. Quantitative approaches to incorporate uncertainties in weapons certi cation are subject to rigorous external peer review, and in this regard, certain imprecise probability methods are well established in the literature and attractive. These methods are illustrated using experimental data from LANL detonator impact testing.

  17. Environmental problems in the nuclear weapons complex

    International Nuclear Information System (INIS)

    Fultz, K.O.

    1989-04-01

    This paper provide the authors' views on the environmental problems facing the Department of Energy. Testimony is based on a large body of work, over 50 reports and testimonies since 1981, on environmental, safety, and health aspects of DOE's nuclear weapons complex. This work has shown that the complex faces a wide variety of serious problem areas including aging facilities, safety concerns which have shut down DOE's production reactors, and environmental cleanup

  18. Polonium-210 as Weapon for Mass Destruction

    International Nuclear Information System (INIS)

    Koteng, A.O.

    2010-01-01

    Properties of Po-210 make it possible for its use as weapon of mass destruction. Po-210 occurs naturally in minute quantities in the human body, in Uranium ore (< 0.1 mg Po-210 / ton ) and as a product of Radon-222 gas decay chain. Po-210 also occurs as deposition on vegetation (tobacco leaves). Po-210 is produced by bombardment of Bi-209 with neutrons in a nuclear reactor. Russia produces 8 grams per year for export to USA market

  19. The big shadow of the nuclear weapon

    International Nuclear Information System (INIS)

    Hubert-Rodier, J.

    2006-01-01

    While civil nuclear industry shows a revival, the military side comes back to the front of the scene too. The end of the cold war has not buried the nuclear weapon. In front of the threats shown by Iran and Northern Korea and despite the quasi-universal nonproliferation treaty, the world is now again threaten by a wave of proliferation encouraged by the political tensions in the Middle-East and Asia. (J.S.)

  20. Kinematics of Laying an Automated Weapon System

    Science.gov (United States)

    2017-07-19

    UNCLASSIFIED UNCLASSIFIED AD-E403 899 Technical Report ARWSE-TR-16024 KINEMATICS OF LAYING AN AUTOMATED WEAPON SYSTEM...information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of

  1. Recoil Considerations for Shoulder-Fired Weapons

    Science.gov (United States)

    2012-05-01

    than would be deduced from the force levels defined by the pressure-time curve of the cartridge. Further and just like a large-caliber weapon mounted...force. If each of the force curves over the time interval were integrated, the result should be the same as that derived from a ballistic pendulum...Kathe, E.; Dillon, R. Sonic Rarefaction Wave Low Recoil Gun; Report ARCCB-TR-2001; U.S. Army Armament Research, Development, and Engineering Center

  2. Kazakhstan: there are no nuclear weapons

    International Nuclear Information System (INIS)

    Golev, A.

    2000-01-01

    In the article it is noted, that in 1992 Kazakhstan, Russian Federation and Ukraine signed Strategic Attack Weapon-1 Treaty, and actually refuse from nuclear bases on theirs territories. On the whole Kazakhstan had in technical capability two missile basis and one basis of strategic bombardment aviation. During 1996-1999 in period of nuclear objects liquidation in Kazakhstan 96 S S-18 missiles and 18,000 tones components of missile fuel were taken out to Russia

  3. Nuclear energy and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    1989-01-01

    A summary of the report dispatched in the middle of 1978 by the Atlantic Council of United States, organized by North American citizens, is presented. The report considers the relation between the production of nucleoelectric energy and the capacity of proliferation of nuclear weapons. The factors which affect the grade of proliferation risk represented by the use of nuclear energy in the world comparing this risk with the proliferation risks independently of nuclear energy, are examined. (M.C.K.) [pt

  4. Defense against nuclear weapons: a decision analysis

    International Nuclear Information System (INIS)

    Orient, J.M.

    1985-01-01

    Response to the public health threat posed by nuclear weapons is a medical imperative. The United States, in contrast to other nations, has chosen a course that assures maximal casualties in the event of a nuclear attack, on the theory that prevention of the attack is incompatible with preventive measures against its consequences, such as blast injuries and radiation sickness. A decision analysis approach clarifies the risks and benefits of a change to a strategy of preparedness

  5. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  6. DNABIT Compress - Genome compression algorithm.

    Science.gov (United States)

    Rajarajeswari, Pothuraju; Apparao, Allam

    2011-01-22

    Data compression is concerned with how information is organized in data. Efficient storage means removal of redundancy from the data being stored in the DNA molecule. Data compression algorithms remove redundancy and are used to understand biologically important molecules. We present a compression algorithm, "DNABIT Compress" for DNA sequences based on a novel algorithm of assigning binary bits for smaller segments of DNA bases to compress both repetitive and non repetitive DNA sequence. Our proposed algorithm achieves the best compression ratio for DNA sequences for larger genome. Significantly better compression results show that "DNABIT Compress" algorithm is the best among the remaining compression algorithms. While achieving the best compression ratios for DNA sequences (Genomes),our new DNABIT Compress algorithm significantly improves the running time of all previous DNA compression programs. Assigning binary bits (Unique BIT CODE) for (Exact Repeats, Reverse Repeats) fragments of DNA sequence is also a unique concept introduced in this algorithm for the first time in DNA compression. This proposed new algorithm could achieve the best compression ratio as much as 1.58 bits/bases where the existing best methods could not achieve a ratio less than 1.72 bits/bases.

  7. Western Option - Disarmament of Russian Weapon Plutonium

    International Nuclear Information System (INIS)

    Tveiten, B.; Petroll, M.R.

    2002-01-01

    The Western Option concept describes an approach to the conversion of weapon-grade plutonium from Russian nuclear warheads under the special aspects of meeting the criteria of irreversible utilization. Putting this concept of plutonium conversion into non-weapon-grade material into effect would make a major contribution to improving security worldwide. This study is based on an agreement between the Russian Federation and the United States of America concluded in September 2000. It provides for the conversion of 34 t of weapon-grade plutonium in each of the two states. This goal is also supported by other G8 countries. While the United States performs its part of the agreement under its sole national responsibility, the Russian program needs financial support by Western states. Expert groups have pointed out several options as a so-called basic scenario. The funds of approx. US Dollar 2 billion required to put them into effect have not so far been raised. The Western Option approach described in this contribution combines results of the basic scenario with other existing experience and with technical solutions available for plutonium conversion. One of the attractions of the Western Option lies in its financial advantages, which are estimated to amount to approx. US Dollar 1 billion. (orig.) [de

  8. Non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    Fischer, D.; Haeckel, E.; Haefele, W.; Lauppe, W.D.; Mueller, H.; Ungerer, W.

    1991-01-01

    During the turbulant transitional events in world politics in the nineties, the control of nuclear weapons plays a major role. While the superpowers are reducing their nuclear arsenal, the danger of nuclear anarchy in the world remains virulent. The NPT of 1968 is up for review soon. The falling apart of the former communist sphere of power, and the regions of conflict in the Third World present new risks for the proliferation of nuclear arms. For unified Germany, which explicitly renounced nuclear weapons, this situation presents difficult questions concerning national safety policies and international responsibility. This volume presents contributions which take a new look at topical and long-term problems of nuclear NP politics. The authors evaluate the conditions under which the NP regime came into being, and assess short- and long-term possibilities and risks. The following papers are included: 1.) Basic controversies during the negotiations concerning the Treaty on non-proliferation of nuclear weapons (Ungerer); 2.) Prologation of the NPT 1995 and appropriate problems concerning safety and control (Haefele/Lauppe); 3.) Consequences of the Iraq case for NP policy (Ficher); 4.) Problems of nuclear technology control (Mueller); 5.) Framework conditions of a nuclear world system (Haeckel). (orig./HP) [de

  9. Nuclear weapons and the World Court ruling

    International Nuclear Information System (INIS)

    Singh, J.

    1998-01-01

    based on the initiatives by non-governmental organizations, the World Health Organisation (WHO) Assembly asked the International Court of Justice for an advisory opinion in 1993 whether, considering the environmental and health consequences, the use of nuclear weapons by a state in war or other armed conflict would be a breach of its obligations under international law. The World Court decided that it was not able to give an advisory opinion as requested, because of the fact that questions of use of force and such like were beyond the scope of specialized agencies like the WHO. The Court has ruled that the international community, especially the five nuclear weapon states have not only an obligation to negotiate a treaty for total nuclear disarmament, but also have an obligation to conclude such treaty. We may expect that the nuclear weapon states will cynically disregard the ruling of the World Court as they have been doing to the basic obligation itself in pursuit of nuclear hegemony. But the remaining 150 countries or so also bear a responsibility to keep nudging the recalcitrant states into implementing their commitments to disarm

  10. The German Debate on Tactical Nuclear Weapons

    International Nuclear Information System (INIS)

    Meier, Olivier

    2008-01-01

    This report analyses the debate in Germany about tactical nuclear weapons deployments in Europe. It is mainly based on interviews conducted with senior officials from the German Federal Foreign Ministry, the Federal Ministry of Defence, senior members of Parliament as well as experts from research institutes and think-tanks. The interviews focused on the more recent past in the German debate as well as the future of tactical nuclear weapon deployments in Germany and Europe. The report concludes that while a change of Germany's position on tactical nuclear weapons is unlikely to change in the short-term, several developments will make it unlikely that the continued involvement of Germany in NATO nuclear sharing will have to be debated in the medium term. Should the next Parliamentary elections, which will take place in 2009 at the latest, result in a Social Democrat-led government, a push for a reduction of Germany's involvement in NATO nuclear sharing appears possible. A conservative-led government is likely to maintain the nuclear status quo within NATO

  11. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  12. Joint Channel Assignment and Routing in Multiradio Multichannel Wireless Mesh Networks: Design Considerations and Approaches

    Directory of Open Access Journals (Sweden)

    Omar M. Zakaria

    2016-01-01

    Full Text Available Multiradio wireless mesh network is a promising architecture that improves the network capacity by exploiting multiple radio channels concurrently. Channel assignment and routing are underlying challenges in multiradio architectures since both determine the traffic distribution over links and channels. The interdependency between channel assignments and routing promotes toward the joint solutions for efficient configurations. This paper presents an in-depth review of the joint approaches of channel assignment and routing in multiradio wireless mesh networks. First, the key design issues, modeling, and approaches are identified and discussed. Second, existing algorithms for joint channel assignment and routing are presented and classified based on the channel assignment types. Furthermore, the set of reconfiguration algorithms to adapt the network traffic dynamics is also discussed. Finally, the paper presents some multiradio practical implementations and test-beds and points out the future research directions.

  13. 24 CFR 221.255 - Assignment option.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Assignment option. 221.255 Section... Assignment option. (a) A mortgagee holding a mortgage insured pursuant to a conditional or firm commitment issued on or before November 30, 1983 has the option to assign, transfer and deliver to the Commissioner...

  14. 24 CFR 221.770 - Assignment option.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Assignment option. 221.770 Section... § 221.770 Assignment option. A mortgagee holding a conditional or firm commitment issued on or before... mortgagee's approved underwriter on or before November 30, 1983) has the option to assign, transfer and...

  15. Solving the rectangular assignment problem and applications

    NARCIS (Netherlands)

    Bijsterbosch, J.; Volgenant, A.

    2010-01-01

    The rectangular assignment problem is a generalization of the linear assignment problem (LAP): one wants to assign a number of persons to a smaller number of jobs, minimizing the total corresponding costs. Applications are, e.g., in the fields of object recognition and scheduling. Further, we show

  16. Why are sexually selected weapons almost absent in females?

    Directory of Open Access Journals (Sweden)

    Anders BERGLUND

    2013-08-01

    Full Text Available In sex role reversed species, predominantly females evolve sexually selected traits, such as ornaments and/or weapons. Female ornaments are common and their function well documented in many species, whether sex role reversed or not. However, sexually selected female weapons seem totally absent except for small wing spurs in three jacana species, present in both males and females. This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles: males commonly have evolved sexually selected weapons as well as ornaments. At the same time, females in many taxa have naturally selected weapons, used in competition over resources or in predator defence. Why are sexually selected weapons then so rare, almost absent, in females? Here I briefly review weaponry in females and the function of these weapons, conclude that the near absence of sexually selected weapons begs an explanation, and suggest that costs of sexually selected weapons may exceed costs of ornaments. Females are more constrained when evolving sexually selected traits compared to males, at least compared to those males that do not provide direct benefits, as trait costs reduce a female’s fecundity. I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons. The same may apply to paternally investing males. Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated [Current Zoology 59 (4: 564–568, 2013].

  17. Algorithmic cryptanalysis

    CERN Document Server

    Joux, Antoine

    2009-01-01

    Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applic

  18. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  19. Measures to implement the Chemical Weapons Convention

    International Nuclear Information System (INIS)

    Tanzman, E.; Kellman, B.

    1999-01-01

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  20. Safeguards for a nuclear weapon convention

    International Nuclear Information System (INIS)

    Fischer, D.

    1999-01-01

    An NDT presupposes a fundamental commitment by all parties to its final objective and hence requires a high and sustained level of confidence amongst all states concerned. The appropriate format for an Nuclear Disarmament Treaty (NDT) would probably be a multilateral treaty open to all states. The treaty must necessarily include the five nuclear weapon states and a procedure would have to be found for securing the ratification of the threshold states without conferring upon them the status of nuclear weapon states. While the IAEA may well be able to carry out the safeguards tasks required by an NDT it would probably be necessary to establish a new international organization to verify the elimination of all nuclear weapons. The experience of UNSCOM and the IAEA in Iraq, and of the IAEA in the DPRK, have shown how difficult the verification of international obligations is in the absence of a commitment to disarm, while the experience of the INF and START treaties, and of the IAEA in South Africa have shown how much simpler it is when the parties concerned are fully committed to the process. Verifying and safeguarding an NDT would be largely an extrapolation of activities already carried out by the nuclear weapon states under the INF and START treaties and by the IAEA in the routine application of safeguards as well as in its less routine work in Iraq, South Africa and the DPRK. Both the verification and safeguarding tasks would be made very much easier if it were possible to bring down to a few hundred the number of nuclear warheads remaining in the hands of any avowed nuclear weapon state, and to conclude a cutoff convention. Experience is needed to show whether the additional safeguards authority accorded to the IAEA by 'programme 93+2' will enable it to effectively safeguard the facilities that would be decommissioned as a result of an NDT and those that would remain in operation to satisfy civilian needs. Subject to this rider and on condition that the IAEA

  1. Algorithmic mathematics

    CERN Document Server

    Hougardy, Stefan

    2016-01-01

    Algorithms play an increasingly important role in nearly all fields of mathematics. This book allows readers to develop basic mathematical abilities, in particular those concerning the design and analysis of algorithms as well as their implementation. It presents not only fundamental algorithms like the sieve of Eratosthenes, the Euclidean algorithm, sorting algorithms, algorithms on graphs, and Gaussian elimination, but also discusses elementary data structures, basic graph theory, and numerical questions. In addition, it provides an introduction to programming and demonstrates in detail how to implement algorithms in C++. This textbook is suitable for students who are new to the subject and covers a basic mathematical lecture course, complementing traditional courses on analysis and linear algebra. Both authors have given this "Algorithmic Mathematics" course at the University of Bonn several times in recent years.

  2. Integer Linear Programming for Constrained Multi-Aspect Committee Review Assignment

    Science.gov (United States)

    Karimzadehgan, Maryam; Zhai, ChengXiang

    2011-01-01

    Automatic review assignment can significantly improve the productivity of many people such as conference organizers, journal editors and grant administrators. A general setup of the review assignment problem involves assigning a set of reviewers on a committee to a set of documents to be reviewed under the constraint of review quota so that the reviewers assigned to a document can collectively cover multiple topic aspects of the document. No previous work has addressed such a setup of committee review assignments while also considering matching multiple aspects of topics and expertise. In this paper, we tackle the problem of committee review assignment with multi-aspect expertise matching by casting it as an integer linear programming problem. The proposed algorithm can naturally accommodate any probabilistic or deterministic method for modeling multiple aspects to automate committee review assignments. Evaluation using a multi-aspect review assignment test set constructed using ACM SIGIR publications shows that the proposed algorithm is effective and efficient for committee review assignments based on multi-aspect expertise matching. PMID:22711970

  3. The real value of nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Carasales, J.

    1998-01-01

    The international community has greeted the establishment of two new nuclear weapon-free zones with praise. Africa and South Asia are the regions which will join, once the respective treaties are ratified and in force, Latin America and the South Pacific to ensure that extensive areas of the earth remain free of nuclear weapons. The usual reaction to these accomplishments is to hail them as important contributions to international peace and security, and as meaningful steps towards a world free of nuclear weapons. The nuclear weapon-free zones have their value but this value relates mainly to the countries within the zone. The interest of nuclear-weapon states are not really affected, or, if they are, the influence is not significant. One should bear in mind that the really important and meaningful nuclear weapon-free zones have yet to be achieved

  4. Structural adaptations to diverse fighting styles in sexually selected weapons.

    Science.gov (United States)

    McCullough, Erin L; Tobalske, Bret W; Emlen, Douglas J

    2014-10-07

    The shapes of sexually selected weapons differ widely among species, but the drivers of this diversity remain poorly understood. Existing explanations suggest weapon shapes reflect structural adaptations to different fighting styles, yet explicit tests of this hypothesis are lacking. We constructed finite element models of the horns of different rhinoceros beetle species to test whether functional specializations for increased performance under species-specific fighting styles could have contributed to the diversification of weapon form. We find that horns are both stronger and stiffer in response to species-typical fighting loads and that they perform more poorly under atypical fighting loads, which suggests weapons are structurally adapted to meet the functional demands of fighting. Our research establishes a critical link between weapon form and function, revealing one way male-male competition can drive the diversification of animal weapons.

  5. Total algorithms

    NARCIS (Netherlands)

    Tel, G.

    We define the notion of total algorithms for networks of processes. A total algorithm enforces that a "decision" is taken by a subset of the processes, and that participation of all processes is required to reach this decision. Total algorithms are an important building block in the design of

  6. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  7. Recovery of weapon plutonium as feed material for reactor fuel

    International Nuclear Information System (INIS)

    Armantrout, G.A.; Bronson, M.A.; Choi, Jor-Shan

    1994-01-01

    This report presents preliminary considerations for recovering and converting weapon plutonium from various US weapon forms into feed material for fabrication of reactor fuel elements. An ongoing DOE study addresses the disposition of excess weapon plutonium through its use as fuel for nuclear power reactors and subsequent disposal as spent fuel. The spent fuel would have characteristics similar to those of commercial power spent fuel and could be similarly disposed of in a geologic repository

  8. What Happens to Deterrence as Nuclear Weapons Decrease Toward Zero?

    Science.gov (United States)

    Drell, Sidney

    2011-04-01

    Steps reducing reliance on deployed nuclear weapons en route to zero will be discussed. They include broadly enhancing cooperation and transparency agreements beyond the provisions for verifying limits on deployed strategic nuclear warheads and delivery systems in the New START treaty. Two questions that will be addressed are: What conditions would have to be established in order to maintain strategic stability among nations as nuclear weapons recede in importance? What would nuclear deterrence be like in a world without nuclear weapons?

  9. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  10. Nuclear weapons in Europe: Why zero is better

    International Nuclear Information System (INIS)

    Daalder, I.H.

    1993-01-01

    Given the fundamental changes in the political context and NATO's perception of nuclear weapons, what role remains for US nuclear weapons in preserving security in Europe? Are US nuclear deployments on the continent still necessary? Is there a requirement for extended deterrence and, if so, does its credibility depend on the continued basing of US nuclear weapons in Europe? And what is the role of arms control in effecting any desirable restructuring in nuclear force postures? In addressing these questions, it becomes clear that US nuclear weapons can now be removed from Europe - they no longer serve the political and military functions they once did

  11. Dismantlement and destruction of chemical, nuclear and conventional weapons

    International Nuclear Information System (INIS)

    Schulte, N.T.

    1997-01-01

    The safe destruction and dismantling of chemical, nuclear and conventional weapons is of fundamental importance to the security of all countries represented in this volume. Expertise in the field is not confined to one country or organisation: all can benefit from each other. There is an ever present danger of proliferation of weapons of mass destruction: approximately two dozen countries have ongoing programmes to develop or acquire such weapons, and many are also gaining the capability to build air-surface delivery systems. But much can be done to prevent proliferation by reducing leakage of materials and know-how and by solving the problems of the destruction of surplus weapons systems, which has now come to be a key issue. In 13 sessions of the workshop attention was paid to (1) Dismantlement and Destruction of Chemical, Nuclear and Conventional Weapons; (2) Status of Implementation of Arms Control Treaties and Voluntary Commitments; (3) National Perspectives on Cooperation in Disarmament; (4) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Chemical Weapons; (5) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Nuclear Weapons; (6) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Conventional Weapons. Session; (7) Experience with Currently Employed Chemical Destruction Technologies; (8) Alternative Chemical Destruction Technologies; (9) Deactivation, Dismantlement and Destruction of Delivery Systems and Infrastructure for Nuclear Weapons; (10) Storage, Safeguarding and Disposition of Fissile Materials; (11) Technologies for Conversion and Civil Use of Demilitarized Materials; (12) International Organizations; and (13) Environmental Challenges Posed by Chemical and Nuclear Disarmament

  12. Biological and Chemical Weapons: Criminal Sanctions and Federal Regulations

    National Research Council Canada - National Science Library

    Garcia, Michael J

    2004-01-01

    .... In accordance with these obligations, the United States has enacted various federal requirements and criminal sanctions applying to biological and chemical weapons, Re cent anti4errorisrn legislation...

  13. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  14. Strategies for denaturing the weapons-grade plutonium stockpile

    International Nuclear Information System (INIS)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons

  15. Military Technology and Conventional Weapons Export Controls: The Wassenaar Arrangement

    National Research Council Canada - National Science Library

    Grimmett, Richard F

    2006-01-01

    This report provides background on the Wassenaar Arrangement, which was formally established in July 1996 as a multilateral arrangement aimed at controlling exports of conventional weapons and related...

  16. The Belgium debate on tactical nuclear weapons

    International Nuclear Information System (INIS)

    Dumoulin, Andre

    2008-01-01

    This publication proposes a discussion about the opinions and positions of the various Belgium political actors and authorities regarding nuclear weapons. After a synthesis of several interviews with different actors, the author analyses the debate content, and more precisely the positions of peace movements, of the government, and of political parties. Several documents are proposed in appendix: a presentation of the evolution on Belgium nuclear missions, a government's answer to parliamentary resolutions regarding non-proliferation and nuclear disarmament, and a working paper submitted by Belgium, Norway and the Netherlands in the perspective of the 2005 Conference of Parties on the Non-Proliferation Treaty

  17. Nuclear weapons, a danger for our world

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This report is about an exhibition about the danger of the increasing amount of nuclear-weapons and was presented in the occasion of the second special meeting of the UN General Assembly (1982). This report describes the causes of a nuclear-war and analyses the causes of the bomb-drop of Hiroshima and Nagasaki as well as possible causes of a bombing of New York City and long-term-consequences of nuclear radiation. Furthermore it lists problems with a higher priority than the armament of nuclear-arms. (kancsar)

  18. History of Nuclear Weapons Design and Production

    Science.gov (United States)

    Oelrich, Ivan

    2007-04-01

    The nuclear build-up of the United States and the Soviet Union during the Cold War is often portrayed as an arms race. Some part was indeed a bilateral competition, but much was the result of automatic application of technical advances as they became available, without careful consideration of strategic implications. Thus, the history of nuclear weapon design is partly designers responding to stated military needs and partly the world responding to constant innovations in nuclear capability. Today, plans for a new nuclear warhead are motivated primarily by the desire to maintain a nuclear design and production capability for the foreseeable future.

  19. Considerations for the Distribution of Antiarmor Weapons.

    Science.gov (United States)

    1985-05-20

    German tank, used in mass formations, had been the decisive factor weapon.- The German Threat - "Blitzkrieg" The first German Tiger tank was not...also needed flank or rear shots to penetrate the armor of Panther and Tiger tanks at all but the closest ranges. A third self propelled antitank gun...Armored Threat In June 1944, the German Western Connand had 99 obsolete Pz III, 587 Pz IV, 290 Pz V (Panther) and only 63 Pz VI ( Tiger ) tanks available.20

  20. Is the nuclear weapon taboo? The nuclear weapon is useless and expensive. Let us not leave the nuclear weapon as an inheritance

    International Nuclear Information System (INIS)

    Gauchet, Nathalie; Norlain, Bernard; Beach, Hugh; Beckett, Margaret; Quiles, Paul; Rocard, Michel; Ramsbotham, David

    2012-03-01

    Starting with the definition of the word taboo as stated in a dictionary (a topic it would be unbecoming to evoke, under social and moral proprieties), the author of the first article discusses the status of the nuclear weapon, outlining that it is expensive, useless and monstrous. She notices that conventions on chemical weapons seem to be more efficient than the NPT, that, even if the reasons for abolition are known as well as ways to reach it, it seems difficult to actually address this issue. She evokes different voices coming from different countries or international bodies calling for this abolition. She also states that the nuclear weapon is not a deterrent weapon but a weapon of domination, and calls for the mobilisation of the civil society throughout the world. A second article states that the nuclear weapon is useless and expensive, and that we have to get rid of this hazard for the sake of the planet. Former ministers, Prime ministers, and generals consider that we can and must give up nuclear weapons, notably because the strategic context has completely changed since the fall of the Berlin wall, and support the action of Global Zero

  1. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  2. The Reduction of Directed Cyclic Graph for Task Assignment Problem

    Directory of Open Access Journals (Sweden)

    Ariffin W.N.M.

    2018-01-01

    Full Text Available In this paper, a directed cyclic graph (DCG is proposed as the task graph. It is undesirable and impossible to complete the task according to the constraints if the cycle exists. Therefore, an effort should be done in order to eliminate the cycle to obtain a directed acyclic graph (DAG, so that the minimum amount of time required for the entire task can be found. The technique of reducing the complexity of the directed cyclic graph to a directed acyclic graph by reversing the orientation of the path is the main contribution of this study. The algorithm was coded using Java programming and consistently produced good assignment and task schedule.

  3. Disposal of Surplus Weapons Grade Plutonium

    International Nuclear Information System (INIS)

    Alsaed, H.; Gottlieb, P.

    2000-01-01

    The Office of Fissile Materials Disposition is responsible for disposing of inventories of surplus US weapons-usable plutonium and highly enriched uranium as well as providing, technical support for, and ultimate implementation of, efforts to obtain reciprocal disposition of surplus Russian plutonium. On January 4, 2000, the Department of Energy issued a Record of Decision to dispose of up to 50 metric tons of surplus weapons-grade plutonium using two methods. Up to 17 metric tons of surplus plutonium will be immobilized in a ceramic form, placed in cans and embedded in large canisters containing high-level vitrified waste for ultimate disposal in a geologic repository. Approximately 33 metric tons of surplus plutonium will be used to fabricate MOX fuel (mixed oxide fuel, having less than 5% plutonium-239 as the primary fissile material in a uranium-235 carrier matrix). The MOX fuel will be used to produce electricity in existing domestic commercial nuclear reactors. This paper reports the major waste-package-related, long-term disposal impacts of the two waste forms that would be used to accomplish this mission. Particular emphasis is placed on the possibility of criticality. These results are taken from a summary report published earlier this year

  4. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    Durand, D.

    2005-01-01

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  5. Nuclear weapons complex: What went wrong?

    International Nuclear Information System (INIS)

    Martin, J.E.

    1991-01-01

    The nuclear weapons complex has generated significant volumes of radioactive wastes dating back to the 1940s. Such wastes included transuranic radioisotopes-for example, plutonium-generated as byproducts of the operations. Most of these wastes at the major disposal site were not classified in the same way nuclear wastes are classified today; the definitions of high- and low-level wastes have changed over time, and, in the case of the latter, different classes have been established that determine methods for disposal and handling. Waste disposal was not a high priority during World War II. After the war, however; resources were not committed to either waste-disposal research or the development of a national waste management policy. AEC's failure to develop a national policy on radioactive waste disposal is easier to understand than to excuse. The disposal problem parallels the chemical waste disposal situation, where there were no federal and few state laws regulating chemical waste disposal until 1976, following publicity about Love Canal. This same story has been repeated for radioactive and mixed wastes and facility safety at the nation's nuclear weapon sites

  6. Nuclear weapons policy at the crossroads

    International Nuclear Information System (INIS)

    Howlett, D.; Ogilvie-White, T.; Simpson, J.; Taylor, E.

    2000-01-01

    This study on nuclear futures is a product of work undertaken by the Mountbatten Centre for International Studies (MCIS) of the University of Southampton. The study has pursued three goals: to attempt to understand the dynamics of the nuclear present; to elucidate a range of possible nuclear futures that may emerge; and to assess different strategies that could be pursued in response to these futures, including proposals for promoting nuclear disarmament. The aim was to draw on research, meetings and outreach to achieve these goals, and to use the knowledge gained to help inform the international policy-making community. The work underlying this study was divided into two stages. During the first stage, the apparent threat perceptions of the five acknowledged NWS (China, France, Russia, the UK and the United States) and the three de facto NWS (India, Israel and Pakistan) were explored . The purpose of this research was to identify the main factors (or shapers) that seem to have influenced nuclear weapons policy in all these states, and to assess their relative importance. The second stage of the work drew on the conclusions reached on the eight countries. The shapers were divided into categories on the basis of their apparent impact on nuclear weapons policy. This study summarizes the main conclusions reached in the course of this work

  7. Nuclear power and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    An appropriate non-proliferation treaty should not discriminate among the non-weapon states, but should seek a cooperative approach with all countries seeking nuclear power and willing to accept international safeguards. Near-term proliferation problems, represented by nations already on the threshold of weapon capability, should not be confused with the long-term problem of world-wide nuclear development. The first can be handled with incentives and disincentives imposed on specific countries, while the latter involves the distribution of plutonium on the basis of alternative fuel cycles. To retain world leadership, U.S. efforts along these lines should be to encourage a dialogue between suppliers and recipients and to coordinate the economic and security issues of its own non-proliferation and foreign policies. One option is a U.S. commitment to a multinational fuel storage and reprocessing facility. Technical evaluation and demonstration of alternative fuel cycles to reach an international consensus would be a parallel activity

  8. 15 CFR 710.6 - Relationship between the Chemical Weapons Convention Regulations and the Export Administration...

    Science.gov (United States)

    2010-01-01

    ... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.6 Relationship between the Chemical Weapons Convention Regulations and the Export Administration Regulations, the International...

  9. Predicting Assignment Submissions in a Multiclass Classification Problem

    Directory of Open Access Journals (Sweden)

    Bogdan Drăgulescu

    2015-08-01

    Full Text Available Predicting student failure is an important task that can empower educators to counteract the factors that affect student performance. In this paper, a part of the bigger problem of predicting student failure is addressed: predicting the students that do not complete their assignment tasks. For solving this problem, real data collected by our university’s educational platform was used. Because the problem consisted of predicting one of three possible classes (multi-class classification, the appropriate algorithms and methods were selected. Several experiments were carried out to find the best approach for this prediction problem and the used data set. An approach of time segmentation is proposed in order to facilitate the prediction from early on. Methods that address the problems of high dimensionality and imbalanced data were also evaluated. The outcome of each approach is shown and compared in order to select the best performing classification algorithm for the problem at hand.

  10. Neutronics benchmark of a MOX assembly with near-weapons-grade plutonium

    International Nuclear Information System (INIS)

    Difilippo, F.C.; Fisher, S.E.

    1998-01-01

    One of the proposed ways to dispose of surplus weapons-grade plutonium (Pu) is to irradiate the high-fissile material in light-water reactors in order to reduce the Pu enrichment to the level of spent fuels from commercial reactors. Considerable experience has been accumulated about the behavior of mixed-oxide (MOX) uranium and plutonium fuels for plutonium recycling in commercial reactors, but the experience is related to Pu enrichments typical of spent fuels quite below the values of weapons-grade plutonium. Important decisions related to the kind of reactors to be used for the disposition of the plutonium are going to be based on calculations, so the validation of computational algorithms related to all aspects of the fuel cycle (power distributions, isotopics as function of the burnup, etc.), for weapons-grade isotopics is very important. Analysis of public domain data reveals that the cycle-2 irradiation in the Quad cities boiling-water reactor (BWR) is the most recent US destructive examination. This effort involved the irradiation of five MOX assemblies using 80 and 90% fissile plutonium. These benchmark data were gathered by General Electric under the sponsorship of the Electric Power Research Institute. It is emphasized, however, that global parameters are not the focus of this benchmark, since the five bundles containing MOX fuels did not significantly affect the overall core performance. However, since the primary objective of this work is to compare against measured post-irradiation assembly data, the term benchmark is applied here. One important reason for performing the benchmark on Quad Cities irradiation is that the fissile blends (up to 90%) are higher than reactor-grade and, quite close to, weapons-grade isotopics

  11. Nuclear weapons and NATO operations: Doctrine, studies, and exercises

    International Nuclear Information System (INIS)

    Karber, P.A.

    1994-01-01

    A listing of papers is presented on the doctrine, studies, and exercises dealing with nuclear weapons and NATO operations for the period 1950-1983. The papers deal with studies on massive retaliation, sword and shield, and flexible response. Some of the enduring issues of nuclear weapons in NATO are listed

  12. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... animals talking about weapons and violence fascination with violent video games, TV shows, and movies threatening or bullying others isolation from family and friends Of course, these signs don't necessarily mean that a person will become violent or bring a weapon to school. Still, you ...

  13. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  14. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...

  15. Instruments of war weapons and technologies that have changed history

    CERN Document Server

    Tucker, Spencer C

    2015-01-01

    In war, the weapons and technologies employed have direct effects on how battles are waged. When new weapons are introduced, they can dramatically alter the outcomes of warfare-and consequently change the course of history itself. This reference work provides a fascinating overview of the major weapon systems and military technologies that have had a major impact on world history. Addressing weapons as crude as the club used by primitive man to the high-tech weapons of today such as unmanned drones, Instruments of War: Weapons and Technologies That Have Changed History offers nearly 270 profusely illustrated entries that examine the key roles played by specific weapons and identify their success and failures. The book begins with an introductory essay that frames the subject matter of the work and discusses the history of weapons as a whole. The text is concise and accessible to general readers without extensive backgrounds in military history yet provides the detailed information necessary to convey the comp...

  16. Deep Attack Weapons Mix Study (DAWMS) Case Study

    National Research Council Canada - National Science Library

    Bexfield, James

    2001-01-01

    .... This report describes the process used to conduct the Deep Attack Weapons Mix Study (DAWMS) in 1995-1997. This case study focuses on the weapons being procured by the Services and whether a joint viewpoint would result in a more effective mix...

  17. Delayed effects of nuclear and chemical weapons in man

    International Nuclear Information System (INIS)

    Dienstbier, Z.

    1984-01-01

    Delayed radiation effects are discussed of the use of nuclear and chemical weapons (defoliants and herbicides). Attention is drawn to the development of delayed malignities in exposed subjects and their pathophysiologic causes are explained. The only prevention of these effects is to prohibit the use of weapons of mass destruction. (author)

  18. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    In this paper Brushless DC (BLDC) Technology and its Application in Articulation of Weapon System Launching Platform using Electromechanical Servo Drive is presented. ... Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications.

  19. The nuclear weapon; L'arme nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2008-07-01

    The author presents the technology, the concept of deterrence, the today means and the international control, concerning the nuclear weapon. The conclusion is pessimistic. The author sees only two issues: the substitution of a new weapon more powerful, or its use. (A.L.B.)

  20. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    technique involve model structure, system representation and the degree of validity, coupled with the simplicity, of the overall model. ABM is best suited... system representation of the air combat system . We feel that a simulation model that combines ABM with equation-based representation of weapons and...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA

  1. Constraining potential nuclear-weapons proliferation from civilian reactors

    International Nuclear Information System (INIS)

    Travelli, A.; Gaines, L.L.; Minkov, V.; Olson, A.P.; Snelgrove, J.

    1993-01-01

    Cessation of the Cold War and renewed international attention to the proliferation of weapons of mass destruction are leading to national policies aimed at restraining nuclear-weapons proliferation that could occur through the nuclear-fuel cycle. Argonne, which has unique experience, technology, and capabilities, is one of the US national laboratories contributing to this nonproliferation effort

  2. Radiation, chemical and biological protection. Mass destruction weapons

    International Nuclear Information System (INIS)

    Janasek, D.; Svetlik, J.

    2005-01-01

    In this text-book mass destruction weapons and radiation, chemical and biological protection are reviewed. The text-book contains the following chapter: (1) Mass destruction weapons; (2) Matter and material; (3) Radioactive materials; (4) Toxic materials; (5) Biological resources; (6) Nuclear energetic equipment; Appendices; References.

  3. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications. In this paper, BLDC Motor and Electromechanical Servo Drive System, operating principle, modeling, characteristics and its application in various weapon system programs are ...

  4. 32 CFR 884.2 - Assigned responsibilities.

    Science.gov (United States)

    2010-07-01

    ... OF PERSONNEL TO UNITED STATES CIVILIAN AUTHORITIES FOR TRIAL § 884.2 Assigned responsibilities. (a... 32 National Defense 6 2010-07-01 2010-07-01 false Assigned responsibilities. 884.2 Section 884.2... requests for return of members to the United States for delivery to civilian authorities when the request...

  5. 12 CFR 563e.28 - Assigned ratings.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Assigned ratings. 563e.28 Section 563e.28 Banks... for Assessing Performance § 563e.28 Assigned ratings. (a) Ratings in general. Subject to paragraphs (b... performance under the lending, investment and service tests, the community development test, the small savings...

  6. Stress Assignment in Reading Italian Polysyllabic Pseudowords

    Science.gov (United States)

    Sulpizio, Simone; Arduino, Lisa S.; Paizi, Despina; Burani, Cristina

    2013-01-01

    In 4 naming experiments we investigated how Italian readers assign stress to pseudowords. We assessed whether participants assign stress following distributional information such as stress neighborhood (the proportion and number of existent words sharing orthographic ending and stress pattern) and whether such distributional information affects…

  7. Assignment of element and isotope factors

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    Element and isotope factors are assigned in the NICS internal accounting system at the Exxon Fuel Fabrication Facility on the basis of coded information included on the material transfer documents. This paper explains more fully the manner in which NICS assigns these factors

  8. Detecting Plagiarism in MS Access Assignments

    Science.gov (United States)

    Singh, Anil

    2013-01-01

    Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…

  9. Real life working shift assignment problem

    Science.gov (United States)

    Sze, San-Nah; Kwek, Yeek-Ling; Tiong, Wei-King; Chiew, Kang-Leng

    2017-07-01

    This study concerns about the working shift assignment in an outlet of Supermarket X in Eastern Mall, Kuching. The working shift assignment needs to be solved at least once in every month. Current approval process of working shifts is too troublesome and time-consuming. Furthermore, the management staff cannot have an overview of manpower and working shift schedule. Thus, the aim of this study is to develop working shift assignment simulation and propose a working shift assignment solution. The main objective for this study is to fulfill manpower demand at minimum operation cost. Besides, the day off and meal break policy should be fulfilled accordingly. Demand based heuristic is proposed to assign working shift and the quality of the solution is evaluated by using the real data.

  10. Mars - robust automatic backbone assignment of proteins

    International Nuclear Information System (INIS)

    Jung, Young-Sang; Zweckstetter, Markus

    2004-01-01

    MARS a program for robust automatic backbone assignment of 13 C/ 15 N labeled proteins is presented. MARS does not require tight thresholds for establishing sequential connectivity or detailed adjustment of these thresholds and it can work with a wide variety of NMR experiments. Using only 13 C α / 13 C β connectivity information, MARS allows automatic, error-free assignment of 96% of the 370-residue maltose-binding protein. MARS can successfully be used when data are missing for a substantial portion of residues or for proteins with very high chemical shift degeneracy such as partially or fully unfolded proteins. Other sources of information, such as residue specific information or known assignments from a homologues protein, can be included into the assignment process. MARS exports its result in SPARKY format. This allows visual validation and integration of automated and manual assignment

  11. Emerging nuclear energy systems and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Gsponer, A.; Sahin, S.; Jasani, B.

    1983-01-01

    Generally when considering problems of proliferation of nuclear weapons, discussions are focused on horizontal proliferation. However, the emerging nuclear energy systems currently have an impact mainly on vertical proliferation. The paper indicates that technologies connected with emerging nuclear energy systems, such as fusion reactors and accelerators, enhance the knowledge of thermonuclear weapon physics and will enable production of military useful nuclear materials (including some rare elements). At present such technologies are enhancing the arsenal of the nuclear weapon states. But one should not forget the future implications for horizontal proliferation of nuclear weapons as some of the techniques will in the near future be within the technological and economic capabilities of non-nuclear weapon states. Some of these systems are not under any international control. (orig.) [de

  12. Proposals for chemical weapons during the American Civil War.

    Science.gov (United States)

    Hasegawa, Guy R

    2008-05-01

    Proposals for chemical weapons that arose during the American Civil War are described. Most incendiary and all biological agents are excluded. The described proposals appeared primarily in periodicals or letters to government officials on both sides. The weapons were usually meant to temporarily disable enemy combatants, but some might have been lethal, and Civil War caregivers were ill-prepared to deal with the weapons' effects. Evidently, none of the proposed weapons were used. In only one instance was use against civilians mentioned. Among the agents most commonly proposed were cayenne pepper or other plant-based irritants such as black pepper, snuff, mustard, and veratria. Other suggested agents included chloroform, chlorine, hydrogen cyanide, arsenic compounds, sulfur, and acids. Proponents usually suggested that the chemicals be included in explosive artillery projectiles. Less commonly proposed vehicles of delivery included fire engines, kites, and manned balloons. Some of the proposed weapons have modern counterparts.

  13. A nuclear-weapon-free world and true disarmament

    International Nuclear Information System (INIS)

    Salvini, G.

    1999-01-01

    This preliminary note about is important to consider when discussing hopes of achieving a nuclear-weapon-free world. Without a serious effort to establish intelligent, powerful bodies to control and judge the behavior of the nations on Earth, whatever they future weapons may be, the objective to reach a nuclear-weapon-free world may even succeed, but it is not enough to stop wars and death. Even more than that: if taken alone, as the 'Great Way', it could prove negative, for it could slow down the general effort to achieve peace on out planet. A nuclear-weapon-free world is of course a very good idea but two points must be discussed: how to achieve the nuclear-weapon-free world; and what will happen afterwards. Some considerations on the second point are made

  14. Psychological markers underlying murder weapon profile: a quantitative study.

    Science.gov (United States)

    Kamaluddin, M R; Othman, A; Ismail, K H; Mat Saat, G A

    2017-12-01

    The horrific nature of murder using different types of weapons has been an important focal point of many criminological studies. Weapons that are used in murders seem to play dominant roles in murder investigations as they may provide information leading to arrest. The established factors for weapon usage include environmental context, demography and availability of weapons. However, there is insufficient research attention on the psychological functioning of murderers for particular weapon usage. In light of this, the current study seeks to narrow this gap of information by identifying the influences of psychological traits on weapon usage among a sample of male murderers. The present cross-sectional study was conducted among 71 male murderers incarcerated in 11 prisons within Peninsular Malaysia. The selection of the sample was based on predetermined selection criteria using a purposive sampling method. A guided self-administered questionnaire comprising sociodemography variables and four Malay validated psychometric instruments: Zuckerman-Kuhlman Personality Questionnaire-40-Cross-Culture, Self-control Scale, "How I Think" Questionnaire and Aggression Questionnaire; was used. Independent sample t-test was performed to establish the mean score differences of psychological traits between the murderers who used single and multiple weapons while Kruskal-Wallis tests were carried out to ascertain the differences between the specific types of weapons used among the murderers. Following this, one-way ANOVA was carried out to ascertain the psychological trait differences among the murderers according to the different sources of weapon. Results indicated specific psychological traits influenced the number(s), source(s) and type(s) of weapon used in committing murder. The findings have implications for the psychological profiling of unknown murderers within the Malaysian context.

  15. Assessment of Random Assignment in Training and Test Sets using Generalized Cluster Analysis Technique

    Directory of Open Access Journals (Sweden)

    Sorana D. BOLBOACĂ

    2011-06-01

    Full Text Available Aim: The properness of random assignment of compounds in training and validation sets was assessed using the generalized cluster technique. Material and Method: A quantitative Structure-Activity Relationship model using Molecular Descriptors Family on Vertices was evaluated in terms of assignment of carboquinone derivatives in training and test sets during the leave-many-out analysis. Assignment of compounds was investigated using five variables: observed anticancer activity and four structure descriptors. Generalized cluster analysis with K-means algorithm was applied in order to investigate if the assignment of compounds was or not proper. The Euclidian distance and maximization of the initial distance using a cross-validation with a v-fold of 10 was applied. Results: All five variables included in analysis proved to have statistically significant contribution in identification of clusters. Three clusters were identified, each of them containing both carboquinone derivatives belonging to training as well as to test sets. The observed activity of carboquinone derivatives proved to be normal distributed on every. The presence of training and test sets in all clusters identified using generalized cluster analysis with K-means algorithm and the distribution of observed activity within clusters sustain a proper assignment of compounds in training and test set. Conclusion: Generalized cluster analysis using the K-means algorithm proved to be a valid method in assessment of random assignment of carboquinone derivatives in training and test sets.

  16. Single-machine common/slack due window assignment problems with linear decreasing processing times

    Science.gov (United States)

    Zhang, Xingong; Lin, Win-Chin; Wu, Wen-Hsiang; Wu, Chin-Chia

    2017-08-01

    This paper studies linear non-increasing processing times and the common/slack due window assignment problems on a single machine, where the actual processing time of a job is a linear non-increasing function of its starting time. The aim is to minimize the sum of the earliness cost, tardiness cost, due window location and due window size. Some optimality results are discussed for the common/slack due window assignment problems and two O(n log n) time algorithms are presented to solve the two problems. Finally, two examples are provided to illustrate the correctness of the corresponding algorithms.

  17. DNABIT Compress – Genome compression algorithm

    OpenAIRE

    Rajarajeswari, Pothuraju; Apparao, Allam

    2011-01-01

    Data compression is concerned with how information is organized in data. Efficient storage means removal of redundancy from the data being stored in the DNA molecule. Data compression algorithms remove redundancy and are used to understand biologically important molecules. We present a compression algorithm, “DNABIT Compress” for DNA sequences based on a novel algorithm of assigning binary bits for smaller segments of DNA bases to compress both repetitive and non repetitive DNA sequence. Our ...

  18. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  19. Nuclear weapons issues in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.

    1993-07-02

    This report discusses how the US can play a productive mediating role in South Asia by engaging India and Pakistan in an international forum to manage nuclear weapons, as Edward Teller advocated. India and Pakistan have developed their nuclear capabilities because they fear their neighbors, not because they want to threaten fear their neighbors, not because they want to threaten the US. The appropriate response for the US, therefore, is diplomatic engagement and negotiations. In addition to the international approach, encouragement and facilitation of regional and bilateral interactions will also be important. Formal arms control agreements have been reached, but less formal confidence-building measures, and unilateral security pledges may well be combined to form a more secure strategic environment in South Asia than a nuclear armed confrontation across the porous South Asian border.

  20. From weapons to waste: The future of the nuclear weapons complex

    International Nuclear Information System (INIS)

    Wasserman Goodman, Sherri

    1992-01-01

    This paper examines how decision-making power has shifted within the nuclear weapons complex, from the federal government operating agency, in which power was originally vested by the Atomic Energy Act, to the states and to regulatory authorities. Additionally, when the original operating agency, the Atomic Energy Commission (AEC), was abolished in the 1970s, substantial decision-making power shifted from Washington to the field sites. This paper identifies the needs for future materials and weapons production, and recommends that restart of old plants be abandoned as no longer militarily necessary. Instead, the U. S. should take advantage of what may be a unique opportunity to 'leapfrog' to new, smaller, technologically-advanced plants that will meet the needs of the nuclear arsenal in the post-Cold War world. This paper then looks at the current state of DOE's environmental restoration/waste management program, and the technological, legal and political problems it faces in trying to accomplish its mission of cleaning up all nuclear weapons sites. This paper argues that the U. S. government no longer has the exclusive authority to make and carry out critical decisions affecting a cleanup program that will cost the U. S. over $200 billion over the next 20-40 years. Moreover, there are competing theories about the principles that should guide the cleanup program. Finally, the author examines alternative futures for the DOE'S environmental restoration/waste management program. (author)

  1. Performance evaluation of distributed wavelength assignment in WDM optical networks

    Science.gov (United States)

    Hashiguchi, Tomohiro; Wang, Xi; Morikawa, Hiroyuki; Aoyama, Tomonori

    2004-04-01

    In WDM wavelength routed networks, prior to a data transfer, a call setup procedure is required to reserve a wavelength path between the source-destination node pairs. A distributed approach to a connection setup can achieve a very high speed, while improving the reliability and reducing the implementation cost of the networks. However, along with many advantages, several major challenges have been posed by the distributed scheme in how the management and allocation of wavelength could be efficiently carried out. In this thesis, we apply a distributed wavelength assignment algorithm named priority based wavelength assignment (PWA) that was originally proposed for the use in burst switched optical networks to the problem of reserving wavelengths of path reservation protocols in the distributed control optical networks. Instead of assigning wavelengths randomly, this approach lets each node select the "safest" wavelengths based on the information of wavelength utilization history, thus unnecessary future contention is prevented. The simulation results presented in this paper show that the proposed protocol can enhance the performance of the system without introducing any apparent drawbacks.

  2. Target assignment for security officers to K targets (TASK)

    International Nuclear Information System (INIS)

    Rowland, J.R.; Shelton, K.W.; Stunkel, C.B.

    1983-02-01

    A probabilistic algorithm is developed to provide an optimal Target Assignment for Security officers to K targets (TASK) using a maximin criterion. Under the assumption of only a limited number (N) of security officers, the TASK computer model determines deployment assignments which maximize the system protection against sabotage by an adversary who may select any link in the system, including the weakest, for the point of attack. Applying the TASK model to a hypothetical nuclear facility containing a nine-level building reveals that aggregate targets covering multiple vital areas should be utilized to reduce the number of possible target assignments to a value equal to or only slightly larger than N. The increased probability that a given aggregate target is covered by one or more security officers offsets the slight decrease in interruption probability due to its occurring earlier in the adversary's path. In brief, the TASK model determines the optimal maximin deployment strategy for limited numbers of security officers and calculates a quantitative measure of the resulting system protection

  3. Males that drop a sexually selected weapon grow larger testes.

    Science.gov (United States)

    Joseph, Paul N; Emberts, Zachary; Sasson, Daniel A; Miller, Christine W

    2018-01-01

    Costly sexually selected weapons are predicted to trade off with postcopulatory traits, such as testes. Although weapons can be important for achieving access to females, individuals of some species can permanently drop (i.e. autotomize) their weapons, without regeneration, to escape danger. We capitalized on this natural behavior to experimentally address whether the loss of a sexually selected weapon leads to increased testes investment in the leaf-footed cactus bug, Narnia femorata Stål (Hemiptera: Coreidae). In a second experiment, we measured offspring production for males that lost a weapon during development. As predicted, males that dropped a hind limb during development grew significantly larger testes than the control treatments. Hind-limb autotomy did not result in the enlargement of other nearby traits. Our results are the first to experimentally demonstrate that males compensate for natural weapon loss by investing more in testes. In a second experiment we found that females paired with males that lost a hind limb had 40% lower egg hatching success than females paired with intact males, perhaps because of lower mating receptivity to males with a lost limb. Importantly, in those cases where viable offspring were produced, males missing a hind limb produced 42% more offspring than males with intact limbs. These results suggest that the loss of a hind-limb weapon can, in some cases, lead to greater fertilization success. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.

  4. Postgraduate diploma collaborative assignment: Implications for ...

    African Journals Online (AJOL)

    Postgraduate diploma collaborative assignment: Implications for ESL students ... and collaborative teaching/learning model involving the major course convenors. ... The quality of the work and mood of all concerned improved tremendously.

  5. Statistical aspects of optimal treatment assignment

    OpenAIRE

    van der Linden, Willem J.

    1980-01-01

    The issues of treatment assignment is ordinarily dealt with within the framework of testing aptitude treatment interaction (ATI) hypothesis. ATI research mostly uses linear regression techniques, and an ATI exists when the aptitude treatment (AT) regression lines cross each other within the relevant interval of the aptitude variable. Consistent with this approach is the use of the points of interaction of AT regression lines as treatment-assignment rule. The replacement of such rules by monot...

  6. On pole structure assignment in linear systems

    Czech Academy of Sciences Publication Activity Database

    Loiseau, J.-J.; Zagalak, Petr

    2009-01-01

    Roč. 82, č. 7 (2009), s. 1179-1192 ISSN 0020-7179 R&D Projects: GA ČR(CZ) GA102/07/1596 Institutional research plan: CEZ:AV0Z10750506 Keywords : linear systems * linear state feedback * pole structure assignment Subject RIV: BC - Control Systems Theory Impact factor: 1.124, year: 2009 http://library.utia.cas.cz/separaty/2009/AS/zagalak-on pole structure assignment in linear systems.pdf

  7. Competitive Traffic Assignment in Road Networks

    Directory of Open Access Journals (Sweden)

    Krylatov Alexander Y.

    2016-09-01

    Full Text Available Recently in-vehicle route guidance and information systems are rapidly developing. Such systems are expected to reduce congestion in an urban traffic area. This social benefit is believed to be reached by imposing the route choices on the network users that lead to the system optimum traffic assignment. However, guidance service could be offered by different competitive business companies. Then route choices of different mutually independent groups of users may reject traffic assignment from the system optimum state. In this paper, a game theoretic approach is shown to be very efficient to formalize competitive traffic assignment problem with various groups of users in the form of non-cooperative network game with the Nash equilibrium search. The relationships between the Wardrop’s system optimum associated with the traffic assignment problem and the Nash equilibrium associated with the competitive traffic assignment problem are investigated. Moreover, some related aspects of the Nash equilibrium and the Wardrop’s user equilibrium assignments are also discussed.

  8. Educational Exchange as a Cold War Weapon

    DEFF Research Database (Denmark)

    Rasmussen, Anders Bo

    2014-01-01

    American President Harry S. Truman called the Cold War a "struggle for the minds of men," and assigned journalists an important role in the conflict. This study finds that the U.S. Depeartment of State, via the American Embassy in Copenhagen, consciously attempted to shape Danish journalits' view...

  9. Can abolition of nuclear weapons be adequately verified?

    International Nuclear Information System (INIS)

    Rotblat, J.

    1993-01-01

    Speaking on the problems of preventing proliferations of nuclear weapons and nuclear disarmament the author suggests the following measures to reach these goals: signing a treaty that binds all the nuclear weapon states to the no-first-use principle as a basic policy; the United Nations should put the elimination of nuclear weapons on its agenda; having the treaty safeguarded two-pronged verification regime, one would be technological verification, the second one - so called societal verification which means that not just a group of experts but everybody would be asked to take part in ensuring that the treaty would not be violated

  10. The research on magnetic exploring abandoned chemical weapons by Japanese

    International Nuclear Information System (INIS)

    Wang Luoguo; Li Jingyue; Wang Zezhong

    2007-01-01

    During Word war II, a lot of chemical weapons were left by Japanese on our land. It is very difficult to explore because its complicated states underground. There is no document about the details of this. Few of the research work have been done. In order to destroy completely abandoned chemical weapons by Japanese, the paper has given a serious study on the means to explore the chemical weapons for the purpose to protect our environment and benefit our people. After plenty of research and test, we get good results. (authors)

  11. Is a nuclear weapon-free world desirable?

    International Nuclear Information System (INIS)

    Tertrais, Bruno

    2009-01-01

    In this article, the author shows that a nuclear weapon-free world would probably be more dangerous than today's world because benefits of the existence of nuclear weapons are probably more important that the risks related to their existence. He outlines that nuclear deterrence has been very efficient for these last 65 years. He states that the disappearance of nuclear weapons could be envisaged only after a large transformation of safety conditions, but that such transformations are actually not at all under way. It would indeed require peaceful and democratic world governance

  12. Fragment assignment in the cloud with eXpress-D

    Science.gov (United States)

    2013-01-01

    Background Probabilistic assignment of ambiguously mapped fragments produced by high-throughput sequencing experiments has been demonstrated to greatly improve accuracy in the analysis of RNA-Seq and ChIP-Seq, and is an essential step in many other sequence census experiments. A maximum likelihood method using the expectation-maximization (EM) algorithm for optimization is commonly used to solve this problem. However, batch EM-based approaches do not scale well with the size of sequencing datasets, which have been increasing dramatically over the past few years. Thus, current approaches to fragment assignment rely on heuristics or approximations for tractability. Results We present an implementation of a distributed EM solution to the fragment assignment problem using Spark, a data analytics framework that can scale by leveraging compute clusters within datacenters–“the cloud”. We demonstrate that our implementation easily scales to billions of sequenced fragments, while providing the exact maximum likelihood assignment of ambiguous fragments. The accuracy of the method is shown to be an improvement over the most widely used tools available and can be run in a constant amount of time when cluster resources are scaled linearly with the amount of input data. Conclusions The cloud offers one solution for the difficulties faced in the analysis of massive high-thoughput sequencing data, which continue to grow rapidly. Researchers in bioinformatics must follow developments in distributed systems–such as new frameworks like Spark–for ways to port existing methods to the cloud and help them scale to the datasets of the future. Our software, eXpress-D, is freely available at: http://github.com/adarob/express-d. PMID:24314033

  13. 77 FR 59891 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Declaration and...

    Science.gov (United States)

    2012-10-01

    ... Request; Chemical Weapons Convention Declaration and Report Handbook and Forms AGENCY: Bureau of Industry.... Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons... Chemical Weapons Convention (CWC), an international arms control treaty. II. Method of Collection Submitted...

  14. 15 CFR 742.18 - Chemical Weapons Convention (CWC or Convention).

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Chemical Weapons Convention (CWC or... REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.18 Chemical Weapons Convention (CWC or Convention). States... Use of Chemical Weapons and on Their Destruction, also known as the Chemical Weapons Convention (CWC...

  15. Excess Weapons Plutonium Immobilization in Russia

    International Nuclear Information System (INIS)

    Jardine, L.; Borisov, G.B.

    2000-01-01

    The joint goal of the Russian work is to establish a full-scale plutonium immobilization facility at a Russian industrial site by 2005. To achieve this requires that the necessary engineering and technical basis be developed in these Russian projects and the needed Russian approvals be obtained to conduct industrial-scale immobilization of plutonium-containing materials at a Russian industrial site by the 2005 date. This meeting and future work will provide the basis for joint decisions. Supporting R and D projects are being carried out at Russian Institutes that directly support the technical needs of Russian industrial sites to immobilize plutonium-containing materials. Special R and D on plutonium materials is also being carried out to support excess weapons disposition in Russia and the US, including nonproliferation studies of plutonium recovery from immobilization forms and accelerated radiation damage studies of the US-specified plutonium ceramic for immobilizing plutonium. This intriguing and extraordinary cooperation on certain aspects of the weapons plutonium problem is now progressing well and much work with plutonium has been completed in the past two years. Because much excellent and unique scientific and engineering technical work has now been completed in Russia in many aspects of plutonium immobilization, this meeting in St. Petersburg was both timely and necessary to summarize, review, and discuss these efforts among those who performed the actual work. The results of this meeting will help the US and Russia jointly define the future direction of the Russian plutonium immobilization program, and make it an even stronger and more integrated Russian program. The two objectives for the meeting were to: (1) Bring together the Russian organizations, experts, and managers performing the work into one place for four days to review and discuss their work with each other; and (2) Publish a meeting summary and a proceedings to compile reports of all the

  16. (+/-)-catechin: chemical weapon, antioxidant, or stress regulator?

    Science.gov (United States)

    Chobot, Vladimir; Huber, Christoph; Trettenhahn, Guenter; Hadacek, Franz

    2009-08-01

    (+/-)-Catechin is a flavan-3-ol that occurs in the organs of many plant species, especially fruits. Health-beneficial effects have been studied extensively, and notable toxic effects have not been found. In contrast, (+/-)-catechin has been implicated as a 'chemical weapon' that is exuded by the roots of Centaurea stoebe, an invasive knapweed of northern America. Recently, this hypothesis has been rejected based on (+/-)-catechin's low phytotoxicity, instability at pH levels higher than 5, and poor recovery from soil. In the current study, (+/-)-catechin did not inhibit the development of white and black mustard to an extent that was comparable to the highly phytotoxic juglone, a naphthoquinone that is allegedly responsible for the allelopathy of the walnut tree. At high stress levels, caused by sub-lethal methanol concentrations in the medium, and a 12 h photoperiod, (+/-)-catechin even attenuated growth retardation. A similar effect was observed when (+/-)-catechin was assayed for brine shrimp mortality. Higher concentrations reduced the mortality caused by toxic concentrations of methanol. Further, when (+/-)-catechin was tested in variants of the deoxyribose degradation assay, it was an efficient scavenger of reactive oxygen species (ROS) when they were present in higher concentrations. This antioxidant effect was enhanced when iron was chelated directly by (+/-)-catechin. Conversely, if iron was chelated to EDTA, pro-oxidative effects were demonstrated at higher concentrations; in this case (+/-)-catechin reduced molecular oxygen and iron to reagents required by the Fenton reaction to produce hydroxyl radicals. A comparison of cyclic voltammograms of (+/-)-catechin with the phytotoxic naphthoquinone juglone indicated similar redox-cycling properties for both compounds although juglone required lower electrochemical potentials to enter redox reactions. In buffer solutions, (+/-)-catechin remained stable at pH 3.6 (vacuole) and decomposed at pH 7.4 (cytoplasm

  17. AUTOBA: automation of backbone assignment from HN(C)N suite of experiments.

    Science.gov (United States)

    Borkar, Aditi; Kumar, Dinesh; Hosur, Ramakrishna V

    2011-07-01

    Development of efficient strategies and automation represent important milestones of progress in rapid structure determination efforts in proteomics research. In this context, we present here an efficient algorithm named as AUTOBA (Automatic Backbone Assignment) designed to automate the assignment protocol based on HN(C)N suite of experiments. Depending upon the spectral dispersion, the user can record 2D or 3D versions of the experiments for assignment. The algorithm uses as inputs: (i) protein primary sequence and (ii) peak-lists from user defined HN(C)N suite of experiments. In the end, one gets H(N), (15)N, C(α) and C' assignments (in common BMRB format) for the individual residues along the polypeptide chain. The success of the algorithm has been demonstrated, not only with experimental spectra recorded on two small globular proteins: ubiquitin (76 aa) and M-crystallin (85 aa), but also with simulated spectra of 27 other proteins using assignment data from the BMRB.

  18. Cargo/Weapons Elevator Land Based Engineering Site

    Data.gov (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  19. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    user

    Motors and Drives are profoundly used in military and strategic weapon ... electric field by means of a split physical commutator and brushes. ... Figure 3.1: Akash Missile Launching Platform on Wheeled Vehicle (downloaded from internet). 4.

  20. Limitations of Guns as a Defence against Manoeuvring Air Weapons

    National Research Council Canada - National Science Library

    Washsberger, Christian

    2004-01-01

    In the near future, strategic and other critical assets will be subject to attack from a new range of air threats, including highly accurate aircraft-launched weapons that offer long stand-off ranges...

  1. Decontamination of American plants engaged in nuclear weapon production

    International Nuclear Information System (INIS)

    Vladislavlev, V.V.

    1992-01-01

    The data on the Americal program dealing with sharp decreasing the levels of radioactive contamination and chemical pollution of soils and ground water in regions, where the plants for nuclear weapon manufacturing are located, are given

  2. Chemical Weapons Disposal: Understanding Scheduled Downtime at Disposal Facilities

    National Research Council Canada - National Science Library

    1997-01-01

    ... materiel and to enhance national security. Aging chemical weapons, many created during World War II, Korean and Cold War eras are safely stored in eight secured sites within the continental United States...

  3. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  4. China: Suspected Acquisition of U.S. Nuclear Weapon Secrets

    National Research Council Canada - National Science Library

    Kan, Shirley A

    2006-01-01

    ... of U.S. nuclear weapon secrets in its development of nuclear forces, as well as whether the Administration's response to the security problems was effective or mishandled and whether it fairly used or abused...

  5. The use of neutron scattering in nuclear weapons research

    International Nuclear Information System (INIS)

    Juzaitis, R.J.

    1995-01-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a 'short-sleeve' workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE's contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects

  6. Cartagena declaration on renunciation of weapons of mass destruction

    International Nuclear Information System (INIS)

    1992-02-01

    The document reproduces the text of the Cartagena Declaration on Renunciation of Weapons of Mass Destruction, signed by the Presidents of Bolivia, Colombia, Ecuador, Peru and Venezuela at Cartagena de Indias, Colombia, on 4 December 1991

  7. Los Alamos National Laboratory JOWOG 31 Weapons Engineering Education & Training

    Energy Technology Data Exchange (ETDEWEB)

    Domzalski, Mark W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-03

    The objectives of this report are to recruit talented staff, invest in new and early/mid career staff, retain trained and talented staff and future leaders, and shorten the ~5-10 year time line to realize new Weaponeers.

  8. The proliferation of massive destruction weapons and ballistic missiles

    International Nuclear Information System (INIS)

    Schmitt, M.

    1996-01-01

    The author studies the actual situation of nuclear deterrence policies, the possibilities of use chemical weapons as massive destructions weapons for non nuclear governments. The situation of non proliferation of nuclear weapons took a new interest with the disintegration of the communism block, but it seems that only few nuclear matter disappeared towards proliferating countries. The denuclearization of Bielorussia, Ukraine and Kazakhstan makes progress with the START I treaty; China has signed the Non proliferation treaty in 1992, it conducts an export policy in matter of equipment and know-how, towards Iran, Pakistan, North Korea, Saudi Arabia and Syria. In a future of ten years, countries such, Iran, North Korea could catch up with Israel, India and Pakistan among non declared nuclear countries. For chemical weapon, Libya, Iran and Syria could catch up with Iraq. (N.C.)

  9. Eliminating Adversary Weapons of Mass Destruction: What's at Stake?

    National Research Council Canada - National Science Library

    Hersman, Rebecca K

    2004-01-01

    .... Unfortunately, the current preoccupation with intelligence might mask other issues and shortcomings in the American ability to eliminate the threat posed by weapons of mass destruction in the hands of its enemies...

  10. Application of inertial confinement fusion to weapon technology

    International Nuclear Information System (INIS)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved

  11. the international politics of nuclear weapons: a constructivist analysis

    African Journals Online (AJOL)

    JK

    regarding the export of and trade in nuclear weapons and technology. ... Since 1945, there has been no change in this position of the government of. Japan as ...... process, the Agency discovered illicit nuclear procurement networks (UN News.

  12. First Trimester Fetal Gender Assignment by Ultrasound

    Directory of Open Access Journals (Sweden)

    Sabahattin Altunyurt

    2010-03-01

    Full Text Available Objective: To investigate the efficiency of genital tubercule angle on detecting fetal gender in first trimester by ultrasonography. Material-Method: Fetal sex assignment by ultrasound was carried out in 172 pregnancies at 11-13+6 weeks between 2007 June and 2007 December. Gestational age was determined by the measurement of crown-rump length (CRL. The ultrasound predictions were compared with actual sex at birth. Mid-sagittal planes of a section of the fetal genital tubercle were performed to identify the gender. Results: 155 of 172 patients’ data were achieved. The overall success rate was 92.3 % in sonographic assignment of fetal sex. The correct assignment rate in female fetuses was significantly higher than males (95.9 % - 88.8 % [p=0,001]. The correct identification of fetal sex improved with advancing gestational age from 89.3 % between 11-11+6 weeks, 92.5 % between 12-12+6 weeks and 93.4 % between 13-13+6 weeks (p=0,96. Conclusion: The fetal sex assignment by ultrasonography between 11-13+6 weeks had high success rate. The sensitivity of fetal sex assignment was not affected with fetus position and gestational age.

  13. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    OpenAIRE

    J.P. Dudeja; G.S. Kalsey

    2000-01-01

    Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs) are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper com...

  14. Historical fencing and scientific research medieval weapons: common ground

    Directory of Open Access Journals (Sweden)

    B. V. Hrynchyshyn

    2015-07-01

    We considered various approaches to the reconstruction of the historical fencing. It is proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods The various approaches to the reconstruction of the historical fencing. Proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods.

  15. Defense and Regional Integration: Brazil’s Weapons Industry Case

    OpenAIRE

    Suzeley Kalil Mathias; Eduardo Lucas de Vasconcelos Cruz

    2009-01-01

    This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the poss...

  16. Dangerous deterrent: nuclear weapons proliferation and conflict in South Asia

    International Nuclear Information System (INIS)

    Paul Kapur, S.

    2008-01-01

    This book discusses the acquisition of nuclear weapons by India and Pakistan and its effect on security of the South Asian region. The author uses quantitative analysis to establish the relationship between nuclearization and conventional stability in the region between 1971 and 2002. He shows a positive correlation between nuclear proliferation and conventional instability during these three decades. Thus, this study affirms that nuclear weapons have failed to prevent conflict in South Asia. In fact, they have escalated tensions

  17. Can we stop the spread of nuclear weapons?

    International Nuclear Information System (INIS)

    Blix, H.

    1990-02-01

    In his address to the Graduate Institute of International Studies in Geneva, IAEA Director General Hans Blix reviewed the world's non-proliferation regime and the role of IAEA safeguards in preventing the spread of nuclear weapons. He emphasized that the first and fundamental barrier to proliferation is the political will and determination of individual States not to acquire nuclear weapons, other barriers being legal obligations under treaties or agreements and the acceptance of safeguards inspections to verify peaceful uses of nuclear facilities

  18. Collector for recovering gallium from weapons plutonium

    International Nuclear Information System (INIS)

    Philip, C.V.; Anthony, R.G.; Chokkaram, S.

    1998-09-01

    Currently, the separation of gallium from weapons plutonium involves the use of aqueous processing using either solvent extraction of ion exchange. However, this process generates significant quantities of liquid radioactive wastes. A Thermally Induced Gallium Removal process, or TIGR, developed by researchers at Los Alamos National Laboratories, is a simpler alternative to aqueous processing. This research examined this process, and the behavior of gallium suboxide, a vapor that is swept away by passing hydrogen/argon over gallium trioxide/plutonium oxide heated at 1100 C during the TIGR process. Through experimental procedures, efforts were made to prevent the deposition of corrosive gallium onto furnace and vent surfaces. Experimental procedures included three options for gallium removal and collection: (1) collection of gallium suboxide through use of a cold finger; (2) collection by in situ air oxidation; and (3) collection of gallium on copper. Results conclude all three collection mechanisms are feasible. In addition, gallium trioxide exists in three crystalline forms, and each form was encountered during each experiment, and that each form will have a different reactivity

  19. The evolution of tail weaponization in amniotes.

    Science.gov (United States)

    Arbour, Victoria M; Zanno, Lindsay E

    2018-01-31

    Weaponry, for the purpose of intraspecific combat or predator defence, is one of the most widespread animal adaptations, yet the selective pressures and constraints governing its phenotypic diversity and skeletal regionalization are not well understood. Here, we investigate the evolution of tail weaponry in amniotes, a rare form of weaponry that nonetheless evolved independently among a broad spectrum of life including mammals, turtles and dinosaurs. Using phylogenetic comparative methods, we test for links between morphology, ecology and behaviour in extant amniotes known to use the tail as a weapon, and in extinct taxa bearing osseous tail armaments. We find robust ecological and morphological correlates of both tail lashing behaviour and bony tail weaponry, including large body size, body armour and herbivory, suggesting these life-history parameters factor into the evolution of antipredator behaviours and tail armaments. We suggest that the evolution of tail weaponry is rare because large, armoured herbivores are uncommon in extant terrestrial faunas, as they have been throughout evolutionary history. © 2018 The Author(s).

  20. An Accurate and Impartial Expert Assignment Method for Scientific Project Review

    Directory of Open Access Journals (Sweden)

    Mingliang Yue

    2017-12-01

    Full Text Available Purpose: This paper proposes an expert assignment method for scientific project review that considers both accuracy and impartiality. As impartial and accurate peer review is extremely important to ensure the quality and feasibility of scientific projects, enhanced methods for managing the process are needed. Design/methodology/approach: To ensure both accuracy and impartiality, we design four criteria, the reviewers’ fitness degree, research intensity, academic association, and potential conflict of interest, to express the characteristics of an appropriate peer review expert. We first formalize the expert assignment problem as an optimization problem based on the designed criteria, and then propose a randomized algorithm to solve the expert assignment problem of identifying reviewer adequacy. Findings: Simulation results show that the proposed method is quite accurate and impartial during expert assignment. Research limitations: Although the criteria used in this paper can properly show the characteristics of a good and appropriate peer review expert, more criteria/conditions can be included in the proposed scheme to further enhance accuracy and impartiality of the expert assignment. Practical implications: The proposed method can help project funding agencies (e.g. the National Natural Science Foundation of China find better experts for project peer review. Originality/value: To the authors’ knowledge, this is the first publication that proposes an algorithm that applies an impartial approach to the project review expert assignment process. The simulation results show the effectiveness of the proposed method.

  1. Towards the complete prohibition and elimination of nuclear weapons

    International Nuclear Information System (INIS)

    Xie Zhiqiong

    1998-01-01

    For 40 years, the Pugwash Conference on Science and world affairs has been making unremitting efforts to achieve it main objectives the struggle to eliminate nuclear weapons, the elimination of wars and maintenance of world peace. The end of the Cold War vigorously encouraged world efforts in arms control and disarmament. On the day of exploding her first nuclear bomb in October 1964, China declared solemnly that it would never be the first to use nuclear weapons at any time under any circumstances. China has also committed unconditionally not to use nuclear weapons or threaten to use nuclear weapons against non-nuclear weapon states and nuclear free zones. China is the sole nuclear weapon state that has made this commitment, and she has kept her word. China is in favour of comprehensive nuclear test ban in the move towards complete nuclear disarmament, taking an active part in the CTBT negotiations in Geneva and contributing to the conclusion of a fair, reasonable, verifiable treaty of universal adherence and unlimited duration within this year

  2. Precursor of other nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Roman-Morey, E.

    1997-01-01

    Based on the analysis of the long process of negotiations for implementing the Treaty of Tlatelolco and its history during the last three decades, especially its influence on other regions of the world for stimulating the creation of new nuclear-weapon-free zones, the following conclusions were drawn: nuclear danger still persists; the end of Cold War implies the end of a nuclear threat; the nuclear fear should not become nuclear complacency and be accepted by international community; common security as the goal of international community should be recognised and definitive abolition of nuclear weapons should be sought; the Treaty of Tlatelolco represents the cornerstone for creating new nuclear-weapon-free zones; Treaties of Tlatelolco, Rarotonga, Bangkok and Pelindaba should be examples to be followed by other regions and groups of countries for creating new nuclear-weapon-free zones which should be recognised as very important phase in achieving a nuclear-weapon-free world and means for attaining an international regime of non-proliferation of weapons for mass destruction

  3. Proposition of law relative to the admission and compensation of nuclear weapons tests victims

    International Nuclear Information System (INIS)

    2008-01-01

    The present proposition of law has for object to come up to the expectations of persons having participated to nuclear weapons test made by France between the 13. february 1960 and the 27 january 1996, in Sahara or French polynesia. The consequences on health can not be ignored even after several decades of years. Decades of veterans have for several years, have got involve in justice procedures to be entitled to obtain compensation in damage repair they assign to the nuclear tests. Some courts of justice have, for years, recognized the legitimacy of these claims and the judgements cite irradiation consequences able to be revealed late even several decades after the radiation exposure. Other states have adopted laws of compensation for the victims of their populations, civil or military ones. That is why this proposition of law comes today to be adopted. (N.C.)

  4. Protein secondary structure assignment revisited: a detailed analysis of different assignment methods

    Directory of Open Access Journals (Sweden)

    de Brevern Alexandre G

    2005-09-01

    Full Text Available Abstract Background A number of methods are now available to perform automatic assignment of periodic secondary structures from atomic coordinates, based on different characteristics of the secondary structures. In general these methods exhibit a broad consensus as to the location of most helix and strand core segments in protein structures. However the termini of the segments are often ill-defined and it is difficult to decide unambiguously which residues at the edge of the segments have to be included. In addition, there is a "twilight zone" where secondary structure segments depart significantly from the idealized models of Pauling and Corey. For these segments, one has to decide whether the observed structural variations are merely distorsions or whether they constitute a break in the secondary structure. Methods To address these problems, we have developed a method for secondary structure assignment, called KAKSI. Assignments made by KAKSI are compared with assignments given by DSSP, STRIDE, XTLSSTR, PSEA and SECSTR, as well as secondary structures found in PDB files, on 4 datasets (X-ray structures with different resolution range, NMR structures. Results A detailed comparison of KAKSI assignments with those of STRIDE and PSEA reveals that KAKSI assigns slightly longer helices and strands than STRIDE in case of one-to-one correspondence between the segments. However, KAKSI tends also to favor the assignment of several short helices when STRIDE and PSEA assign longer, kinked, helices. Helices assigned by KAKSI have geometrical characteristics close to those described in the PDB. They are more linear than helices assigned by other methods. The same tendency to split long segments is observed for strands, although less systematically. We present a number of cases of secondary structure assignments that illustrate this behavior. Conclusion Our method provides valuable assignments which favor the regularity of secondary structure segments.

  5. Algorithmic alternatives

    International Nuclear Information System (INIS)

    Creutz, M.

    1987-11-01

    A large variety of Monte Carlo algorithms are being used for lattice gauge simulations. For purely bosonic theories, present approaches are generally adequate; nevertheless, overrelaxation techniques promise savings by a factor of about three in computer time. For fermionic fields the situation is more difficult and less clear. Algorithms which involve an extrapolation to a vanishing step size are all quite closely related. Methods which do not require such an approximation tend to require computer time which grows as the square of the volume of the system. Recent developments combining global accept/reject stages with Langevin or microcanonical updatings promise to reduce this growth to V/sup 4/3/

  6. Combinatorial algorithms

    CERN Document Server

    Hu, T C

    2002-01-01

    Newly enlarged, updated second edition of a valuable text presents algorithms for shortest paths, maximum flows, dynamic programming and backtracking. Also discusses binary trees, heuristic and near optimums, matrix multiplication, and NP-complete problems. 153 black-and-white illus. 23 tables.Newly enlarged, updated second edition of a valuable, widely used text presents algorithms for shortest paths, maximum flows, dynamic programming and backtracking. Also discussed are binary trees, heuristic and near optimums, matrix multiplication, and NP-complete problems. New to this edition: Chapter 9

  7. Writing Assignments that Promote Active Learning

    Science.gov (United States)

    Narayanan, M.

    2014-12-01

    Encourage students to write a detailed, analytical report correlating classroom discussions to an important historical event or a current event. Motivate students interview an expert from industry on a topic that was discussed in class. Ask the students to submit a report with supporting sketches, drawings, circuit diagrams and graphs. Propose that the students generate a complete a set of reading responses pertaining to an assigned topic. Require each student to bring in one comment or one question about an assigned reading. The assignment should be a recent publication in an appropriate journal. Have the students conduct a web search on an assigned topic. Ask them to generate a set of ideas that can relate to classroom discussions. Provide the students with a study guide. The study guide should provide about 10 or 15 short topics. Quiz the students on one or two of the topics. Encourage the students to design or develop some creative real-world examples based on a chapter discussed or a topic of interest. Require that students originate, develop, support and defend a viewpoint using a specifically assigned material. Make the students practice using or utilizing a set of new technical terms they have encountered in an assigned chapter. Have students develop original examples explaining the different terms. Ask the students to select one important terminology from the previous classroom discussions. Encourage the students to explain why they selected that particular word. Ask them to talk about the importance of the terminology from the point of view of their educational objectives and future career. Angelo, T. A. (1991). Ten easy pieces: Assessing higher learning in four dimensions. In T. A. Angelo (Ed.), Classroom research: Early lessons from success (pp. 17-31). New Directions for Teaching and Learning, No. 46. San Francisco: Jossey-Bass.

  8. Grouping puts figure-ground assignment in context by constraining propagation of edge assignment.

    Science.gov (United States)

    Brooks, Joseph L; Brook, Joseph L; Driver, Jon

    2010-05-01

    Figure-ground organization involves the assignment of edges to a figural shape on one or the other side of each dividing edge. Established visual cues for edge assignment primarily concern relatively local rather than contextual factors. In the present article, we show that an assignment for a locally unbiased edge can be affected by an assignment of a remote contextual edge that has its own locally biased assignment. We find that such propagation of edge assignment from the biased remote context occurs only when the biased and unbiased edges are grouped. This new principle, whereby grouping constrains the propagation of figural edge assignment, emerges from both subjective reports and an objective short-term edge-matching task. It generalizes from moving displays involving grouping by common fate and collinearity, to static displays with grouping by similarity of edge-contrast polarity, or apparent occlusion. Our results identify a new contextual influence on edge assignment. They also identify a new mechanistic relation between grouping and figure-ground processes, whereby grouping between remote elements can constrain the propagation of edge assignment between those elements. Supplemental materials for this article may be downloaded from http://app.psychonomic-journals.org/content/supplemental.

  9. Parallel algorithms for continuum dynamics

    International Nuclear Information System (INIS)

    Hicks, D.L.; Liebrock, L.M.

    1987-01-01

    Simply porting existing parallel programs to a new parallel processor may not achieve the full speedup possible; to achieve the maximum efficiency may require redesigning the parallel algorithms for the specific architecture. The authors discuss here parallel algorithms that were developed first for the HEP processor and then ported to the CRAY X-MP/4, the ELXSI/10, and the Intel iPSC/32. Focus is mainly on the most recent parallel processing results produced, i.e., those on the Intel Hypercube. The applications are simulations of continuum dynamics in which the momentum and stress gradients are important. Examples of these are inertial confinement fusion experiments, severe breaks in the coolant system of a reactor, weapons physics, shock-wave physics. Speedup efficiencies on the Intel iPSC Hypercube are very sensitive to the ratio of communication to computation. Great care must be taken in designing algorithms for this machine to avoid global communication. This is much more critical on the iPSC than it was on the three previous parallel processors

  10. Effects of Weapons on Aggressive Thoughts, Angry Feelings, Hostile Appraisals, and Aggressive Behavior: A Meta-Analytic Review of the Weapons Effect Literature.

    Science.gov (United States)

    Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J

    2017-09-01

    Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).

  11. A multi-objective approach to the assignment of stock keeping units to unidirectional picking lines

    Directory of Open Access Journals (Sweden)

    Le Roux, G. J.

    2017-05-01

    Full Text Available An order picking system in a distribution centre consisting of parallel unidirectional picking lines is considered. The objectives are to minimise the walking distance of the pickers, the largest volume of stock on a picking line over all picking lines, the number of small packages, and the total penalty incurred for late distributions. The problem is formulated as a multi-objective multiple knapsack problem that is not solvable in a realistic time. Population-based algorithms, including the artificial bee colony algorithm and the genetic algorithm, are also implemented. The results obtained from all algorithms indicate a substantial improvement on all objectives relative to historical assignments. The genetic algorithm delivers the best performance.

  12. Flow Oriented Channel Assignment for Multi-radio Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Niu Zhisheng

    2010-01-01

    Full Text Available We investigate channel assignment for a multichannel wireless mesh network backbone, where each router is equipped with multiple interfaces. Of particular interest is the development of channel assignment heuristics for multiple flows. We present an optimization formulation and then propose two iterative flow oriented heuristics for the conflict-free and interference-aware cases, respectively. To maximize the aggregate useful end-to-end flow rates, both algorithms identify and resolve congestion at instantaneous bottleneck link in each iteration. Then the link rate is optimally allocated among contending flows that share this link by solving a linear programming (LP problem. A thorough performance evaluation is undertaken as a function of the number of channels and interfaces/node and the number of contending flows. The performance of our algorithm is shown to be significantly superior to best known algorithm in its class in multichannel limited radio scenarios.

  13. Autodriver algorithm

    Directory of Open Access Journals (Sweden)

    Anna Bourmistrova

    2011-02-01

    Full Text Available The autodriver algorithm is an intelligent method to eliminate the need of steering by a driver on a well-defined road. The proposed method performs best on a four-wheel steering (4WS vehicle, though it is also applicable to two-wheel-steering (TWS vehicles. The algorithm is based on coinciding the actual vehicle center of rotation and road center of curvature, by adjusting the kinematic center of rotation. The road center of curvature is assumed prior information for a given road, while the dynamic center of rotation is the output of dynamic equations of motion of the vehicle using steering angle and velocity measurements as inputs. We use kinematic condition of steering to set the steering angles in such a way that the kinematic center of rotation of the vehicle sits at a desired point. At low speeds the ideal and actual paths of the vehicle are very close. With increase of forward speed the road and tire characteristics, along with the motion dynamics of the vehicle cause the vehicle to turn about time-varying points. By adjusting the steering angles, our algorithm controls the dynamic turning center of the vehicle so that it coincides with the road curvature center, hence keeping the vehicle on a given road autonomously. The position and orientation errors are used as feedback signals in a closed loop control to adjust the steering angles. The application of the presented autodriver algorithm demonstrates reliable performance under different driving conditions.

  14. Design of an adaptive pole assignment controller for steam generators and its experimental study

    International Nuclear Information System (INIS)

    Na, Man Gyun; No, Hee Cheon

    1992-01-01

    An adaptive observer is designed that both parameters and state variables of the steam generator are estimated simultaneously. A pole assignment controller is derived on the basis of the adaptive observer. The characteristics of the overall closed-loop control system can be expressed in terms of its poles, assigned poles. The troublesome tuning procedure of the P-I controller is reduced to the determination of the desired poles only. The proposed algorithm is compared with the conventional P-I controller through numerical simulation. Also, the adaptive pole assignment controller is studied experimentally by implementing it to the mock-up of the nuclear steam generator. The adaptive pole assignment controller shows better responses than the P-l controller does. (Author)

  15. Semi-infinite assignment and transportation games

    NARCIS (Netherlands)

    Timmer, Judith B.; Sánchez-Soriano, Joaqu´ın; Llorca, Navidad; Tijs, Stef; Goberna, Miguel A.; López, Marco A.

    2001-01-01

    Games corresponding to semi-infinite transportation and related assignment situations are studied. In a semi-infinite transportation situation, one aims at maximizing the profit from the transportation of a certain good from a finite number of suppliers to an infinite number of demanders. An

  16. Statistical aspects of optimal treatment assignment

    NARCIS (Netherlands)

    van der Linden, Willem J.

    The issues of treatment assignment is ordinarily dealt with within the framework of testing aptitude treatment interaction (ATI) hypothesis. ATI research mostly uses linear regression techniques, and an ATI exists when the aptitude treatment (AT) regression lines cross each other within the relevant

  17. Tabu search for target-radar assignment

    DEFF Research Database (Denmark)

    Hindsberger, Magnus; Vidal, Rene Victor Valqui

    2000-01-01

    In the paper the problem of assigning air-defense illumination radars to enemy targets is presented. A tabu search metaheuristic solution is described and the results achieved are compared to those of other heuristic approaches, implementation and experimental aspects are discussed. It is argued ...

  18. Strategy-Proof Assignment Of Multiple Resources

    DEFF Research Database (Denmark)

    Erlanson, Albin; Szwagrzak, Karol

    2015-01-01

    We examine the strategy-proof allocation of multiple resources; an application is the assignment of packages of tasks, workloads, and compensations among the members of an organization. In the domain of multidimensional single-peaked preferences, we find that any allocation mechanism obtained by ...

  19. Optimal Processor Assignment for Pipeline Computations

    Science.gov (United States)

    1991-10-01

    the use of ratios: initially each task is assigned a procesbuor2 the remaining proceborb are distributed in proportion to the quantities f,(1), 1 < i...algorithmns. IEEE Trans. onl Parallel and Distributed Systemns, 1 (4):470-499, October 1990. [26] P. Al. Kogge. The Architeture of Pipelined Comnputers

  20. Incentivized optimal advert assignment via utility decomposition

    NARCIS (Netherlands)

    Kelly, F.; Key, P.; Walton, N.

    2014-01-01

    We consider a large-scale Ad-auction where adverts are assigned over a potentially infinite number of searches. We capture the intrinsic asymmetries in information between advertisers, the advert platform and the space of searches: advertisers know and can optimize the average performance of their

  1. A game theoretic approach to assignment problems

    NARCIS (Netherlands)

    Klijn, F.

    2000-01-01

    Game theory deals with the mathematical modeling and analysis of conflict and cooperation in the interaction of multiple decision makers. This thesis adopts two game theoretic methods to analyze a range of assignment problems that arise in various economic situations. The first method has as

  2. 7 CFR 1437.104 - Assigned production.

    Science.gov (United States)

    2010-01-01

    ...) Irrigation equipment is not capable of supplying adequate water to sustain the expected production of a... practice is not used. (7) For normal irrigated annual and biennial crops, the supply of available water at... determining losses under this section, assigned production will be used to offset the loss of production when...

  3. Accounting for Sustainability: An Active Learning Assignment

    Science.gov (United States)

    Gusc, Joanna; van Veen-Dirks, Paula

    2017-01-01

    Purpose: Sustainability is one of the newer topics in the accounting courses taught in university teaching programs. The active learning assignment as described in this paper was developed for use in an accounting course in an undergraduate program. The aim was to enhance teaching about sustainability within such a course. The purpose of this…

  4. DNABIT Compress – Genome compression algorithm

    Science.gov (United States)

    Rajarajeswari, Pothuraju; Apparao, Allam

    2011-01-01

    Data compression is concerned with how information is organized in data. Efficient storage means removal of redundancy from the data being stored in the DNA molecule. Data compression algorithms remove redundancy and are used to understand biologically important molecules. We present a compression algorithm, “DNABIT Compress” for DNA sequences based on a novel algorithm of assigning binary bits for smaller segments of DNA bases to compress both repetitive and non repetitive DNA sequence. Our proposed algorithm achieves the best compression ratio for DNA sequences for larger genome. Significantly better compression results show that “DNABIT Compress” algorithm is the best among the remaining compression algorithms. While achieving the best compression ratios for DNA sequences (Genomes),our new DNABIT Compress algorithm significantly improves the running time of all previous DNA compression programs. Assigning binary bits (Unique BIT CODE) for (Exact Repeats, Reverse Repeats) fragments of DNA sequence is also a unique concept introduced in this algorithm for the first time in DNA compression. This proposed new algorithm could achieve the best compression ratio as much as 1.58 bits/bases where the existing best methods could not achieve a ratio less than 1.72 bits/bases. PMID:21383923

  5. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons; Armes de terreur. Debarrasser le monde des armes nucleaires, biologiques et chimiques - Commission sur les armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Journe, V.

    2010-07-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  6. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  7. Algorithmic Self

    DEFF Research Database (Denmark)

    Markham, Annette

    This paper takes an actor network theory approach to explore some of the ways that algorithms co-construct identity and relational meaning in contemporary use of social media. Based on intensive interviews with participants as well as activity logging and data tracking, the author presents a richly...... layered set of accounts to help build our understanding of how individuals relate to their devices, search systems, and social network sites. This work extends critical analyses of the power of algorithms in implicating the social self by offering narrative accounts from multiple perspectives. It also...... contributes an innovative method for blending actor network theory with symbolic interaction to grapple with the complexity of everyday sensemaking practices within networked global information flows....

  8. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  9. Civil nuclear energy and the proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1990-04-01

    The issue of whether civil nuclear programmes contribute to the risk of proliferation of nuclear weapons has been discussed since civil programmes were first considered, and has always complicated public attitudes to civil nuclear energy. This paper seeks to define the extent to which there is such ''linkage''. It does not deal with the linkages that exist between nuclear weapons and other industries and activities - for example, those involved in weapons delivery systems -since these are not within the Uranium Institute's area of competence. Linkage concerns regarding civil nuclear programmes arise primarily over the possibility of their being used to produce highly enriched uranium or plutonium for use in weapons. The technologies which can give rise directly to these materials are therefore ''sensitive'' in proliferation terms. Linkage may also arise through the relevant experience of the trained workforce. Such linkage is, however, limited by institutional, technical and economic factors. First, important institutional constraints on using a civil programme for military purposes exist in the form of a network of bilateral agreements and international treaties - most particularly the Nuclear Non-Proliferation Treaty - and the international safeguards inspections. Secondly, without access to the technologies of enrichment or reprocessing, the fissile material needed for an explosive cannot be obtained from any plant or process used to produce electricity. Finally, establishing a civil programme - with equipment whose design is optimized for electricity production - in order to develop weapons is an expensive route compared to specialized facilities. (author)

  10. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    Chang Yenchiang

    2009-01-01

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  11. Distributed Schemes for Crowdsourcing-Based Sensing Task Assignment in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Linbo Zhai

    2017-01-01

    Full Text Available Spectrum sensing is an important issue in cognitive radio networks. The unlicensed users can access the licensed wireless spectrum only when the licensed wireless spectrum is sensed to be idle. Since mobile terminals such as smartphones and tablets are popular among people, spectrum sensing can be assigned to these mobile intelligent terminals, which is called crowdsourcing method. Based on the crowdsourcing method, this paper studies the distributed scheme to assign spectrum sensing task to mobile terminals such as smartphones and tablets. Considering the fact that mobile terminals’ positions may influence the sensing results, a precise sensing effect function is designed for the crowdsourcing-based sensing task assignment. We aim to maximize the sensing effect function and cast this optimization problem to address crowdsensing task assignment in cognitive radio networks. This problem is difficult to be solved because the complexity of this problem increases exponentially with the growth in mobile terminals. To assign crowdsensing task, we propose four distributed algorithms with different transition probabilities and use a Markov chain to analyze the approximation gap of our proposed schemes. Simulation results evaluate the average performance of our proposed algorithms and validate the algorithm’s convergence.

  12. Hitler's bomb: the secret story of Germans' attempts to get the nuclear weapon

    International Nuclear Information System (INIS)

    Karlsch, Rainer

    2007-01-01

    In this historical book, the author claims to have evidence concerning the development and testing of a possible 'nuclear weapon' by Nazi Germany in 1945. The 'weapon' in question is not alleged to be a standard nuclear weapon powered by nuclear fission, but something closer to either a radiological weapon (a so-called 'dirty bomb') or a hybrid-nuclear fusion weapon. Its new evidence is concerned primarily with the parts of the German nuclear energy project (an attempted clandestine scientific effort led by Germany to develop and produce atomic weapons during World War II) under Kurt Diebner, a German nuclear physicist who directed and administrated the project

  13. Nuclear weapon-free zone, non-proliferation treaty and South Asia

    International Nuclear Information System (INIS)

    Jayaramu, P.S.

    1980-01-01

    Emergence of and the motivations behind the concept of nuclear weapon free zone, the conceptual linkage between the nuclear weapon free zone and the Non-Proliferation Treaty and the problems involved in the implementation of nuclear weapon free zone proposals put forward from time to time are discussed. Pakistan's proposal for a nuclear weapon free zone in South Asia, motivations behind the proposal, and India's response to it are examined. It is pointed out that both the NPT and nuclear weapon free zone indirectly grant a certain amount of legitimacy to the use of nuclear weapons. (M.G.B.)

  14. Careerism, Committee Assignments and the Electoral Connection

    OpenAIRE

    Katz, Jonathan N.; Sala, Brian R.

    1996-01-01

    Most scholars agree that members of Congress are strongly motivated by their desire for reelection. This assumption implies that members of Congress adopt institutions, rules, and norms of behavior in part to serve their electoral interests. Direct tests of the electoral connection are rare, however, because significant, exogenous changes in the electoral environment are difficult to identify. We develop and test an electoral rationale for the norm of committee assignment "property rights...

  15. An Ultimatum Game Approach to Billet Assignments

    Science.gov (United States)

    2015-09-01

    time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and completing and reviewing this...treatments are needed for this investigation. To conserve the subject pool and meet the budget, we elected to pursue treatments that covered salient...across billets can be partially offset through compensating wages ( hedonic wages) and/or the potential of future superior assignments. In the

  16. Protein secondary structure: category assignment and predictability

    DEFF Research Database (Denmark)

    Andersen, Claus A.; Bohr, Henrik; Brunak, Søren

    2001-01-01

    In the last decade, the prediction of protein secondary structure has been optimized using essentially one and the same assignment scheme known as DSSP. We present here a different scheme, which is more predictable. This scheme predicts directly the hydrogen bonds, which stabilize the secondary......-forward neural network with one hidden layer on a data set identical to the one used in earlier work....

  17. Algorithms for worst-case tolerance optimization

    DEFF Research Database (Denmark)

    Schjær-Jacobsen, Hans; Madsen, Kaj

    1979-01-01

    New algorithms are presented for the solution of optimum tolerance assignment problems. The problems considered are defined mathematically as a worst-case problem (WCP), a fixed tolerance problem (FTP), and a variable tolerance problem (VTP). The basic optimization problem without tolerances...... is denoted the zero tolerance problem (ZTP). For solution of the WCP we suggest application of interval arithmetic and also alternative methods. For solution of the FTP an algorithm is suggested which is conceptually similar to algorithms previously developed by the authors for the ZTP. Finally, the VTP...... is solved by a double-iterative algorithm in which the inner iteration is performed by the FTP- algorithm. The application of the algorithm is demonstrated by means of relatively simple numerical examples. Basic properties, such as convergence properties, are displayed based on the examples....

  18. Assignment and Correspondence Tracking System - Tactical / Operational Reporting

    Data.gov (United States)

    Social Security Administration — Reporting data store for the Assignment and Correspondence Tracking System (ACT). ACT automates the assignment and tracking of correspondence processing within the...

  19. Artificial intelligence applied to assigned merchandise location in retail sales systems

    Directory of Open Access Journals (Sweden)

    Cruz-Domínguez, O.

    2016-05-01

    Full Text Available This paper presents an option for improving the process of assigning storage locations for merchandise in a warehouse. A disadvantage of policies in the literature is that the merchandise is assigned allocation only according to the volume of sales and the rotation it presents. However, in some cases it is necessary to deal with other aspects such as family group membership, the physical characteristics of the products, and their sales pattern to design an integral policy. This paper presents an alternative to the afore- mentioned process using Flexsim®, artificial neural networks, and genetic algorithms.

  20. Waste-aware fluid volume assignment for flow-based microfluidic biochips

    DEFF Research Database (Denmark)

    Schneider, Alexander Rüdiger; Pop, Paul; Madsen, Jan

    2017-01-01

    complex Fluidic Units (FUs) such as switches, micropumps, mixers and separators can be constructed. When running a biochemical application on a FBMB, fluid volumes are dispensed from input reservoirs and used by the FUs. Given a biochemical application and a biochip, we are interested in determining...... the fluid volume assignment for each operation of the application, such that the FUs volume requirements are satisfied, while over- and underflow are avoided and the total volume of fluid used is minimized. We propose an algorithm for this fluid assignment problem. Compared to previous work, our method...

  1. Hazards of chemical weapons release during war: new perspectives.

    Science.gov (United States)

    Reutter, S

    1999-01-01

    The two major threat classes of chemical weapons are mustard gas and the nerve agents, and this has not changed in over 50 years. Both types are commonly called gases, but they are actually liquids that are not remarkably volatile. These agents were designed specifically to harm people by any route of exposure and to be effective at low doses. Mustard gas was used in World War I, and the nerve agents were developed shortly before, during, and after World War II. Our perception of the potency of chemical weapons has changed, as well as our concern over potential effects of prolonged exposures to low doses and potential target populations that include women and children. Many of the toxicologic studies and human toxicity estimates for both mustard and nerve agents were designed for the purpose of quickly developing maximal casualties in the least sensitive male soldier. The "toxicity" of the chemical weapons has not changed, but our perception of "toxicity" has. PMID:10585902

  2. Environmental Restoration Strategic Plan. Remediating the nuclear weapons complex

    International Nuclear Information System (INIS)

    1995-08-01

    With the end of the cold war, the US has a reduced need for nuclear weapons production. In response, the Department of Energy has redirected resources from weapons production to weapons dismantlement and environmental remediation. To this end, in November 1989, the US Department of Energy (DOE) established the Office of Environmental Restoration and Waste Management (renamed the Office of Environmental Management in 1994). It was created to bring under a central authority the management of radioactive and hazardous wastes at DOE sites and inactive or shut down facilities. The Environmental Restoration Program, a major component of DOE's Environmental Management Program, is responsible for the remediation and management of contaminated environmental media (e.g., soil, groundwater, sediments) and the decommissioning of facilities and structures at 130 sites in over 30 states and territories

  3. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  4. Weapons grade plutonium disposition in PWR, CANDU and FR

    International Nuclear Information System (INIS)

    Deplech, M.; Tommasi, J.; Zaetta, A.

    2000-01-01

    In the frame work of the AIDA/MOX phase I/I/ program (1994-1997) between France and Russia, the disposition of plutonium in reactors was studied. The LWR (Light Water Reactor), FR (Fast reactors), CANDU (Heavy Water Reactors), HTR (High Temperature Reactors) options for using excess dismantled weapons plutonium for peaceful commercial nuclear power generating purposes offer some advantages over the remaining options (storage). The AIDA/MOX phase 1 program covers different topics, among which are the neutronic aspects of loading reactors with weapons-grade plutonium. The conclusions are that the weapon plutonium consumption is similar in the different type of reactors. However, the use of inert matrices allows to increase the mass balance for a same denaturing level. The use of Thorium as a matrix or special isotopes to increase the proliferation resistance prove to be insufficient. (author)

  5. Managing nuclear weapons in a changing world: Proceedings

    International Nuclear Information System (INIS)

    1992-01-01

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL's Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents

  6. Scientific and technical development and the chemical weapon convention

    International Nuclear Information System (INIS)

    Siddiqui, P.H.

    2008-01-01

    The Chemical Weapons Convention (CWC) was drafted with the recognition that it is impossible to envision every way in which toxic chemicals might be used for aggressive purposes. As terrorist organizations and rogue states replace the major powers as the most likely candidates to employ chemical weapons, the agents of choice may differ from those developed for battlefield use. Twenty- first century chemical warfare may target civilians or agricultural production, and clandestine production-facilities may manufacture toxic agents from chemical precursors, not monitored under the CWC control regime. The effects (on CWC implementation) of changing industrial technologies, including ongoing developments in chemical process technology, dual-use industrial chemicals, and rapid methods for discovering biologically active chemicals, are considerable Also considered is how commercial technologies could be misused for the development of novel chemical weapons, and how such abuses might be detected and monitored. (author)

  7. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  8. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  9. Development of Maintenance METRICS to Forecast Resource Demands of Weapon Systems (Parameter Prioritization). Revision A.

    Science.gov (United States)

    1980-10-01

    34 mathematical " or "logical" algorithms. 36 D194-10089-2 - A simple least squares regression routine is computed for each variable combination. - The output...ATE ____ -)Eq50!NEL AuSHORE i M07 1 -3AL 3 "EE A:NT PERSONNEL ASS:.S𔃾ED I ____I -C81 07L 5 LVEL :lE;S0NNEL ASlt_______ cg -- / MLC-I.~ T 0;:S3’lNF ASS...AUTHRIZE ് 70TAL 𔃾AINT PERSONNEL ASSIGNED I � 7AL 3 LAIEL 4ESNN ERSU~ORE ASSIGNE tK07 1 --TAL .-L-El 𔃾APT 2ERSONNEL ASSIGNED I1- 408 1TOTAL 7 LVEL

  10. Canadians, nuclear weapons, and the Cold War security dilemma

    International Nuclear Information System (INIS)

    Eaton, M.A.

    2007-01-01

    This dissertation provides a history of Canadian ideas about nuclear weapons from the late 1950s until the end of the Trudeau era in 1984. Throughout this period, Canadians reacted to the insecurity they felt in the world around them by expressing many conflicting, often irreconcilable views about a range of nuclear weapon issues, including Canada's acquisition of nuclear warheads in 1963, the U.S. ABM program in the 1960s and early 1970s, the role of Canadian nuclear technology in the development of India's first nuclear explosion, and the Trudeau government's decision to allow the U.S. military to test cruise missiles in northern Canada The dissertation concludes with an examination of the emergence of a broadly-based, increasingly mainstream and influential anti-nuclear movement in the early 1980s, the clearest manifestation of the insecurity Canadians experienced at the time. .The nuclear debates examined in this dissertation reveal that Canadians were divided over nuclear weapons, nuclear strategy, the arms race, proliferation, and arms control and disarmament. In particular, they came to fundamentally different conclusions about how Canada's nuclear weapon policies, and its support for the nuclear policies of its alliances, would contribute to international stability and order. Some believed that their security rested on the maintenance of a strong Western nuclear deterrent and supported Canada contributing to its credibility; others believed that the constant modernisation of nuclear arsenals fuelled by the superpower arms race posed a serious threat to their security. This conceptual dilemma-the security through nuclear strength argument versus the fear that the quest for security through quantitative and qualitative improvements of nuclear stockpiles increased the likelihood of nuclear war-left Canadians divided over the value and utility of nuclear weapons and the strategies developed around them. At the same time, Canadians' ideas about nuclear weapons

  11. Parallel algorithms

    CERN Document Server

    Casanova, Henri; Robert, Yves

    2008-01-01

    ""…The authors of the present book, who have extensive credentials in both research and instruction in the area of parallelism, present a sound, principled treatment of parallel algorithms. … This book is very well written and extremely well designed from an instructional point of view. … The authors have created an instructive and fascinating text. The book will serve researchers as well as instructors who need a solid, readable text for a course on parallelism in computing. Indeed, for anyone who wants an understandable text from which to acquire a current, rigorous, and broad vi

  12. Algorithm 865

    DEFF Research Database (Denmark)

    Gustavson, Fred G.; Reid, John K.; Wasniewski, Jerzy

    2007-01-01

    We present subroutines for the Cholesky factorization of a positive-definite symmetric matrix and for solving corresponding sets of linear equations. They exploit cache memory by using the block hybrid format proposed by the authors in a companion article. The matrix is packed into n(n + 1)/2 real...... variables, and the speed is usually better than that of the LAPACK algorithm that uses full storage (n2 variables). Included are subroutines for rearranging a matrix whose upper or lower-triangular part is packed by columns to this format and for the inverse rearrangement. Also included is a kernel...

  13. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  14. Morality of Weapons of Mass Destruction: A Case Study of the Atomic Bombings of Hiroshima and Nagasaki

    Science.gov (United States)

    2010-04-01

    34 Paul C. Szasz , “The International Law Concerning Weapons of Mass...downloaded 18 October 2009. Szasz , Paul C., “The International Law Concerning Weapons of Mass Destruction.” In Ethics and Weapons of Mass Destruction

  15. A linear-time algorithm for Euclidean feature transform sets

    NARCIS (Netherlands)

    Hesselink, Wim H.

    2007-01-01

    The Euclidean distance transform of a binary image is the function that assigns to every pixel the Euclidean distance to the background. The Euclidean feature transform is the function that assigns to every pixel the set of background pixels with this distance. We present an algorithm to compute the

  16. Correcting environmental problems facing the nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1990-06-01

    This report discusses DOE's efforts to correct the environmental problems facing the nuclear weapons complex. It focuses on three main points. First, the weapons complex faces a variety of serious and costly environmental problems. Second, during the past year, DOE has made some important changes to its organization that should help change its management focus from one that emphasizes materials production to one that more clearly focuses on environmental concerns. Third, because resolution of DOE's environmental problems will require considerable resources during a period of budgetary constraints, it is imperative that DOE have internal controls in place to ensure that resources are spent efficiently

  17. Manhattan Project redux: Canada and the first atomic weapons

    Energy Technology Data Exchange (ETDEWEB)

    Arsenault, J.E

    2008-09-15

    Only three nuclear weapons produced by the Manhattan Project (MP) were used during World War II: Trinity Test, New Mexico on 16 July 1945, Hiroshima, Japan, on 6 August 1945, and Nagasaki, Japan, on 9 August 1945. Several sources and authors, including EM and RL (1967), Stacey (1970), Sanger (1981), and Buckley (2000), have written that it is unlikely that any Canadian uranium was used in the atomic weapons that ended WW II. These sources offer no detailed justification for their conclusion, nevertheless, after analysis of data contained in numerous sources, this article reaches a similar conclusion. (author)

  18. Proliferation of massive destruction weapons: fantasy or reality?

    International Nuclear Information System (INIS)

    Duval, M.

    2001-01-01

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  19. Chemical and biological weapons: new questions, new answers.

    Science.gov (United States)

    Hood, E

    1999-01-01

    The words "chemical and biological weapons" (CBW) send a shiver down most spines these days. With the end of the Cold War, the possibility of a massive nuclear confrontation appears remote, so today many popular doomsday scenarios center on the aggressive use of chemical or biological warfare by rogue nations or terrorist groups. As exaggerated as some of the accounts are, with CBW cast as the latest unseen, unstoppable enemy, the threat posed by these weapons is all too real, and growing. Images p931-a PMID:10585899

  20. Nuclear-weapon-free zones in the Asia Pacific region

    International Nuclear Information System (INIS)

    Yamada, Eiji

    1997-01-01

    The Review and Extension Conference of the Parties to the Non-Proliferation Treaty decided on the indefinite extension of the Treaty, and adopted two documents 'principles and Objectives for Nuclear Non-Proliferation and Disarmament' and 'Strengthening the Review Process for the Treaty'. In the former document, the Conference encourages the establishment of nuclear-weapon-free zones, on the conviction that such zones will enhance global and regional peace and security. Besides the Rarotonga Treaty, ASEAN countries plan to establish a nuclear-weapon-free zone in the South-East Asia

  1. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  2. Turkey's response to threats of weapons of mass destruction

    OpenAIRE

    Al, Guray.

    2001-01-01

    Unlike most of its NATO allies, Turkey did not emerge from the Cold War with enhanced security. The acquisition of weapons of mass destruction (WMD) and ballistic missiles by its neighbors in the Middle Eastâ Iran, Iraq and Syriaâ creates a serious security concern for Turkey. This thesis analyzes the numerous threats posed to Turkey by its neighborsα nuclear, chemical and biological weapons programs and their ballistic missiles. It evaluates Turkeyαs defense options to counter these thre...

  3. Manhattan Project redux: Canada and the first atomic weapons

    International Nuclear Information System (INIS)

    Arsenault, J.E.

    2008-01-01

    Only three nuclear weapons produced by the Manhattan Project (MP) were used during World War II: Trinity Test, New Mexico on 16 July 1945, Hiroshima, Japan, on 6 August 1945, and Nagasaki, Japan, on 9 August 1945. Several sources and authors, including EM and RL (1967), Stacey (1970), Sanger (1981), and Buckley (2000), have written that it is unlikely that any Canadian uranium was used in the atomic weapons that ended WW II. These sources offer no detailed justification for their conclusion, nevertheless, after analysis of data contained in numerous sources, this article reaches a similar conclusion. (author)

  4. IFR starts to burn up weapons-grade material

    International Nuclear Information System (INIS)

    Anon.

    1994-01-01

    With funding from different parts of the federal government, the Integral Fast Reactor (IFR) project has survived into fiscal year 1994 and is now embarking on a demonstration of how this type of liquid-metal-cooled reactor (LMR) can be used to burn fuel derived from weapons-grade plutonium. This month, an assembly made from weapons-grade material is to be loaded into Experimental Breeder Reactor-II in Idaho, which is serving as the prototype for the IFR concept. Although FY 1994 work is being funded by the DOE, this particular examination of plutonium burnup is backed by the Department of Defense

  5. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  6. World hazards and nuclear weapons: right and wrong answers. To reach a treaty of interdiction of nuclear weapons is possible

    International Nuclear Information System (INIS)

    Durand, Daniel; Nivet, Roland

    2017-01-01

    A first article notices that modernisation of nuclear weapons are resumed with the emergence of new nuclear temptations: ambitious modernisation programme in the USA, catching-up race by Russia to be able to pierce antimissile defences, Chinese modernisation, renewal of the British Trident programme, doubling of nuclear military budgets in France, developments in India and Pakistan. However, the author discusses the possible emergence of new opportunities for a nuclear disarmament: humanitarian ICAN campaign for a treaty of interdiction of nuclear weapons. He highlights the need of a debate in France on these issues even though no politician dares to take a strong position in favour of nuclear disarmament. In a third article, a member of an activist association shows that, after the adoption of a U N resolution on favour of the elaboration of a treaty of interdiction of nuclear weapons, reaching such a treaty is possible. The action of civil society seems necessary

  7. Applications of random forest feature selection for fine-scale genetic population assignment.

    Science.gov (United States)

    Sylvester, Emma V A; Bentzen, Paul; Bradbury, Ian R; Clément, Marie; Pearce, Jon; Horne, John; Beiko, Robert G

    2018-02-01

    Genetic population assignment used to inform wildlife management and conservation efforts requires panels of highly informative genetic markers and sensitive assignment tests. We explored the utility of machine-learning algorithms (random forest, regularized random forest and guided regularized random forest) compared with F ST ranking for selection of single nucleotide polymorphisms (SNP) for fine-scale population assignment. We applied these methods to an unpublished SNP data set for Atlantic salmon ( Salmo salar ) and a published SNP data set for Alaskan Chinook salmon ( Oncorhynchus tshawytscha ). In each species, we identified the minimum panel size required to obtain a self-assignment accuracy of at least 90% using each method to create panels of 50-700 markers Panels of SNPs identified using random forest-based methods performed up to 7.8 and 11.2 percentage points better than F ST -selected panels of similar size for the Atlantic salmon and Chinook salmon data, respectively. Self-assignment accuracy ≥90% was obtained with panels of 670 and 384 SNPs for each data set, respectively, a level of accuracy never reached for these species using F ST -selected panels. Our results demonstrate a role for machine-learning approaches in marker selection across large genomic data sets to improve assignment for management and conservation of exploited populations.

  8. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution.

    Science.gov (United States)

    Miller, C W; McDonald, G C; Moore, A J

    2016-11-01

    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  9. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote. ...

  10. Critical Success Factors and Their Application to DOD Weapon System Acquisition

    National Research Council Canada - National Science Library

    Harris, Chad M

    2006-01-01

    Department of Defense weapon systems are growing more complex and expensive and the services are under increasing pressure from Congress to improve the cost schedule and performance of their weapons programs...

  11. Seized Drugs and Weapons: DEA Needs to Improve Certain Physical Safeguards and Strength Accountability

    National Research Council Canada - National Science Library

    1999-01-01

    This report focuses on DEAs controls over seized drugs and weapons. There is an inherent risk of theft, misuse, and loss of drugs and weapons due to the fact that such evidence typically has a market or "street" value...

  12. Symmetric Logic Synthesis with Phase Assignment

    OpenAIRE

    Benschop, N. F.

    2001-01-01

    Decomposition of any Boolean Function BF_n of n binary inputs into an optimal inverter coupled network of Symmetric Boolean functions SF_k (k \\leq n) is described. Each SF component is implemented by Threshold Logic Cells, forming a complete and compact T-Cell Library. Optimal phase assignment of input polarities maximizes local symmetries. The "rank spectrum" is a new BF_n description independent of input ordering, obtained by mapping its minterms onto an othogonal n \\times n grid of (transi...

  13. Tolerance based algorithms for the ATSP

    NARCIS (Netherlands)

    Goldengorin, B; Sierksma, G; Turkensteen, M; Hromkovic, J; Nagl, M; Westfechtel, B

    2004-01-01

    In this paper we use arc tolerances, instead of arc costs, to improve Branch-and-Bound type algorithms for the Asymmetric Traveling Salesman Problem (ATSP). We derive new tighter lower bounds based on exact and approximate bottleneck upper tolerance values of the Assignment Problem (AP). It is shown

  14. 48 CFR 42.602 - Assignment and location.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Assignment and location... Assignment and location. (a) A CACO may be assigned only when (1) the contractor has at least two locations..., or a full-time CACO may be assigned. In determining the location of the CACO, the responsible agency...

  15. Testing the Effectiveness of Online Assignments in Theory of Finance

    Science.gov (United States)

    Batu, Michael; Bower, Nancy; Lun, Esmond; Sadanand, Asha

    2018-01-01

    The authors investigated the effectiveness of online versus paper assignments using final examination scores in three cohorts of theory of finance. In particular, two cohorts were exposed to online assignments while another cohort was exposed to traditional assignments. The central result is that exposure to online assignments robustly leads to…

  16. Just war and nuclear weapons : just war theory and its application to the Korean nuclear weapons issue in Korean Christianity

    OpenAIRE

    Son, Changwan

    2009-01-01

    This thesis is primarily an application of the Christian tradition of Just War to the problems arising from the basing of US nuclear weapons in South Korea and the development of nuclear weapons by the regime in the North. The Christian theology of Just War has developed over the last two thousand years, adapting as first Christianity became the state religion of the Roman Empire, through the break down of any enforceable norms in Europe‘s 'Dark Ages‘, to the emergence of the concept of th...

  17. Geometry-Of-Fire Tracking Algorithm for Direct-Fire Weapon Systems

    Science.gov (United States)

    2015-09-01

    this specific application. A scaled-down version for a fire team was created with XBee Pro radios, Arduino Uno microcontrollers, Raspberry Pi computers...constructed with XBee Pro radios, Arduino Uno microcontrollers, Raspberry Pi computers and ROS [5]. The XBee Pro radios and Arduino Uno microcontrollers

  18. Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks

    Science.gov (United States)

    2015-11-01

    Gholamreza, and Ester, Martin. “Modeling the Temporal Dynamics of Social Rating Networks Using Bidirectional Effects of Social Relations and Rating...1.1.2 β-disruptor Problems Besides the homogeneous network model consisting of uniform nodes and bidirectional links, the heterogeneous network model... neural and metabolic networks .” Biological Cybernetics 90 (2004): 311–317. 10.1007/s00422-004-0479-1. URL http://dx.doi.org/10.1007/s00422-004-0479-1 [51

  19. WDM Multicast Tree Construction Algorithms and Their Comparative Evaluations

    Science.gov (United States)

    Makabe, Tsutomu; Mikoshi, Taiju; Takenaka, Toyofumi

    We propose novel tree construction algorithms for multicast communication in photonic networks. Since multicast communications consume many more link resources than unicast communications, effective algorithms for route selection and wavelength assignment are required. We propose a novel tree construction algorithm, called the Weighted Steiner Tree (WST) algorithm and a variation of the WST algorithm, called the Composite Weighted Steiner Tree (CWST) algorithm. Because these algorithms are based on the Steiner Tree algorithm, link resources among source and destination pairs tend to be commonly used and link utilization ratios are improved. Because of this, these algorithms can accept many more multicast requests than other multicast tree construction algorithms based on the Dijkstra algorithm. However, under certain delay constraints, the blocking characteristics of the proposed Weighted Steiner Tree algorithm deteriorate since some light paths between source and destinations use many hops and cannot satisfy the delay constraint. In order to adapt the approach to the delay-sensitive environments, we have devised the Composite Weighted Steiner Tree algorithm comprising the Weighted Steiner Tree algorithm and the Dijkstra algorithm for use in a delay constrained environment such as an IPTV application. In this paper, we also give the results of simulation experiments which demonstrate the superiority of the proposed Composite Weighted Steiner Tree algorithm compared with the Distributed Minimum Hop Tree (DMHT) algorithm, from the viewpoint of the light-tree request blocking.

  20. Assigned value improves memory of proper names.

    Science.gov (United States)

    Festini, Sara B; Hartley, Alan A; Tauber, Sarah K; Rhodes, Matthew G

    2013-01-01

    Names are more difficult to remember than other personal information such as occupations. The current research examined the influence of assigned point value on memory and metamemory judgements for names and occupations to determine whether incentive can improve recall of proper names. In Experiment 1 participants studied face-name and face-occupation pairs assigned 1 or 10 points, made judgements of learning, and were given a cued recall test. High-value names were recalled more often than low-value names. However, recall of occupations was not influenced by value. In Experiment 2 meaningless nonwords were used for both names and occupations. The name difficulty disappeared, and value influenced recall of both names and occupations. Thus value similarly influenced names and occupations when meaningfulness was held constant. In Experiment 3 participants were required to use overt rote rehearsal for all items. Value did not boost recall of high-value names, suggesting that differential processing could not be implemented to improve memory. Thus incentives may improve memory for proper names by motivating people to engage in selective rehearsal and effortful elaborative processing.