WorldWideScience

Sample records for weapon systems human-computer

  1. US Army Weapon Systems Human-Computer Interface (WSHCI) style guide, Version 1

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.

    1996-09-30

    A stated goal of the U.S. Army has been the standardization of the human computer interfaces (HCIS) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of style guides. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide. This document, the U.S. Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide, represents the first version of that style guide. The purpose of this document is to provide HCI design guidance for RT/NRT Army systems across the weapon systems domains of ground, aviation, missile, and soldier systems. Each domain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their domains.

  2. U.S. Army weapon systems human-computer interface style guide. Version 2

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.; Donohoo, D.T.

    1997-12-31

    A stated goal of the US Army has been the standardization of the human computer interfaces (HCIs) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of HCI design guidance documents. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA), now termed the Joint Technical Architecture-Army (JTA-A). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide, which resulted in the US Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide Version 1. Based on feedback from the user community, DISC4 further tasked PNNL to revise Version 1 and publish Version 2. The intent was to update some of the research and incorporate some enhancements. This document provides that revision. The purpose of this document is to provide HCI design guidance for the RT/NRT Army system domain across the weapon systems subdomains of ground, aviation, missile, and soldier systems. Each subdomain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their subdomains.

  3. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma

    1958-04-01

    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  4. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous

  5. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous weap

  6. Human computer interaction issues in Clinical Trials Management Systems.

    Science.gov (United States)

    Starren, Justin B; Payne, Philip R O; Kaufman, David R

    2006-01-01

    Clinical trials increasingly rely upon web-based Clinical Trials Management Systems (CTMS). As with clinical care systems, Human Computer Interaction (HCI) issues can greatly affect the usefulness of such systems. Evaluation of the user interface of one web-based CTMS revealed a number of potential human-computer interaction problems, in particular, increased workflow complexity associated with a web application delivery model and potential usability problems resulting from the use of ambiguous icons. Because these design features are shared by a large fraction of current CTMS, the implications extend beyond this individual system.

  7. STUDY ON HUMAN-COMPUTER SYSTEM FOR STABLE VIRTUAL DISASSEMBLY

    Institute of Scientific and Technical Information of China (English)

    Guan Qiang; Zhang Shensheng; Liu Jihong; Cao Pengbing; Zhong Yifang

    2003-01-01

    The cooperative work between human being and computer based on virtual reality (VR) is investigated to plan the disassembly sequences more efficiently. A three-layer model of human-computer cooperative virtual disassembly is built, and the corresponding human-computer system for stable virtual disassembly is developed. In this system, an immersive and interactive virtual disassembly environment has been created to provide planners with a more visual working scene. For cooperative disassembly, an intelligent module of stability analysis of disassembly operations is embedded into the human-computer system to assist planners to implement disassembly tasks better. The supporting matrix for stability analysis of disassembly operations is defined and the method of stability analysis is detailed. Based on the approach, the stability of any disassembly operation can be analyzed to instruct the manual virtual disassembly. At last, a disassembly case in the virtual environment is given to prove the validity of above ideas.

  8. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  9. Acquiring Affordable Weapons Systems.

    Science.gov (United States)

    1977-05-01

    a greater emphasis on O&S costs during system development may result in somewhat increased development, acquisition and/or produccion costs. This...assumed levels of manpower pools fur other functions, and where manual backup procedures must supplant automated operations when equipment casualties...identified, 25 and the final CIS was to be computer based although inputs to the system could either be manually generated or provided on automatic

  10. Safety Metrics for Human-Computer Controlled Systems

    Science.gov (United States)

    Leveson, Nancy G; Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems.This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  11. Human-computer systems interaction backgrounds and applications 3

    CERN Document Server

    Kulikowski, Juliusz; Mroczek, Teresa; Wtorek, Jerzy

    2014-01-01

    This book contains an interesting and state-of the art collection of papers on the recent progress in Human-Computer System Interaction (H-CSI). It contributes the profound description of the actual status of the H-CSI field and also provides a solid base for further development and research in the discussed area. The contents of the book are divided into the following parts: I. General human-system interaction problems; II. Health monitoring and disabled people helping systems; and III. Various information processing systems. This book is intended for a wide audience of readers who are not necessarily experts in computer science, machine learning or knowledge engineering, but are interested in Human-Computer Systems Interaction. The level of particular papers and specific spreading-out into particular parts is a reason why this volume makes fascinating reading. This gives the reader a much deeper insight than he/she might glean from research papers or talks at conferences. It touches on all deep issues that ...

  12. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2000-07-01

    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  13. The Importance of Designating Cyberspace Weapon Systems

    Science.gov (United States)

    2013-10-01

    PerspectiveSpace Focus Cyberspace Vulnerability Assessment / Hunter Weapon System The Air Force Cyberspace Vulnerability Assessment ( CVA ) / Hunter  weapon...system can perform defensive sorties worldwide via remote or on-site access. The  CVA /Hunter weapon sys- tem is operated by one active duty unit, the...support all of the mission crews. Developed by the for- mer Air Force Information Operations Center, the  CVA /Hunter  weapon system was fielded to the 688th

  14. 48 CFR 217.173 - Multiyear contracts for weapon systems.

    Science.gov (United States)

    2010-10-01

    ... weapon systems. 217.173 Section 217.173 Federal Acquisition Regulations System DEFENSE ACQUISITION... Mulityear Contracting 217.173 Multiyear contracts for weapon systems. As authorized by 10 U.S.C. 2306b(h... contract for— (a) A weapon system and associated items, services, and logistics support for a weapon system...

  15. Computation of Weapons Systems Effectiveness

    Science.gov (United States)

    2013-09-01

    Aircraft Dive Angle : Initial Weapon Release Velocity at x-axis VOx VOz x: x-axis z: z-axis : Initial Weapon Release Velocity at z...altitude Impact Velocity (x− axis), Vix = VOx (3.4) Impact Velocity (z− axis), Viz = VOz + (g ∗ TOF) (3.5) Impact Velocity, Vi = �Vix2 + Viz2 (3.6...compute the ballistic partials to examine the effects that varying h, VOx and VOz have on RB using the following equations: ∂RB ∂h = New RB−Old RB

  16. A Software Framework for Multimodal Human-Computer Interaction Systems

    NARCIS (Netherlands)

    Shen, Jie; Pantic, Maja

    2009-01-01

    This paper describes a software framework we designed and implemented for the development and research in the area of multimodal human-computer interface. The proposed framework is based on publish / subscribe architecture, which allows developers and researchers to conveniently configure, test and

  17. A Software Framework for Multimodal Human-Computer Interaction Systems

    NARCIS (Netherlands)

    Shen, Jie; Pantic, Maja

    2009-01-01

    This paper describes a software framework we designed and implemented for the development and research in the area of multimodal human-computer interface. The proposed framework is based on publish / subscribe architecture, which allows developers and researchers to conveniently configure, test and

  18. Task Analyses of Three Selected Weapons Systems.

    Science.gov (United States)

    1976-10-01

    using weapons is a joint function of the specific weapon system, the goals (missions) of the system, and the environment in which it is used. The first...Identification of fire mission profiles which state general job functions for each type of typical mission. Documentary sources such as Field Manuals...nd Arin,,, Ui, Guni i A,!i" tant uuPnrr No. I Can; n , r Grup - ( nile. .rs and Prir Diff,-ront S, tm: -inch L,,t.’r _, Fort Hood l::t Cavall, I

  19. Optical countermeasures against CLOS weapon systems

    NARCIS (Netherlands)

    Toet, A.; Benoist, K.W.; Lingen, J.N.J. van; Schleijpen, H.M.A.

    2013-01-01

    There are many weapon systems in which a human operator acquires a target, tracks it and designates it. Optical countermeasures against this type of systems deny the operator the possibility to fulfill this visual task. We describe the different effects that result from stimulation of the human

  20. Demand Analysis of Informational Shipboard Gun Weapon System Interface Design

    Directory of Open Access Journals (Sweden)

    WANG Hui-chuan

    2013-04-01

    Full Text Available According to development demand of informational shipboard gun weapon system, design concept of shipboard gun weapon system interface is proposed. System composition is put forward and function demand of interface is analyzed from combat, training and detection aspects. General principle need to be followed in design process. A new concept is provided for development of shipboard gun weapon system interface.

  1. Design of Food Management Information System Based on Human-computer Interaction

    Directory of Open Access Journals (Sweden)

    Xingkai Cui

    2015-07-01

    Full Text Available Food safety problem is directly related with public health. This study takes the necessity of establishing food management information system as the breakthrough point, through the interpretation of the overview of human-computer interaction technology, as well as the conceptual framework of human-computer interaction, it discusses the construction of food management information system, expecting to promote China's food safety management process so as to guarantee public health guarantee.

  2. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    43 Figure 14: Simulation Study Methodology for the Weapon System Analysis Metrics Definition and Data Collection The analysis plan calls for...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Presented to the Faculty Department of Operational Sciences

  3. 2007-2008 Weapon Systems

    Science.gov (United States)

    2007-01-01

    Begin destruction of binary neutralent in the Wet Air Oxidation system at Texas Molecular in Deer Park, TX • 3QFY07: Achieve 100 percent... Lufkin , TX) Family of Medium Tactical Vehicles (FMTV) LMTV A1 Cargo MTV A1 Cargo Payload: 5,000 pounds 10,000 pounds Towed load: 12,000 pounds 21,000...FOREIGN MILITARY SALES None CONTRACTORS EADS North America (Arlington, VA) American Eurocopter (Columbus, MS; Grand Prairie, TX) CAE USA (Tampa, FL

  4. Peruvian Weapon System Acquisition Process

    Science.gov (United States)

    1990-12-01

    for comparable weaponry, one dear advantage the Soviet Union offers a Third World client is the speed with which it can fill an arms order. This... client states. Finally and possibly more importantly, arms trading allows the Soviets to have access to strategic regions. There are indications that...include system development, implemetation and start up costo . Some may occur during the opetting life cycle. Normally, nonrecurring costs include

  5. Psychosocial and Cultural Modeling in Human Computation Systems: A Gamification Approach

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; Riensche, Roderick M.; Haack, Jereme N.; Butner, R. Scott

    2013-11-20

    “Gamification”, the application of gameplay to real-world problems, enables the development of human computation systems that support decision-making through the integration of social and machine intelligence. One of gamification’s major benefits includes the creation of a problem solving environment where the influence of cognitive and cultural biases on human judgment can be curtailed through collaborative and competitive reasoning. By reducing biases on human judgment, gamification allows human computation systems to exploit human creativity relatively unhindered by human error. Operationally, gamification uses simulation to harvest human behavioral data that provide valuable insights for the solution of real-world problems.

  6. Interaction in Information Systems - Beyond Human-Computer Interaction

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    The purpose of this paper is to discuss and analyze the role of interaction in information systems. Interaction represents dynamic relations between actors and other elements in information systems. We introduce a semi-formal notation that we use to describe a set of interaction patterns and we...... illustrate how the notation can be used to describe mediated interaction. We use the interaction patterns to evaluate a set of modeling languages. No single language supports all relevant aspects of interaction modeling. We use the interaction patterns to identify to general and supplementary forms...... of interaction-interaction based on exchange of objects and interaction based on exchange of commands. None of the modeling languages that we analyze support both forms in a rich way....

  7. HCI^2 Workbench: A Development Tool for Multimodal Human-Computer Interaction Systems

    NARCIS (Netherlands)

    Shen, Jie; Wenzhe, Shi; Pantic, Maja

    2011-01-01

    In this paper, we present a novel software tool designed and implemented to simplify the development process of Multimodal Human-Computer Interaction (MHCI) systems. This tool, which is called the HCI^2 Workbench, exploits a Publish / Subscribe (P/S) architecture [13] [14] to facilitate efficient an

  8. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  9. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  10. HFE (Human Factors Engineering) Technology for Navy Weapon System Acquisition.

    Science.gov (United States)

    1979-07-01

    uncovering of improved propulsion systems, sensors , weapons, etc., by industry or governr-ient agencies, may in.tiate the development of a new weapon system...needs. (No. A-109) _L a f. Tailor an acquisition stratagy for each program, as soon as the agency decides to solict alternative system design concepto

  11. Real Time Multiple Hand Gesture Recognition System for Human Computer Interaction

    Directory of Open Access Journals (Sweden)

    Siddharth S. Rautaray

    2012-05-01

    Full Text Available With the increasing use of computing devices in day to day life, the need of user friendly interfaces has lead towards the evolution of different types of interfaces for human computer interaction. Real time vision based hand gesture recognition affords users the ability to interact with computers in more natural and intuitive ways. Direct use of hands as an input device is an attractive method which can communicate much more information by itself in comparison to mice, joysticks etc allowing a greater number of recognition system that can be used in a variety of human computer interaction applications. The gesture recognition system consist of three main modules like hand segmentation, hand tracking and gesture recognition from hand features. The designed system further integrated with different applications like image browser, virtual game etc. possibilities for human computer interaction. Computer Vision based systems has the potential to provide more natural, non-contact solutions. The present research work focuses on to design and develops a practical framework for real time hand gesture.

  12. Portable tongue-supported human computer interaction system design and implementation.

    Science.gov (United States)

    Quain, Rohan; Khan, Masood Mehmood

    2014-01-01

    Tongue supported human-computer interaction (TSHCI) systems can help critically ill patients interact with both computers and people. These systems can be particularly useful for patients suffering injuries above C7 on their spinal vertebrae. Despite recent successes in their application, several limitations restrict performance of existing TSHCI systems and discourage their use in real life situations. This paper proposes a low-cost, less-intrusive, portable and easy to use design for implementing a TSHCI system. Two applications of the proposed system are reported. Design considerations and performance of the proposed system are also presented.

  13. Adapting the Law of Armed Conflict to Autonomous Weapon Systems

    Science.gov (United States)

    2014-01-01

    remains in the realm of theory . Still, several modern highly- automated—and some would call them autonomous—weapon systems already exist. These are...CROSS, 483, 507 (2012). 58. Backstrom & Henderson, supra note 57, at 401. 59. Justin McClelland , The Review of Weapons in Accordance with Article 36

  14. A Model-based Framework for Risk Assessment in Human-Computer Controlled Systems

    Science.gov (United States)

    Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems. This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions. Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  15. Computational Virtual Reality (VR) as a human-computer interface in the operation of telerobotic systems

    Science.gov (United States)

    Bejczy, Antal K.

    1995-01-01

    This presentation focuses on the application of computer graphics or 'virtual reality' (VR) techniques as a human-computer interface tool in the operation of telerobotic systems. VR techniques offer very valuable task realization aids for planning, previewing and predicting robotic actions, operator training, and for visual perception of non-visible events like contact forces in robotic tasks. The utility of computer graphics in telerobotic operation can be significantly enhanced by high-fidelity calibration of virtual reality images to actual TV camera images. This calibration will even permit the creation of artificial (synthetic) views of task scenes for which no TV camera views are available.

  16. Criteria of Human-computer Interface Design for Computer Assisted Surgery Systems

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jian-guo; LIN Yan-ping; WANG Cheng-tao; LIU Zhi-hong; YANG Qing-ming

    2008-01-01

    In recent years, computer assisted surgery (CAS) systems become more and more common in clinical practices, but few specific design criteria have been proposed for human-computer interface (HCI) in CAS systems. This paper tried to give universal criteria of HCI design for CAS systems through introduction of demonstration application, which is total knee replacement (TKR) with a nonimage-based navigation system.A typical computer assisted process can be divided into four phases: the preoperative planning phase, the intraoperative registration phase, the intraoperative navigation phase and finally the postoperative assessment phase. The interface design for four steps is described respectively in the demonstration application. These criteria this paper summarized can be useful to software developers to achieve reliable and effective interfaces for new CAS systems more easily.

  17. Hand gesture recognition based on motion history images for a simple human-computer interaction system

    Science.gov (United States)

    Timotius, Ivanna K.; Setyawan, Iwan

    2013-03-01

    A human-computer interaction can be developed using several kind of tools. One choice is using images captured using a camera. This paper proposed a simple human-computer interaction system based on hand movement captured by a web camera. The system aims to classify the captured movement into one of three classes. The first two classes contain hand movements to the left and right, respectively. The third class contains non-hand movements or hand movements to other directions. The method used in this paper is based on Motion History Images (MHIs) and nearest neighbor classifier. The resulting MHIs are processed in two manners, namely by summing the pixel values along the vertical axis and reshaping into vectors. We also use two distance criteria in this paper, respectively the Euclidian distance and cross correlation. This paper compared the performance of the combinations of different MHI data processing and distance criteria using 10 runs of 2-fold cross validation. Our experiments show that reshaping the MHI data into vectors combined with a Euclidean distance criterion gives the highest average accuracy, namely 55.67%.

  18. Cognitive engineering models: A prerequisite to the design of human-computer interaction in complex dynamic systems

    Science.gov (United States)

    Mitchell, Christine M.

    1993-01-01

    This chapter examines a class of human-computer interaction applications, specifically the design of human-computer interaction for the operators of complex systems. Such systems include space systems (e.g., manned systems such as the Shuttle or space station, and unmanned systems such as NASA scientific satellites), aviation systems (e.g., the flight deck of 'glass cockpit' airplanes or air traffic control) and industrial systems (e.g., power plants, telephone networks, and sophisticated, e.g., 'lights out,' manufacturing facilities). The main body of human-computer interaction (HCI) research complements but does not directly address the primary issues involved in human-computer interaction design for operators of complex systems. Interfaces to complex systems are somewhat special. The 'user' in such systems - i.e., the human operator responsible for safe and effective system operation - is highly skilled, someone who in human-machine systems engineering is sometimes characterized as 'well trained, well motivated'. The 'job' or task context is paramount and, thus, human-computer interaction is subordinate to human job interaction. The design of human interaction with complex systems, i.e., the design of human job interaction, is sometimes called cognitive engineering.

  19. Applying systemic-structural activity theory to design of human-computer interaction systems

    CERN Document Server

    Bedny, Gregory Z; Bedny, Inna

    2015-01-01

    Human-Computer Interaction (HCI) is an interdisciplinary field that has gained recognition as an important field in ergonomics. HCI draws on ideas and theoretical concepts from computer science, psychology, industrial design, and other fields. Human-Computer Interaction is no longer limited to trained software users. Today people interact with various devices such as mobile phones, tablets, and laptops. How can you make such interaction user friendly, even when user proficiency levels vary? This book explores methods for assessing the psychological complexity of computer-based tasks. It also p

  20. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  1. Categorisation of visualisation methods to support the design of Human-Computer Interaction Systems.

    Science.gov (United States)

    Li, Katie; Tiwari, Ashutosh; Alcock, Jeffrey; Bermell-Garcia, Pablo

    2016-07-01

    During the design of Human-Computer Interaction (HCI) systems, the creation of visual artefacts forms an important part of design. On one hand producing a visual artefact has a number of advantages: it helps designers to externalise their thought and acts as a common language between different stakeholders. On the other hand, if an inappropriate visualisation method is employed it could hinder the design process. To support the design of HCI systems, this paper reviews the categorisation of visualisation methods used in HCI. A keyword search is conducted to identify a) current HCI design methods, b) approaches of selecting these methods. The resulting design methods are filtered to create a list of just visualisation methods. These are then categorised using the approaches identified in (b). As a result 23 HCI visualisation methods are identified and categorised in 5 selection approaches (The Recipient, Primary Purpose, Visual Archetype, Interaction Type, and The Design Process).

  2. Millimeter Wave Radar Applications to Weapons Systems

    Science.gov (United States)

    1976-06-01

    ocity, and azimuth and elevation arRles ; assignment of target to L weapon for engagement; and assessment of the damage by the indication of cessa- tion...paper. 29 D.E. Gray, American institute of Physics Handbook ," McGraw-Hill, New S~York, 1957. --. . - - . .A • -•• =_ . . . . •,,- - - The complex...B-13) is the target-to-clutter power ratio. I. 41I 7 Handbook of Mathematical Functions, U.S. Department of Commerce, National Bureau of Standards

  3. Historical Cost Growth of Completed Weapon System Programs

    Science.gov (United States)

    2006-01-01

    Management Program of RAND Project AIR FORCE. The project’s technical monitor is Jay Jordan, Technical Director of the Air Force Cost Analysis Agency. Other...CGFs for development costs range from a low of 1.16 for the nine ship weapon systems reviewed in Asher and Mag- gelet (1984) to a high of 2.26 for six...to procurement) for each weapon system 2.26 (n = 6) 1.43 (n = 6) Not reported Asher and Maggelet (1984) Last SAR for program or December 1983 As of

  4. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    In recent years, the development of autonomous weapon systems and so-called ‘killer robots’, has caused a number of serious legal and ethical concerns in the international community, including questions of compliance with International Humanitarian Law and the Laws of Armed Conflict. On the other...... hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...

  5. Adaptation of hybrid human-computer interaction systems using EEG error-related potentials.

    Science.gov (United States)

    Chavarriaga, Ricardo; Biasiucci, Andrea; Forster, Killian; Roggen, Daniel; Troster, Gerhard; Millan, Jose Del R

    2010-01-01

    Performance improvement in both humans and artificial systems strongly relies in the ability of recognizing erroneous behavior or decisions. This paper, that builds upon previous studies on EEG error-related signals, presents a hybrid approach for human computer interaction that uses human gestures to send commands to a computer and exploits brain activity to provide implicit feedback about the recognition of such commands. Using a simple computer game as a case study, we show that EEG activity evoked by erroneous gesture recognition can be classified in single trials above random levels. Automatic artifact rejection techniques are used, taking into account that subjects are allowed to move during the experiment. Moreover, we present a simple adaptation mechanism that uses the EEG signal to label newly acquired samples and can be used to re-calibrate the gesture recognition system in a supervised manner. Offline analysis show that, although the achieved EEG decoding accuracy is far from being perfect, these signals convey sufficient information to significantly improve the overall system performance.

  6. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...... of justification and risk management in contemporary conflicts....

  7. Power Systems and Energy Storage Modeling for Directed Energy Weapons

    Science.gov (United States)

    2014-06-01

    electron laser kW Kilo-watt LCS Littoral Combat Ship LAWS Laser Weapon System MLD Maritime Laser Demonstration MW Mega -watt NiMH Nickel metal...and various littoral combat ships. Also, an accurate, working model of the capacitor energy bank is being developed and the flywheel model is being

  8. Supply Chain Resilience: Assessing USAF Weapon System Life Cycle

    Science.gov (United States)

    2010-03-01

    Appendix E: Supply Chain Resilience Storyboard ........................................................... 87 Bibliography...bolt that, in March 2000, struck a Philips semiconductor plant in Albuquerque, New Mexico , created a 10-minute blaze that contaminated millions of...strategic planning of weapon systems as they mature and progress through the life cycle. 87 Appendix E: Supply Chain Resilience Storyboard 88

  9. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja

    2000-04-01

    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  10. 48 CFR 212.270 - Major weapon systems as commercial items.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Major weapon systems as... Requirements for the Acquisition of Commercial Items 212.270 Major weapon systems as commercial items. The DoD policy for acquiring major weapon systems as commercial items is in Subpart 234.70. ...

  11. Weapon System Requirements: Detailed Systems Engineering Prior to Product Development Positions Programs for Success

    Science.gov (United States)

    2016-11-01

    contractor subsequently discovered problems with the aircraft wiring and aerial refueling systems and encountered a fuel contamination incident, all...WEAPON SYSTEM REQUIREMENTS Detailed Systems Engineering Prior to Product Development Positions Programs for Success...Accountability Office Highlights of GAO-17-77, a report to congressional committees November 2016 WEAPON SYSTEM REQUIREMENTS Detailed Systems

  12. An Human-Computer Interactive Augmented Reality System for Coronary Artery Diagnosis Planning and Training.

    Science.gov (United States)

    Li, Qiming; Huang, Chen; Lv, Shengqing; Li, Zeyu; Chen, Yimin; Ma, Lizhuang

    2017-09-02

    In order to let the doctor carry on the coronary artery diagnosis and preoperative planning in a more intuitive and more natural way, and to improve the training effect for interns, an augmented reality system for coronary artery diagnosis planning and training (ARS-CADPT) is designed and realized in this paper. At first, a 3D reconstruction algorithm based on computed tomographic (CT) images is proposed to model the coronary artery vessels (CAV). Secondly, the algorithms of static gesture recognition and dynamic gesture spotting and recognition are presented to realize the real-time and friendly human-computer interaction (HCI), which is the characteristic of ARS-CADPT. Thirdly, a Sort-First parallel rendering and splicing display subsystem is developed, which greatly expands the capacity of student users. The experimental results show that, with the use of ARS-CADPT, the reconstruction accuracy of CAV model is high, the HCI is natural and fluent, and the visual effect is good. In a word, the system fully meets the application requirement.

  13. The design of an intelligent human-computer interface for the test, control and monitor system

    Science.gov (United States)

    Shoaff, William D.

    1988-01-01

    The graphical intelligence and assistance capabilities of a human-computer interface for the Test, Control, and Monitor System at Kennedy Space Center are explored. The report focuses on how a particular commercial off-the-shelf graphical software package, Data Views, can be used to produce tools that build widgets such as menus, text panels, graphs, icons, windows, and ultimately complete interfaces for monitoring data from an application; controlling an application by providing input data to it; and testing an application by both monitoring and controlling it. A complete set of tools for building interfaces is described in a manual for the TCMS toolkit. Simple tools create primitive widgets such as lines, rectangles and text strings. Intermediate level tools create pictographs from primitive widgets, and connect processes to either text strings or pictographs. Other tools create input objects; Data Views supports output objects directly, thus output objects are not considered. Finally, a set of utilities for executing, monitoring use, editing, and displaying the content of interfaces is included in the toolkit.

  14. Optimizing the Sustainment of U.S. Army Weapon Systems

    Science.gov (United States)

    2016-03-17

    64 OPTIMIZING SUSTAINMENT OF ARMY SYSTEMS 6 Chapter 1 - Optimizing the Sustainment of U.S. Army Weapon Systems In a paradigm shift from...past 13 years. The result has been the erosion of perishable maintenance skills. The Army must develop the most effective plan to sustain these...communities to study and effectively manage Army sustainment . One effort is the development of Maintenance Steering Groups (MSG) to perform extensive

  15. Ubiquitous Human Computing

    OpenAIRE

    Zittrain, Jonathan L.

    2008-01-01

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a thumb tack and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This short essay explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  16. The Morality of Employing Remotely Piloted Weapon Systems in Combat

    Science.gov (United States)

    2013-03-01

    ethics of remotely piloted weapon systems involve utilitarianism and Just War Theory. Although the other two perspectives, pacifism and realism, do...perspectives of utilitarianism , Just War Theory, pacifism, and realism are evaluated to justify the claim. With the exception of pacifism, each of these...of utilitarianism , Just War Theory, pacifism, and realism are evaluated to justify the claim. With the exception of pacifism, each of these

  17. Kinematics of Laying an Automated Weapon System

    Science.gov (United States)

    2017-07-19

    NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHORS Joshua Stapp 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...Coordinate Systems 6 Transformation of Earth Referenced Lay to Platform Reference Frame 6 Results and Discussions 7 Conclusions 8 Bibliography 9...Distribution List 11 FIGURES 1 Earth reference frame 1 2 Platform reference frame 2 3 Cartesian coordinate system 3 4 Spherical

  18. Rapid Human-Computer Interactive Conceptual Design of Mobile and Manipulative Robot Systems

    Science.gov (United States)

    2015-05-19

    Learning Comparative User Models for Accelerating Human-Computer Collaborative Search, Evolutionary and Biologically Inspired Music , Sound, Art and...has been investigated theoretically to some extent ([12]) and successfully applied to artistic tasks ([11, 5]). Our hypothesis is that it is possible...model’s prediction to the sign of the original entry. If the signs coincide for all entries, the network is considered to be successfully trained

  19. Status Reporting on Weapon System Acquisition Programs,

    Science.gov (United States)

    1985-04-01

    Systems Division ( ASSD ) and the reschedulinq of vehicle acceptance testing milestones caused by thnse !e*e box deliveries. Impact to program: Contract...is primarily due to the late delivery of the ASSD boxes (approximately 10 months late). Impact to program: None. 2 S...integration for which BCWP has been taken. The cumulative cost variance of ($22.5M) is primarily due to the late box deliveries from ASSD and the

  20. Weapons Systems, United States Army 1997.

    Science.gov (United States)

    1997-01-01

    in a tactical environment. The M1070 trac - tor has front- and rear-axle steering, a central tire inflation system, and cab space for six personnel to...Cavalry Regiments-Squadrons, Field Artillery Battalions A3-based BFIST planned (XM7A1) France: AMX-10 PAC-90, AMX VTT /LT; Russia: BMP PRP-3, BMP PRP-4...Sensor-Heavy, Armored Transport and Treatment Vehicle (planned) China: Type 85 ACV, WZ-506, Type 90 CV; France: AMX-10PC, AMX VTT /PC; Germany: Tpzl

  1. Tank Weapon System Management. A Program for Maximum Effectiveness

    Science.gov (United States)

    1977-04-19

    flow is minimal and positive. Authorizations: Current Proposed 76D10 9100 (8571) 8850 (81%) 76D20 1400 (15%) 1650 (19,) RECOMMENDATION: Etab &~h Mte...weapon system. RECOIMENtrATION: Etab &6h a Ppon4ive, ,ositve technicat c nnee to puvidc gqudaince and to kece u Jeedbacia on’ tank .6upp’PX irazteuL...System. An integrated group of procedures, methods, policies and may include the computer(s) and its software which is used to obtain, process and analyze

  2. Microcontroller based ground weapon control system(Short Communication

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2001-10-01

    Full Text Available Armoured vehicles and tanks generally consist of high resolution optical (both infrared and visible and display systems for recognition and identification of the targets. Different weapons/articles to engage the targets may be present. A fire control system (FCS controls all the above systems, monitors the status of the articles present and passes the information to the display system. Depending upon the health and availability of the articles, the FCS selects and fires the articles. Design and development of ground control unit which is the heart of the FCS, both in hardware and software, has been emphasised. The system has been developed using microcontroller and software developed in ASM 51 language. The system also has a facility to test all the systems and articles as initial power on condition. From the safety point of view, software and hardware interlocks have been provided in the critical operations, like firing sequence. "

  3. Transfer alignment of shipborne inertial-guided weapon systems

    Institute of Scientific and Technical Information of China (English)

    Sun Changyue; Deng Zhenglong

    2009-01-01

    The transfer alignment problem of the shipborne weapon inertial navigation system (INS) is addressed. Specifically, two transfer alignment algorithms subjected to the ship motions induced by the waves are discussed. To consider the limited maneuver level performed by the ship, a new filter algorithm for transfer alignment methods using velocity and angular rate matching is first derived. And then an improved method using integrated velocity and integrated angular rate matching is introduced to reduce the effect of the ship body flexure. The simulation results show the feasibility and validity of the proposed transfer alignment algorithms.

  4. Human-Computer System Development Methodology for the Dialogue Management System.

    Science.gov (United States)

    1982-05-01

    system structure must be compatible with the system requirements. 35 An example for this situation is the initial achitecture which was defined for... innovation and creativity is possible at the design stage, the coding stage is more tightly con- strained. The design must be completed to a level of detail...BATED77 Bates, D. (ed). "Software Engineering Techniques", Infotech State of the Art Report (1977). BOEHB76 Boehm, B. W. "Software Engineering

  5. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  6. Geometry-Of-Fire Tracking Algorithm for Direct-Fire Weapon Systems

    Science.gov (United States)

    2015-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited GEOMETRY-OF- FIRE ...TRACKING ALGORITHM FOR DIRECT- FIRE WEAPON SYSTEMS by Caleb K. Khan September 2015 Thesis Advisor: Zachary Staples Co-Advisor: Xiaoping...2015 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE GEOMETRY-OF- FIRE TRACKING ALGORITHM FOR DIRECT- FIRE WEAPON SYSTEMS

  7. 77 FR 55195 - Notice of Public Meetings for the Draft Environmental Impact Statement for Naval Weapons Systems...

    Science.gov (United States)

    2012-09-07

    ... Weapons Systems Training Facility Boardman, OR AGENCY: Department of the Navy, DoD. ACTION: Notice... and proposed DoN and Oregon National Guard training and testing activities at Naval Weapons Systems...

  8. Damage assessment of long-range rocket system by electromagnetic pulse weapon

    Science.gov (United States)

    Cao, Lingyu; Liu, Guoqing; Li, Jinming

    2017-08-01

    This paper analyzes the damage mechanism and characteristics of electromagnetic pulse weapon, establishes the index system of survivability of long-range rocket launcher system, and uses AHP method to establish the combat effectiveness model of long-range rocket missile system. According to the damage mechanism and characteristics of electromagnetic pulse weapon, the damage effect of the remote rocket system is established by using the exponential method to realize the damage efficiency of the remote rocket system.

  9. A mobile Nursing Information System based on human-computer interaction design for improving quality of nursing.

    Science.gov (United States)

    Su, Kuo-Wei; Liu, Cheng-Li

    2012-06-01

    A conventional Nursing Information System (NIS), which supports the role of nurse in some areas, is typically deployed as an immobile system. However, the traditional information system can't response to patients' conditions in real-time, causing delays on the availability of this information. With the advances of information technology, mobile devices are increasingly being used to extend the human mind's limited capacity to recall and process large numbers of relevant variables and to support information management, general administration, and clinical practice. Unfortunately, there have been few studies about the combination of a well-designed small-screen interface with a personal digital assistant (PDA) in clinical nursing. Some researchers found that user interface design is an important factor in determining the usability and potential use of a mobile system. Therefore, this study proposed a systematic approach to the development of a mobile nursing information system (MNIS) based on Mobile Human-Computer Interaction (M-HCI) for use in clinical nursing. The system combines principles of small-screen interface design with user-specified requirements. In addition, the iconic functions were designed with metaphor concept that will help users learn the system more quickly with less working-memory. An experiment involving learnability testing, thinking aloud and a questionnaire investigation was conducted for evaluating the effect of MNIS on PDA. The results show that the proposed MNIS is good on learning and higher satisfaction on symbol investigation, terminology and system information.

  10. Study on effectiveness evaluation of weapon systems based on grey relational analysis and TOPSIS

    Institute of Scientific and Technical Information of China (English)

    Gu Hui; Song Bifeng

    2009-01-01

    To evaluate the effectiveness of weapon systems, the advantages and disadvantages of grey relational analysis and TOPSIS for multiattribute decision-making is pointed out, and an effectiveness evaluation model of weapon systems by combining grey relational analysis and TOPSIS is proposed. The model aggregates the grey relational grade and the distance to a new integrated closeness and reflects not only the trend but also the situation of the alternative. The example illuminates that the model is effective for the effectiveness evaluation of weapon systems.

  11. An Analysis of the Distributed Architecture for a Telephone Based Human Computer Dialogue System

    Institute of Scientific and Technical Information of China (English)

    WANGHengt; DULimin

    2004-01-01

    The main purpose of this paper was to present a distributed speech interactive system built on LAN (Local area network), which integrated Automatic speech recognition (ASR), Text to speech (TTS) and Natural language perception (NLP) technologies to allow multiusers to access and converse with it concurrently. During a typical telephone based interaction, users could retrieve up-to-date stock information and call for somebody by directly speaking their name. Though there were far too many papers published to describe such system, most of them all focused on the algorithm on speech recognition rather than the architecture. Our paper was written to make for it and proposed an efficient and effective dynamic load balancing algorithm with sender active and non-preemptive concepts based on the distributed architecture and multithread concurrency in order to solve the loads allocating when multi-users accessed the system and gave rise to much burden to the servers. This paper was composed of five part: (1) an introduction about why such architecture was built; (2) an overview about the system; (3) proposed and implemented the algorithm; (4) evaluated and tested the system performance based on the architecture; and (5) a brief summary.

  12. A system for sentiment analysis of colloquial Arabic using human computation.

    Science.gov (United States)

    Al-Subaihin, Afnan S; Al-Khalifa, Hend S

    2014-01-01

    We present the implementation and evaluation of a sentiment analysis system that is conducted over Arabic text with evaluative content. Our system is broken into two different components. The first component is a game that enables users to annotate large corpuses of text in a fun manner. The game produces necessary linguistic resources that will be used by the second component which is the sentimental analyzer. Two different algorithms have been designed to employ these linguistic resources to analyze text and classify it according to its sentimental polarity. The first approach is using sentimental tag patterns, which reached a precision level of 56.14%. The second approach is the sentimental majority approach which relies on calculating the number of negative and positive phrases in the sentence and classifying the sentence according to the dominant polarity. The results after evaluating the system for the first sentimental majority approach yielded the highest accuracy level reached by our system which is 60.5% while the second variation scored an accuracy of 60.32%.

  13. A System for Sentiment Analysis of Colloquial Arabic Using Human Computation

    Directory of Open Access Journals (Sweden)

    Afnan S. Al-Subaihin

    2014-01-01

    Full Text Available We present the implementation and evaluation of a sentiment analysis system that is conducted over Arabic text with evaluative content. Our system is broken into two different components. The first component is a game that enables users to annotate large corpuses of text in a fun manner. The game produces necessary linguistic resources that will be used by the second component which is the sentimental analyzer. Two different algorithms have been designed to employ these linguistic resources to analyze text and classify it according to its sentimental polarity. The first approach is using sentimental tag patterns, which reached a precision level of 56.14%. The second approach is the sentimental majority approach which relies on calculating the number of negative and positive phrases in the sentence and classifying the sentence according to the dominant polarity. The results after evaluating the system for the first sentimental majority approach yielded the highest accuracy level reached by our system which is 60.5% while the second variation scored an accuracy of 60.32%.

  14. Lipophilic super-absorbent swelling gels as cleaners for use on weapons systems and platforms

    Science.gov (United States)

    Increasingly stringent environmental regulations on volatile organic compounds (VOCs) and hazardous air pollutants (HAPs) demand the development of disruptive technologies for cleaning weapons systems and platforms. Currently employed techniques such as vapor degreasing, solvent, aqueous, or blast c...

  15. Robot Arm Control and Having Meal Aid System with Eye Based Human-Computer Interaction (HCI)

    Science.gov (United States)

    Arai, Kohei; Mardiyanto, Ronny

    Robot arm control and having meal aid system with eye based HCI is proposed. The proposed system allows disabled person to select desirable food from the meal tray by their eyes only. Robot arm which is used for retrieving the desirable food is controlled by human eye. At the tip of the robot arm, tiny camera is equipped. Disabled person wear a glass of which a single Head Mount Display: HMD and tiny camera is mounted so that disabled person can take a look at the desired food and retrieve it by looking at the food displayed onto HMD. Experimental results show that disabled person can retrieve the desired food successfully. It also is confirmed that robot arm control by eye based HCI is much faster than that by hands.

  16. Human-Centered Design of Human-Computer-Human Dialogs in Aerospace Systems

    Science.gov (United States)

    Mitchell, Christine M.

    1998-01-01

    A series of ongoing research programs at Georgia Tech established a need for a simulation support tool for aircraft computer-based aids. This led to the design and development of the Georgia Tech Electronic Flight Instrument Research Tool (GT-EFIRT). GT-EFIRT is a part-task flight simulator specifically designed to study aircraft display design and single pilot interaction. ne simulator, using commercially available graphics and Unix workstations, replicates to a high level of fidelity the Electronic Flight Instrument Systems (EFIS), Flight Management Computer (FMC) and Auto Flight Director System (AFDS) of the Boeing 757/767 aircraft. The simulator can be configured to present information using conventional looking B757n67 displays or next generation Primary Flight Displays (PFD) such as found on the Beech Starship and MD-11.

  17. The health hazard assessment process in support of joint weapon system acquisitions.

    Science.gov (United States)

    Kluchinsky, Timothy A; Jokel, Charles R; Cambre, John V; Goddard, Donald E; Batts, Robert W

    2013-01-01

    Since 1981, the Army's HHA Program has provided an invaluable service to combat developers and materiel program managers by providing recommendations designed to eliminate or control health hazards associated with materiel and weapon systems. The program has consistently strived to improve its services by providing more meaningful and efficient assistance to the acquisition community. In the uncertain fiscal times ahead, the Army's HHA Program will continue to provide valuable and cost-effective solutions to mitigate the health risks of weapons systems.

  18. Simulation of Fighter Aircraft Weapon Systems for Design and Performance Evaluation

    OpenAIRE

    P. S. Subramanyam

    1997-01-01

    Simulation forms an essential tool in the system design and performance evaluation of fighter aircraft weapon systems. The various guidance strategies used for weapons like guns, missiles, bombs in the air-to-air or air-to-ground missions, for aiding the pilot for an effective delivery have been studied through extensive off-line and pilot-in-loop simulation. The pilot workload analysis carried out in the high fidelity cockpit simulator at the Aeronautical Development Agency , Bangalor...

  19. Human-centered design of human-computer-human dialogs in aerospace systems

    Science.gov (United States)

    Mitchell, Christine M.

    1994-01-01

    The second six months of this grant saw further development of GT-CATS, the Georgia Tech Crew Activity Tracking System, and progress on research exploring tutoring concepts for tutors for mode management. The latter included data analysis and a preliminary paper summarizing the development and evaluation of the VNAV Tutor. A follow-on to the VNAV Tutor is planned. Research in this direction will examine the use of OFMspert and GT-CATS to create an 'intelligent' tutor for mode management, a more extensive domain of application than only vertical navigation, and alternative pedagogy, such as substituting focused 'cases' of reported mode management situations rather than lessons defined by full LOFT scenarios.

  20. Mode Research on Space Weapons Systems Innovation Based Quality Function Deployment

    Directory of Open Access Journals (Sweden)

    Wang Xiuhong

    2011-06-01

    Full Text Available in the aviation industry, experts are enthusiastic over the research of sophisticated weapons. Little specialist pays attention to the innovation modes and methods. Up to now little quantization method suitable for aviation weapon systems innovation is presented. Base on the deep analysis and study on features of aviation weapon systems innovation and different innovation mode from the mass production, we have designed process model and quality chain model of aviation weapon systems innovation. Compared with the process model of large-scale innovation, the process models are more complex including many feedbacks and adding five steps: task decomposition, analysis of knowledge gap, accumulation of key knowledge, outsourcing selection, system integration. Meanwhile manufacturing process and R&D process are preformed simultaneously, and are involved in the process of module development. Technology application and diffusion are preformed with delivering the final innovation product to user. Quality function deployment and quality house are adopted to deal with the quality transfer among nodes. Quality demands of one node are converted into the technique features of another node in the quality house. We designed the top-down technique features transfer model and bottom-up demands transfer model to solve the quality transfer problems among nodes. At last an example is given to illustrate that this approach can accelerate to blaze the aviation weapon systems trails more than the existing methods and effectively reach quality management of aviation weapon systems innovation.

  1. Modeling of C3 I system in laser countermeasure weapon system

    Institute of Scientific and Technical Information of China (English)

    CHEN Chang-xi; GUO Li-hong

    2008-01-01

    With the spectrum extended in modem Electronic War, Laser Countermeasure Weapon will be re-quested in order to snatch up and keep the Electromagnetism-Power in war field. If Command, Control, Com-munications and Intelligence called Double-Army-Power-Implement is applied to general design of Laser Coun-termeasure Weapon System, the efficiency of Weapon System can be greatly improved. The Object-Oriented a-nalysis and design approach based on UML for C3I system architecture was put forward, by which logical archi-tecture described by class diagrams and behavior diagrams can be developed through Object-Oriented analysis,and physical architecture described by component diagrams and deployment diagrams can be developed through Object-Oriented design. The framework of Modeling based UML was firstly set forth, the high process of Com-mand, Control, Intelligence, Surveillance, Reconnaissance and UML Architecture was utilized., Then the Modeling process was particularly discussed through following the core ideology and basic principle of RUP(Rational Unified Process). Next, a series of diagrams of UML diagram which include Activity diagrams, Use Case diagrams, Sequence diagrams, Package diagrams and Class diagrams of system analysis, Component dia-grams, and Deployment diagrams of system design are illustrated in the process of Modeling of C3I system soft-ware. Lastly, some problems that should be noticed in the Modeling process, merit and demerit of model, next works were also put forward.

  2. The design of the multifunctional training simulation system on the platform as the same as the weapon system

    Institute of Scientific and Technical Information of China (English)

    Lu,Bin; Zhou,XiaoDong

    2003-01-01

    This paper presents the way to design the multifunc-tional (fighting, testing, maintenance, query about malfunctionetc) training simulation system on the platform of hardware thatas same as the weapon system with C++ Builder language.

  3. The Future of Killing: Ethical and Legal Implications of Fully Autonomous Weapon Systems

    Directory of Open Access Journals (Sweden)

    Martin Lark

    2017-03-01

    Full Text Available Warfare is moving towards full weapon autonomy. Already, there are weapons in service that replace a human at the point of engagement. The remote pilot must adhere to the law and consider the moral and ethical implications of using lethal force. Future fully autonomous weapons will be able to search for, identify and engage targets without human intervention, raising the question of who is responsible for the moral and ethical considerations of using such weapons. In the chaos of war, people are fallible, but they can apply judgement and discretion and identify subtle signals. For example, humans can identify when an enemy wants to surrender, are burying their dead, or are assisting non-combatants. An autonomous weapon may not be so discerning and may not be capable of being programmed to apply discretion, compassion, or mercy, nor can it adapt commanders’ intent or apply initiative. Before fully autonomous weapons use lethal force, it is argued that there needs to be assurances that the ethical implications are understood and that control mechanisms are in place to ensure that oversight of the system is able to prevent incidents that could amount to breaches of the laws of armed conflict.

  4. Response surface method using grey relational analysis for decision making in weapon system selection

    Institute of Scientific and Technical Information of China (English)

    Peng Wang; Peng Meng; Baowei Song

    2014-01-01

    A proper weapon system is very important for a na-tional defense system. General y, it means selecting the optimal weapon system among many alternatives, which is a multiple-attribute decision making (MADM) problem. This paper proposes a new mathematical model based on the response surface method (RSM) and the grey relational analysis (GRA). RSM is used to obtain the experimental points and analyze the factors that have a significant impact on the selection results. GRA is used to an-alyze the trend relationship between alternatives and reference series. And then an RSM model is obtained, which can be used to calculate al alternatives and obtain ranking results. A real world application is introduced to il ustrate the utilization of the model for the weapon selection problem. The results show that this model can be used to help decision-makers to make a quick comparison of alternatives and select a proper weapon system from multiple alternatives, which is an effective and adaptable method for solving the weapon system selection problem.

  5. Simulation of Fighter Aircraft Weapon Systems for Design and Performance Evaluation

    Directory of Open Access Journals (Sweden)

    P.S. Subramanyam

    1997-07-01

    Full Text Available Simulation forms an essential tool in the system design and performance evaluation of fighter aircraft weapon systems. The various guidance strategies used for weapons like guns, missiles, bombs in the air-to-air or air-to-ground missions, for aiding the pilot for an effective delivery have been studied through extensive off-line and pilot-in-loop simulation. The pilot workload analysis carried out in the high fidelity cockpit simulator at the Aeronautical Development Agency , Bangalore, provides the system designer an effective means to tune the various subsy stems for better performance. The paper focuses on all these aspects to bring out the importance of simulation in the overall fighter aircraft weapon system design.

  6. Feature extraction from time domain acoustic signatures of weapons systems fire

    Science.gov (United States)

    Yang, Christine; Goldman, Geoffrey H.

    2014-06-01

    The U.S. Army is interested in developing algorithms to classify weapons systems fire based on their acoustic signatures. To support this effort, an algorithm was developed to extract features from acoustic signatures of weapons systems fire and applied to over 1300 signatures. The algorithm filtered the data using standard techniques then estimated the amplitude and time of the first five peaks and troughs and the location of the zero crossing in the waveform. The results were stored in Excel spreadsheets. The results are being used to develop and test acoustic classifier algorithms.

  7. Computing variable bounds in the conceptual design phase of guided weapon systems

    NARCIS (Netherlands)

    Weiss, M.; Buco, D.

    2012-01-01

    The performance of guided weapon systems is primarily expressed by the end-of-flight effect, routinely approximated by the miss distance. It is however equally important that certain system variables of interest are kept within given bounds all along the duration of the flight. In this paper, we pro

  8. Is Weapon System Cost Growth Increasing? A Quantitative Assessment of Completed and Ongoing Programs

    Science.gov (United States)

    2007-01-01

    monitor was Jay Jordan, technical director of the Air Force Cost Analysis Agency. Other RAND Project AIR FORCE documents that address weapon system...Systems, Santa Monica, Calif.: RAND Corporation, MG-415-AF, 2006. As of January 15, 2007: http://www.rand.org/pubs/monographs/MG415/ Asher , Norman J

  9. Computing variable bounds in the conceptual design phase of guided weapon systems

    NARCIS (Netherlands)

    Weiss, M.; Buco, D.

    2012-01-01

    The performance of guided weapon systems is primarily expressed by the end-of-flight effect, routinely approximated by the miss distance. It is however equally important that certain system variables of interest are kept within given bounds all along the duration of the flight. In this paper, we

  10. A Real-Time Model-Based Human Motion Tracking and Analysis for Human-Computer Interface Systems

    Directory of Open Access Journals (Sweden)

    Chung-Lin Huang

    2004-09-01

    Full Text Available This paper introduces a real-time model-based human motion tracking and analysis method for human computer interface (HCI. This method tracks and analyzes the human motion from two orthogonal views without using any markers. The motion parameters are estimated by pattern matching between the extracted human silhouette and the human model. First, the human silhouette is extracted and then the body definition parameters (BDPs can be obtained. Second, the body animation parameters (BAPs are estimated by a hierarchical tritree overlapping searching algorithm. To verify the performance of our method, we demonstrate different human posture sequences and use hidden Markov model (HMM for posture recognition testing.

  11. Weapon and Sighting System Compatibility Assessment for Prototype Maxillofacial Protection Devices

    Science.gov (United States)

    2013-03-01

    14 6.7 FIREBALL : M4 Weapon Compatibility ......................................................................15 6.8 FIREBALL : M240B...System Compatibility – Stryker Combat Vehicle...........................................19 7.1.1 CVCH, FIREBALL Helmet Bracket, No Maxillofacial... FIREBALL Helmet Bracket With Maxillofacial Protection (figure 32

  12. Warhead politics: Livermore and the competitive system of nuclear weapon design

    Energy Technology Data Exchange (ETDEWEB)

    Francis, Sybil [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    1995-06-01

    From the 1950s onward, US evolved a two-laboratory system to design, develop, and test nuclear weapons. LANL (New Mexico) dates from World War II. The founding in 1952 of LLNL in California effectively established the two-laboratory system. Despite essentially identical missions, LANL and LLNL adopted different strategies and approaches to the development of nuclear weapons. This thesis looks to their joint history for an explanation of this and consequent questions (how did the two-laboratory system originate and evolve? how did it function? what impact did it have on nuclear weapons development?) The incentives and constraints that shaped laboratory strategies and outputs was determined by military demand for nuclear weapons, an informal mandate against laboratory duplication, congressional support for competition, and Livermore`s role as the ``second lab.`` This thesis discusses the laboratories` role in the arms race, organizational strategies for coping with changing political environments, dynamics of technological innovation, and the leverage of policymakers over large organizations.

  13. Wearable Computing System with Input-Output Devices Based on Eye-Based Human Computer Interaction Allowing Location Based Web Services

    Directory of Open Access Journals (Sweden)

    Kohei Arai

    2013-08-01

    Full Text Available Wearable computing with Input-Output devices Base on Eye-Based Human Computer Interaction: EBHCI which allows location based web services including navigation, location/attitude/health condition monitoring is proposed. Through implementation of the proposed wearable computing system, all the functionality is confirmed. It is also found that the system does work well. It can be used easily and also is not expensive. Experimental results for EBHCI show excellent performance in terms of key-in accuracy as well as input speed. It is accessible to internet, obviously, and has search engine capability.

  14. Handbook of human computation

    CERN Document Server

    Michelucci, Pietro

    2013-01-01

    This volume addresses the emerging area of human computation, The chapters, written by leading international researchers, explore existing and future opportunities to combine the respective strengths of both humans and machines in order to create powerful problem-solving capabilities. The book bridges scientific communities, capturing and integrating the unique perspective and achievements of each. It coalesces contributions from industry and across related disciplines in order to motivate, define, and anticipate the future of this exciting new frontier in science and cultural evolution. Reade

  15. WSTIAC: Weapon Systems Technology Information Analysis Center. Volume 6, Number 1

    Science.gov (United States)

    2005-01-01

    Computational Neuroscience Program 2004. Associate Editor; Journal of Counter Ordinance Technology. Joel L EDavis, Program Manager, Cognitive and Neural...tests were against unitary (nonseparating) targets representative of the Journal of the Optical Society of America A, involves of SCUD-type ballistic...Agent ( CSEA ) and prime contractor for the Aegis Weapon System agencies. A single query searches across 30 databases and and Vertical Launch System

  16. Experimental Investigations of a Precision Sensor for an Automatic Weapons Stabilizer System.

    Science.gov (United States)

    Korobiichuk, Igor

    2016-12-24

    This paper presents the results of experimental investigations of a precision sensor for an automatic weapons stabilizer system. It also describes the experimental equipment used and the structure of the developed sensor. A weapons stabilizer is designed for automatic guidance of an armament unit in the horizontal and vertical planes when firing at ground and air targets that are quickly maneuvering, and at lower speeds when firing anti-tank missiles, as well as the bypass of construction elements by the armament unit, and the automatic tracking of moving targets when interacting with a fire control system. The results of experimental investigations have shown that the error of the precision sensor developed on the basis of a piezoelectric element is 6 × 10(-10) m/s² under quasi-static conditions, and ~10(-5) m/s² for mobile use. This paper defines metrological and calibration properties of the developed sensor.

  17. New rapid transfer alignment method for SINS of airborne weapon systems

    Institute of Scientific and Technical Information of China (English)

    Yu Chen; Yan Zhao

    2014-01-01

    Transfer alignment is an effective alignment method for the strapdown inertial navigation system (SINS) of airborne weapon systems. The traditional transfer alignment methods for large misalignment angles alignment use nonlinear transfer align-ment models and incorporate nonlinear filtering. A rapid transfer alignment method with linear models and linear filtering for ar-bitrary misalignment angles is presented. Through the attitude quaternion decomposition, the purpose of transfer alignment is converted to estimate a constant quaternion. Employing special manipulations on measurement equation, velocity and attitude linear measurement equations are derived. Then the linear trans-fer alignment model for arbitrary misalignment angles is built. An adaptive Kalman filter is developed to handle modeling errors of the measurement noise statistics. Simulation results show feasibili-ty and effectiveness of the proposed method, which provides an alternative rapid transfer alignment method for airborne weapons.

  18. A Study of New Method for Weapon System Effectiveness Evaluation Based on Bayesian Network

    Institute of Scientific and Technical Information of China (English)

    YAN Dai-wei; GU Liang-xian; PAN Lei

    2008-01-01

    As weapon system effectiveness is affected by many factors, its evaluation is essentially a multi-criterion decision making problem for its complexity. The evaluation model of the effectiveness is established on the basis of metrics architecture of the effectiveness. The Bayesian network, which is used to evaluate the effectiveness, is established based on the metrics architecture and the evaluation models. For getting the weights of the metrics by Bayesian network, subjective initial values of the weights are given, gradient ascent algorithm is adopted, and the reasonable values of the weights are achieved. And then the effectiveness of every weapon system project is gained. The weapon system, whose effectiveness is relative maximum, is the optimization system. The research result shows that this method can solve the problem of AHP method which evaluation results are not compatible to the practice results and overcome the shortcoming of neural network in multilayer and multi-criterion decision. The method offers a new approaeh for evaluating the effectiveness.

  19. Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process

    Science.gov (United States)

    2013-01-02

    Weapon Systems and Recent Efforts to Reform the Process 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT ...oversee and mange acquisition programs. At each milestone, a program must meet specific statutory and regulatory requirements before the program can...the FY2007 defense authorization bill stated Simply put, the Department of Defense (DOD) acquisition process is broken. The ability of the

  20. Geometry-of-fire tracking algorithm for direct-fire weapon systems

    OpenAIRE

    Khan, Caleb K.

    2015-01-01

    Approved for public release; distribution is unlimited The continuous cycle for validating geometry of fires on a battlefield impedes momentum. A force that can decide and act quicker than the enemy has an advantage. The goal of this thesis is to provide dismounted infantry units with this advantage by developing a sensor network that streamlines the geometry-of-fire validation cycle for direct-fire weapon systems. This is the first attempt to develop technology for this specific applicati...

  1. The vulnerability of laser warning systems against guided weapons based on low power lasers

    OpenAIRE

    Al-Jaberi, Mubarak

    2006-01-01

    Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding missiles pose a significant threat to military assets in the modern battlefield. Laser beam-riding missiles are particularly hard to detect because they use low power lasers. Most laser warning systems produced so far can not detect laser beam-riding missiles because of their weak emissions which have signals less than 1% of laser range finder power . They are even harder to defeat because current ...

  2. Visibility Characteristics of Terrain and Their Effects on Weapon-System Performance

    Science.gov (United States)

    1980-03-01

    range of the weapon and if "LOS" exists. The existence and duration of LOS in these modelo is deterministically assessed by computations on the...defenders had visibility to the same target. vihile it does make sense to discuss those areas separately, there are aspects of the experiment, which, being...and other sensing systems which might exist in battlefield conditions, and their implications on the utility of laser guided beam rider and TOW

  3. Using Heuristics for Supportability Analysis of Adaptive Weapon Systems in Combat

    Science.gov (United States)

    2017-01-01

    Defense ARJ, January 2017, Vol. 24 No. 1 : 30–41 Using Heuristics for Supportability Analysis http://www.dau.mil In a limited data situation , a decision...USING HEURISTICS for Supportability Analysis of Adaptive Weapon Systems in Combat Samuel H. Amber The new U.S. Army vision contends that heuristics...Image designed by Diane Fleischer 32 Defense ARJ, January 2017, Vol. 24 No. 1 : 30–41 Using Heuristics for Supportability Analysis http

  4. Human computer interaction positioning system based on RFID for museum%基于RFID的博物馆人机互动定位系统

    Institute of Scientific and Technical Information of China (English)

    周祥云; 钱慧; 余轮

    2011-01-01

    Designed a positioning system of human-computer interaction based on RFID for digital museum, bringing about the functions of zone location of people, the monitoring of people-flow's distribution and the track of people's moving trace. It met the management and application requirement of museum. Based on the track of people's moving trace, the paper proposed an application program of human-computer game-interaction combined with the location technology of RFID, and the scheme has been applied in the museum.%设计了一种基于RFID技术的数字博物馆人机互动定位系统。该系统具备人员区域定位、人流量分布监测和人员移动轨迹的追踪功能,满足了博物馆的管理应用需求。在实现人员移动轨迹追踪的基础上提出了一种结合RFID定位技术的人机互动游戏应用方案,并将该方案应用到博物馆中。

  5. The Mechanisms and Value of Competition for Major Weapon Systems

    Science.gov (United States)

    2011-04-01

    technology. MUOS is intended to replace the Ultra-High Frequency Follow-On system ( UFO ), which was fielded between 1993 and 2003. Launch of the first......performance on the UFO system was considered an outstanding success. Based on rather limited evidence, Scearce concludes that Boeing’s bid for MUOS was based

  6. Internal Versus External Acquisition for Small Weapons Systems

    Science.gov (United States)

    2007-03-01

    early 1800s. Other examples of repeating history include Lowering the Cost of Federal System Acquisition ( Kasser , 1996), Spare Parts Horror Stories...Spare Parts”, 1997), and Back to Basics (Dornheim, 2006). Kasser recommends moving system testing and inspection to an earlier phase of the...Katobe, M. “Hollowing –Out of US Multinationals and Their Global Competitiveness,” Journal of International Business Studies. 1989, Vol 19:1-15. Kasser

  7. Review and Analysis of GAO Reports on Major Weapon Systems

    Science.gov (United States)

    2012-10-24

    that controls the health and status of the space vehicle was found to be inadequate when it unexpectedly failed during testing in 2007. In April...Outsourcing the Pearl Harbor MK-48 Intermediate Maintenance Activity  Pallet Management System  PBL (4)  Privatization-NOSL/NAWCI  RFID (6)  Risk

  8. From Marginal Adjustments to Meaningful Change: Rethinking Weapon System Acquisition

    Science.gov (United States)

    2010-01-01

    Management in Expeditionary Operations, 2007. GAO—See U.S. Government Accountability Offi ce. Garcia , A., H. Keyner, T. Robillard, and M. Van Mullekom... Marquez , R. B. Magnaye, and W. Tan, System Maturity Indices for Decision Support in the Defense Acquisition Process, proceedings of the 5th Annual

  9. Digital Guided Weapons Technology. Volume 1. Digital Processor System Studies

    Science.gov (United States)

    1976-11-01

    Subsystem 4. 1. 3 LORAN Subsystem 4. 1.4 E-O Data Link Subsystem 4. 1. 5 TERCOM Subsystem 4.1.6 DME Subsystem 4. 1.7 Global Positioning System...Subsystem Block Diagram 16 Electro-Optical Data Link Subsystem Block Diagram 17 TERCOM Subsystem Block Diagram 18 GPS Subsystem Functional Flow...Processing Requirements — EO Data Link 6 Processing Requirements - TERCOM Subsystem 7 GPS Guidance Subsystem Digital Processing Requirements 8

  10. A dollar cost evaluation of mainland China's major weapon systems

    OpenAIRE

    Wang, Chih-Hsiang

    1994-01-01

    Approved for public release, distribution unlimited This thesis analyzes the requirements and design considerations of a video teletraining (VTT) delivery system for 25 Defense Finance and Accounting Service (DFAS) centers located throughout the continental United States. Current DFAS VTT capabilities are reviewed and included. The study's sponsor, the Defense Business Management University (DBMU), has been tasked by the DoD comptroller to implement a training program for these centers. Th...

  11. Language evolution and human-computer interaction

    Science.gov (United States)

    Grudin, Jonathan; Norman, Donald A.

    1991-01-01

    Many of the issues that confront designers of interactive computer systems also appear in natural language evolution. Natural languages and human-computer interfaces share as their primary mission the support of extended 'dialogues' between responsive entities. Because in each case one participant is a human being, some of the pressures operating on natural languages, causing them to evolve in order to better support such dialogue, also operate on human-computer 'languages' or interfaces. This does not necessarily push interfaces in the direction of natural language - since one entity in this dialogue is not a human, this is not to be expected. Nonetheless, by discerning where the pressures that guide natural language evolution also appear in human-computer interaction, we can contribute to the design of computer systems and obtain a new perspective on natural languages.

  12. Language evolution and human-computer interaction

    Science.gov (United States)

    Grudin, Jonathan; Norman, Donald A.

    1991-01-01

    Many of the issues that confront designers of interactive computer systems also appear in natural language evolution. Natural languages and human-computer interfaces share as their primary mission the support of extended 'dialogues' between responsive entities. Because in each case one participant is a human being, some of the pressures operating on natural languages, causing them to evolve in order to better support such dialogue, also operate on human-computer 'languages' or interfaces. This does not necessarily push interfaces in the direction of natural language - since one entity in this dialogue is not a human, this is not to be expected. Nonetheless, by discerning where the pressures that guide natural language evolution also appear in human-computer interaction, we can contribute to the design of computer systems and obtain a new perspective on natural languages.

  13. Technical analysis of US Army Weapons Systems and related advanced technologies of military interest. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1991-06-14

    This report summarizes the activities and accomplishments of an US Army technology security project designed to identify and develop effective policy guidelines for militarily critical technologies in specific Army systems and in broad generic technology areas of military interest, Individual systems analyses are documented in separate Weapons Systems Technical Assessments (WSTAs) and the general generic technology areas are evaluated in the Advanced Technology Assessment Reports (ATARs), However, specific details of these assessments are not addressed here, only recommendations regarding aspects of the defined approach, methodology, and format are provided and discussed.

  14. Challenges in the application of modular open system architecture to weapons

    Science.gov (United States)

    Shaver, Jonathan; Rose, Leo; Young, Quinn; Christensen, Jacob

    2016-05-01

    The overarching objective for Flexible Weapons is to replace current inventory weapons that will not fully utilize the increased capabilities of 6th generation platforms, with a single weapons kit made up of flexible, open architecture components. Flexible Weapon will develop a common architecture to enable modular subsystems to achieve flexible weapons capability while allowing technology refresh at the pace of technology discovery in an affordable and sustainable design. The various combinations of weapons to address multiple missions must be 100% compatible with 6th generation delivery platforms (fighters, bombers, RPAs) and backwards compatible with 4th and 5th generation platforms.

  15. Magnetohydrodynamic (MHD) nuclear weapons effects on submarine cable systems. Volume 1. Experiments and analysis. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1987-06-01

    This report presents a study of the nuclear weapons magnetohydrodynamic (MHD) effects on submarine communications cables. The study consisted of the analysis and interpretation of currently available data on submarine cable systems TAT-4, TAT-6, and TAT-7. The primary result of the study is that decrease of the effective resistivity with frequency over the available experimental range, coupled with the model results, leads to quite small effective resistivities at the MHD characteristic frequencies, and hence small earth potential differences. Thus, it appears that submarine cable systems are less susceptible to an MHD threat than their land-based counter-parts.

  16. Human-computer interface design

    Energy Technology Data Exchange (ETDEWEB)

    Bowser, S.E.

    1995-04-01

    Modern military forces assume that computer-based information is reliable, timely, available, usable, and shared. The importance of computer-based information is based on the assumption that {open_quotes}shared situation awareness, coupled with the ability to conduct continuous operations, will allow information age armies to observe, decide, and act faster, more correctly and more precisely than their enemies.{close_quotes} (Sullivan and Dubik 1994). Human-Computer Interface (HCI) design standardization is critical to the realization of the previously stated assumptions. Given that a key factor of a high-performance, high-reliability system is an easy-to-use, effective design of the interface between the hardware, software, and the user, it follows logically that the interface between the computer and the military user is critical to the success of the information-age military. The proliferation of computer technology has resulted in the development of an extensive variety of computer-based systems and the implementation of varying HCI styles on these systems. To accommodate the continued growth in computer-based systems, minimize HCI diversity, and improve system performance and reliability, the U.S. Department of Defense (DoD) is continuing to adopt interface standards for developing computer-based systems.

  17. Human-Computer Interactions and Decision Behavior

    Science.gov (United States)

    1984-01-01

    software interfaces. The major components of the reseach program included the Diaiogue Management System. (DMS) operating environment, the role of...specification; and new methods for modeling, designing, and developing human-computer interfaces based on syntactic and semantic specification. The DMS...achieving communication is language. Accordingly, the transaction model employs a linguistic model consisting of parts that relate computer responses

  18. Human Computer Interactions in Next-Generation of Aircraft Smart Navigation Management Systems: Task Analysis and Architecture under an Agent-Oriented Methodological Approach

    Directory of Open Access Journals (Sweden)

    José M. Canino-Rodríguez

    2015-03-01

    Full Text Available The limited efficiency of current air traffic systems will require a next-generation of Smart Air Traffic System (SATS that relies on current technological advances. This challenge means a transition toward a new navigation and air-traffic procedures paradigm, where pilots and air traffic controllers perform and coordinate their activities according to new roles and technological supports. The design of new Human-Computer Interactions (HCI for performing these activities is a key element of SATS. However efforts for developing such tools need to be inspired on a parallel characterization of hypothetical air traffic scenarios compatible with current ones. This paper is focused on airborne HCI into SATS where cockpit inputs came from aircraft navigation systems, surrounding traffic situation, controllers’ indications, etc. So the HCI is intended to enhance situation awareness and decision-making through pilot cockpit. This work approach considers SATS as a system distributed on a large-scale with uncertainty in a dynamic environment. Therefore, a multi-agent systems based approach is well suited for modeling such an environment. We demonstrate that current methodologies for designing multi-agent systems are a useful tool to characterize HCI. We specifically illustrate how the selected methodological approach provides enough guidelines to obtain a cockpit HCI design that complies with future SATS specifications.

  19. Human computer interactions in next-generation of aircraft smart navigation management systems: task analysis and architecture under an agent-oriented methodological approach.

    Science.gov (United States)

    Canino-Rodríguez, José M; García-Herrero, Jesús; Besada-Portas, Juan; Ravelo-García, Antonio G; Travieso-González, Carlos; Alonso-Hernández, Jesús B

    2015-03-04

    The limited efficiency of current air traffic systems will require a next-generation of Smart Air Traffic System (SATS) that relies on current technological advances. This challenge means a transition toward a new navigation and air-traffic procedures paradigm, where pilots and air traffic controllers perform and coordinate their activities according to new roles and technological supports. The design of new Human-Computer Interactions (HCI) for performing these activities is a key element of SATS. However efforts for developing such tools need to be inspired on a parallel characterization of hypothetical air traffic scenarios compatible with current ones. This paper is focused on airborne HCI into SATS where cockpit inputs came from aircraft navigation systems, surrounding traffic situation, controllers' indications, etc. So the HCI is intended to enhance situation awareness and decision-making through pilot cockpit. This work approach considers SATS as a system distributed on a large-scale with uncertainty in a dynamic environment. Therefore, a multi-agent systems based approach is well suited for modeling such an environment. We demonstrate that current methodologies for designing multi-agent systems are a useful tool to characterize HCI. We specifically illustrate how the selected methodological approach provides enough guidelines to obtain a cockpit HCI design that complies with future SATS specifications.

  20. Study of Direction Probability and Algorithm of Improved Marriage in Honey Bees Optimization for Weapon Network System

    Institute of Scientific and Technical Information of China (English)

    YANG Chen-guang; TU Xu-yan; CHEN Jie

    2009-01-01

    To solve the weapon network system optimization problem against small raid objects with low attitude, the concept of direction probability and a new evaluation index system are proposed. By calculating the whole damaging probability that changes with the defending angle, the efficiency of the whole weapon network system can be subtly described. With such method, we can avoid the inconformity of the description obtained from the traditional index systems. Three new indexes are also proposed, I.e. Join index, overlap index and cover index, which help manage the relationship among several sub-weapon-networks. By normalizing the computation results with the Sigmoid function, the matching problem between the optimization algorithm and indexes is well settled. Also, the algorithm of improved marriage in honey bees optimization that proposed in our previous work is applied to optimize the embattlement problem. Simulation is carried out to show the efficiency of the proposed indexes and the optimization algorithm.

  1. 1-B it 人机交互系统%One-Bit human-computer interactive system

    Institute of Scientific and Technical Information of China (English)

    程煜; 张鸣宇; 陶霖密

    2015-01-01

    通过研制普适的非对称交互系统,解决运动能力障碍人群借助通用计算设备通过互联网进行交流这一问题。虚拟鼠标替代传统鼠标、中文输入法替代传统键盘输入功能、快捷键替代传统键盘快捷操作功能,作为交互系统的基础支持完全根据用户自身意志完成各类操作;配置1-Bit输入设备有效减轻了运动障碍人群的操作负担。基于上述方法,设计并开发实现了1-Bit人机交互系统,该系统能够利用1-Bit输入设备完成对普通计算机的操作。实验测试和分析表明,用户可以基于1-Bit输入设备操作电脑,包括文字输入、网页浏览、音视频播放、日常护理等功能,满足用户的日常电脑使用需求,同时该交互系统具有易于学习、功能方便扩展的特性。%Through developing a universal asymmetric interactive system, the obstacle of communication in the In-ternet among movement disability crowds through general computing equipment is solved.A virtual mouse took the place of the traditional mouse.A Chinese input method and shortcut keys were used instead of the original keyboard input.Users can operate computers according to their own will.The set of the one-Bit input device can further re-duce the burden for the disabled people.Based on the above-mentioned method, a one-Bit interaction system was developed and implemented, which can manipulate computers by the one-Bit input device.The user tests and anal-ysis of the system indicate that users can manipulate computers with multi-functions, including text entry, website browsing, audio and video play, and health care via one-Bit input device.The system is easy to learn and its func-tions can be developed and expanded easily, which meets the daily requirements for a user to operate a computer.

  2. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  3. Grey Prediction Fuzzy Control of the Target Tracking System in a Robot Weapon

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-zhong; JI Jiang-tao; WANG Hong-ru

    2007-01-01

    Grey modeling can be used to predict the behavioral development of a system and find out the lead control values of the system. By using fuzzy inference, PID parameters can be adjusted on line by the fuzzy controller with PID parameters self-tuning. According to the characteristics of target tracking system in a robot weapon, grey prediction theory and fuzzy PID control ideas are combined. A grey prediction mathematical model is constructed and a fuzzy PID controller with grey prediction was developed. Simulation result shows fuzzy PID control algorithm with grey prediction is an efficient method that can improve the control equality and robustness of traditional PID control and fuzzy PID control, and has much better performance for target tracking.

  4. Multidisciplinary model-based-engineering for laser weapon systems: recent progress

    Science.gov (United States)

    Coy, Steve; Panthaki, Malcolm

    2013-09-01

    We are working to develop a comprehensive, integrated software framework and toolset to support model-based engineering (MBE) of laser weapons systems. MBE has been identified by the Office of the Director, Defense Science and Engineering as one of four potentially "game-changing" technologies that could bring about revolutionary advances across the entire DoD research and development and procurement cycle. To be effective, however, MBE requires robust underlying modeling and simulation technologies capable of modeling all the pertinent systems, subsystems, components, effects, and interactions at any level of fidelity that may be required in order to support crucial design decisions at any point in the system development lifecycle. Very often the greatest technical challenges are posed by systems involving interactions that cut across two or more distinct scientific or engineering domains; even in cases where there are excellent tools available for modeling each individual domain, generally none of these domain-specific tools can be used to model the cross-domain interactions. In the case of laser weapons systems R&D these tools need to be able to support modeling of systems involving combined interactions among structures, thermal, and optical effects, including both ray optics and wave optics, controls, atmospheric effects, target interaction, computational fluid dynamics, and spatiotemporal interactions between lasing light and the laser gain medium. To address this problem we are working to extend Comet™, to add the addition modeling and simulation capabilities required for this particular application area. In this paper we will describe our progress to date.

  5. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  6. Design and Implementation of Simulation Environment for HLA-Compliant Torpedo Weapon System

    Institute of Scientific and Technical Information of China (English)

    TANG Kai; KANG Feng-ju; GU Hao; SONG Zhi-ming

    2008-01-01

    A novel scheme for HLA(high level architecture)-compliant reconfigurable open architecture for the torpedo weapon system simulation is proposed. In addition, a kind of applied software framework for federate members based on the reusable software is put forward. The automation of time management strategy drafting and publish-subscribe declaration, and the consistent interface between RTI (run-time infrastructure) and simulation models are solved effectively. Furthermore, in order to simulate the fluctuant seabed, twinkle light spots, air bubbles, muddy effect, etc, an extended module, called as Underwater Space Vega, is developed. Finally, a distributed interactive simulation environment for underwater vehicles is set up with the aid of the software pRTI1.3. The preliminary experiment results indicate that this system friendly features GUI, reusable models and competence for real-time simulation.

  7. [Biological weapons].

    Science.gov (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D

    2010-08-01

    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage. Georg Thieme Verlag KG Stuttgart * New York.

  8. Man-machine interface in a submarine command and weapon control system: features and design experience

    Directory of Open Access Journals (Sweden)

    Johan H. Aas

    1989-01-01

    Full Text Available Important man-machine interface (MMI issues concerning a submarine command and weapon control system (CWCS such as crew organization, automation level and decision support are discussed in this paper. Generic submarine CWCS functions and operating conditions are outlined. Detailed, dynamic and real-time prototypes were used to support the MMI design. The prototypes are described and experience with detailed prototyping is discussed. Some of the main interaction principles are summarized and a restricted example of the resulting design is given. Our design experience and current work have been used to outline future perspectives of MMI design in naval CWCSs. The need for both formal and experimental approaches is emphasized.

  9. Minimal mobile human computer interaction

    NARCIS (Netherlands)

    el Ali, A.

    2013-01-01

    In the last 20 years, the widespread adoption of personal, mobile computing devices in everyday life, has allowed entry into a new technological era in Human Computer Interaction (HCI). The constant change of the physical and social context in a user's situation made possible by the portability of m

  10. 75 FR 13262 - Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign...

    Science.gov (United States)

    2010-03-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign Countries or Foreign Firms for Calendar Year 2009 AGENCY: Bureau of Industry and...

  11. 基于多智能体的人机协作智能信息系统%Human-Computer-Cooperated Intelligent Information System Based on Multi-Agents

    Institute of Scientific and Technical Information of China (English)

    操龙兵; 戴汝为

    2003-01-01

    综合集成研讨厅理论体系是作为处理开放的复杂巨系统的有关问题而提出的,其实质是一个人机协作的智能信息系统.本文主要探索研讨厅的实现途径,给出了基于网络的研讨厅的层次模型与系统结构,提出了基于内嵌客户/Agent/服务器的请求器-中介器-供应器模型的多智能体研讨厅的多层分布计算模型,并基于Java的智能信息Agent技术探讨了支持宏观经济决策的多智能体研讨厅的构架及工作机制.研究表明,基于Internet有关技术与Agent计算技术有可能实现研讨厅,并由于Agent技术的优势而可能得到较好的系统性能.%The Hall for Workshop of Metasynthetic Engineering(HWME) is an engeering technology proposed for coping with open complex giant systems. In this paper we describe the implementation of a human-computer-cooperated intelligent information system with HWME and multi-agents. We propose a layered model, a system structure over the network, and a distributed computing model-an n-tier client/agent/server-nested Requester-Mediator-Provider-for building the system. Furthermore, we discuss the framework and working mechanisms of an agent-based system of HWME, which is designed for macroeconomic decision-support based on intelligent information agents in Java. Our system implementation shows that an agent-oriented HWME system over the Internet may exhibit better performance in terms of handling open complex problems.

  12. Human Computer Interaction: An intellectual approach

    Directory of Open Access Journals (Sweden)

    Kuntal Saroha

    2011-08-01

    Full Text Available This paper discusses the research that has been done in thefield of Human Computer Interaction (HCI relating tohuman psychology. Human-computer interaction (HCI isthe study of how people design, implement, and useinteractive computer systems and how computers affectindividuals, organizations, and society. This encompassesnot only ease of use but also new interaction techniques forsupporting user tasks, providing better access toinformation, and creating more powerful forms ofcommunication. It involves input and output devices andthe interaction techniques that use them; how information ispresented and requested; how the computer’s actions arecontrolled and monitored; all forms of help, documentation,and training; the tools used to design, build, test, andevaluate user interfaces; and the processes that developersfollow when creating Interfaces.

  13. Fundamentals of human-computer interaction

    CERN Document Server

    Monk, Andrew F

    1985-01-01

    Fundamentals of Human-Computer Interaction aims to sensitize the systems designer to the problems faced by the user of an interactive system. The book grew out of a course entitled """"The User Interface: Human Factors for Computer-based Systems"""" which has been run annually at the University of York since 1981. This course has been attended primarily by systems managers from the computer industry. The book is organized into three parts. Part One focuses on the user as processor of information with studies on visual perception; extracting information from printed and electronically presented

  14. Neurotoxic Weapons and Syndromes.

    Science.gov (United States)

    Carota, Antonio; Calabrese, Pasquale; Bogousslavsky, Julien

    2016-01-01

    The modern era of chemical and biological warfare began in World War I with the large-scale production and use of blistering and choking agents (chlorine, phosgene and mustard gases) in the battlefield. International treaties (the 1925 Geneva Protocol, the 1975 Biological and Toxin Weapons Convention and the 1993 Chemical Weapons Convention) banned biological and chemical weapons. However, several countries are probably still engaged in their development. Hence, there is risk of these weapons being used in the future. This chapter will focus on neurotoxic weapons (e.g. nerve agents, chemical and biological neurotoxins, psychostimulants), which act specifically or preeminently on the central nervous system and/or the neuromuscular junction. Deeply affecting the function of the nervous system, these agents either have incapacitating effects or cause clusters of casualties who manifest primary symptoms of encephalopathy, seizures, muscle paralysis and respiratory failure. The neurologist should be prepared both to notice patterns of symptoms and signs that are sufficiently consistent to raise the alarm of neurotoxic attacks and to define specific therapeutic interventions. Additionally, extensive knowledge on neurotoxic syndromes should stimulate scientific research to produce more effective antidotes and antibodies (which are still lacking for most neurotoxic weapons) for rapid administration in aerosolized forms in the case of terrorist or warfare scenarios. © 2016 S. Karger AG, Basel.

  15. Human Computation An Integrated Approach to Learning from the Crowd

    CERN Document Server

    Law, Edith

    2011-01-01

    Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the Web to perform complex computation. There are various genres of human computation applications that exist today. Games with a purpose (e.g., the ESP Game) specifically target online gamers who generate useful data (e.g., image tags) while playing an enjoy

  16. Discussion on Technology and Development of Submarine Command and Control System Human-Computer Interaction%潜艇指控系统人机交互技术发展分析*

    Institute of Scientific and Technical Information of China (English)

    程飞

    2013-01-01

      介绍和分析了国外潜艇指控系统人机交互技术的发展情况和技术特点,回顾了国内潜艇指控系统人机交互手段的发展,从满足未来海军潜艇作战需求出发,对潜艇指控人机交互技术的发展进行了前瞻性分析。%In this paper,an introduction and analysis are given for general development situation and technical feature of Human-computer Interaction for foreign submarine C2 system,and then the Human-computer Interaction for domestic submarine C2 systems are reviewed briefly.In the view of satisfying operational requirement of our future submarine,we analyzed the development of Human-computer Interaction for submarine C2 system.

  17. Major weapon system environmental life-cycle cost estimating for Conservation, Cleanup, Compliance and Pollution Prevention (C3P2)

    Science.gov (United States)

    Hammond, Wesley; Thurston, Marland; Hood, Christopher

    1995-01-01

    The Titan 4 Space Launch Vehicle Program is one of many major weapon system programs that have modified acquisition plans and operational procedures to meet new, stringent environmental rules and regulations. The Environmental Protection Agency (EPA) and the Department of Defense (DOD) mandate to reduce the use of ozone depleting chemicals (ODC's) is just one of the regulatory changes that has affected the program. In the last few years, public environmental awareness, coupled with stricter environmental regulations, has created the need for DOD to produce environmental life-cycle cost estimates (ELCCE) for every major weapon system acquisition program. The environmental impact of the weapon system must be assessed and budgeted, considering all costs, from cradle to grave. The Office of the Secretary of Defense (OSD) has proposed that organizations consider Conservation, Cleanup, Compliance and Pollution Prevention (C(sup 3)P(sup 2)) issues associated with each acquisition program to assess life-cycle impacts and costs. The Air Force selected the Titan 4 system as the pilot program for estimating life-cycle environmental costs. The estimating task required participants to develop an ELCCE methodology, collect data to test the methodology and produce a credible cost estimate within the DOD C(sup 3)P(sup 2) definition. The estimating methodology included using the Program Office weapon system description and work breakdown structure together with operational site and manufacturing plant visits to identify environmental cost drivers. The results of the Titan IV ELCCE process are discussed and expanded to demonstrate how they can be applied to satisfy any life-cycle environmental cost estimating requirement.

  18. Introduction to human-computer interaction

    CERN Document Server

    Booth, Paul

    2014-01-01

    Originally published in 1989 this title provided a comprehensive and authoritative introduction to the burgeoning discipline of human-computer interaction for students, academics, and those from industry who wished to know more about the subject. Assuming very little knowledge, the book provides an overview of the diverse research areas that were at the time only gradually building into a coherent and well-structured field. It aims to explain the underlying causes of the cognitive, social and organizational problems typically encountered when computer systems are introduced. It is clear and co

  19. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

    Science.gov (United States)

    2016-04-30

    Szafran Abstract Acquisition data lay the foundational role for decision-making, management , and oversight of the weapon-systems acquisition...2015). This data- management strategy fails to address the complete managerial prerogatives of the USD(AT&L) and the Better Buying Power initiatives...with information managers and our literature review on Master Data Management found that data governance plays a key role in the success of acquisition

  20. ITER: The International Thermonuclear Experimental Reactor and the nuclear weapons proliferation implications of thermonuclear-fusion energy systems

    OpenAIRE

    Gsponer, Andre; Hurni, Jean-Pierre

    2004-01-01

    This report contains two parts: (1) A list of "points" highlighting the strategic-political and military-technical reasons and implications of the very probable siting of ITER (the International Thermonuclear Experimental Reactor) in Japan, which should be confirmed sometimes in early 2004. (2) A technical analysis of the nuclear weapons proliferation implications of inertial- and magnetic-confinement fusion systems substantiating the technical points highlighted in the first part, and showin...

  1. Into the Caves of Steel: Precaution, Cognition and Robotic Weapon Systems Under the International Law of Armed Conflict

    Directory of Open Access Journals (Sweden)

    Jonathan David Herbach

    2012-09-01

    Full Text Available

    The pace of development with respect to robotic weapons systems is staggering. Often formulated in the context of a desire of the ‘haves’ States to minimize battlefield casualties and to reduce monetary costs, technological advancement holds a number of ramifications for the law of armed conflict. Specifically, as technology introduces the possibility of increasingly autonomous forms of robotic weapon systems, the implications of augmenting precision while removing, for all intents and purposes, direct control by or involvement of human beings (‘in the loop’ must be examined, along with differentiated responsibilities of the ‘haves’ versus the ‘have-nots’. The present article takes as a foundation the international humanitarian law principle of precaution, as codified in Article 57 of Additional Protocol I, to assess various aspects of the applicability of the relevant provisions to these new weapons systems, and in particular draws conclusions as to how precaution could influence future developments.


  2. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  3. 武器装备体系需求变更管理研究%Research on Requirements Change Management of Weapon Equipment System of Systems

    Institute of Scientific and Technical Information of China (English)

    耿青霞; 杨秀月; 杨雷

    2011-01-01

    According to the characteristic of requirements change of weapon equipment system-of-systems, the paper studies the basic conception, analyzes the principle and work flows of requirements change of weapon equipment system-of-systems. Moreover, it brings forward the analysis frame of requirements change supporting theory and methods for the choice and development of the tools of requirements change management of weapon equipment system-of-systems. It is significant to implement the requirements change scientific management and enhance the quality of requirements generation of weapon equipment system-of-systems.%依据武器装备体系需求变更的特点,研究了武器装备体系需求变更管理的基本概念,分析了武器装备体系需求变更管理的原则和流程,构建了武器装备体系需求变更分析框架,为体系需求变更管理工具的选择和开发提供理论和方法支持,对实现武器装备体系需求变更的科学管理,提高需求生成的质量具有重要的理论指导意义。

  4. 48 CFR 25.301-3 - Weapons.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Weapons. 25.301-3 Section... FOREIGN ACQUISITION Contracts Performed Outside the United States 25.301-3 Weapons. The contracting officer shall follow agency procedures and the weapons policy established by the combatant commander or...

  5. 武器装备体系能力矩阵评估方法%Matrix Methodology Based Capability Evaluation of Weapon System of Systems

    Institute of Scientific and Technical Information of China (English)

    曹强; 荆涛; 周少平

    2016-01-01

    针对武器装备体系能力难以客观、定量评估的问题,引入复杂网络理论,提出了基于矩阵运算的武器装备体系能力评估方法。分析了武器装备体系能力的概念,建立了武器装备体系的复杂层次网络模型,描述了装备网络的组成、运行过程,定义了装备网络的矩阵描述方法和矩阵运算规则,提出了装备网络作战能力描述参数,给出了装备网络能力的矩阵计算方法,进行了影响因素分析,最后通过实例验证了方法可行性、有效性和灵活性。%In order to evaluate capability of weapon system of systems more objectively and quantitively,complex networks theory is introduced,and a new matrix capability evaluation methodology is put forward. The capability definitions of weapon system of systems are analyzed,a layered complex network model of weapon system of systems is built,the components and operation process of the weapon network model are also described. Then matrix expression methods of weapon network and its special calculate rules are defined,tailor-made operation capability indexes of weapon network are brought out. The algorithm of using single-layer-matrixes and inter-layer-matrixes to compute whole weapon network’s capability is present; the influence factors of the algorithm are detailly analyzed. By the case study of a nominal operation network,the feasibility,validity and flexibility of proposed methodology are proved.

  6. System and method for multi-stage bypass, low operating temperature suppressor for automatic weapons

    Science.gov (United States)

    Moss, William C.; Anderson, Andrew T.

    2015-06-09

    The present disclosure relates to a suppressor for use with a weapon. The suppressor may be formed to have a body portion having a bore extending concentric with a bore axis of the weapon barrel. An opening in the bore extends at least substantially circumferentially around the bore. A flow path communicates with the opening and defines a channel for redirecting gasses flowing in the bore out from the bore, through the opening, into a rearward direction in the flow path. The flow path raises a pressure at the opening to generate a Mach disk within the bore at a location approximately coincident with the opening. The Mach disk forms as a virtual baffle to divert at least a portion of the gasses into the opening and into the flow path.

  7. Weapon System Acquisitions: Opportunities Exist to Improve the Department of Defense’s Portfolio Management

    Science.gov (United States)

    2015-08-01

    use to plan and manage their investments. From a DOD perspective , portfolio reviews can help increase return on taxpayers’ investments in weapon...the organizations involved. However, when they want to analyze their portfolios from another perspective —for example, examining funding Page 13 GAO...who are to develop capability portfolio strategic plans, provide cross-component perspectives , recommend capability priorities to senior decision

  8. Improving the Effectiveness and Acquisition Management of Selected Weapon Systems: A Summary of Major Issues and Recommended Actions.

    Science.gov (United States)

    1982-05-14

    delayed until after the production decision. A prime operational issue is the missile’s motor which pro- duces significant amounts of smoke under many...humidity and tempera- ture conditions. The smoke makes the launch helicopter more visible to the enemy. In addition, it can obscure the crew’s field of...Payload Remain Unresolved MASAD-81-24 04/06/81 An Assesment of the Navy’s Mine Warfare Mission (SECRET) C-MASAD-81-13 04/30/81 Aquiring Weapon Systems in

  9. Human computer interaction using hand gestures

    CERN Document Server

    Premaratne, Prashan

    2014-01-01

    Human computer interaction (HCI) plays a vital role in bridging the 'Digital Divide', bringing people closer to consumer electronics control in the 'lounge'. Keyboards and mouse or remotes do alienate old and new generations alike from control interfaces. Hand Gesture Recognition systems bring hope of connecting people with machines in a natural way. This will lead to consumers being able to use their hands naturally to communicate with any electronic equipment in their 'lounge.' This monograph will include the state of the art hand gesture recognition approaches and how they evolved from their inception. The author would also detail his research in this area for the past 8 years and how the future might turn out to be using HCI. This monograph will serve as a valuable guide for researchers (who would endeavour into) in the world of HCI.

  10. The Quantum Human Computer (QHC) Hypothesis

    Science.gov (United States)

    Salmani-Nodoushan, Mohammad Ali

    2008-01-01

    This article attempts to suggest the existence of a human computer called Quantum Human Computer (QHC) on the basis of an analogy between human beings and computers. To date, there are two types of computers: Binary and Quantum. The former operates on the basis of binary logic where an object is said to exist in either of the two states of 1 and…

  11. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    UNCLASSIFIED UNCLASSIFIED Application of a Dynamic Programming Algorithm for Weapon Target Assignment Lloyd Hammond Weapons and...Combat Systems Division Defence Science and Technology Group DST Group-TR-3221 ABSTRACT Threat evaluation and weapon assignment...dynamic programming algorithm for Weapon Target Assignment which, after more rigorous testing, could be used as a concept demonstrator and as an auxiliary

  12. The epistemology and ontology of human-computer interaction

    NARCIS (Netherlands)

    Brey, Philip

    2005-01-01

    This paper analyzes epistemological and ontological dimensions of Human-Computer Interaction (HCI) through an analysis of the functions of computer systems in relation to their users. It is argued that the primary relation between humans and computer systems has historically been epistemic: computer

  13. 机载激光武器系统作战应用分析%Operational Application Analysis of Airborne Laser Weapon System

    Institute of Scientific and Technical Information of China (English)

    余驰; 张立群

    2011-01-01

    机载激光武器系统是一种应用于现代战机的高能激光武器系统.介绍了机载激光武器系统组成、工作原理和特点,对机载激光武器系统的作战应用进行了研究和分析.分析了机载激光武器系统的关键技术及其应用所需要解决的技术问题.通过研究和分析提出了一些未来机载激光武器系统作战应用的思考和建议.%Airborne laser weapon system is one of the high energy laser weapon systems which is used in modem fighting aircraft. Composition、work principle and characteristics of airbome laser weapon system were introduced in the paper,operational application was studied and analyzed. Key technology of airborne laser weapon system was analyzed; its technology problem must solve in application was analyzed. Passing study and analysis, some considerations and suggestions of operational application are presented on future airborne laser weapon system.

  14. Automatic Checkout System for Ground Electronics of a Weapon System (Short Communication

    Directory of Open Access Journals (Sweden)

    V. Ashok Kumar

    1997-04-01

    Full Text Available An automatic checkout system (ACOS designed and developed for a surface-to-air missile system is described. The system has a built-in self-check and has been extensively used for checking faults in the subsystems of ground electronics. It has resulted in saving a lot of effort in quickly diagnosing and rectifying faults. The salient features of the ACOS have been described and the scope for further work in this area has been outline.

  15. Use of non-petroleum fuels to reduce military energy vulnerabilities: self-sufficient bases and new weapon propulsion systems

    Energy Technology Data Exchange (ETDEWEB)

    Freiwald, D.A.

    1980-01-01

    The US fossil synfuels program may not have significant impact on domestic fuel supplies until near the year 2000, resulting in a continuing mobility fuels vulnerability for the US military until then. But there are other mobility fuel options for both propulsion systems and stationary base-energy sources, for which the base technology is commercially available or at least demonstrated. For example, for surface propulsion systems, hydrogen-fuel-cell/battery-electric hybrids may be considered; for weapons systems these may offer some new flexibilities, standardization possibilities, and multiple military-controlled fuel-supply options. Hydrogen-fueled aircraft may provide interesting longer-term possibilities in terms of military energy self-sufficiency and multiple supply options, as well as performance specifications. These scenarios will be discussed, along with possibilities for demonstrations in the MX-system ground vehicles.

  16. Summarizing of Development of Interface of Shipboard Gun Weapon System%舰炮武器系统人机界面发展综述

    Institute of Scientific and Technical Information of China (English)

    汪汇川; 赵晓哲

    2012-01-01

    The progress of Interface of shipboard gun weapon system is discussed. The circumstances and characteristics of interface of shipboard gun weapon system in start-up period, foundation period and development period is described. The development of describing and studying the interface of new shipboard gun weapon system will be open, intelligent, based on virtual reality and scientific evaluation finally.%探讨了舰炮武器系统人机界面发展历程,详述舰炮武器系统人机界面经历了初创期、奠基期和发展期三个阶段的情况与特点.最后对新型舰炮武器系统人机界面设计与研究将向开放式、智能化、虚拟现实和科学评佶方向发展作了展望.

  17. Handling emotions in human-computer dialogues

    CERN Document Server

    Pittermann, Johannes; Minker, Wolfgang

    2010-01-01

    This book presents novel methods to perform robust speech-based emotion recognition at low complexity. It describes a flexible dialogue model to conveniently integrate emotions and other dialogue-influencing parameters in human-computer interaction.

  18. Cooperation in human-computer communication

    OpenAIRE

    Kronenberg, Susanne

    2000-01-01

    The goal of this thesis is to simulate cooperation in human-computer communication to model the communicative interaction process of agents in natural dialogs in order to provide advanced human-computer interaction in that coherence is maintained between contributions of both agents, i.e. the human user and the computer. This thesis contributes to certain aspects of understanding and generation and their interaction in the German language. In spontaneous dialogs agents cooperate by the pro...

  19. Tracking system to maximize the engagement envelope of a data linked weapon

    Science.gov (United States)

    Davies, James M.; Ralph, Jason F.; Oxtoby, Neil P.

    2011-06-01

    This paper presents the results of an integrated target tracking, pursuit and intercept strategy. It is designed to maximize the overlap between the engagement envelope of a data linked weapon and the possible predicted locations of an agile target. Once the target track has been initialized, a Markov Model calculates all possible locations of the target up to the time of intercept, approximately 30 seconds from launch. These locations and associated probabilities are updated during the tracking process. This includes target maneuvers, which are detected using an IMM estimator. The engagement envelope is maximized at fixed points in time. In doing so the intercept decision is delayed until, there is a high probability of a successful interception.

  20. Research on Inferring ELECTRE-III’s Parameters with Fuzzy information and A Case on Naval Gun Weapon System Integration

    Directory of Open Access Journals (Sweden)

    Sun Shi Yan

    2016-01-01

    Full Text Available Multiple attributes decision making (MADM method is an important measure for system integration. Robustness analysis on MADM is a hotspot in these years which wins academe’s great attention, and is supposed to be an effective way when countering imperfect information. Setting parameters in ELECTRE-III’s is a vital and difficult step. In this paper, a method of inferring ELECTRE-III’s parameters with fuzzy information based on robustness analysis is presented. First, ELECTRE-III is transformed into a continuous smooth function of each parameter vector. Then, robustness analysis structure and a parameters inferring algorithm are provided by maximizing robustness margin based on mathematics programming. Moreover, how to resolve the programming problem is also discussed. At last, a illustrative example of Naval Gun Weapon System Integration is put forward.

  1. Human Computer Interface Design Criteria. Volume 1. User Interface Requirements

    Science.gov (United States)

    2010-03-19

    2 entitled Human Computer Interface ( HCI )Design Criteria Volume 1: User Interlace Requirements which contains the following major changes from...MISSILE SYSTEMS CENTER Air Force Space Command 483 N. Aviation Blvd. El Segundo, CA 90245 4. This standard has been approved for use on all Space and...and efficient model of how the system works and can generalize this knowledge to other systems. According to Mayhew in Principles and Guidelines in

  2. Development Analysis of Airborne Weapon Control System%机载武器控制系统的发展分析

    Institute of Scientific and Technical Information of China (English)

    李国柱

    2014-01-01

    机载武器控制系统在现代战争中发挥着越来越重要的作用。文章介绍了机载武器控制系统的发展历程以及装备的研制、改进情况,指出了在现代战争中发展机载武器控制系统的优势和重要性,重点探讨了几种机载武器控制系统的性能及其特点,最后论述了机载武器控制系统的发展动向与分析。%Airborne weapon control system plays more and more roles in the war today .The process of development of the Airborne weapon control system abroad and equipment in some countries in the world and its modification are described . The technique performance and properties of several airborne weapon control system seekers are analyzed ;and development trend and analysis of airborne weapon control system are discussed .

  3. New weapons and the arms race

    Energy Technology Data Exchange (ETDEWEB)

    Tsipis, K.

    1983-01-01

    In speaking about technologies that could further animate the weapons competition between the US and the USSR, it is useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, and can best be described by the tasks that they can perform rather than any specific weapons' application. The author discusses these in reverse order.

  4. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  5. A Ground Network Micro-Weapon System%一种地面网域化微武器系统

    Institute of Scientific and Technical Information of China (English)

    胡美艳; 杨卫; 徐薇; 岳元

    2011-01-01

    A ground network micro-weapon system is a new concept high-performance micro-smart weapon which proposed in this paper.It bases on wireless sensor network, integrates with perception,identification, location and attack.It is a sense of the battlefield area, can automatic identify and locate the person and vehicles target; complete preparations for battlefield reconnaissance and attack; it can make use of wireless sensor network to communicate, compose a group of micro-combat units to be some clusters in multi-mode coordinated attack ; it will play an important role in the fortress defense, the resident duty,border control and counter-terrorism operation.%基于无线传感器网络,集感知、识别、定位、攻击于一体的地面网域化微武器系统,提出的一种全新概念的高性能微型智能武器.能感知网域内战场态势,自动对人员、车辆目标识别和定位,完成战场侦察和攻击准备;能利用网络进行通讯,将一群微战斗单元组成若干个簇来对目标实施多模协同攻击;将在要塞防御、驻地值勤、边防职守以及反恐作战等方面发挥重要作用.

  6. Research on demonstration methodology for system of systems on weapon and equipment%关于武器装备体系论证方法的思考

    Institute of Scientific and Technical Information of China (English)

    魏继才; 崔颢; 任庭光; 董杰

    2011-01-01

    Characteristic of development and demonstration for system of systems on weapon and equipment were analyzed. Issue of demonstration was also analyzed. Demonstration methodology for system of systems on weapon and equipment was built based on the analysis means and methods. This could be adapted for development of system of systems on weapon and equipment in information age. The essential characteristics of stratagem research are discussed and the stratagem research methodology is brought forward and constructed. Then under the guidance of the combination of qualitative and quantitative methods, the meta-synthetic integrated environment of stratagem research is designed, realized and applied to solve the stratagem research problem.%针对武器装备体系建设的特点,简述了目前武器装备体系论证特点和存在的方法问题.通过分析武器装备体系论证手段,剖析武器装备体系论证方法,提出应合理建立武器装备体系论证方法体系,形成武器装备体系论证方法论,以适应在信息化条件下武器装备体系建设的论证要求.依据上述方法论结合武器装备体系论证的特点,建立了软件综合集成环境,环境中每个软件工具或软件分系统,可根据不同论证任务,灵活形成针对该论证任务的软件环境,以满足相应论证任务的需要,体现定性分析与定量评估相结合.

  7. Weapons Acquisition. Processes of Selected Foreign Government.

    Science.gov (United States)

    1986-02-01

    period from 1977 to 1985: (1) 5.56mm calibre assault rifle. (2) Milan and Hot antitank weapon systems. (3) Roland ground-to-air weapon system. (4) AMX 30...and standardization edicts . Awards and penalties are laid on accordingly. (7/17, 13/20) The ministries stand apart from one another in the same way

  8. 鱼雷作战效能评估方法分析%Analysis of Evaluation Model for Torpedo Weapon System

    Institute of Scientific and Technical Information of China (English)

    宋保维; 宋晓茹; 毛昭勇

    2012-01-01

    The torpedo weapon systems with high operational effectiveness have been playing a decisive role in the modern warfare under high-tech conditions. The paper describes the definition for torpedo weapon operational effectiveness. Some key researches are paid to introduce several typical newly analysis and evaluation methods for torpedo weapon systems, which is along with the characteristic and many dedicated applications of each method discussed. Finally, the existing problems of the operational effectiveness evaluations for torpedo weapon operational effectiveness analyses and evaluation are pointed out, and the development trends of it have been prospected.%高作战效能的鱼雷武器装备系统在现代高技术战争中起着决定性作用.给出了鱼雷作战效能定义,重点对比几种典型新颖的鱼雷武器系统作战效能分析方法,并讨论了各自的特点和适用场合.最后提出了当前鱼雷武器作战效能评估的现存问题,并对其研究领域的发展方向作了展望.

  9. Investigation on scalable high-power lasers with enhanced 'eye-safety' for future weapon systems

    Science.gov (United States)

    Bigotta, S.; Diener, K.; Eichhorn, M.; Galecki, L.; Geiss, L.; Ibach, T.; Scharf, H.; von Salisch, M.; Schöner, J.; Vincent, G.

    2016-10-01

    The possible use of lasers as weapons becomes more and more interesting for military forces. Besides the generation of high laser power and good beam quality, also safety considerations, e. g. concerning eye hazards, are of importance. The MELIAS (medium energy laser in the "eye-safe" spectral domain) project of ISL addresses these issues, and ISL has developed the most powerful solid-state laser in the "eye-safe" wavelength region up to now. "Eye safety" in this context means that light at a wavelength of > 1.4 μm does not penetrate the eye and thus will not be focused onto the retina. The basic principle of this technology is that a laser source needs to be scalable in power to far beyond 100 kW without a significant deterioration in beam quality. ISL has studied a very promising laser technology: the erbium heat-capacity laser. This type of laser is characterised by a compact design, a simple and robust technology and a scaling law which, in principle, allows the generation of laser power far beyond megawatts at small volumes. Previous investigations demonstrated the scalability of the SSHCL and up to 4.65 kW and 440 J in less than 800 ms have been obtained. Opticalto- optical efficiencies of over 41% and slope efficiencies of over 51% are obtained. The residual thermal gradients, due to non perfect pumping homogeneity, negatively affect the performance in terms of laser pulse energy, duration and beam quality. In the course of the next two years, ISL will be designing a 25 to 30 kW erbium heat-capacity laser.

  10. 基于多屏协同的智能电视人机交互系统%SMART TV HUMAN-COMPUTER INTERACTION SYSTEM BASED ON MULTI-SCREEN COLLABORATION

    Institute of Scientific and Technical Information of China (English)

    黄兴旺; 孙鹏; 韩锐; 刘春梅

    2016-01-01

    基于多屏协同的智能电视人机交互系统定义了移动设备对智能电视的远程操控和文本输入的通信机制,以解决用户对智能电视的操作不灵活的问题,尤其改善用户的文本输入操作体验。该通信机制稳定、可扩展性强,适用于不同平台的远程操控和文本输入需求。该系统基于 UPnP 协议实现了快速连接移动设备和智能电视,并且以 Android 系统广播机制和输入机制为依据,提出了基于虚拟驱动的输入扩展机制,达到了原生鼠标键盘事件的效果,实现了利用移动设备对智能电视进行交互控制的设计。实验证明,该人机交互系统,具有无缝连接、操作简单的优点,尤其适合用户进行文本输入操作。%The smart TV human-computer interaction system based on multi-screen collaboration defines a communication mechanism for mobile devices in regard to remote control and text input on smart TV so as to solve the problem that user’s control on smart TV is not flexible,in particular to improve user’s experience of text inputting operation.This mechanism is stable and has high scalability,and is suitable for the requirement of remote control and text input on different platforms.Based on UPnP protocol the system implements fast connection on mobile devices and smart TV,and presents the virtual drive-based input extension mechanism based on Android system broadcast mechanism and input mechanism,this achieves the effect of the native mouse and keyboard events,thus realises the design of using mobile devices to interactively control smart TV.Experiments show that this human-computer interaction system has the advantages of seamless connectivity and simple operation,and is particularly suitable for users in text input operation.

  11. Analysis of laser energy characteristics of laser guided weapons based on the hardware-in-the-loop simulation system

    Science.gov (United States)

    Zhu, Yawen; Cui, Xiaohong; Wang, Qianqian; Tong, Qiujie; Cui, Xutai; Li, Chenyu; Zhang, Le; Peng, Zhong

    2016-11-01

    The hardware-in-the-loop simulation system, which provides a precise, controllable and repeatable test conditions, is an important part of the development of the semi-active laser (SAL) guided weapons. In this paper, laser energy chain characteristics were studied, which provides a theoretical foundation for the SAL guidance technology and the hardware-in-the-loop simulation system. Firstly, a simplified equation was proposed to adjust the radar equation according to the principles of the hardware-in-the-loop simulation system. Secondly, a theoretical model and calculation method were given about the energy chain characteristics based on the hardware-in-the-loop simulation system. We then studied the reflection characteristics of target and the distance between the missile and target with major factors such as the weather factors. Finally, the accuracy of modeling was verified by experiment as the values measured experimentally generally follow the theoretical results from the model. And experimental results revealed that ratio of attenuation of the laser energy exhibited a non-linear change vs. pulse number, which were in accord with the actual condition.

  12. Speech Dialogue with Facial Displays Multimodal Human-Computer Conversation

    CERN Document Server

    Nagao, K; Nagao, Katashi; Takeuchi, Akikazu

    1994-01-01

    Human face-to-face conversation is an ideal model for human-computer dialogue. One of the major features of face-to-face communication is its multiplicity of communication channels that act on multiple modalities. To realize a natural multimodal dialogue, it is necessary to study how humans perceive information and determine the information to which humans are sensitive. A face is an independent communication channel that conveys emotional and conversational signals, encoded as facial expressions. We have developed an experimental system that integrates speech dialogue and facial animation, to investigate the effect of introducing communicative facial expressions as a new modality in human-computer conversation. Our experiments have shown that facial expressions are helpful, especially upon first contact with the system. We have also discovered that featuring facial expressions at an early stage improves subsequent interaction.

  13. Unmanned Surface Vehicle Human-Computer Interface for Amphibious Operations

    Science.gov (United States)

    2013-08-01

    FIGURES Figure 1. MOCU Baseline HCI using Both Aerial Photo and Digital Nautical Chart ( DNC ) Maps to Control and Monitor Land, Sea, and Air...Action DNC Digital Nautical Chart FNC Future Naval Capability HCI Human-Computer Interface HRI Human-Robot Interface HSI Human-Systems Integration...Digital Nautical Chart ( DNC ) Maps to Control and Monitor Land, Sea, and Air Vehicles. 3.2 BASELINE MOCU HCI The Baseline MOCU interface is a tiled

  14. Applying Human Computation Methods to Information Science

    Science.gov (United States)

    Harris, Christopher Glenn

    2013-01-01

    Human Computation methods such as crowdsourcing and games with a purpose (GWAP) have each recently drawn considerable attention for their ability to synergize the strengths of people and technology to accomplish tasks that are challenging for either to do well alone. Despite this increased attention, much of this transformation has been focused on…

  15. Deep architectures for Human Computer Interaction

    NARCIS (Netherlands)

    Noulas, A.K.; Kröse, B.J.A.

    2008-01-01

    In this work we present the application of Conditional Restricted Boltzmann Machines in Human Computer Interaction. These provide a well suited framework to model the complex temporal patterns produced from humans in the audio and video modalities. They can be trained in a semisupervised fashion and

  16. Cleanup worker exposures to hazardous chemicals at a former nuclear weapons plant: piloting of an exposure surveillance system.

    Science.gov (United States)

    LaMontagne, A D; Van Dyke, M V; Martyny, J W; Ruttenber, A J

    2001-02-01

    Cleanup of former U.S. Department of Energy (DOE) nuclear weapons production facilities involves potential exposures to various hazardous chemicals. We have collaboratively developed and piloted an exposure database and surveillance system for cleanup worker hazardous chemical exposure data with a cleanup contractor at the Rocky Flats Environmental Technology Site (RFETS). A unique system feature is the incorporation of a 34-category work task-coding scheme. This report presents an overview of the data captured by this system during development and piloting from March 1995 through August 1998. All air samples collected were entered into the system. Of the 859 breathing zone samples collected, 103 unique employees and 39 unique compounds were represented. Breathing zone exposure levels were usually low (86% of breathing zone samples were below analytical limits of detection). The use of respirators and other exposure controls was high (87 and 88%, respectively). Occasional high-level excursions did occur. Detailed quantitative summaries are provided for the six most monitored compounds: asbestos, beryllium, carbon tetrachloride, chromium, lead, and methylene chloride. Task and job title data were successfully collected for most samples, and showed specific cleanup activities by pipe fitters to be the most commonly represented in the database. Importantly, these results demonstrate the feasibility of the implementation of integrated exposure database and surveillance systems by practicing industrial hygienists employed in industry as well as the preventive potential and research uses of such systems. This exposure database and surveillance system--the central features of which are applicable in any industrial work setting--has enabled one of the first systematic quantitative characterizations of DOE cleanup worker exposures to hazardous chemicals.

  17. Visual Interpretation Of Hand Gestures For Human Computer Interaction

    Directory of Open Access Journals (Sweden)

    M.S.Sahane

    2014-01-01

    Full Text Available The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI. In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This discussion is organized on the basis of the method used for modeling, analyzing, and recognizing gestures. We propose pointing gesture-based large display interaction using a depth camera. A user interacts with applications for large display by using pointing gestures with the barehand. The calibration between large display and depth camera can be automatically performed by using RGB-D camera.. We also discuss implemented gestural systems as well as other potential applications of vision-based gesture recognition. We discuss directions of future research in gesture recognition, including its integration with other natural modes of human computer interaction.

  18. A Model for Operational Efficiency Evaluation of Air-defense Weapon System%地面防空武器系统的效能评估模型

    Institute of Scientific and Technical Information of China (English)

    姜广顺

    2012-01-01

    作战系统服务能力是衡量其作战效能的重要指标,结合现代作战系统的特点,运用排队论原理,建立了一种地面防空武器系统效能评估模型,确定了武器系统作为随机服务系统的主要性能指标,包括目标突防概率、目标杀伤概率、占用射击通道的平均数、射击通道占用概率和武器系统效率等.示例计算分析显示,该模型与外部条件和地面防空武器系统的综合特性密切相关,对辅助指挥员决策有一定的参考价值.%The combat system' s service capability is one of the important factors of its operational efficiency. Based on the characteristics of modern combat system, a model for operational efficiency evaluation of air-defense weapon system was established by applying basic principle of queuing theory. The main features of air-defense weapon system as a random service system were defined, such as target penetration probability, target kill probability, the average number of occupying the firing channel, shooting channel occupancy probability and weapon system efficiency and so on. The analysis and calculation to an example showed that this model was closely related to the external conditions and all-round property of air-defense weapon system, and could be taken as a reference for aiding decision-making for commanders.

  19. Effectiveness Evaluation of Weapon System Supported by Data Link%数据链支持下的武器系统评估体系研究

    Institute of Scientific and Technical Information of China (English)

    王磊; 曹龙

    2014-01-01

    Aimed at the problems that effectiveness evaluation of weapon system supported by data link are cost high,time-consuming and on single weapon system. Operation Domain theory is quoted to build up a common effectiveness evaluation system of Weapon System Supported by Data Link,which combined with index system and integrated evaluation method. This system effectively solves the problems which evaluation object is various,man in loop facts are multiple and qualitative index lacks quantized method,which also provided a reliable way to evaluated effectiveness of weapon system supported by data link.%结合数据链作战使用需求,针对国外采用统计法评估数据链系统代价高、费时和针对单一兵器系统的问题。创新性地将作用域原则引入WSSDL作战效能评估体系过程中,完成了基于作用域的指标体系构建和综合评估方法设计工作,首次有效地解决了数据链支持下武器系统的评估对象多样化、人在回路因素多、定性指标缺乏量化手段的问题,为数据链支持下的武器系统作战效能评估提供了可靠手段和方法。

  20. Analysis of army-wide hearing conservation database for hearing profiles related to crew-served and individual weapon systems

    Directory of Open Access Journals (Sweden)

    William A Ahroon

    2011-01-01

    Full Text Available Damage-risk criteria (DRC for noise exposures are designed to protect 95% of the exposed populations from hearing injuries caused by those noise exposures. The current DRC used by the US military follows OSHA guidelines for continuous noise. The current military DRC for impulse exposures follows the recommendations from the National Academy of Sciences - National Research Council Committee on Hearing, Bioacoustics, and Biomechanics (CHABA and are contained in the current military standard, MIL-STD-1474D "Noise Limits." Suggesting that the MIL-STD for impulse exposure is too stringent, various individuals have proposed that the DRC for exposure to high-level impulses be relaxed. The purpose of this study is to evaluate the current hearing status of US Army Soldiers, some of whom can be, by their military occupational specialties (MOS, reasonably expected to be routinely exposed to high-level impulses from weapon systems. The Defense Occupational and Environmental Health Readiness System - Hearing Conservation (DOEHRS-HC was queried for the hearing status of enlisted Soldiers of 32 different MOSs. The results indicated that less than 95% of the Soldiers in the DOEHRS-HC database were classified as having normal hearing. In other words, the goal of the DRC used for limiting noise injuries (from continuous and impulse exposures was not stringent enough to prevent hearing injuries in all but the most susceptible Soldiers. These results suggest that the current military noise DRC should not be relaxed.

  1. 36 CFR 13.30 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 13... INTERIOR NATIONAL PARK SYSTEM UNITS IN ALASKA General Provisions § 13.30 Weapons, traps and nets. (a... of this chapter, the following are prohibited— (1) Possessing a weapon, trap, or net; (2) Carrying a...

  2. 50 CFR 27.43 - Weapons other than firearms.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Weapons other than firearms. 27.43 Section... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Weapons § 27.43 Weapons other than firearms. The use or possession of cross bows, bows and arrows, air guns, spears, gigs...

  3. The Trend of Missile-Gun Combined Weapon System for Aerial Defense%弹炮结合防空武器系统新趋势

    Institute of Scientific and Technical Information of China (English)

    陈薇; 王军

    2016-01-01

    Since the Kosovo War started to use a form of simple air raids and counter-air raids,a increasing number of wars use air raids to attack the enemy,so how to defense the enemy in the air become more and more important. Missile-Gun combined weapon system not only has a big air defense area but also has a high effective-cost,so it will become the trend of air defense weapon system. This paper describes the structure and classification of Missile-Gun combined weapon system,and analyzes the advantages and disadvantages of the current systems; finally the trend of Missile-Gun combined weapon system is proposed.%自从科索沃战争开创了单纯空袭作战与反空袭作战的先例之后,空袭就成为了战争的焦点,如何更好地抵御空中目标的来袭成为各国战争防御的主题。弹炮结合防空武器系统具有防空区域大、效费比高等优点,是防空武器系统的发展趋势之一。在分析现有典型弹炮结合防空武器系统的基础上,依据弹炮结合武器系统是否共用火控系统将其分为弹炮混编式和弹炮同控式两种形式;随后,结合现代空袭的特点提出了弹炮结合武器系统的发展趋势。

  4. 某武器系统阵地通话器的设计%Design of Technology for Intercom in the Some Weapon System

    Institute of Scientific and Technical Information of China (English)

    王原会; 王桂兰; 彭涛; 孔祥善

    2014-01-01

    Features of the intercom associated with some weapon system are introduced in the paper, options and design based on PBL3764 (SLIC),composition of the independent system and effects on application of PBL3764 to the weapon system are explored as well. Effectiveness of the weapon system coordination is enhanced due to reliability and effectiveness of the key technology.%介绍了配套某武器系统阵地通话器的主要技术与功能要求,探讨了其关键技术用户电路PBL3764(SLIC)的选型设计,及其PBL3764应用在该武器系统的效果,阐述了该阵地通话器通信系统,提高了阵地式武器系统协调的效能,以及通信系统的独立构成功能。

  5. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  6. A Glance into the Future of Human Computer Interactions

    CERN Document Server

    Farooq, Umer; Nazir, Sohail

    2011-01-01

    Computers have a direct impact on our lives nowadays. Human's interaction with the computer has modified with the passage of time as improvement in technology occurred the better the human computer interaction became. Today we are facilitated by the operating system that has reduced all the complexity of hardware and we undergo our computation in a very convenient way irrespective of the process occurring at the hardware level. Though the human computer interaction has improved but it's not done yet. If we come to the future the computer's role in our lives would be a lot more rather our life would be of the artificial intelligence. In our future the biggest resource would be component of time and wasting time for a key board entry or a mouse input would be unbearable so the need would be of the computer interaction environment that along with the complexity reduction also minimizes the time wastage in the human computer interaction. Accordingly in our future the computation would also be increased it would n...

  7. A Glance into the Future of Human Computer Interaction

    CERN Document Server

    Farooq, Umer; Nazir, Sohail

    2011-01-01

    Computers have a direct impact on our lives nowadays. Human's interaction with the computer has modified with the passage of time as improvement in technology occurred the better the human computer interaction became. Today we are facilitated by the operating system that has reduced all the complexity of hardware and we undergo our computation in a very convenient way irrespective of the process occurring at the hardware level. Though the human computer interaction has improved but it's not done yet. If we come to the future the computer's role in our lives would be a lot more rather our life would be of the artificial intelligence. In our future the biggest resource would be component of time and wasting time for a key board entry or a mouse input would be unbearable so the need would be of the computer interaction environment that along with the complexity reduction also minimizes the time wastage in the human computer interaction. Accordingly in our future the computation would also be increased it would n...

  8. Geometrical configurations of unphased diffraction-limited antennas in passive millimetre-wave imaging systems for concealed weapon detection

    Science.gov (United States)

    Serenelli, Roberto

    2004-12-01

    This paper analyzes simple imaging configurations to scan a human body, suitable as passive or active millimetre-wave imaging systems for concealed weapon detection (CWD). The first cylindrical configuration allows a 360 degrees scan: N unphased diffraction-limited antennas each of size L are placed on a circular support surrounding the subject (allowing scanning in the horizontal plane with N non-overlapping independent beams), and this circle is mechanically displaced over the whole body height. An analytical formula gives the maximum obtainable spatial resolution for different dimensions of the circular scanning device and operating frequencies, and the number of receivers achieving this optimal resolution. Constraints to be taken into account are diffraction, the usable total length of the circle, and the full coverage by the N beams over the subject, which is modelled as a cylinder with variable radius, coaxial with the scanning circle. Numerical calculations of system resolution are shown for different operating microwave (MW) and millimetre-wave (MMW) frequencies; in order to study off-axis performances, situations where the subject is not coaxial with the scanning device are also considered. For the case of a parallelepiped to be imaged instead of a cylinder, a linear array configuration is analyzed similarly to the circular one. A theoretical study is carried out to design other curved arrays, filled with unphased diffraction-limited antennas, for the imaging of linear subjects with finer resolution. Finally, the application of such configurations is considered for the design of active imaging systems, and different system architectures are discussed.

  9. Device 2F112 (F-14A WST (Weapon System Trainers)) Instructor Console Review.

    Science.gov (United States)

    1983-12-01

    Cockpit Section- Trainee Station, b. Instructor Operator Station (OS), c. Computer System, d. Wide-Angle Visual System (WAVS), e. Auxiliary Systems. The...d) Printer 2) TRAINEE AREA 3) HYDRAULIC POWFR ROOM 4) ELEC. POWER/AIR COMPRESSORS 5) COMPUTER/PERIPHERAL AREA Figure 1. Device 2FI12 general layout...l-" ._, .: < .’ --.,,.. .’ ., . .,. - NAVTRAEQUIPCEN 81-M-1121-1 • )I,1(Immendat ion 15. MO Billet. The Mission Operator has ;,tit v,,n elt ctive

  10. Vessel Weapon System Baseline Deviation Analysis Based on ANSYS%基于ANSYS的舰船武器装备基准变化分析方法

    Institute of Scientific and Technical Information of China (English)

    张磊; 王安国; 李辉

    2013-01-01

    Vessel weapon system baseline deviation caused by external condition affects attack accuracy. The finite element model is constructed by ANSYS. 3D wave loads calculation method is used to simulate the wave force in sailing condition. Vessel weapon system baseline deviation in the case of two limit sea conditions is researched. The simulation result indicates that vessel weapon system baseline deviation of certain vessel structure of this text is remarkable in the rolling condition and the weapon baseline near stem and broadside has a tremendous influence. Therefore this certain vessel should be sailing a-gainst wave while it carries out combat duty in order to decrease the influence of rolling.%舰船武器装备基准在外界因素作用下产生变化,从而影响武器系统的打击精度.应用ANSYS平台建立舰船有限元模型,利用三维波浪载荷的计算方法模拟航行条件下舰船所受载荷,研究了舰船甲板面武器装备基准在两种极限海况下的变化情况.仿真结果表明:针对所选取的某型舰船主体结构而言,舰船横摇使武器装备基准产生较大的变化,并且靠近船体尾部和两舷位置处装备的基准变化较为显著,所以该型舰船在执行作战任务中,应尽量采取顶浪航行,减小舰船横摇对武器装备基准的影响.

  11. Study of System United Integration to Weapon Equipment%信息化武器装备系统综合集成研究

    Institute of Scientific and Technical Information of China (English)

    范海文; 李建伟; 王世尧

    2014-01-01

    The transformation of weapon equipment from mechanization to information demand system united integration technique. This pager explain the meaning of united Integration and the specialties for weapon equipment,give some way and suggest according as experience too.%武器装备由机械化向信息化的转型需要应用综合集成技术。论述了综合集成的内涵及信息化武器装备系统综合集成的必要性、特点和原则,并结合所从事项目的实践,提出系统综合集成的一些方法和几点建议。

  12. The CCTC Quick-Reacting General War Gaming System (QUICK) Users Manual. Volume 3. Weapon Allocation Subsystem

    Science.gov (United States)

    1978-04-15

    a weapon group with multiple independently targetable reentry veh.cles (ZIRV) i. atich a manner that there are no feasible footprints that towr that...PLANSET) 0Index numberDesignator code/country location code/flag code Task/subtask ~Target multiplicity ~Target latitude %1 Target longitude §Depenetration... alteracions or other change;. Input to the ALOCV modul. A;- noted in 3.1.1.1 above the Weapon/Target Data 1l!e is creAted without refer- ence to these execution

  13. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2014-01-03

    William Potter , and Nikolai Sokov, Reducing and Regulating Tactical (Nonstrategic) Nuclear Weapons in Europe, The James Martin Center For...See William C. Potter and Nikolai Sokov, “Nuclear Weapons that People Forget,” International Herald Tribune, May 31, 2000. 87 Sam Nunn, Igor...their security.97 94 Kent Harris , “NATO Allies Want U.S. Nuclear Weapons out of Europe

  14. 信息化武器装备系统中的软件思维%Software Thought in Information Weapon Equipment System

    Institute of Scientific and Technical Information of China (English)

    顾滨兵; 刘庆峰; 于慧媛

    2012-01-01

    It is well known that the software is very important under the information environment, but profound infection to weapon equipment system of weapon equipment software must think much of not only in the area of function and technology, but also in the thought area. After making logical relation of software and hardware clearly and researching infection of software in thought layer, apprehends weapon equipment system in software point of view, and is cognizant of software's function like spirit.%在信息化条件下,重视软件成为共识,但是重视装备软件不仅是在功能技术层面上,还应在思维层面上审视其对武器装备系统的思想内涵和发展思路的深刻影响.从武器装备系统中软硬件的逻辑关系出发,研究软件如何从思维层面影响现代武器装备系统,可以更好地从软件的视角上去理解和把握武器装备系统,真正认识到软件的“灵魂”作用.

  15. On Development of Fire Control System for Neutralizing Weapon%压制兵器火控系统发展趋势

    Institute of Scientific and Technical Information of China (English)

    荆玉焕; 王秀春; 张振华

    2012-01-01

    On the basis of status quo of the digitalized fire control for the neutralizing weapon in China and development trend of the modern weapon systems in the overseas, the developing trend of the neutralizing weapon is discussed and analyzed, technical characteristics of the new generation of the fire netted,intelligent and integrated fire control system.%在目前国内压制兵器数字化火控系统发展现状的基础上,根据世界先进武器装备系统的发展趋势,总结分析压制兵器的发展趋势,并归纳提炼出新一代或控股系统的技术特征.为研制出具有信息化、网络化、智能化、一体化火控系统的炮兵武器装备进行理论探索.

  16. Research on Quantization System of Weapon Equipment Combat Capability%武器装备作战能力量化体系

    Institute of Scientific and Technical Information of China (English)

    陈国社; 马亚平

    2011-01-01

    Weapon equipmen combat capability quantity is a primary data engineering in the field of war game.As the basic element of weapon equipmen combat capability , "five kinds capability" is decomposed into some factors reasonably.Through the scientific and reasonable partition of weapon equipmen combat capability quantization level, the framework of weapon equipmen combat capability quantization is set up.Finally, the main works and interrelated methods about index system setting up and model system designing is introduced simply.%武器装备作战能力量化问题是现代作战模拟领域的一项基础数据工程.以"五力"为武器装备作战能力的基本构成要素,对其适度分解,形成了武器装备作战能力内涵较为全面、详细的描述.对武器装备作战能力量化层次进行了科学、合理划分,确定了武器装备作战能力各分量的首要量化层次,形成了武器装备作战能力量化体系结构.介绍了武器装备作战能力量化指标体系建立和量化模型体系构建所涉及的主要工作及相应研究思路.

  17. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1993-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  18. Commander’s Guide to Money as a Weapons System: Tactics, Techniques, and Procedures

    Science.gov (United States)

    2009-04-01

    events, diffuse potential unrest, and foster relations and stability with the local Afghan people. Provincial reconstruction teams (PRT) and...more advanced techniques such as reverse osmosis . The distribution of drinking water is accomplished via municipal water systems or as bottled water

  19. Climate Change: Anticipated Effects on High-Energy Laser Weapon Systems in Maritime Environments

    Science.gov (United States)

    2010-10-25

    assess variability and uncer- tainty in system performance arising from spatial, spectral, and temporal variations in operating conditions (Fiorino et al...profiles of data for highly specific modeling scenarios. Worldwide seasonal, diurnal, and geographical spatial– temporal variations in these parameters...codes, both driven by parameters from the Surface Marine Gridded Clima - tology database, provides enhanced representation of atmospheric effects over

  20. Weapons of Mass Secretion : The Type III Secretion System of Shigella flexneri

    NARCIS (Netherlands)

    Sani, Musa

    2007-01-01

    In bacteria that are pathogenic for animals, type III secretion systems allow extracellular bacteria adhering to the surface of a host cell to inject specialized proteins across the plasma membrane. The injected proteins subvert the functioning of the aggressed cell or destroy its communications, fa

  1. Weapons of Mass Secretion : The Type III Secretion System of Shigella flexneri

    NARCIS (Netherlands)

    Sani, Musa

    2007-01-01

    In bacteria that are pathogenic for animals, type III secretion systems allow extracellular bacteria adhering to the surface of a host cell to inject specialized proteins across the plasma membrane. The injected proteins subvert the functioning of the aggressed cell or destroy its communications,

  2. ManTech Implementing a Strategy to Deliver Weapon Systems Affordability

    Science.gov (United States)

    2010-11-01

    print for sensor grid production • Developed...developed and demonstrated a prototype virtual- reality welder training system that simulates the gas metal arc welding process • The 3D head-mounted...processes for lighter, durable and more comfortable composite prosthetics – Provided improved combat rations with high quality,

  3. Novel Organelles with Elements of Bacterial and Eukaryotic Secretion Systems Weaponize Parasites of Drosophila.

    Science.gov (United States)

    Heavner, Mary Ellen; Ramroop, Johnny; Gueguen, Gwenaelle; Ramrattan, Girish; Dolios, Georgia; Scarpati, Michael; Kwiat, Jonathan; Bhattacharya, Sharmila; Wang, Rong; Singh, Shaneen; Govind, Shubha

    2017-09-06

    The evolutionary success of parasitoid wasps, a highly diverse group of insects widely used in biocontrol, depends on a variety of life history strategies in conflict with those of their hosts [1]. Drosophila melanogaster is a natural host of parasitic wasps of the genus Leptopilina. Attack by L. boulardi (Lb), a specialist wasp to flies of the melanogaster group, activates NF-κB-mediated humoral and cellular immunity. Inflammatory blood cells mobilize and encapsulate Lb eggs and embryos [2-5]. L. heterotoma (Lh), a generalist wasp, kills larval blood cells and actively suppresses immune responses. Spiked virus-like particles (VLPs) in wasp venom have clearly been linked to wasps' successful parasitism of Drosophila [6], but the composition of VLPs and their biotic nature have remained mysterious. Our proteomics studies reveal that VLPs lack viral coat proteins but possess a pharmacopoeia of (1) the eukaryotic vesicular transport system, (2) immunity, and (3) previously unknown proteins. These novel proteins distinguish Lh from Lb VLPs; notably, some proteins specific to Lh VLPs possess sequence similarities with bacterial secretion system proteins. Structure-informed analyses of an abundant Lh VLP surface and spike-tip protein, p40, reveal similarities to the needle-tip invasin proteins SipD and IpaD of Gram-negative bacterial type-3 secretion systems that breach immune barriers and deliver virulence factors into mammalian cells. Our studies suggest that Lh VLPs represent a new class of extracellular organelles and share pathways for protein delivery with both eukaryotic microvesicles and bacterial surface secretion systems. Given their mixed prokaryotic and eukaryotic properties, we propose the term mixed-strategy extracellular vesicle (MSEV) to replace VLP. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. A Program Manager’s Methodology for Developing Structured Design in Embedded Weapons Systems.

    Science.gov (United States)

    1983-12-01

    conversion among various data types and provide interfacing with existing sensor and ship’s equipment. The WCIP provides visual status information to -he...the new concept. A rather simple way of viewing this requires one to visualize the principle to be added as needing a set of prerequisite traits. For...system specifications from their totally graphic fcrm into a short narrativa form. This trans.tion is a necessary first step toward using an SDL, an

  5. Guidance, Control and Positioning of Future Precision Guided Stand-off Weapons Systems

    Science.gov (United States)

    1986-06-01

    ngcessairsment lieu entre deux missiles adjacents. Les missiles i et i+1 entrent en collision si l𔄀cart relatif &. passe par le domajne & entre deux recal ... airbag manufacturers. The resulting ejection concept incorporates a dual airbag system in which individual submunitions are grouped into subpacks...consisting of submunitions, an airbag and foam dunnage. These subpacks are arranged around one or more primary airbags which are used to eject the subpacks

  6. Systems Engineering and Program Management. Trends and Costs for Aircraft and Guided Weapons Programs

    Science.gov (United States)

    2006-01-01

    Project AIR FORCE PCA Physical Configuration Audit P&D Production and Deployment PDR Preliminary Design Review P3I Preplanned Product Improvement PIN ...Program Management SEPM LOT Lot Cost of SE/PM (in production) SEPM UC Unit Cost of SE/PM (in production) SFR System Functional Review ii SE/PM...perform as intended, without a mission critical failure , for a specified period of time. Maintainability engineers are concerned with the resource re

  7. Warranties in Weapon System Procurement: An Analysis of Practice and Theory.

    Science.gov (United States)

    1987-04-01

    warranty usage by DoD drawn from civil commercial codes, court rulings, and claims commission findings. It evolved from the ASPRs through the DARs...parts whose materials and labor costs me less than $50. The contrato is protected against claims when DoD personnel have taken certain improper actions...relieved of his liability. If the systemic defect threshold is breached, a contingent liability ceiling Is sot for the contrato equal to tha thrshoLd

  8. A decontamination system for chemical weapons agents using a liquid solution on a solid sorbent

    Energy Technology Data Exchange (ETDEWEB)

    Waysbort, Daniel [Israel Institute for Biological Research, PO Box 19, Ness-Ziona 74100 (Israel); McGarvey, David J. [R and T Directorate, Edgewood Chemical and Biological Center (ECBC), Aberdeen Proving Ground-Edgewood Area, MD 21010 (United States)], E-mail: david.mcgarvey@us.army.mil; Creasy, William R.; Morrissey, Kevin M.; Hendrickson, David M. [SAIC, P.O. Box 68, Gunpowder Branch, Aberdeen Proving Ground, MD 21010 (United States); Durst, H. Dupont [R and T Directorate, Edgewood Chemical and Biological Center (ECBC), Aberdeen Proving Ground-Edgewood Area, MD 21010 (United States)

    2009-01-30

    A decontamination system for chemical warfare agents was developed and tested that combines a liquid decontamination reagent solution with solid sorbent particles. The components have fewer safety and environmental concerns than traditional chlorine bleach-based products or highly caustic solutions. The liquid solution, based on Decon Green{sup TM}, has hydrogen peroxide and a carbonate buffer as active ingredients. The best solid sorbents were found to be a copolymer of ethylene glycol dimethacrylate and n-lauryl methacrylate (Polytrap 6603 Adsorber); or an allyl methacrylate cross-linked polymer (Poly-Pore E200 Adsorber). These solids are human and environmentally friendly and are commonly used in cosmetics. The decontaminant system was tested for reactivity with pinacolyl methylphosphonofluoridate (Soman, GD), bis(2-chloroethyl)sulfide (Mustard, HD), and S-(2-diisopropylaminoethyl) O-ethyl methylphosphonothioate (VX) by using NMR Spectroscopy. Molybdate ion (MoO{sub 4}{sup -2}) was added to the decontaminant to catalyze the oxidation of HD. The molybdate ion provided a color change from pink to white when the oxidizing capacity of the system was exhausted. The decontaminant was effective for ratios of agent to decontaminant of up to 1:50 for VX (t{sub 1/2} {<=} 4 min), 1:10 for HD (t{sub 1/2} < 2 min with molybdate), and 1:10 for GD (t{sub 1/2} < 2 min). The vapor concentrations of GD above the dry sorbent and the sorbent with decontamination solution were measured to show that the sorbent decreased the vapor concentration of GD. The E200 sorbent had the additional advantage of absorbing aqueous decontamination solution without the addition of an organic co-solvent such as isopropanol, but the rate depended strongly on mixing for HD.

  9. Supporting Negotiation Behavior with Haptics-Enabled Human-Computer Interfaces

    OpenAIRE

    Küçükyılmaz, Ayşe; Sezgin, Tevfik Metin; Başdoğan, Çağatay

    2012-01-01

    An active research goal for human-computer interaction is to allow humans to communicate with computers in an intuitive and natural fashion, especially in real-life interaction scenarios. One approach that has been advocated to achieve this has been to build computer systems with human-like qualities and capabilities. In this paper, we present insight on how human-computer interaction can be enriched by employing the computers with behavioral patterns that naturally appear in human-human nego...

  10. The human-computer interaction design of self-operated mobile telemedicine devices

    OpenAIRE

    Zheng, Shaoqing

    2015-01-01

    Human-computer interaction (HCI) is an important issue in the area of medicine, for example, the operation of surgical simulators, virtual rehabilitation systems, telemedicine treatments, and so on. In this thesis, the human-computer interaction of a self-operated mobile telemedicine device is designed. The mobile telemedicine device (i.e. intelligent Medication Box or iMedBox) is used for remotely monitoring patient health and activity information such as ECG (electrocardiogram) signals, hom...

  11. Logistics: Implementation of Performance - Based Logistics for the Javelin Weapon System

    Science.gov (United States)

    2007-11-02

    the c.ontext of each lice within the Automated Cost 24 Batimating-hTasgraled Tools ( ACEIT ) mode], the Army’s standard cost model, containing the EA was...fully validated the EA, The Javelin E.A was valihdted through an extensive review of the EA cost documentation in (te ACEIT file in coordination with... ACEIT file of the system cost estimate- This documentation was conndered to be suflicienT by the CEAC Director once the EA was determinmd to be valid

  12. Human-Computer Interaction in Smart Environments

    Directory of Open Access Journals (Sweden)

    Gianluca Paravati

    2015-08-01

    Full Text Available Here, we provide an overview of the content of the Special Issue on “Human-computer interaction in smart environments”. The aim of this Special Issue is to highlight technologies and solutions encompassing the use of mass-market sensors in current and emerging applications for interacting with Smart Environments. Selected papers address this topic by analyzing different interaction modalities, including hand/body gestures, face recognition, gaze/eye tracking, biosignal analysis, speech and activity recognition, and related issues.

  13. 四代火力打击体系的信息化特征%Informationization Characteristics of Four Generations Weapon Systems

    Institute of Scientific and Technical Information of China (English)

    蔡毅

    2014-01-01

    根据火力打击体系的信息化特征将其分为4代:第一代火力打击体系的信息化特征为“惯性打击”--按发射时初始条件确定的弹道、由惯性保持弹丸/炸弹飞行直至命中目标;第二代火力打击体系的信息化特征为“相对打击”--依靠目标与背景之间信号的对比度产生制导信号控制/修正弹道,使导弹/制导炸弹精确命中目标;第三代火力打击体系的信息化特征为“绝对打击”--依靠目标的地理坐标、用全球卫星定位系统的信息作为控制/修正弹道的信号实现精确打击;第四代火力打击体系的信息化特征为“绝对打击+相对打击+数据链+人在环路”--即依靠目标的地理坐标、用全球卫星定位系统的信息作为控制/修正弹道的信号完成导弹/制导炸弹的中段制导,再利用“相对打击”、双向数据链和“人在环路”实现末制导,不仅能精确命中目标,还具有主动选择打击位置、控制打击程度、评估毁伤效果的能力。%In this paper, weapon systems were divided into four generations according to their informationization characteristics. The first generation weapon system features “Inertial Weapon”, with which the munitions approaches the target following the ballistic trajectory that preset by the launching platform using initial conditions. The second generation weapon system’s informationization characteristic is“Relative Striking”, which utilizes contrast signatures (e.g. radar, laser, wire, visible, or infrared signatures) between the target and the background to produce the signal to guide the precision weapon to aim at the target.“Absolute Striking”is the main attribute of the third generation weapon system. The guided weapon is guided to acquire the target via its geographical coordinate and a GPS signal. The fourth generation weapon system integrates “Absolute Striking” with “Relative Striking”,

  14. Study on Human-Computer Interaction in Immersive Virtual Environment

    Institute of Scientific and Technical Information of China (English)

    段红; 黄柯棣

    2002-01-01

    Human-computer interaction is one of the most important issues in research of Virtual Environments. This paper introduces interaction software developed for a virtual operating environment for space experiments. Core components of the interaction software are: an object-oriented database for behavior management of virtual objects, a software agent called virtual eye for viewpoint control, and a software agent called virtual hand for object manipulation. Based on the above components, some instance programs for object manipulation have been developed. The user can observe the virtual environment through head-mounted display system, control viewpoint by head tracker and/or keyboard, and select and manipulate virtual objects by 3D mouse.

  15. Human-Computer Interaction, Tourism and Cultural Heritage

    Science.gov (United States)

    Cipolla Ficarra, Francisco V.

    We present a state of the art of the human-computer interaction aimed at tourism and cultural heritage in some cities of the European Mediterranean. In the work an analysis is made of the main problems deriving from training understood as business and which can derail the continuous growth of the HCI, the new technologies and tourism industry. Through a semiotic and epistemological study the current mistakes in the context of the interrelations of the formal and factual sciences will be detected and also the human factors that have an influence on the professionals devoted to the development of interactive systems in order to safeguard and boost cultural heritage.

  16. 基于Multi-Agent的防空导弹武器系统模型设计%Design of Multi-Agent Based Model on Air Defense Missile Weapon System

    Institute of Scientific and Technical Information of China (English)

    陈宝印; 栾立秋; 张成斌

    2011-01-01

    建立科学的结构模型是进行防空导弹武器系统仿真的基础和关键环节.针对防空导弹武器系统的特点,提出了基于Multi-Agent的防空导弹武器系统模型建模方法,设计了防空导弹武器系统模型结构.利用Multi-Agent建模技术,把防空导弹武器系统实体映射成相应的Multi-Agent系统,并以Agent的形式对防空导弹武器系统这一客观复杂系统进行了深刻的认识,为防空导弹武器系统建模仿真奠定了基础.%Forming a scientific system model is the key of Air Defense Missile Weapon System simulation. According to the characters of Air Defense Missile Weapon System, a modeling method of multi-agent based model on Air Defense Missile Weapon System is given. The framework on Air Defense Missile Weapon System is designed. Using the Multi-Agent modeling technology, maps the Air Defense Missile Weapon System entity the corresponding Multi-Agent system, and carries on the profound understanding by the Agent form to Air Defense Missile Weapon System this objective complicated, which will be helpful to realize the modeling simulation on Air Defense Missile Weapon System.

  17. 基于MapX的电力系统GIS人机交互设计%Design of GIS Human-Computer Interaction Based on MapX for Electric Power System

    Institute of Scientific and Technical Information of China (English)

    朱作欣; 朱全胜; 马超; 李卫东

    2011-01-01

    In this paper, based on the method geographic information system (GIS) visual development interface, a GIS map is designed and drawn by MapInfo, which includes basic geographic layer, power station layer, substation layer, 220 kV transmission line layer, and 500 kV transmission line layer. Moreover, some basic functions and advanced functions of human-computer interaction of electric power system GIS based on MapX are achieved. The basic functions include space function, search function, display data function, thematic map function, eagle eye map function, contour map function, and 3D Visualization function. The advanced functions include multi-screen display function and associated adaptive regulatory function. According to different usage features and demands, more advanced functions can be developed on this basis. The design as presented in this paper will have significant effects in the management, analysis and maintenance of the power grid data.%应用基于地理信息系统(GIS)的电力系统可视化界面开发方法,使用MapInfo软件,设计绘制包括基础地理层、发电厂层、变电站层、220 kV输电线路层、500 kV输电线路层的GIS图.在此基础上,实现基于MapX的电力系统GIS人机交互基本功能及高级功能,基本功能包括空间功能、查询功能、详细数据展示功能、专题图功能、鹰眼图功能、等高线图功能、3D可视化功能,高级功能包括关联多屏显示功能、自适应调节功能.在整个系统中,基本功能可以较为简单地进行实现;高级功能突破了简单的二次开发限制,针对性更强,且具备了更专业的人机交互功能.依据电力系统中不同的使用特点和需求,还可以在此基础上开发出更多的其他高级功能.在对电网数据进行管理、分析和维护时具有显著的效果.

  18. 人工智能技术在武器投放系统中的应用%Application of Artificial Intelligence Technology on Weapon Delivery Systems

    Institute of Scientific and Technical Information of China (English)

    顾云涛

    2013-01-01

    The application of artificial intelligence on armament adapt to the requirement of warfare which is rapid, accurate and efficient. The system which is combined artificial intelligence technology with weapon system is able to autonomous or semiautonomous accomplish the reconnaissance, searching, identify, aiming and attack missions. The concept research of the intelligent weapon delivery system is presented, the system is designed by using artificial intelligence technology and its function is described. And then, based on the current state of art, the tradeoff research is done between automate weapon delivery and pilot, making using of each merits in order to achieve the optimal performance.%人工智能的军事应用适应了快速、精确、高效的作战需求。人工智能技术与武器系统结合能够自主或半自主完成侦察、搜索、识别、瞄准、攻击目标等任务。本文对智能武器投放系统进行了概念研究,用人工智能技术对系统进行了设计,对系统功能上进行了描述。另外,分析了当前技术水平,对自动武器投放应用和驾驶员之间权衡研究,发挥各自优点,使整体性能达到最优。

  19. Weapons Systems Analysis

    Science.gov (United States)

    1981-10-01

    Defense Review, 10, 43-47 (1977). [429] Brains, S. J., Game Theory and Politics, The Free Press, New York, New York (1975). [430] Bresson , M. M., "Les...Study in Conflict and Cooperation, University of Michigan Press, Ann Arbor, Michigan (1965). [505] Roberts , D. M. and J. C. Gittins, "The Search For An

  20. Apparent chlorofluorocarbon age of ground water of the shallow aquifer system, Naval Weapons Station Yorktown, Yorktown, Virginia

    Science.gov (United States)

    Nelms, David L.; Harlow, George E.; Brockman, Allen R.

    2001-01-01

    Apparent ages of ground water are useful in the analysis of various components of flow systems, and results of this analysis can be incorporated into investigations of potential pathways of contaminant transport. This report presents the results of a study in 1997 by the U.S. Geological Survey (USGS), in cooperation with the Naval Weapons Station Yorktown, Base Civil Engineer, Environmental Directorate, to describe the apparent age of ground water of the shallow aquifer system at the Station. Chlorofluorocarbons (CFCs), tritium (3H), dissolved gases, stable isotopes, and water-quality field properties were measured in samples from 14 wells and 16 springs on the Station in March 1997.Nitrogen-argon recharge temperatures range from 5.9°C to 17.3°C with a median temperature of 10.9°C, which indicates that ground-water recharge predominantly occurs in the cold months of the year. Concentrations of excess air vary depending upon geohydrologic setting (recharge and discharge areas). Apparent ground-water ages using a CFC-based dating technique range from 1 to 48 years with a median age of 10 years. The oldest apparent CFC ages occur in the upper parts of the Yorktown-Eastover aquifer, whereas the youngest apparent ages occur in the Columbia aquifer and the upper parts of the discharge area setting, especially springs. The vertical distribution of apparent CFC ages indicates that groundwater movement between aquifers is somewhat retarded by the leaky confining units, but the elapsed time is relatively short (generally less than 35 years), as evidenced by the presence of CFCs at depth. The identification of binary mixtures by CFC-based dating indicates that convergence of flow lines occurs not only at the actual point of discharge, but also in the subsurface.The CFC-based recharge dates are consistent with expected 3H concentrations measured in the water samples from the Station. The concentration of 3H in ground water ranges from below the USGS laboratory minimum

  1. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    Science.gov (United States)

    Bell, William C; Dallas, Cham E

    2007-01-01

    Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this outcome would be the probable loss

  2. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    Directory of Open Access Journals (Sweden)

    Dallas Cham E

    2007-02-01

    Full Text Available Abstract Background The threat posed by the use of weapons of mass destruction (WMD within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this

  3. Electrical Control System Design of Shipboard Box Weapon%舰载箱式无人机电控传送系统设计

    Institute of Scientific and Technical Information of China (English)

    朱玉川; 夏冉

    2014-01-01

    在现今的自动控制领域,PLC的应用已十分广泛。首先对舰载箱式无人机的设计进行简要介绍。为实现舰载箱式无人机发射系统传动的高精度、高效率,提出PLC电控传送系统并进行相应设计。通过对液压执行系统硬件结构设计,高精度电液比例控制设计,控制流程设计,PLC选型,控制软件设计等完成了整个电控系统设计过程,在对控制系统程序调试后,控制系统完成了相应的功能需求,达到了设计要求。%In automatic control domain,PLC has been widely used. One design of ship-borne box of unmanned aerial vehicle firstly been introduced briefly. To achieve high precision and high efficiency of carrier box weapon launch system transmission,system choose PLC as the core of the electrical control system. Through the design of electronic control system hardware structure and control software design,it implements the shipboard box -type weapons sent efficiency and precision positioning.

  4. 舰载弹炮结合近程武器系统技术研究%Study on Shipped Missile-Gun Integrated Defense Weapon System

    Institute of Scientific and Technical Information of China (English)

    白奕

    2014-01-01

    现代高性能反舰导弹是舰艇末端防御的最大威胁,而舰载弹炮结合近程武器系统为舰艇的末端防御提供了一种有效的途径。分析了舰载弹炮结合近程武器系统的作战使用和主要特点,针对海上空袭武器的特点,重点研究了增强系统抗饱和攻击能力的设计方法,并探讨了舰载弹炮结合近程武器系统在现代海战中的使用方向。%Modern high-powered antiship missile is the main threaten of ship,and shipped missile-gun integrated defense weapon system is an effective way to the terminal defense of ship. This paper first analyzes the combat operation and main characteristic of missile-gun integrated defense weapon system,then studies the key factor of designing a system. At last the system usage is discussed in the modern sea war.

  5. 印度导弹武器装备体系发展与前景分析%Analysis of Indian Missile Weapon System Development

    Institute of Scientific and Technical Information of China (English)

    张莹

    2012-01-01

    随着国际安全环境的重大变化,印度加紧了其军事战略的调整和军队建设的步伐,大力发展导弹武器体系建设,对周边国家和地区形成了安全威胁.在分析印度军事战略的基础上,重点阐述印度弹道导弹、巡航导弹、防空导弹和导弹防御系统等武器装备体系的建设情况,并分析了其发展趋势和未来前景.%With the tremendous changes of the international security environment, India promotes the military strategy adjustment and the military construction, and pays great attention to the development of missile weapon system, threatening to the security of neighboring countries and regions. Beginning with the Indian military strategy, this paper describes the Indian weapon system construction in depth, such as the ballistic missile, cruise missile, air defense system and ballistic missile defense system .ete. Finally future development trend and prospect are analyzed.

  6. The Framework of Comprehensive Analysis for the Combat Capability of Weapon System of Systems%武器装备体系作战能力综合分析框架

    Institute of Scientific and Technical Information of China (English)

    赵相安; 姜志平; 黄新生

    2011-01-01

    为了分析武器装备体系的整体作战能力,提出了一种武器装备体系作战能力的综合分析框架,该框架将武器装备体系的作战能力分析划分为3个层次,并针对每个层次分别提出了相应的能力分析方法.首先研究了如何描述和度量单个武器装备的作战能力;其次研究了如何将多个同类型武器装备的作战能力进行折合形成新的作战能力;最后是研究了多个及多种类型武器装备的作战能力如何合成新的作战能力.并进行案例分析,证明了该框架的可用性.%To analyze the capability of the weapon System of Systems, a kind of analyzing framework is provided in the paper. The framework divides the combat capability analysis of the weapon System of Systems into three levels, and to each level, the corresponding capability analysis method is provided. Firstly, how to describe and measure the combat capability of the single weapon is researched. Secondly, how to discount the combat capability of many weapons into new ones is researched. Thirdly, how to compose the combat capability of many and many kinds of weapons into new ones is researched. Lastly, the case that proves the framework's availability is analyzed.

  7. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  8. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote. ...

  9. 某型武器通信系统脆性建模与分析%Brittleness Modeling and Analysis on A Weapon's Communication System

    Institute of Scientific and Technical Information of China (English)

    胡俊

    2015-01-01

    某型武器通信系统进行脆性建模与分析的目的是找到该通信系统的脆性源,为改进装备维修保障工作提供依据.运用图论建立通信系统脆性模型,对模型进行分层重构.找到通信系统的脆性源,得到分层的系统脆性模型.分析结果表明:在某型武器通信系统中,通信控制机是其脆性源,对完善某型武器通信系统建构、改善通信控制机性能、开展通信控制机操作训练和故障诊断训练等具有很强的指导作用,同时也为建设某型通信控制机故障诊断训练系统提供理论依据.%Brittleness modeling and analysis that was adopted to a weapon's communication system aimed to find the brittle source of the communication system and to provide basis for improve the work of equipment's maintenance. Brittleness model of communication system was constructed by the graph theory, then the model was reconstructed hierarchically. And brittle source of communication system was found, hierarchical system brittle model was got at last. It was demonstrated by the analysis result that communication controller was brittle source of a weapon's communication system. As a result it has stronger directive function to consummate the construction of a weapon's communication system, improve the performance of communication controller, develop the operation training and fault diagnosis training of communication controller, theoretical support was afforded to construct a fault diagnosis training system of communication controller at the same time.

  10. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun

    2009-01-01

    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  11. Human-Computer Interaction The Agency Perspective

    CERN Document Server

    Oliveira, José

    2012-01-01

    Agent-centric theories, approaches and technologies are contributing to enrich interactions between users and computers. This book aims at highlighting the influence of the agency perspective in Human-Computer Interaction through a careful selection of research contributions. Split into five sections; Users as Agents, Agents and Accessibility, Agents and Interactions, Agent-centric Paradigms and Approaches, and Collective Agents, the book covers a wealth of novel, original and fully updated material, offering:   ü  To provide a coherent, in depth, and timely material on the agency perspective in HCI ü  To offer an authoritative treatment of the subject matter presented by carefully selected authors ü  To offer a balanced and broad coverage of the subject area, including, human, organizational, social, as well as technological concerns. ü  To offer a hands-on-experience by covering representative case studies and offering essential design guidelines   The book will appeal to a broad audience of resea...

  12. Research on the Capability Generation of Weapon System-of-Systems Based on Fuzzy Consensus%基于模糊共识的武器装备体系能力生成研究

    Institute of Scientific and Technical Information of China (English)

    黄魏; 梁晓庆; 谭跃进

    2011-01-01

    武器装备体系能力生成是武器装备体系构建与发展的基础,是专家群体研讨并最终形成武器装备体系能力发展的共识过程,专家意见共识的形成是武器装备体系能力生成的核心环节.为便于专家理解并对各种方案进行比较,采用模糊共识的思想,通过建立专家的模糊偏好矩阵,计算专家意见的一致度,在此基础上获得专家意见的模糊共识度.%The capability generation of weapon system-of-systems is foundation of construct and development of weapon system-of-systems. It is the process of expert group discussion then form consensus of capability development. The forming of expert opinion consensus is the significant segment of capability generation of weapon system-of-systems. In order to facilitate the understanding of experts and to compare various options, adopts the idea of fuzzy consensus, through the establishment of the expert's fuzzy preference matrix, the calculation of the same degree of expert opinion, then acquire fuzzy degree of consensus.

  13. The Electronic Delivery of Automated Technical Information for Logistics Support of Navy Weapon Systems: Potential, System Description and Status

    Science.gov (United States)

    1989-02-01

    Charles S. Sawyer. Test and Evaluation of The Navy Technical Information Presentation System (NTIPS), AN/SPA-25D Test Results. DTRC-88-035, September 1988...L. LeBeau; Anne S. Mavor; Theodore J. Post; and Charles S. Sawyer. Test and Evaluation of The Navy Technical Information Presentpl ier System (NTIPS...Karpovich 1 EER Systems 1 NPFC-100 H. Bukowski LCDR F. Harmer 2 EG&G 1 NOSC WASC L. Snodgrass R. Smillie WASCI R. Beckham 1 NOS Indianhead 4 Essex Corp. G

  14. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  15. Wounds and weapons.

    Science.gov (United States)

    Vogel, H; Dootz, B

    2007-08-01

    X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Radiographs may show, which weapon has been employed; they can be read as war reports.

  16. Human-computer interface glove using flexible piezoelectric sensors

    Science.gov (United States)

    Cha, Youngsu; Seo, Jeonggyu; Kim, Jun-Sik; Park, Jung-Min

    2017-05-01

    In this note, we propose a human-computer interface glove based on flexible piezoelectric sensors. We select polyvinylidene fluoride as the piezoelectric material for the sensors because of advantages such as a steady piezoelectric characteristic and good flexibility. The sensors are installed in a fabric glove by means of pockets and Velcro bands. We detect changes in the angles of the finger joints from the outputs of the sensors, and use them for controlling a virtual hand that is utilized in virtual object manipulation. To assess the sensing ability of the piezoelectric sensors, we compare the processed angles from the sensor outputs with the real angles from a camera recoding. With good agreement between the processed and real angles, we successfully demonstrate the user interaction system with the virtual hand and interface glove based on the flexible piezoelectric sensors, for four hand motions: fist clenching, pinching, touching, and grasping.

  17. Advancements in Violin-Related Human-Computer Interaction

    DEFF Research Database (Denmark)

    Overholt, Daniel

    2014-01-01

    Finesse is required while performing with many traditional musical instruments, as they are extremely responsive to human inputs. The violin is specifically examined here, as it excels at translating a performer’s gestures into sound in manners that evoke a wide range of affective qualities...... of human intelligence and emotion is at the core of the Musical Interface Technology Design Space, MITDS. This is a framework that endeavors to retain and enhance such traits of traditional instruments in the design of interactive live performance interfaces. Utilizing the MITDS, advanced Human......-Computer Interaction technologies for the violin are developed in order to allow musicians to explore new methods of creating music. Through this process, the aim is to provide musicians with control systems that let them transcend the interface itself, and focus on musically compelling performances....

  18. Human-computer interaction: psychology as a science of design.

    Science.gov (United States)

    Carroll, J M

    1997-01-01

    Human-computer interaction (HCI) study is the region of intersection between psychology and the social sciences, on the one hand, and computer science and technology, on the other. HCI researchers analyze and design specific user interface technologies (e.g. pointing devices). They study and improve the processes of technology development (e.g. task analysis, design rationale). They develop and evaluate new applications of technology (e.g. word processors, digital libraries). Throughout the past two decades, HCI has progressively integrated its scientific concerns with the engineering goal of improving the usability of computer systems and applications, which has resulted in a body of technical knowledge and methodology. HCI continues to provide a challenging test domain for applying and developing psychological and social theory in the context of technology development and use.

  19. On the Rhetorical Contract in Human-Computer Interaction.

    Science.gov (United States)

    Wenger, Michael J.

    1991-01-01

    An exploration of the rhetorical contract--i.e., the expectations for appropriate interaction--as it develops in human-computer interaction revealed that direct manipulation interfaces were more likely to establish social expectations. Study results suggest that the social nature of human-computer interactions can be examined with reference to the…

  20. Design of human computer interaction system of virtual crops based on Leap Motion%基于Leap Motion的虚拟农作物人机交互系统设计

    Institute of Scientific and Technical Information of China (English)

    吴福理; 丁胤; 丁维龙; 谢涛

    2016-01-01

    In recent years, the Somatosensory Technology has been applied in many fields including entertainment, education, automation and medicine etc. But in agriculture, it still has rarely involved. The traditional human-computer interaction system of virtual plant operating at a particular operating system or on a mobile platform, and interactive mode is interactive through the mouse and keyboard, need parameters and commands more cumbersome user input, resulting in the lack of good user interaction experience. In view of the above situation, in this paper, we designed and developed virtual farming object interaction system based on cloud computing and somatosensory interactive technology. The system firstly generated a 3D model of the virtual crop in the cloud, and the model was stored in the cloud. Our virtual crop model included rice and tomato. The cloud-side provided the data calculation ability and responded the browser requesting, the browser-side was responsible for display, caching and a small amount of calculation, and Leap Motion was responsible for interaction on the browser-side. In order to obtain the relevant parameters for rice modeling, we had done experiments in China National Rice Research Institute in Zhejiang, Hangzhou between 2015 and 2016. The selected rice stage was from the jointing stage to the heading stage. For each plant, we measured three blades in different leaf positions, which included blade lengths, blade widths, the changed widths along the blades, and blade growth positions. The 3D data of virtual crops needed to be generated by algorithms on Amazon cloud platform. The topological structures of tomato plants were described by the parametric L-system in our system, and we separated the structures into stems, rachis, blades, fruit branches and flower branches. Using WebGL to render 3D crop models on browser allowed and incorporated users to directly interact with it. In this paper, we defined a 3D virtual crop data exchange protocol

  1. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne

    2016-01-01

    Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand on the sp......Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...

  2. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun

    2002-01-01

    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  3. Multiple smart weapons employment mechanism

    Energy Technology Data Exchange (ETDEWEB)

    McGlynn, M.P.; Meiklejohn, W.D.

    1993-07-20

    A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

  4. Nuclear weapon detection categorization analysis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    This statement of work is for the Proof of Concept for nuclear weapon categories utility in Arms control. The focus of the project will be to collect, analyze and correlate Intrinsic Radiation (INRAD) calculation results for the purpose of defining measurable signatures that differentiate categories of nuclear weapons. The project will support START III negotiations by identifying categories of nuclear weapons. The categories could be used to clarify sub-limits on the total number of nuclear weapons.

  5. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  6. Financial Condition of Government Contractors and Control of Production Costs in the Procurement of Major DoD Aircraft Weapon Systems

    Science.gov (United States)

    1989-06-01

    Technology ( FLYTECH )=ASP; 3. Weapons and Avionics System Technology (SYSTECH) =ASP/AP. The SYSTECH measure was derived from the two others and was a rough...PLA7TECH SYSTECH FLYTECH I A-IJ 6.57 0.50837 3.34 2 A- I7EG’H 6.S7 0.s0877 1-.4 A- :AI 1 32.8 0.87645 10.74 4 -4C 6. N !.076: 5.45 5 -464 7.33 i.162S s.S...0001 Variance explained (R’): .5812 Adjusted R’-. .5719 F Value: 62.44 Model Significance: .0001 FLYTECH =-30.943 4 .7063 YEAR 8.386 .0001 Variance

  7. Bayesian Decision Evaluation on Probability Index of Weapon System%武器系统概率指标的贝叶斯决策评定方法

    Institute of Scientific and Technical Information of China (English)

    贾旭山; 金振中

    2011-01-01

    剖析了武器系统试验工程领域中常用二项分布经典假设检验方法存在的问题,从贝叶斯决策思想和理论出发提出了概率指标评定的新方法,通过实例对比证明了贝叶斯决策评定方法有效解决了二项分布经典假设检验方法中存在的问题.%The problem of classical hypothesis testing for binomial distribution in weapon system test domain is analyzed. A new method of probability evaluating index is provided based on Bayesian decision idea and theory , it is proved that the problem of classical hypothesis testing for binomial distribution can be solved by means of the Bayesian decision evaluation method.

  8. Gesture controlled human-computer interface for the disabled.

    Science.gov (United States)

    Szczepaniak, Oskar M; Sawicki, Dariusz J

    2017-02-28

    The possibility of using a computer by a disabled person is one of the difficult problems of the human-computer interaction (HCI), while the professional activity (employment) is one of the most important factors affecting the quality of life, especially for disabled people. The aim of the project has been to propose a new HCI system that would allow for resuming employment for people who have lost the possibility of a standard computer operation. The basic requirement was to replace all functions of a standard mouse without the need of performing precise hand movements and using fingers. The Microsoft's Kinect motion controller had been selected as a device which would recognize hand movements. Several tests were made in order to create optimal working environment with the new device. The new communication system consisted of the Kinect device and the proper software had been built. The proposed system was tested by means of the standard subjective evaluations and objective metrics according to the standard ISO 9241-411:2012. The overall rating of the new HCI system shows the acceptance of the solution. The objective tests show that although the new system is a bit slower, it may effectively replace the computer mouse. The new HCI system fulfilled its task for a specific disabled person. This resulted in the ability to return to work. Additionally, the project confirmed the possibility of effective but nonstandard use of the Kinect device. Med Pr 2017;68(1):1-21.

  9. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    have eased in recent years, with their nuclear tests in 1998 and continued animosity toward each other, India and Pakistan have joined the list of...could be complex, difficult, and very time- consuming . 137 Given the large disparity in the numbers of U.S. and Russian nonstrategic nuclear weapons

  10. Medicalized weapons & modern war.

    Science.gov (United States)

    Gross, Michael L

    2010-01-01

    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  11. Neutrino Counter Nuclear Weapon

    CERN Document Server

    Tang, Alfred

    2008-01-01

    Radiations produced by neutrino-antineutrino annihilation at the Z0 pole can be used to heat up the primary stage of a thermonuclear warhead and can in principle detonate the device remotely. Neutrino-antineutrino annihilation can also be used as a tactical assault weapon to target hideouts that are unreachable by conventional means.

  12. Nuclear weapons in Europe

    CERN Document Server

    Calogero, F

    1981-01-01

    Information speech given by Prof. Calogero from the university of Roma to describe the actual situation of nuclear weapons in Europe, the strategical reasons or justifications for this deployment, the prospects of negociations, and what scientists could do and do on this issue.

  13. Pakistans Nuclear Weapons

    Science.gov (United States)

    2016-02-12

    Memorandum from Air Commodore Khalid Banuri, 2011. 84 Mahmud Ali Durrani, “Pakistan’s Strategic Thinking and the Role of Nuclear Weapons...Richard P. Cronin , K. Alan Kronstadt, and Sharon Squassoni. Also see CRS Report RL33498, Pakistan-U.S. Relations, by K. Alan Kronstadt. 168 For a

  14. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  15. 虚拟现实技术在武器对抗仿真中的应用研究%The Research of Virtual Reality's Application on the Simulation of Weapon Systems' Antagonism

    Institute of Scientific and Technical Information of China (English)

    詹荣开; 王宏伟; 贺汉根

    2001-01-01

    Traditional military drill or weapon system's performance evaluation is often accomplished by a sham battle with true weapon systems.With the fast development of virtual reality,virtual sham battle,which integrates virtual reality and weapon systems' simulation,has become possible.Based on the summarization to virtual reality,this paper emphatically discusses virtual reality's application on the simulation of weapon systems'antagonism and a few typical problems in it.At last,a few future development directions are listed.%传统的军事训练或武器系统性能评估通常都采用有真实武器系统的训练或军事演习来进行。随着虚拟现实技术的迅速发展,将它与系统仿真相结合来进行虚拟对抗演练已经成为可能。文中在概述虚拟现实技术的基础上,着重探讨了虚拟现实技术在武器对抗仿真中的应用及其中几个较为典型的问题,并提出了今后的发展方向。

  16. A Framework and Implementation of User Interface and Human-Computer Interaction Instruction

    Science.gov (United States)

    Peslak, Alan

    2005-01-01

    Researchers have suggested that up to 50 % of the effort in development of information systems is devoted to user interface development (Douglas, Tremaine, Leventhal, Wills, & Manaris, 2002; Myers & Rosson, 1992). Yet little study has been performed on the inclusion of important interface and human-computer interaction topics into a current…

  17. 基于ADC方法的复杂武器系统效能评估方法%Research on Effect Valuation to the Complicated Weapon System Based on ADC

    Institute of Scientific and Technical Information of China (English)

    王晅; 陶禹; 樊丹瑛

    2016-01-01

    ADC method is one of the important methods to assess the effectiveness of weapon equipment. Traditional ADC methods also simplify individual subsystems of weapon system to the series system. In this paper,the ADC methods is optimizes aimed at the various subsystems composed of numerous,complex series-parallel relationship,varying degree of impact on the operational of complex weapon systems. On this method,ADC approach allows a more objective assessment of multiple parallel systems. The actual verification by a certain type of weaponry ADC improved method reasonably practicable,can have a more objective and comprehensive evaluation of complex weapons systems,can be used as reference to other complex weapon system effectiveness assessment methods.%ADC方法是武器装备效能评估的重要方法之一。传统ADC方法一般将武器系统各个分系统简化为串联系统计算。针对复杂武器系统中各个分系统组成繁多、串并联关系复杂、对作战影响程度不一等特点,对ADC方法进行了优化,使得ADC方法可以针对多并联系统更客观地评估。通过某型武器装备的实际验证,改进后的ADC方法合理可行,可以对复杂武器系统拥有更客观和更全面地评价,可作为其他复杂武器系统效能评估方法的参考。

  18. Non-lethal weapons and their characteristics

    OpenAIRE

    DAMJANOVIC DRAGAN Z.

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  19. NON-LETHAL WEAPONS AND THEIR CHARACTERISTICS

    OpenAIRE

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  20. Prediction of the wounded and rescue algorithm for emergent events during destruction of Japanese-abandoned chemical weapons(JACW in transportable system

    Directory of Open Access Journals (Sweden)

    Yue-cheng YU

    2011-05-01

    Full Text Available Objective To explore the potential injuries and amount of the wounded during destruction of JACW in transportable system(TSD,thereby to formulate the rational allocation of medical staff at the scene and the scientific algorithm of medical rescue in emergent events.Methods Prediction of the different injuries and amount of the wounded,allocation of the force for emergency medical rescue(EMR,and EMR algorithm were formulated based on the detailed investigation on the types of chemical weapons,working processes and risks during the elimination of JACW in the TSD background.Results The JACW in Nanjing Depository were diphenylcyanarsine,diphenylchloroarsine,chloroacetophenone,mustard gas and lewisite,among them the foremost two were in the majority.Red tanks containing the chemical toxicants are the main types of chemical weapons in warfare,and there were also a few chemical bombs.It was estimated that four to seven workers might be injured in one accident,of them two or three might be seriously injured.The types of injury might be due to intoxication of chemical agent,chemical burn,explosion injury,or combined injuries.The rational allocation of EMR force combined with the scientific rescue algorithm was made according to the information.Conclusions It is of great significance to scientifically allocate the EMR force and formulate algorithm based on the rational prediction of the types and amount of the wounded during elimination process of JACW with TSD in Nanjing.Theory and experience from this research will provide important reference for the same kind of work in other cities later.

  1. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  2. Human Computer Interaction Approach in Developing Customer Relationship Management

    Directory of Open Access Journals (Sweden)

    Mohd H.N.M. Nasir

    2008-01-01

    Full Text Available Problem statement: Many published studies have found that more than 50% of Customer Relationship Management (CRM system implementations have failed due to the failure of system usability and does not fulfilled user expectation. This study presented the issues that contributed to the failures of CRM system and proposed a prototype of CRM system developed using Human Computer Interaction approaches in order to resolve the identified issues. Approach: In order to capture the users' requirements, a single in-depth case study of a multinational company was chosen in this research, in which the background, current conditions and environmental interactions were observed, recorded and analyzed for stages of patterns in relation to internal and external influences. Some techniques of blended data gathering which are interviews, naturalistic observation and studying user documentation were employed and then the prototype of CRM system was developed which incorporated User-Centered Design (UCD approach, Hierarchical Task Analysis (HTA, metaphor and identification of users' behaviors and characteristics. The implementation of these techniques, were then measured in terms of usability. Results: Based on the usability testing conducted, the results showed that most of the users agreed that the system is comfortable to work with by taking the quality attributes of learnability, memorizeablity, utility, sortability, font, visualization, user metaphor, information easy view and color as measurement parameters. Conclusions/Recommendations: By combining all these techniques, a comfort level for the users that leads to user satisfaction and higher usability degree can be achieved in a proposed CRM system. Thus, it is important that the companies should put usability quality attribute into a consideration before developing or procuring CRM system to ensure the implementation successfulness of the CRM system.

  3. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  4. Bioterrorism: pathogens as weapons.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2012-10-01

    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  5. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  6. Counterproliferation of Nuclear Weapons

    Science.gov (United States)

    2010-04-01

    an occurrence. In his book, Atomic Tragedy, Sean Malloy writes that Henry Stimson, the United States Secretary of War, warned in April, 1945 that...Ibid., 380. 41 Ibid. 42 Sean L. Malloy , Atomic Tragedy: Henry L. Stimson and the Decision to use the Bomb Against Japan (Ithaca, New York...Weapons of Mass Destruction in the Middle East, 96-97. 45 Robert M. Gates, National Defense Strategy (Washington, DC: US Government Printing Office

  7. Principles of Guided Missiles and Nuclear Weapons.

    Science.gov (United States)

    Naval Personnel Program Support Activity, Washington, DC.

    Fundamentals of missile and nuclear weapons systems are presented in this book which is primarily prepared as the second text of a three-volume series for students of the Navy Reserve Officers' Training Corps and the Officer Candidate School. Following an introduction to guided missiles and nuclear physics, basic principles and theories are…

  8. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  9. Interim Report of the Defense Science Board (DSB) Task Force on the Survivability of Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapon Effects (NWE)

    Science.gov (United States)

    2011-08-01

    major platforms for High Altitude EMP ( HEMP ) protection, and the Navy implemented a requirements review process. United States Strategic Command...Army improving process for independent review of survivability – Air Force committing resources for testing major platforms for HEMP protection...battlespaces where nuclear weapons are threatening or are being employed. The most likely case(s) are use of nuclear weapons by others. Although

  10. 32 CFR 234.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...

  11. Wearable joystick for gloves-on human/computer interaction

    Science.gov (United States)

    Bae, Jaewook; Voyles, Richard M.

    2006-05-01

    In this paper, we present preliminary work on a novel wearable joystick for gloves-on human/computer interaction in hazardous environments. Interacting with traditional input devices can be clumsy and inconvenient for the operator in hazardous environments due to the bulkiness of multiple system components and troublesome wires. During a collapsed structure search, for example, protective clothing, uneven footing, and "snag" points in the environment can render traditional input devices impractical. Wearable computing has been studied by various researchers to increase the portability of devices and to improve the proprioceptive sense of the wearer's intentions. Specifically, glove-like input devices to recognize hand gestures have been developed for general-purpose applications. But, regardless of their performance, prior gloves have been fragile and cumbersome to use in rough environments. In this paper, we present a new wearable joystick to remove the wires from a simple, two-degree of freedom glove interface. Thus, we develop a wearable joystick that is low cost, durable and robust, and wire-free at the glove. In order to evaluate the wearable joystick, we take into consideration two metrics during operator tests of a commercial robot: task completion time and path tortuosity. We employ fractal analysis to measure path tortuosity. Preliminary user test results are presented that compare the performance of both a wearable joystick and a traditional joystick.

  12. Handheld ultrasound concealed weapons detector

    Science.gov (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank

    1998-12-01

    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  13. Weapons Neutron Research Facility (WNR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  14. Tool, weapon, or white elephant? A realist analysis of the five phases of a twenty-year programme of occupational health information system implementation in the health sector.

    Science.gov (United States)

    Spiegel, Jerry M; Lockhart, Karen; Dyck, Carmen; Wilson, Andrea; O'Hara, Lyndsay; Yassi, Annalee

    2012-08-06

    , including technological support and software licensing models, can also affect outcome and sustainability - especially in the North-south context. Careful attention must be given to power relations between the various stakeholders at macro, meso and micro levels when implementing IS. North-South-South collaborations should be encouraged. Governance as well as technological issues are crucial determinants of IS application, and ultimately whether the system is seen as a tool, weapon, or white elephant by the various involved parties."You may call me a fool, But was there a rule The weapon should be turned into a tool? And what do we see? The first tool I step on Turned into a weapon. - Robert Frost"White (albino) elephants were regarded as holy in ancient times in Thailand and other Asian countries. Keeping a white elephant was a very expensive undertaking, since the owner had to provide the elephant with special food and provide access for people who wanted to worship it. If a Thai King became dissatisfied with a subordinate, he would give him a white elephant. The gift would, in most cases, ruin the recipient. - The Phrase Finder"

  15. Tool, weapon, or white elephant? A realist analysis of the five phases of a twenty-year programme of occupational health information system implementation in the health sector

    Directory of Open Access Journals (Sweden)

    Spiegel Jerry M

    2012-08-01

    outcomes of interest to all parties. Issues specific to IS development, including technological support and software licensing models, can also affect outcome and sustainability – especially in the North–south context. Careful attention must be given to power relations between the various stakeholders at macro, meso and micro levels when implementing IS. North–South-South collaborations should be encouraged. Governance as well as technological issues are crucial determinants of IS application, and ultimately whether the system is seen as a tool, weapon, or white elephant by the various involved parties. "You may call me a fool, But was there a rule The weapon should be turned into a tool? And what do we see? The first tool I step on Turned into a weapon. - Robert Frost" "White (albino elephants were regarded as holy in ancient times in Thailand and other Asian countries. Keeping a white elephant was a very expensive undertaking, since the owner had to provide the elephant with special food and provide access for people who wanted to worship it. If a Thai King became dissatisfied with a subordinate, he would give him a white elephant. The gift would, in most cases, ruin the recipient. - The Phrase Finder"

  16. Development and Application of Computational/In Vitro Toxicological Methods for Chemical Hazard Risk Reduction of New Materials for Advanced Weapon Systems

    Science.gov (United States)

    Frazier, John M.; Mattie, D. R.; Hussain, Saber; Pachter, Ruth; Boatz, Jerry; Hawkins, T. W.

    2000-01-01

    The development of quantitative structure-activity relationship (QSAR) is essential for reducing the chemical hazards of new weapon systems. The current collaboration between HEST (toxicology research and testing), MLPJ (computational chemistry) and PRS (computational chemistry, new propellant synthesis) is focusing R&D efforts on basic research goals that will rapidly transition to useful products for propellant development. Computational methods are being investigated that will assist in forecasting cellular toxicological end-points. Models developed from these chemical structure-toxicity relationships are useful for the prediction of the toxicological endpoints of new related compounds. Research is focusing on the evaluation tools to be used for the discovery of such relationships and the development of models of the mechanisms of action. Combinations of computational chemistry techniques, in vitro toxicity methods, and statistical correlations, will be employed to develop and explore potential predictive relationships; results for series of molecular systems that demonstrate the viability of this approach are reported. A number of hydrazine salts have been synthesized for evaluation. Computational chemistry methods are being used to elucidate the mechanism of action of these salts. Toxicity endpoints such as viability (LDH) and changes in enzyme activity (glutahoione peroxidase and catalase) are being experimentally measured as indicators of cellular damage. Extrapolation from computational/in vitro studies to human toxicity, is the ultimate goal. The product of this program will be a predictive tool to assist in the development of new, less toxic propellants.

  17. Aesthetic Approaches to Human-Computer Interaction

    DEFF Research Database (Denmark)

    This volume consists of revised papers from the First International Workshop on Activity Theory Based Practical Methods for IT Design. The workshop took place in Copenhagen, Denmark, September 2-3, 2004. The particular focus of the workshop was the development of methods based on activity theory...... for practical development of IT-based systems....

  18. Audio Technology and Mobile Human Computer Interaction

    DEFF Research Database (Denmark)

    Chamberlain, Alan; Bødker, Mads; Hazzard, Adrian

    2017-01-01

    Audio-based mobile technology is opening up a range of new interactive possibilities. This paper brings some of those possibilities to light by offering a range of perspectives based in this area. It is not only the technical systems that are developing, but novel approaches to the design...

  19. Analysis of Rocket Weapon System Decision Based on Virtual Simulation%基于虚拟仿真的火箭武器系统决策分析法

    Institute of Scientific and Technical Information of China (English)

    付昆; 于存贵

    2011-01-01

    In view of the defects in classical expert system exist that the lack of dynamic prediction function and principium illumination problem, an improved frame work of multiple rocket weapon expert system based on virtual simulation model is proposed. By building the virtual simulation model, and multiple rocket launch weapon system performance without servo system control, process control and intermittent control three control mode of the simulation analysis, and taking an example calculation. The results show that the model is feasible and effective, can provide an efficient and intuitionistic new way for solve the weapon system analysis.%针对传统武器专家系统缺少动态预测功能和机理性解释的问题,提出基于虚拟样机仿真的多管火箭武器专家系统集成框架,建立仿真模型,对多管火箭武器发射系统性能进行没有伺服系统控制、全过程控制和间断性控制3种控制方式的仿真分析,并通过实例进行演算.结果表明:该模型是可行、有效的,可为解决武器系统分析提供一种有效、直观的新途径.

  20. Insulin as a weapon.

    Science.gov (United States)

    Robinson, Samuel D; Safavi-Hemami, Helena

    2016-12-01

    The discovery of insulin and its use for the treatment of diabetes is undoubtedly one of the true successes of modern medicine. Injectable insulin would prove the first effective treatment for a previously incurable and usually fatal disease. Soon after however, the powerful effects of insulin overdose would be reported, and subsequently exploited for dubious medical and sometimes nefarious purposes. In this article we describe the discovery that certain venomous marine snails of the genus Conus also exploit the powerful effects of insulin overdose, employing it as a weapon for prey capture. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Rationale awareness for quality assurance in iterative human computation processes

    CERN Document Server

    Xiao, Lu

    2012-01-01

    Human computation refers to the outsourcing of computation tasks to human workers. It offers a new direction for solving a variety of problems and calls for innovative ways of managing human computation processes. The majority of human computation tasks take a parallel approach, whereas the potential of an iterative approach, i.e., having workers iteratively build on each other's work, has not been sufficiently explored. This study investigates whether and how human workers' awareness of previous workers' rationales affects the performance of the iterative approach in a brainstorming task and a rating task. Rather than viewing this work as a conclusive piece, the author believes that this research endeavor is just the beginning of a new research focus that examines and supports meta-cognitive processes in crowdsourcing activities.

  2. Measuring Appeal in Human Computer Interaction

    DEFF Research Database (Denmark)

    Neben, Tillmann; Xiao, Bo Sophia; Lim, Eric T.

    2015-01-01

    has relied predominantly on subjective self-rating scales, this research-in-progress paper proposes complementary objective measurement for appeal. We start by reviewing the linkages between the theoretical constructs related to appeal and their neurophysiological correlates. We then review past......Appeal refers to the positive emotional response to an aesthetic, beautiful, or in another way desirable stimulus. It is a recurring topic in information systems (IS) research, and is important for understanding many phenomena of user behavior and decision-making. While past IS research on appeal...

  3. Human/computer control of undersea teleoperators

    Science.gov (United States)

    Sheridan, T. B.; Verplank, W. L.; Brooks, T. L.

    1978-01-01

    The potential of supervisory controlled teleoperators for accomplishment of manipulation and sensory tasks in deep ocean environments is discussed. Teleoperators and supervisory control are defined, the current problems of human divers are reviewed, and some assertions are made about why supervisory control has potential use to replace and extend human diver capabilities. The relative roles of man and computer and the variables involved in man-computer interaction are next discussed. Finally, a detailed description of a supervisory controlled teleoperator system, SUPERMAN, is presented.

  4. 航空武器系统通用数据管理平台的设计与实现%Design and Implementation of the General Data Management Platform for Weapon System of Aircraft

    Institute of Scientific and Technical Information of China (English)

    胡宇; 周德云; 汪凌霄

    2011-01-01

    针对传统航空武器电子系统设计中存在的数据管理混乱和低效问题,提出了一种基于数据库的管理平台对整个设备与接口控制信息进行管理的方案。基于三层开放式结构,建立了以SQL Server为数据库引擎,结合XML进行数据管理的模型,实现了对数据存储、数据操作以及终端管理的功能,形成了拥有丰富接口的开放式武器系统辅助设计平台。该平台具有友好的人机界面和良好的可扩展性,并在作战飞机航空武器仿真系统中得到应用。%Aimed at the management chaos and ineffectiveness in traditional designing for weapon system of aircraft, gave a solution based on database technologies to manage the equipments and interface data during the weapon system designing. Based on the open structure with three layers, founded a model using SQL Server as the database engine and XML as the storage tool. Implemented the platform with the functions of data storage, data operation and terminal management, which also have open and abundant interface for developers of weapon system and its simulation system. The practice shows that this platform can improve the efficiency of the development in weapon system of aircraft, and effectively avoid mistakes.

  5. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  6. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  7. Naval Weapons Station Earle Reassessment

    Science.gov (United States)

    2013-12-01

    surveys for their Section 110 compliance: Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger 1999...text within brackets. Berger Report 1999 Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger... architectural treatment of buildings at NWS Earle: a traditional vernacular theme with minimal decorative detailing. This so-called minimal traditional

  8. Musculoskeletal colloquialisms based on weapons.

    Science.gov (United States)

    Agrawal, Anuj

    2017-01-01

    Eponyms and colloquialisms are commonly used in orthopaedic literature and convey a great deal of information in a concise fashion. Several orthopaedic conditions have characteristic clinical or radiologic appearances, mimicking the appearance of certain arms or weapons. Most of these are easy to memorise and recognise, provided the orthopaedic surgeon is aware of the colloquialism and familiar with the appearance of the weapon on which it is based. Unfortunately, many such colloquialisms are based on traditional weapons no longer in current use, and their appearances are not familiar to most orthopaedists, creating confusion and difficulty in understanding them. In this paper, we have reviewed the musculoskeletal colloquialisms based on weapons, including a brief description of the weapon with illustrations, highlighting the importance of the colloquialism in diagnosis or treatment of musculoskeletal conditions.

  9. Nuclear weapon reliability evaluation methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)

    1993-06-01

    This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

  10. 基于马尔可夫过程的武器系统相关失效分析%Analysis of Weapon Systems Subject to Correlative Cause Failures Based on Markov Process

    Institute of Scientific and Technical Information of China (English)

    张振友; 郭强; 黄立坡; 杨岐子

    2012-01-01

    利用马尔可夫过程分别对共因失效和载荷共事失效两种相关失效的系统平均失效时间进行了建模分析.针对同时出现两种相关失效的武器系统进行了实例分析,并将结果和不考虑相关失效时的计算结果进行了对比,对相关失效分析在可靠性分析和评价中的重要作用进行了阐述.%The mean time to failure of weapon systems subject to common cause failures and load share cause failures is analyzed based on Markov process, the weapon systems in which common cause failures and load share? cause failures at the same time is analyzed. The result is compared with that without considering correlative cause failures. The results show that the Analysis of Weapon systems subject to correlative cause failures is very important.

  11. Modeling and Calculation for Influence of Spot Jamming on Antiaircraft Gun Weapon System's Firing Efficiency%瞄准式干扰对高炮射击效能影响的计算分析

    Institute of Scientific and Technical Information of China (English)

    张玉琳; 蒋里强; 高建军; 陈敏雅

    2015-01-01

    针对瞄准式干扰对某型高炮射击效能的影响,从炮瞄雷达的基本工作原理入手,根据电子干扰行动的基本规律,就自卫瞄准式干扰对某型高炮射击效能的影响进行数学建模与定量计算分析;研究方法及结论对定量计算电子干扰高炮武器系统射击效能的影响具有借鉴意义.%Aiming at influence of spot jamming on antiaircraft gun weapon system's firing efficiency,from the keystone of radar confront,based on the essence rule of electronic jamming action, is calculated and analyazed influence to a certain type of antiaircraft gun weapon system's firing efficiency for spot jamming. The paper offers a calculated method for spot jamming which has a influence on antiaircraft gun weapon system,the method and conclusion have a very important meaning for having a quantitative calculation to electronic jamming .

  12. Analysis of Fire Effectiveness Based on High-rate-firing Naval Gun Weapon System%基于高射频舰炮武器系统的射击效力分析

    Institute of Scientific and Technical Information of China (English)

    胡小利; 王炳

    2015-01-01

    In the face of the improved missile penetration ability and its speed, the author proposes to increase the gun firing rate based on the existing high⁃rate⁃firing of naval gun weapon system for an effective way, with the grim situation of sea bat⁃tlefield as a background. And this paper analyzes the Shooting effectiveness of different firing rate naval gun weapon system through the establishment of the mathematics module for damage probability. There is an important guiding significance on the development of high⁃rate⁃firing automatic gun weapon system.%以严峻的海上战场形势为背景,面对飞行速度和突防能力不断加强的反舰导弹,在现有高射频舰炮武器系统基础上,提出以增加舰炮射速为途径的改进方式,并建立对空碰炸射击毁伤模型,对不同射频的舰炮武器系统进行射击效力分析,对高射频自动炮武器系统的研制有重要指导意义。

  13. 基于技术检测的装甲装备武器系统执行任务能力评估%Ability to Implement the Mandate Assessment of Armored Equipment Weapons System Based on Technical Detection

    Institute of Scientific and Technical Information of China (English)

    张辽宁; 屈洋; 张政; 邢旺

    2016-01-01

    Technology state affects the ability to implement the mandate of armored equipment weapons system greatly, yet there are few studies on its evaluation. Aimed at the problem, the paper put forward a method of evaluating the ability to implement the mandate of armored equipment based on the technical detection of equipment, and a case evaluation and analysis of a certain armored equipment weapon system is carried out. The method is operable and can provide data reference for the development of technical detection equipment and technology of armored equipment weapons system.%技术状态对装甲装备武器系统的执行任务能力有着重要影响,目前对其评估的研究还很少。针对这一问题,提出一种利用技术检测对装甲装备武器系统执行任务能力进行评估的方法,并结合某装甲装备武器系统进行了实例分析。分析结果表明:该方法具有可操作性,能够为装甲装备武器系统检测设备和技术的发展提供数据参考。

  14. Secure Human-Computer Identification against Peeping Attacks (SecHCI): A Survey

    OpenAIRE

    Li, SJ; Shum, HY

    2003-01-01

    This paper focuses on human-computer identification systems against peeping attacks, in which adversaries can observe (and even control) interactions between humans (provers) and computers (verifiers). Real cases on peeping attacks were reported by Ross J. Anderson ten years before. Fixed passwords are insecure to peeping attacks since adversaries can simply replay the observed passwords. Some identification techniques can be used to defeat peeping attacks, but auxiliary devices must be used ...

  15. Formal modelling techniques in human-computer interaction

    NARCIS (Netherlands)

    Haan, de G.; Veer, van der G.C.; Vliet, van J.C.

    1991-01-01

    This paper is a theoretical contribution, elaborating the concept of models as used in Cognitive Ergonomics. A number of formal modelling techniques in human-computer interaction will be reviewed and discussed. The analysis focusses on different related concepts of formal modelling techniques in hum

  16. Humans, computers and wizards human (simulated) computer interaction

    CERN Document Server

    Fraser, Norman; McGlashan, Scott; Wooffitt, Robin

    2013-01-01

    Using data taken from a major European Union funded project on speech understanding, the SunDial project, this book considers current perspectives on human computer interaction and argues for the value of an approach taken from sociology which is based on conversation analysis.

  17. 2.75 Inch Rocket/AH-1G Helicopter Weapons System Baseline Instrumentation Test Report. Volume 1,

    Science.gov (United States)

    1972-04-01

    network with sharper transduers while eliminating the e a d cost eut-of characteristics than thoe ordinarily supplied of complex arrier systems...chancX in the output proportional to the displacement. Both IF LOAD series of transduers are available in seven stroke W.e s rn .Cores ane available with

  18. Human Resources Data in Weapon System Design: An Initial Plan for Development of a Unified Data Base.

    Science.gov (United States)

    1980-11-01

    was established based o11 the results elf the first threeI tasks and oln an inilustry slur vey. This re liort DD I F’N7 1473 EDITION OF INOV 65 IS...systems) would not materialize . This would mean, of course, that the UDB experience data -51- would not be available to improve the predictive programs in

  19. Improving U. S. Army Analysis of Alternatives to Better Address the Weapon Systems Acquisition Reform Act of 2009

    Science.gov (United States)

    2012-05-01

    Hume (2012) presents ideas for building an analytical framework for the capabilities development process. TRAC (2011b) presents recommendations to...TRAC WSMR Mr. Scott Schoeb, Chief, Maneuver Systems Branch, AMSAA Mr. Alan Dinsmore, Integration Team Leader, AMSAA Mr. David Henningsen, Office...continue to be, involved in multiple Army AoAs. The name, rank, organization, and position are provided below for each person interviewed. Dr. David

  20. Research on Top-layer Planning and Overall Design Project Decision of Weapon System Based on Analytic Hierarchy Process

    Institute of Scientific and Technical Information of China (English)

    WU Rui-wen

    2012-01-01

    Based on analytic hierarchy process(AHP) theory,a vital important problem for top-layer planning and overall design of modern self-propelled gun-howitzer system,namely overall project decision-making,was analyzed.A hierarchy model was built to solve the complex and uncertain problem,and a decision-making index system was established.Then,the weights in all layers of the model were determined by simulating experts.Finally,according to the calculated results of the elements in each layer,the weights of the alternatives to the overall goal were calculated to conduct the hierarchy total decision.A decision example shows that the overall project of a self-propelled gun-howitzer A is much better than that of another self-propelled gun-howitzer B,digitalized in comprehensive efficiency,operability,system accuracy and economy,but inferior to it in the information capability,and there exists relatively larger gap between them in the information sharing index.

  1. Research on HLA Distributing Interactive Simulation of Torpedo Weapon System%基于HLA的鱼雷武器系统分布交互仿真

    Institute of Scientific and Technical Information of China (English)

    魏静; 高立娥; 杜来毅; 王飞

    2011-01-01

    为避免传统意义上低层次、低效率的重复开发,通过对HIA联邦成员的仿真流程及内部接口关系的研究,构建了基于HLA标准的由鱼雷、发射艇、目标、对抗器材等联邦成员组成的鱼雷作战对抗分布交互仿真系统,给出了仿真系统的网络拓扑结构,完成了联邦成员的功能实现.介绍了水声对抗条件下的基本作战仿真流程,包括初始设定、仿真计算、搜索探测、决策方案、双方武器或干扰器材的对抗过程、仿真结束等六个阶段:完成了鱼雷武器系统在潜一潜,舰一潜对抗态势条件下的弹道仿真研究.%In order to ovoid low level and inefficient exploitation , by means of researching of simulation flow and inside interface of HLA federation member, based on HLA standard, torpedo warfare simulation system is established by federation members such as torpedo, launch ship, target and confront equipments.This paper introduces the principal campaign simulation flow under the different countermove.It consists of the initialization, searching, detecting, decision, and the countermine process for weapon and countermeasure, and it investigates the ballistic trajectory simulation under the submarine to submarine countermine situation.

  2. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  3. Application of inertial confinement fusion to weapon technology

    Energy Technology Data Exchange (ETDEWEB)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved.

  4. Risk in the Weapons Stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Noone, Bailey C [Los Alamos National Laboratory

    2012-08-14

    When it comes to the nuclear weapons stockpile, risk must be as low as possible. Design and care to keep the stockpile healthy involves all aspects of risk management. Design diversity is a method that helps to mitigate risk.

  5. The Weaponization of Social Media

    Science.gov (United States)

    2016-06-10

    media efforts will be compared to similar Western business and civic social media centric marketing efforts from both a technical and theoretical...THE WEAPONIZATION OF SOCIAL MEDIA A thesis presented to the Faculty of the U.S. Army Command and General Staff College in...The Weaponization of Social Media 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Jack B. Irby III, MAJ 5d

  6. Collection of Information Directly from Patients through an Adaptive Human-computer Interface

    Science.gov (United States)

    Lobach, David F.; Arbanas, Jennifer M.; Mishra, Dharani D.; Wildemuth, Barbara; Campbell, Marci

    2002-01-01

    Clinical information collected directly from patients is critical to the practice of medicine. Past efforts to collect this information using computers have had limited utility because these efforts required users to be facile with the information collecting system. This poster describes the development and function of a computer system that uses technology to overcome the limitations of previous computer-based data collection tools by adapting the human-computer interface to fit the skills of the user. The system has been successfully used at two diverse clinical sites.

  7. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  8. Evaluation of Operational Capability for Surface-to-Air Missile Weapon System Based on Neural Network%基于神经网络的地空导弹武器系统作战能力评估

    Institute of Scientific and Technical Information of China (English)

    李国宏; 孙健; 夏伟鹏; 康红霞

    2011-01-01

    The limitations of evaluation method of operational capability for surface-to-air missile weapon system are analyzed in the light of the characteristics of its operational use in this paper. The index system for evaluating the operational capability of surface-to-air weapon system according to the principle of setting the index system. Through analysis of the structure and characteristics of artificial neural network,the neural network model used to evaluate the operational capability of surface-to-air missile weapon system. This model needs not to determine the strict quantitative relations between different factors,overcome the negative influences of man-made factors.%根据地空导弹武器系统的作战使用特点,分析了评估其作战能力方法的局限性.根据指标体系设置的原则,建立了地空导弹武器系统作战能力评价指标体系.通过分析人工神经网络的结构和特点,设计了评估地空导弹武器系统作战能力的神经网络模型.该模型不需要确定各因素之间严格的定量关系,克服了以往由于人为因素所造成的负面影响.最后通过实际应用,说明该方法简便易行,准确可靠.

  9. 支持ModBus协议的组态式人机界面系统的设计∗%Configurable Human Computer Interface System Design Based on ModBus Protocol

    Institute of Scientific and Technical Information of China (English)

    何鹏飞; 何平; 张琼琼; 赵鸿博

    2015-01-01

    人机界面在工业控制领域得到广泛应用。针对传统人机界面画面固定,通用性差等缺点,采用STM32平台设计了一种基于组态式的,画面可重配置的人机界面系统。通过组态软件设计画面,从而应用到不同的设备或工业控制系统。文章提出一种多层次的有限状态机来实现画面的显示与跳转,从而可以实现复杂画面逻辑。并采用ModBus协议将其应用于多轴控制器中,实现对电机速度、位移、报警信息等参数的显示与修改。对ModBus协议的支持,可以实现连接不同的设备和一个设备网络,从而监控多个设备中的状态参数。%HMI ( Human Machine Interface ) is widely applied in industrial control filed. Traditional HMI have disadvantages of poor universality and fixed pictures. Design a new one with a Feature of pictures reconfiguration based on STM32 platform. Through the configuration software design of the screen, which is applied to different equipment or the industrial control system. Proposed a multi-level finite state machine to implement display and jump functions. And the ModBus protocol has been used in the multi-axis controller to achieve the visualization and modification of motor parameters comprising speed, displacement, alarm in-formation and so forth.

  10. Research on Reliability Optimization of Antiaircraft Weapon System Based on Heuristic Algorithm%启发式算法的防空武器系统可靠性优化

    Institute of Scientific and Technical Information of China (English)

    郭强; 蒋里强; 高建军

    2013-01-01

    针对复杂武器系统可靠性分配最优化问题,以系统的可靠度最大为目标函数,综合考虑系统的费用、质量等约束条件,建立了武器系统的可靠性冗余分配最优化模型,提出了基于启发式方法的求解算法,通过改进各级子系统的可靠性从而使总的系统可靠性最大.算法设计比较简便,易于编程实现.通过对防空武器系统的可靠性分配优化问题进行实例分析,结果表明算法是有效、实用的.为大型复杂武器系统的可靠性设计和优化研究提供了科学有效的方法.%Aiming at the reliability redundancy optimization allotment of the complicated weapon system, using the biggest reliability as the target value, synthesize expenses, quality .etc. to control as condition, the model optimization about the reliability redundancy optimization allotment of the weapon system is builded up; put forward the heuristic algorithm solving calculated way according to opposite increase quantity through. Tthe reliability that passes the improvement all levels subsystem makes the total system reliability biggest, carrying on a solid example analysis to the reliability redundancy optimization allotment of the antiaircraft weapon system.

  11. Digital Simulation of Kill Probability on Shipborne Weapon System Against Missile Target%舰炮武器系统对导弹目标毁伤概率的数字仿真

    Institute of Scientific and Technical Information of China (English)

    李云超; 冯元伟

    2011-01-01

    Taking antimissile shipbome gun weapon system as a prototype, based on the operational process of this weapon system, and by using dynamic accuracy test data of naval gun tracing real object,a mathematical model of dynamic accuracy test calculating kill probability is constructed to simulate kill probability of shipborne gun system by directly hitting against missile targets, which realizes this simulation calculation. The simulation result is similar to that of actual effect of firing. Results show that the way of the simulation can carry out dynamic accuracy calculating kill probability and provide basis for decision making for the scheme of firing tests and supply reference for fire efficiency' s evaluation and effectiveness assessment of shipborne gun weapon system.%以某型反导舰炮武器系统为原型,通过分析舰炮武器系统反导作战过程,利用靶场舰炮武器系统的动态精度试验数据,建立了动态精度计算毁伤概率的数学模型,模拟了舰炮武器系统对导弹目标着发射击的毁伤概率,实现了毁伤概率的仿真计算,仿真结果与实弹射击结果接近.结果表明,应用这种方法,可以实现动态精度预估毁伤概率,为射击试验方案制定提供决策依据,也可以为舰炮武器系统射击效力的鉴定和效能评估提供参考.

  12. Non-destructive measurement of human griping force in a human-weapon system%人枪系统中人体握持主动力非破坏测量方法

    Institute of Scientific and Technical Information of China (English)

    金鑫; 周克栋; 赫雷; 黄雪鹰; 张俊斌

    2015-01-01

    Here,a measurement method of active griping force was proposed to obtain the human griping force under continuous firing.Based on bionics and ergonomics,a bionic equivalent grip was designed to replace human hand. The bionic grip could be used to measure the equivalent forces system of a human-weapon system without destroying the weapon.The explicit active griping force components emerged after the equivalent forces system was decomposed with EMD.The obtained active griping force data were significant to study affecting factors of firing accuracy.Test results showed that the proposed measurement method can accurately reflect the action of human griping force in a human-weapon system under continuous firing.%为获得连续射击时人体握持主动力参数,提出一种人体握持主动力的测量方法。该方法设计了基于仿生学及人机工程学的仿生握爪,以等效代替人手握持射击。仿生握爪能够在不破坏枪支的情况下获得连续射击时人枪作用力的等效力系,该力系经 EMD 分解可得显现的握持主动力分量。所得的握持主动力参数对研究射击精度影响因素等课题具有重要意义。实验结果表明,该方法能准确反映连续射击时人枪系统力的作用。

  13. Design of human-computer dialogue statement library system based on sentence category%基于句类模型的人机对话系统语句库设计

    Institute of Scientific and Technical Information of China (English)

    梁子琳; 丁润伟; 刘宏

    2011-01-01

    A statement library of common topics was constructed in this paper for the problems which the low intelligence of human-machine dialogue system and the statement library was limited in some special field at present. The statement library based on sentence category of Chinese sentence types covered twenty-eight common topics, which was composed of 900 sentences. In addition, the statement library can generate much more sentences by taking place of key words for much broad fields of human-machine interaction. The statement library was more complete, improved the intelligence of human-machine dialogue and reduced the workload of constructing statement library. The real-time can be achieved because the statement library was small. The experiment results for human-machine interaction show that the statement library presented in this paper is better than that of chat robot-little I. The statement library can improve the intelligence and real-time of a chat robot, so that made human-machine interaction more friendly.%针对目前人机对话系统智能性较低、语句库领域受限的现状,设计了面向日常生活常用话题的机器人回复语句库,用于日常生活聊天.语句库以汉语句子类型中的句类为模型,构建了涵盖日常生活常用的28个话题范围的900句语句库.通过关键词语的替换可以扩展出更多的语句,从而用于更广泛领域的人机对话交流,增加了语句库的完善性,尽量避免了出现答非所问的情形.同时该构建方法降低了人工构建语句库的工作量,而且由于语句库较小,确保了系统实现的实时性.人机交互对比实验表明:该语句库实现了使用较少的语句就基本可以进行日常话题的对话,满意度高于对比网络聊天机器人小i,使得人机交互更加友好.

  14. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.

    1998-12-01

    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  15. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  16. 典藏數位化資訊環境之探討 | On Creation and Management of Digital Libraries: System Environment, Human-Computer Interface and Reseach Issues

    Directory of Open Access Journals (Sweden)

    何建明、黃世昆、莊庭瑞、李德財

    2000-10-01

    management of high-performance, user-friendly mass digital archives not only presents many challenging research and engineering issues, but the digital content or collections in the digital archives themselves also serve as the foundation of a genuine "information society". We consider the digital library that we build in Academia Sinica as a human- and content-centered system with participants including general users, researchers, content providers, content digitalization specialists, and system engineers. In building the Academia Sinica Digital Library we not only obtain various supporting tools for content management, but also establish a unified process for content creation, storage and presentation, which helps ascertain consistency and interoperability of the content in the digital library. In this article we touch on some issues related to the construction, usage and maintenance of a digital library aimed to contain a diverse range of collections of digital objects putting together by information content providers of various disciplines, and be ubiquitously accessible via the Internet.

  17. 双联装火炮武器系统零位检测和规正方法%Method of Zero Check and Adjustment for Twin-Barrelled Gun Weapon System

    Institute of Scientific and Technical Information of China (English)

    杨广; 李卓; 吉亚林

    2014-01-01

    在交汇式双联装火炮武器系统中,火炮装置通过联装两座火炮单元来提高发射率,由于火炮单元自动机轴线与火炮装置的实际架位存在偏差,常规标定方法无法获取此类武器系统火炮架位与跟踪传感器的偏差。针对此问题提出一种交汇式双联装火炮武器系统的零位检测和规正方法,该方法通过零飞方式检查火炮瞄准误差,并根据火炮高低指向实时地计算炮管指向和火炮架位的实际偏差,以准确测量火炮与跟踪传感器的零位偏差,实现交汇式双联装火炮武器系统快速标定。%Twin-barrelled gun weapon system equips with two guns. Its shooting rate is higher. But we cannot get the error between the gun servo and the tracking sensor directly by traditional method because of its direction difference between the gun barrel and the gun servo. So a fast calibrating method is declared. In this method, the weapon system checks the aiming error of gun in zero-fly mode. It�s a fast and efficient method to check and adjust the zero of the twin-barrelled gun weapon system.

  18. Analysis of Quantity Requirement and Its Marginal Utility of Weapon System Based on Random Theory%基于随机理论的武器系统数量需求及边际效用分析

    Institute of Scientific and Technical Information of China (English)

    张庆捷; 赵瑾; 张杰; 郑斌

    2012-01-01

    针对武器系统作战需求中的数量需求问题,提出了一种基于作战过程状态转移的研究思路.根据“侦察—信息处理与决策—火力打击”的一般作战过程,建立了状态转移方程,推导出了数量需求函数的解析表达式,并对其边际效用进行了分析.结果表明:增加武器系统数量和提高武器系统战技性能(tactical and technical characteristics,TTC)对火力打击效能均具有补偿作用,但它们的边际效用是有区分的,分水岭就是该武器系统是否具备精确打击能力.%To study the problem of quantity requirement in weapon system operational requirement, an idea based on state transition of operational process is put forward. With the general operational process of "reconnaissance-information processing and decision-fire attack", the state transition function is built, the analytic expressions of quantity requirement function is deduced and calculated, and the marginal utility is also analyzed. The main conclusion is made as follows, the increased quantity and the improved tactical and technical characteristics(TTC) of weapon system will make up fire efficiency both, but with different marginal utility, and weather this certain weapon system has accurate fire ability or not is regarded as the watershed.

  19. Homo ludens in the loop playful human computation systems

    CERN Document Server

    Krause, Markus

    2014-01-01

    The human mind is incredible. It solves problems with ease that will elude machines even for the next decades. This book explores what happens when humans and machines work together to solve problems machines cannot yet solve alone. It explains how machines and computers can work together and how humans can have fun helping to face some of the most challenging problems of artificial intelligence. In this book, you will find designs for games that are entertaining and yet able to collect data to train machines for complex tasks such as natural language processing or image understanding. You wil

  20. Operational characteristics optimization of human-computer system

    OpenAIRE

    Zulquernain Mallick; Irfan Anjum Badruddin magami; Khaleed Hussain Tandur

    2010-01-01

    Computer operational parameters are having vital influence on the operators efficiency from readability viewpoint. Four parameters namely font, text/background color, viewing angle and viewing distance are analyzed. The text reading task, in the form of English text, was presented on the computer screen to the participating subjects and their performance, measured in terms of number of words read per minute (NWRPM), was recorded. For the purpose of optimization, the Taguchi method is u...

  1. Operational characteristics optimization of human-computer system

    Directory of Open Access Journals (Sweden)

    Zulquernain Mallick

    2010-09-01

    Full Text Available Computer operational parameters are having vital influence on the operators efficiency from readability viewpoint. Four parameters namely font, text/background color, viewing angle and viewing distance are analyzed. The text reading task, in the form of English text, was presented on the computer screen to the participating subjects and their performance, measured in terms of number of words read per minute (NWRPM, was recorded. For the purpose of optimization, the Taguchi method is used to find the optimal parameters to maximize operators’ efficiency for performing readability task. Two levels of each parameter have been considered in this study. An orthogonal array, the signal-to-noise (S/N ratio and the analysis of variance (ANOVA were employed to investigate the operators’ performance/efficiency. Results showed that Times Roman font, black text on white background, 40 degree viewing angle and 60 cm viewing distance, the subjects were quite comfortable, efficient and read maximum number of words per minute. Text/background color was dominant parameter with a percentage contribution of 76.18% towards the laid down objective followed by font type at 18.17%, viewing distance 7.04% and viewing angle 0.58%. Experimental results are provided to confirm the effectiveness of this approach.

  2. Derivation of models for nuclear weapon terrorist arming and detonation risk analysis

    Energy Technology Data Exchange (ETDEWEB)

    Parziale, A A

    1998-03-01

    This report investigates "use control" for the on-site arming and detonation, by terrorists, of stored weapon systems. We investigate both components of weapon "use control", which we define as: (1) weapon "use denial" * that we model as a probability, Pj (denial), that represents the chances that terrorists attempting to arm a type j weapon will commit a non-recoverable error, and (2) weapon "use delay" that we model as a random variable, Tj , that represents the arming delay imposed by the use control features of a type j weapon, before detonation can occur. Using information pertaining to the physical security system at a storage site, the postulated terrorist attack force size, and simulated combat engagement outcomes, we formulate the frequency, fj , and probability, P(dj ), of on-site detonation, for generic weapon types j. We derive a model that disjoins the performance of site physical security, from that for weapon use control, if the use control random variable Tj has a Uniform or histogram distribution. This is an especially significant result where most complex distributions can be adequately approximated with a histogram. Hence, we can conduct combat simulations to obtain the physical security performance of a specific storage site independent of the use control features associated with specific weapon types that are stored, or might be stored, at the site. In turn, we can obtain the use control performance for various weapon types, independent of where they are stored and the physical security systems surrounding them. Our models can then mathematically combine physical security performance and weapon use control performance for any combination of storage facility and weapon type.

  3. Human -Computer Interface using Gestures based on Neural Network

    Directory of Open Access Journals (Sweden)

    Aarti Malik

    2014-10-01

    Full Text Available - Gestures are powerful tools for non-verbal communication. Human computer interface (HCI is a growing field which reduces the complexity of interaction between human and machine in which gestures are used for conveying information or controlling the machine. In the present paper, static hand gestures are utilized for this purpose. The paper presents a novel technique of recognizing hand gestures i.e. A-Z alphabets, 0-9 numbers and 6 additional control signals (for keyboard and mouse control by extracting various features of hand ,creating a feature vector table and training a neural network. The proposed work has a recognition rate of 99%. .

  4. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  5. Research on Computer Aided Innovation Model of Weapon Equipment Requirement Demonstration

    Science.gov (United States)

    Li, Yong; Guo, Qisheng; Wang, Rui; Li, Liang

    Firstly, in order to overcome the shortcoming of using only AD or TRIZ solely, and solve the problems currently existed in weapon equipment requirement demonstration, the paper construct the method system of weapon equipment requirement demonstration combining QFD, AD, TRIZ, FA. Then, we construct a CAI model frame of weapon equipment requirement demonstration, which include requirement decomposed model, requirement mapping model and requirement plan optimization model. Finally, we construct the computer aided innovation model of weapon equipment requirement demonstration, and developed CAI software of equipment requirement demonstration.

  6. Data Fusion and Its Application of Electro-Optical Sensor and Radar in Ship Cannon Weapon System%舰炮武器系统光电传感器与雷达数据融合及应用

    Institute of Scientific and Technical Information of China (English)

    丛树学; 高俊云

    2012-01-01

    目标参数的质量直接影响武器系统的命中概率,因此,光电、雷达传感器数据的选优尤为重要,数据融合解决了这一问题。针对舰炮武器系统雷达及光电传感器的数据融合,建立了数学模型,并根据所建立的模型提出工程实践,提高了武器系统的命中率。%The quality of target parameters influences the hit probability of weapon system directly. I nereIore, me opLmuzu- tion of the data of electro-optical sensor and radar is very important. Data fusion could solve the problem. In view of the data fusion of electro-opticaI sensor and radar in ship cannon system, the mathematic model is established, and the engineering practice based on the model is described. The data fusion method mentioned in this paper improves the hit probability of the weapon system.

  7. 防空导弹武器系统通用火控软件设计与实现%General Design and Accomplishment of Firepower Control Software in Air Defense Missile Weapon System

    Institute of Scientific and Technical Information of China (English)

    陈华

    2011-01-01

    针对不同防空导弹武器系统的火控软件之间不能互用的现状,分析了火控系统各主要功能模块之间的接口关系,提出了火控软件通用化设计的思路,并用C++实现了该设计.火控软件的通用化设计值碍将来防空导弹能武器系统火控软件的标准化设计和编程借鉴.%s :Contrasting the status of no interoperability in firepower control softwares among different aerial defense missile weapon system, the interface relation of functional module in firepower control system is analyzed.And the idea of general design of firepower control software is put forward.Furthermore, the idea is realized by using C++ programming.The general design of firepower control software is worth used for reference in the standard design and programming of future aerial defense missile weapon system.

  8. Research on Test Method of Ship-Borne Torpedo Defence Weapon System Intercepting Torpedo in Sea Trial%舰载鱼雷防御武器系统拦截实航鱼雷试验方法

    Institute of Scientific and Technical Information of China (English)

    侯宝娥; 陈高杰

    2014-01-01

    Based on the test destination of ship-borne torpedo defence weapon system intercepting torpedo in sea trial,this paper first introduces the system constitution and working principle briefly. And then,the feasible test sea -lanes are researched and designed. Lastly,the concrete test implementary scheme,data-processing and result assessment are proposed. The method can guide the torpedo defense fighting and the operating of torpedo defense weapon system.%针对舰载鱼雷防御武器系统拦截实航鱼雷试验目的,在简单介绍系统组成及工作原理的基础上,研究设计了可行的试验航路,并提出具体的试验实施方案、试验数据处理及结果评定方法。对水面舰的鱼雷防御作战、鱼雷防御武器系统的使用有一定的指导意义。

  9. The Combat Efficiency Evaluation of the Self-Propelled Weapon System Based on AHP and Cloud Theory%基于AHP和云理论的自行火炮武器系统作战效能评估

    Institute of Scientific and Technical Information of China (English)

    周瑾粼; 高启航

    2014-01-01

    In view of the problem in the combat efficiency evaluation of the self-propelled weapon system,this paper establishes the index system of the combat efficiency evaluation and the mathematical model by use of Analytic Hierarchy Process (AHP) and the cloud centre-of-gravity judgment process,surveys the availability and the function of this method combining to the specific living example. It also provides an effective method and way for the combat efficiency evaluation of the self-propelled weapon system.%针对自行火炮武器系统作战效能的评估问题,运用AHP和云重心评判法建立作战效能评估指标体系和评估数学模型,并结合具体实例验证了此方法的有效性和实用性,为自行火炮武器系统作战效能评估提供了一种有效的方法和途径。

  10. 一种高炮武器系统射击准备精度综合检测方法%An Integrated Test Method Based on Accuracy of Fire Preparation for Antiaircraft Artillery Weapon System

    Institute of Scientific and Technical Information of China (English)

    刘永鸿; 张文红

    2011-01-01

    In order to improve the fire preparation accuracy of antiaircraft artillery weapon system, put forward an integrated test method for accuracy of fire preparation based on CCD camera. The checkout equipment includes cold gun correction sighting telescope, the single chip application system, display equipment and storage battery and so on. Through the calculation of ballistic correction and the picture deviating techniques of interpretation based on muzzle aiming direction in linkage, realize the integrated test for error of fire preparation based on antiaircraft artillery weapon system.The application results show that the executed device has these characteristics of simple structure and high check precision etc.%为提高高炮武器系统射击准备精度,提出一种基于CCD摄像的射击准备精度综合检测方法.检测装置由冷炮校正器、单片机应用系统、显示器和蓄电池等构成,通过弹道修正量计算和联动状态下炮口指向的图像偏差判别方法,实现高炮武器系统射击准备误差的综合检测.应用结果表明,该实施装置具有结构简单、检测精度高等特点.

  11. Analysis on Operational capability for Truck-mounted Howitzers Weapon System Based on AHP%基于层次分析法的车载炮武器系统作战能力

    Institute of Scientific and Technical Information of China (English)

    汪洋

    2011-01-01

    The truck-mounted howitzers weapon system is a sort of novel army ground fire assault system,there is lots of uncertainty factors influenced the operational capability of truck-mounted Howitzers artillery division.In the paper,it made the quantization analysis for operational capability by means of AHP,and obtained the related data and conclusion.It provided a certain reference base for training and application of truck-mounted howitzers weapon system in troops.%车载炮武器系统是一种新型陆军地面火力打击系统,影响车载炮炮兵分队作战能力的不定因素很多,本文采用层次分析法对其作战能力进行了量化分析,得出了相关数据和结论,为车载炮武器系统在部队的训练和使用提供了一定的参考依据。

  12. Cross-cultural human-computer interaction and user experience design a semiotic perspective

    CERN Document Server

    Brejcha, Jan

    2015-01-01

    This book describes patterns of language and culture in human-computer interaction (HCI). Through numerous examples, it shows why these patterns matter and how to exploit them to design a better user experience (UX) with computer systems. It provides scientific information on the theoretical and practical areas of the interaction and communication design for research experts and industry practitioners and covers the latest research in semiotics and cultural studies, bringing a set of tools and methods to benefit the process of designing with the cultural background in mind.

  13. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  14. A user-friendly wearable single-channel EOG-based human-computer interface for cursor control

    OpenAIRE

    2015-01-01

    This paper presents a novel wearable single-channel electrooculography (EOG) based human-computer interface (HCI) with a simple system design and robust performance. In the proposed system, EOG signals for control are generated from double eye blinks, collected by a commercial wearable device (the NeuroSky MindWave headset), and then converted into a sequence of commands that can control cursor navigations and actions. The EOG-based cursor control system was tested on 8 subjects in indoor or ...

  15. Fire Command Control Model for Multi-Waveband Photoelectrical Camouflage Weapon System%多波段光电伪装武器系统射击指挥控制模型

    Institute of Scientific and Technical Information of China (English)

    朱安国; 王朝晖; 张继春; 杨槐

    2011-01-01

    快速实施大面积多波段烟幕防护,是现代战争中保护重要军事、经济目标的有效手段.多波段光电伪装武器系统是近年来因这种需求而发展起来的一种新型武器装备,但大多自主作战、缺乏统一的指挥控制功能,给出系统成建制协同作战时,从目标预测、建立空间遮障到火力分配等射击指挥控制相关模型.%To quickly carry out the large-area and multi-waveband smoke protection is the effective means for protecting the important military and electronic targets in the modern war. The multi-waveband photoelectrical weapon system is the new type of weapon device developed to meet this requirement in recent years. But it independently carries out the war task without the unified command and control function, so this paper gives the related fire command control models involving the target prediction,establishment of the space block, and the fire allocation when the system carries out the cooperative war task.

  16. Security after the revolutions of 1989 and 1991: The future with nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Weber, S. [Univ. of California, Berkeley, CA (United States)

    1992-12-31

    Political scientists typically view weapons within the realm of effects, not within the realm of cause. That is, weapons are a consequence of the great causal factors in international relations. Insecurity is the most important of these factors; it follows from the uneven distribution of power among states, the security dilemma, and the ever-present possibility that violence will be used to settle disagreements because there is no higher authority above states capable of enforcing rules. According to this logic weapons cause neither war nor peace. They are simply tools that states use to gain a share of the scarcest commodity - security - by fighting other states or by threatening to do so if necessary. Nuclear weapons are a product of great industrial capabilities, knowledge, and other resources. The United States and the Soviet Union had the largest arsenals of nuclear weapons because they were superpowers, not the other way around. On this logic, nuclear weapons reflect and reinforce a distribution of power that would exist in their absence. As the distribution of power among states changes, the status of nuclear weapons in the world will also change in a way that reflects the more fundamental causes that continue to drive state-state relationships in an anarchic world. In this chapter the author treat nuclears weapons within the realm of great causes. Arguing that nuclear weapons were a fundamental cause in bringing the Cold War, and with it the last vestiges of bipolarity, to an end. International life in the 1990s will not be the same as it was between 1945 and 1989. Will it be more like the multipolar world of the 1800s, with nuclear weapons simply grafted on the way other new weapons innovations have been in the past? That is not expected because nuclear weapons have altered the fundamental causal forces that drove previous international systems from peace to war and back again. 21 refs.

  17. 32 CFR 1903.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Weapons. 1903.10 Section 1903.10 National... INSTALLATIONS § 1903.10 Weapons. (a) Except as provided in paragraph (c) of this section, knowingly possessing or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited. (b...

  18. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  19. Real life identification of partially occluded weapons in video frames

    Science.gov (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.

    2016-05-01

    We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.

  20. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  1. Handheld Concealed Weapons Detector Development

    Science.gov (United States)

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  2. Supporting Negotiation Behavior with Haptics-Enabled Human-Computer Interfaces.

    Science.gov (United States)

    Oguz, S O; Kucukyilmaz, A; Sezgin, Tevfik Metin; Basdogan, C

    2012-01-01

    An active research goal for human-computer interaction is to allow humans to communicate with computers in an intuitive and natural fashion, especially in real-life interaction scenarios. One approach that has been advocated to achieve this has been to build computer systems with human-like qualities and capabilities. In this paper, we present insight on how human-computer interaction can be enriched by employing the computers with behavioral patterns that naturally appear in human-human negotiation scenarios. For this purpose, we introduce a two-party negotiation game specifically built for studying the effectiveness of haptic and audio-visual cues in conveying negotiation related behaviors. The game is centered around a real-time continuous two-party negotiation scenario based on the existing game-theory and negotiation literature. During the game, humans are confronted with a computer opponent, which can display different behaviors, such as concession, competition, and negotiation. Through a user study, we show that the behaviors that are associated with human negotiation can be incorporated into human-computer interaction, and the addition of haptic cues provides a statistically significant increase in the human-recognition accuracy of machine-displayed behaviors. In addition to aspects of conveying these negotiation-related behaviors, we also focus on and report game-theoretical aspects of the overall interaction experience. In particular, we show that, as reported in the game-theory literature, certain negotiation strategies such as tit-for-tat may generate maximum combined utility for the negotiating parties, providing an excellent balance between the energy spent by the user and the combined utility of the negotiating parties.

  3. NATO's targeting process: ensuring human control over (and lawful use of) 'autonomous' weapons

    NARCIS (Netherlands)

    Roorda, M.; Williams, A.P.; Scharre, P.D.

    2015-01-01

    The prospect of the use of so-called autonomous weapon systems has raised significant legal and moral concerns. This chapter contributes to the debate by providing an alternative perspective to the current dominant focus on the technological capabilities of future weapons. The author argues that

  4. [Modern pneumatic weapons and injuries they cause].

    Science.gov (United States)

    Kozachenko, I N

    2013-01-01

    The data on the history of development and further improvement of pneumatic weapons are presented with special reference to specific features of different types and varieties of these weapons, cartridges for them, and the sphere of their application. Investigations into peculiarities of damages caused by high-capacity pneumatic weapons to the objects of forensic medical expertise affected from different distances are reviewed. Results of forensic medical expertise and clinical studies on the structure of body injuries inflicted by gunshots from pneumatic weapons to the human body are discussed. The author emphasizes the necessity of developing up-to-date terminology and classification of gunshot injuries caused by shooting from pneumatic weapons.

  5. The Human-Computer Domain Relation in UX Models

    DEFF Research Database (Denmark)

    Clemmensen, Torkil

    This paper argues that the conceptualization of the human, the computer and the domain of use in competing lines of UX research have problematic similarities and superficial differences. The paper qualitatively analyses concepts and models in five research papers that together represent two...... influential lines of UX research: aesthetics and temporal UX, and two use situations: using a website and starting to use a smartphone. The results suggest that the two lines of UX research share a focus on users’ evaluative judgments of technology, both focuses on product qualities rather than activity...... domains, give little details about users, and treat human-computer interaction as perception. The conclusion gives similarities and differences between the approaches to UX. The implications for theory building are indicated....

  6. Human-computer interface incorporating personal and application domains

    Science.gov (United States)

    Anderson, Thomas G.

    2011-03-29

    The present invention provides a human-computer interface. The interface includes provision of an application domain, for example corresponding to a three-dimensional application. The user is allowed to navigate and interact with the application domain. The interface also includes a personal domain, offering the user controls and interaction distinct from the application domain. The separation into two domains allows the most suitable interface methods in each: for example, three-dimensional navigation in the application domain, and two- or three-dimensional controls in the personal domain. Transitions between the application domain and the personal domain are under control of the user, and the transition method is substantially independent of the navigation in the application domain. For example, the user can fly through a three-dimensional application domain, and always move to the personal domain by moving a cursor near one extreme of the display.

  7. Combining Natural Human-Computer Interaction and Wireless Communication

    Directory of Open Access Journals (Sweden)

    Ştefan Gheorghe PENTIUC

    2011-01-01

    Full Text Available In this paper we present how human-computer interaction can be improved by using wireless communication between devices. Devices that offer a natural user interaction, like the Microsoft Surface Table and tablet PCs, can work together to enhance the experience of an application. Users can use physical objects for a more natural way of handling the virtual world on one hand, and interact with other users wirelessly connected on the other. Physical objects, that interact with the surface table, have a tag attached to them, allowing us to identify them, and take the required action. The TCP/IP protocol was used to handle the wireless communication over the wireless network. A server and a client application were developed for the used devices. To get a wide range of targeted mobile devices, different frameworks for developing cross platform applications were analyzed.

  8. Why Sexually Selected Weapons Are Not Ornaments.

    Science.gov (United States)

    McCullough, Erin L; Miller, Christine W; Emlen, Douglas J

    2016-10-01

    The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. 某高炮武器系统自动校射系统设计%Design of Automatic Firing Calibration System of a Certain Antiaircraft Artillery Weapon System

    Institute of Scientific and Technical Information of China (English)

    马志强; 程远增; 孙世宇; 王春平

    2011-01-01

    我国现役高炮火控系统的校射大多采用开环控制,没有自动校射功能,作战效能较低.针对某型高炮设计了一种自动校射系统,该系统采用火控解算参数与数字图像处理技术相结合的方法,火控计算机计算出虚拟弹目偏差,图像处理技术获取置信度较高的弹目偏差,对高炮射击诸元进行实时校正,克服传统校射的不足,从而实现对高炮武器系统的全过程高精度自动校射,实现高炮武器系统的快速射击,提高射击命中率,充分发挥高炮武器系统的作战效能.%China's active antiaircraft artillery fire control system mostly uses open-loop control for fireng calibration, no automatic fire calibration function, only has low operation efficiency. This paper presents a design method of automatic fire calibration system to a certain antiaircraft artillery. Combining fire control system computing parameters with digital image processing technology, automatic fire calibration system uses fire control computer computing the virtual miss distance, uses image processing technology obtaining miss distance with higher reliability in order to correct real-timely all kinds of firing data of antiaircraft artillery and overcome the deficiencies of traditional fire calibration method. For the antiaircraft artillery weapon system, this system could achieve automatic fire calibration with the whole process and high precision, ensure rapid firing and improve hit rate, give full play to the combat effectiveness.

  10. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  11. Influence of Vertical Target Density on Hit Probabity of Shipborne Atillery Weapon System%立靶密集度指标对舰炮武器系统命中概率的影响

    Institute of Scientific and Technical Information of China (English)

    孙晏涛

    2012-01-01

    文章分析了影响舰炮武器系统射击精度的几个因素,并以某型舰炮为例,利用典型数据对立靶密集度与命中概率的关系进行了仿真计算,总结了舰炮立靶密集度指标与系统精度的关系。%This paper analyzes the factors affecting the shooting accuracy of the shipborne atillery weapon system,in a type of sbipborne atillery as an example,use the typical data to simulate the relationship between vertiacl target density and hit probability,and summarize the relationship between vertiacl target density and the system accuracy.

  12. Human Computation: Object Recognition for Mobile Games Based on Single Player

    Directory of Open Access Journals (Sweden)

    Mohamed Sakr

    2014-07-01

    Full Text Available Smart phones and its applications gain a lot of popularity nowadays. Many people depend on them to finish their tasks banking, social networking, fun and a lot other things. Games with a purpose (GWAP and microtask crowdsourcing are considered two techniques of the human-computation. GWAPs depend on humans to accomplish their tasks. Porting GWAPs to smart phones will be great in increasing the number of humans in it. One of the systems of human-computation is ESP Game. ESP Game is a type of games with a purpose. ESP game will be good candidate to be ported to smart phones. This paper presents a new mobile game called MemoryLabel. It is a single player mobile game. It helps in labeling images and gives description for them. In addition, the game gives description for objects in the image not the whole image. We deploy our algorithm at the University of Menoufia for evaluation. In addition, the game is published on Google play market for android applications. In this trial, we first focused on measuring the total number of labels generated by our game and also the number of objects that have been labeled. The results reveal that the proposed game has promising results in describing images and objects.

  13. 光学标校技术在舰炮武器系统中的应用研究%Application of optical alignment calibration technique in naval gun weapon system

    Institute of Scientific and Technical Information of China (English)

    李子明

    2012-01-01

    In order to solve the problem that the alignment calibration method of aiming at stars in naval gun weapon system is easily influenced by the weather, an optical alignment calibration method with need of reference object for the integrated weapon system of radar (photoelectricity) and naval gun is proposed. The gun barrel axis is led out by the laser beam and translated parallel to the radar (photoelectricity) receiving window through the alignment optical module, then the angle difference between the radar axis and barrel gun axis is obtained to be calibrated. Test and experiment results show that the method is characterized by simple operation, high efficiency and real time, it has the alignment calibration error no more than 0. 5 mrad. This method is impacted less by the weather and environment conditions compared with the method of aiming at stars, and has a significant role to give full play to the operational effectiveness of gun weapon system.%为了解决舰炮武器系统瞄星标校受天气影响较大的问题,针对雷达(光电)与舰炮一体化的武器系统,提出了一种不需要参照物的光学标校方法.该方法用激光束将炮管轴线引出,通过不失调光学组件进行平行移动并进入雷达(光电)接收窗口,从而获得雷达(光电系统)轴线与炮管轴线的角度差并进行标校.测试与试验结果表明,该方法具有操作简便、效率高、适时性强、标校误差不大于0.5 mrad等特点,与描星方法标校相比,受天气、环境因素影响较小,对充分发挥舰炮武器系统的作战效能具有显著作用.

  14. Biomechanical and performance implications of weapon design: comparison of bullpup and conventional configurations.

    Science.gov (United States)

    Stone, Richard T; Moeller, Brandon F; Mayer, Robert R; Rosenquist, Bryce; Van Ryswyk, Darin; Eichorn, Drew

    2014-06-01

    Shooter accuracy and stability were monitored while firing two bullpup and two conventional configuration rifles of the same caliber in order to determine if one style of weapon results in superior performance. Considerable debate exists among police and military professionals regarding the differences between conventional configuration weapons, where the magazine and action are located ahead of the trigger, and bullpup configuration, where they are located behind the trigger (closer to the user). To date, no published research has attempted to evaluate this question from a physical ergonomics standpoint, and the knowledge that one style might improve stability or result in superior performance is of interest to countless military, law enforcement, and industry experts. A live-fire evaluation of both weapon styles was performed using a total of 48 participants. Shooting accuracy and fluctuations in biomechanical stability (center of pressure) were monitored while subjects used the weapons to perform standard drills. The bullpup weapon designs were found to provide a significant advantage in accuracy and shooter stability, while subjects showed considerable preference toward the conventional weapons. Although many mechanical and maintenance issues must be considered before committing to a bullpup or conventional weapon system, it is clear in terms of basic human stability that the bullpup is the more advantageous configuration. Results can be used by competitive shooter, military, law enforcement, and industry experts while outfitting personnel with a weapon system that leads to superior performance.

  15. An Adaptive H infinity Control Algorithm for Jitter Control and Target Tracking in a Directed Energy Weapon

    Science.gov (United States)

    2012-05-16

    system, (2) free electron laser for weapons of mass destruction detection, (3) high power microwave weapon, (4) electric fiber weapon system, and (5...1980’s and 1990’s1. Free-space laser communication provides many advantages to traditional microwave communication: broader bandwidth, lower power...eliminate torsional and bending modes below approximately 200 Hz. The mass of the bread board is 71.3 kg. Figure 10 Newport Breadboard7 2.1.6

  16. History of Laser Weapon Research

    Science.gov (United States)

    2012-01-01

    surgery/medicine, hair re- moval, presentation pointers, law enforcement, ranging and sighting devices, welding applications, and much more. Using...other laser technology develop- ments. The first chemical laser, hydrogen fluoride ( HF ), was built in 1965, producing 1 kW. It was then that DoD became...energy laser (HEL) weapons. In industry, the more powerful CO2 lasers are used for weld - ing, drilling, and cutting. There are many different types

  17. Deterrence and Cyber-Weapons

    Science.gov (United States)

    2013-03-01

    67, no. 4 (2012): 41. 4 Scott Shackelford , “Estonia Three Years Later,” Journal of Internet Law 8, no. 13 (2010): 25. 3 weapons were employed...effects of 134 Scott Shackelford , “From Nuclear War to Net War: Analogizing Cyber-Attacks in...International Law,” (unpublished paper, Stanford University), 5-6. 135 Shackelford , unpublished paper, 76. 136 Ibid., 73. 137 Mary Ellen O’Connell, “Cyber

  18. Effective Use of Human Computer Interaction in Digital Academic Supportive Devices

    OpenAIRE

    Thuseethan, S.; Kuhanesan, S.

    2015-01-01

    In this research, a literature in human-computer interaction is reviewed and the technology aspect of human computer interaction related with digital academic supportive devices is also analyzed. According to all these concerns, recommendations to design good human-computer digital academic supportive devices are analyzed and proposed. Due to improvements in both hardware and software, digital devices have unveiled continuous advances in efficiency and processing capacity. However, many of th...

  19. 小口径速射舰炮武器系统反导射击方法研究%Antimissile Firing Method Research of Minor-caliber Rapid,-firing Naval Gun Weapon System

    Institute of Scientific and Technical Information of China (English)

    刘德耀; 孙朝江; 赵岩

    2011-01-01

    小口径速射舰炮受弹鼓容量及舰炮发射系统限制,一般不能在舰炮武器系统有效射击范围内全航路持续射击,这就要求对射击方法进行研究.应用蒙特卡洛法,在MATLAB软件平台上计算了小口径速射舰炮武器系统对匀速直线运动导弹的命中概率与弹丸相遇点距离间的关系,提出了以全航路最大概率命中导弹有效部位为基础制定射击终止点,反推射击起始点的射击方法,提高了舰炮武器系统在全航路射弹数限定条件下的命中概率;以舰炮武器系统跟踪器最大跟踪角速度限制因素为例,分析了导弹运动速度、航路捷径与射击区域的对应关系,并应用本方法对导弹典型航路的射击方案进行了仿真.仿真结果表明该方法在一定条件下能有效提高舰炮武器系统对导弹的全航路命中概率.%The magazine capacity and the launch system of naval gun are limit the minor-caliber rapid-firing naval gun to full-track continuous firing in the effective firing range of the naval gun weapon system, so we study the firing method. By means of Monte Carlo calculated the relationship between hit probability of minor-caliber rapid-firing naval gun weapon system on the missile of constant velocity movement and the distance of bullet meeting point in MATLAB. Based on full-track maximum probability hit the effective place of missile to set firing ending, to deduce firing beginning was presented and the method improved the hit probability of naval gun weapon system under the ammunition's limiting condition. Take the limiting factor of tracker's maximum tracking angular velocity as an example to analysis the relation of missile moving speed and track shortcut and firing area. And adopt this method to simulation the fire method of typical track of missile. Simulation results show that the method can effective increase full-track hit probability of naval gun weapon system on missile below some conditions.

  20. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  1. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  2. Soft Electronics Enabled Ergonomic Human-Computer Interaction for Swallowing Training

    Science.gov (United States)

    Lee, Yongkuk; Nicholls, Benjamin; Sup Lee, Dong; Chen, Yanfei; Chun, Youngjae; Siang Ang, Chee; Yeo, Woon-Hong

    2017-04-01

    We introduce a skin-friendly electronic system that enables human-computer interaction (HCI) for swallowing training in dysphagia rehabilitation. For an ergonomic HCI, we utilize a soft, highly compliant (“skin-like”) electrode, which addresses critical issues of an existing rigid and planar electrode combined with a problematic conductive electrolyte and adhesive pad. The skin-like electrode offers a highly conformal, user-comfortable interaction with the skin for long-term wearable, high-fidelity recording of swallowing electromyograms on the chin. Mechanics modeling and experimental quantification captures the ultra-elastic mechanical characteristics of an open mesh microstructured sensor, conjugated with an elastomeric membrane. Systematic in vivo studies investigate the functionality of the soft electronics for HCI-enabled swallowing training, which includes the application of a biofeedback system to detect swallowing behavior. The collection of results demonstrates clinical feasibility of the ergonomic electronics in HCI-driven rehabilitation for patients with swallowing disorders.

  3. Proceedings of the Tungsten Workshop for Hard Target Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Mackiewicz-Ludtka, G.; Hayden, H.W.; Davis, R.M.

    1995-06-01

    The purpose of this meeting was to review and exchange information and provide technical input for improving technologies relevant to the Hard Target Weapons Program. This workshop was attended by representatives from 17 organizations, including 4 Department of Defense (DoD) agencies, 8 industrial companies, and 5 laboratories within DOE. Hard targets are defined as reinforced underground structures that house enemy forces, weapon systems, and support equipment. DOE-ORO and Martin Marietta Energy Systems, Inc. (Energy Systems) have been involved in advanced materials research and development (R&D) for several DOE and DoD programs. These programs are conducted in close collaboration with Eglin AFB, Department of the Army`s Picatinny Arsenal, and other DoD agencies. As part of this ongoing collaboration, Eglin AFB and Oak Ridge National Laboratory planned and conducted this workshop to support the Hard Target Weapons Program. The objectives of this workshop were to (1) review and identify the technology base that exists (primarily due to anti-armor applications) and assess the applicability of this technology to the Hard Target Weapons Program requirements; (2) determine future directions to establish the W materials, processing, and manufacturing technologies suitable for use in fixed, hard target penetrators; and (3) identify and prioritize the potential areas for technical collaboration among the participants.

  4. Hand Gesture and Neural Network Based Human Computer Interface

    Directory of Open Access Journals (Sweden)

    Aekta Patel

    2014-06-01

    Full Text Available Computer is used by every people either at their work or at home. Our aim is to make computers that can understand human language and can develop a user friendly human computer interfaces (HCI. Human gestures are perceived by vision. The research is for determining human gestures to create an HCI. Coding of these gestures into machine language demands a complex programming algorithm. In this project, We have first detected, recognized and pre-processing the hand gestures by using General Method of recognition. Then We have found the recognized image’s properties and using this, mouse movement, click and VLC Media player controlling are done. After that we have done all these functions thing using neural network technique and compared with General recognition method. From this we can conclude that neural network technique is better than General Method of recognition. In this, I have shown the results based on neural network technique and comparison between neural network method & general method.

  5. 36 CFR 2.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...

  6. 基于使命和方法框架的武器装备体系结构建模%Stracture Modeling of Weapon Equipment System of Systems Based on Missions and Means Framework

    Institute of Scientific and Technical Information of China (English)

    叶国青; 舒宇; 葛冰峰; 陈英武

    2012-01-01

    针对武器装备体系的特点,提出一种基于使命和方法框架(Missions and Means Framework,MMF)的武器装备体系结构建模方法.MMF模型包含使命的确定、方法的分配和使命完成的评价.采用使命-方法框架对武器装备体系进行组织和描述.在自上而下的规划和决策过程中,实现了使命的确定和方法的分配,以数据要素的形式完成对武器装备体系结构模型的构建.并以"超地平线登陆"作战装备体系为例,验证了该方法的可行性.%To model the stracture of weapon equipment system-of-systems (WESoS), a new method based on the mission and means framework (MMF) is presented according to its characteristics. The MMF model comprises the specification of the mission. allocation of the means and assessment of the mission accomplishment. Using the MMF to organize and describe the WESoS, It addresses the structure modeling of the WESoS as a top-down planning and decision making process that accomplishes the specification of the missions and the allocation of the means in data element form. The case study of the over-the-horizon landing WESoS demonstrates the feasibility of the method.

  7. Rainout assessment: the ACRA system and summaries of simulation results. [Computer systems to estimate threats from precipitation scavenging of radioactive debris clouds from nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Watson, C.W.; Barr, S.; Allenson, R.E.

    1977-09-01

    A generalized, three-dimensional, integrated computer code system was developed to estimate collateral-damage threats from precipitation-scavenging (rainout) of airborne debris-clouds from defensive tactical nuclear engagements. This code system, called ACRA for Atmospheric-Contaminant Rainout Assessment, is based on Monte Carlo statistical simulation methods that allow realistic, unbiased simulations of probabilistic storm, wind, and precipitation fields that determine actual magnitudes and probabilities of rainout threats. Detailed models (or data bases) are included for synoptic-scale storm and wind fields; debris transport and dispersal (with the roles of complex flow fields, time-dependent diffusion, and multidimensional shear effects accounted for automatically); microscopic debris-precipitation interactions and scavenging probabilities; air-to-ground debris transport; local demographic features, for assessing actual threats to populations; and nonlinear effects accumulations from multishot scenarios. We simulated several hundred representative shots for West European scenarios and climates to study single-shot and multishot sensitivities of rainout effects to variations in pertinent physical variables.

  8. Optimization of Aimpoints for Coordinate Seeking Weapons

    Science.gov (United States)

    2015-09-01

    process. The program works by first taking in the number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the...MATLAB program is used as the coding tool for the development of this algorithm and the optimization process. The program works by first taking in the...number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the assumed target location. Then, the weapon

  9. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness

    OpenAIRE

    Taylor, J. Eric T.; Witt, Jessica K.; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools – and specifically weapons – can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and ...

  10. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and...

    Science.gov (United States)

    2011-02-03

    ... Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and Request for... ``Weapons Safety Assessment'' (WSA). This guidance would be used by licensees and certificate holders applying to the NRC to obtain enhanced weapons under the NRC's proposed rule titled ``Enhanced Weapons...

  11. 地面武器机动工程创新实践教学体系建设%The Construction of Ground Mobile Weapons Engineering Innovation and Practice Teaching System

    Institute of Scientific and Technical Information of China (English)

    李宏才; 闫清东

    2011-01-01

    Practice teaching plays an important role in improving the overall quality of students' innovative spirit and practical ability. To enhance the innovation and hands-on capability of undergraduates majored in ground mobile weapons engineering, an innovative practices teaching system featured with a combination of practical skill-training and innovation capacity-building in ground mobile weapons engineering was Set up, which combined the new development of the expertise and was based on modem technology and teaching philosophy. Provides a broad platform for independent design and development, the platform could help undergraduates their hands-on operation, expand training, simulation and design, which is extremely important to improve student learning and quality, practical and creative ability.%实践教学对于提高学生的综合素质、培养学生的创新精神和实践能力具有重要作用。为提升大学本科地面武器机动工程专业学生动手实践能力、创新能力,结合专业技术的新发展,依据现代技术和教育教学理念,建设实践技能锻炼和创新能力培养有机结合的地面武器机动工程专业创新实践教学体系。为大学生提供了动手操作、拓展训练、设计仿真和自主设计开发的广阔平台,对提高学生学习的兴趣和质量、实践能力和创新能力具有极其重要意义。

  12. The Human-Computer Interface and Information Literacy: Some Basics and Beyond.

    Science.gov (United States)

    Church, Gary M.

    1999-01-01

    Discusses human/computer interaction research, human/computer interface, and their relationships to information literacy. Highlights include communication models; cognitive perspectives; task analysis; theory of action; problem solving; instructional design considerations; and a suggestion that human/information interface may be a more appropriate…

  13. Armas estratégicas e poder no sistema internacional: o advento das armas de energia direta e seu impacto potencial sobre a guerra e a distribuição multipolar de capacidades Strategic weapons and power in international system: the arise of direct energy weapons and their potential impact over the war and multipolar distribution of capabilities

    Directory of Open Access Journals (Sweden)

    Fabrício Schiavo Ávila

    2009-04-01

    Full Text Available O pós-Guerra Fria (1991-2006 apresenta uma mudança significativa no cenário estratégico: a maior acessibilidade da tecnologia militar e o surgimento de novas armas capazes de modificar o poder coercitivo dos países - como as armas de energia direta - acabam pondo em xeque a ideia de que a primazia nuclear é condição suficiente para garantir a unipolaridade. Focando-se no atual recrudescimento das tensões entre EUA e Rússia - especialmente com a proposta norte-americana de implementação do Escudo Antimíssil no Leste Europeu - e analisando as relações de poder entre os três países, procuramos revelar que tipo de competição ocorrerá no sistema internacional nas próximas décadas. O presente artigo analisa as reais possibilidades de que a primazia nuclear norte-americana se torne efetiva, uma vez que, para tanto, é necessário o desarmamento estratégico das demais potências. Como uma guerra nuclear entre os três países possui um custo político muito elevado, as disputas tendem a ser decididas na esfera das operações. Para ilustrar esta última afirmação, usamos um cenário contrafactual de guerra nuclear limitada entre Estados Unidos, Rússia e China, por meio do qual tentamos evidenciar as precondições táticas e operacionais para uma eventual vitória da coalizão sino-russa.The evolution of the Post-Cold War (1991-2006 international system shows a significant amount of change regarding the strategic capabilities of United States, Russia, and China. The rise of a new class of strategic weapons called directed energy weapons (lasers and high power microwaves, as well as the great costs associated with the quest for nuclear primacy, demand closer examination of the current assumption about the links between nuclear primacy and unipolar distribution of power in the International System. Starting with the current tensions between US and Russia, we try to reveal in this article what kind of competition might be observed

  14. The Russian biological weapons program: vanished or disappeared?

    Science.gov (United States)

    Shoham, Dany; Wolfson, Ze'ev

    2004-01-01

    The legacy and arsenal of biological weapons Russia inherited from USSR in 1991 became a lingering unsolved issue, in terms of a prime strategic arm that ought to be eliminated, advisably, in accordance with the Biological Weapons Convention Russia is committed to, and considering further undertakings and declarations made by the Russian regime. Indeed, that inheritance was created by USSR as a powerful, highly sophisticated component of utmost importance within the Soviet military paradigm, based on a wide spectrum of virulent, stabilized pathogens and toxins plus delivery systems. Moreover, remarkably advanced biotechnologies were thus applied to procure stockpiles of military-grade pathogens and toxins. Yet, an intriguing debate aroused with regard to the extent of the weaponized biological inventory accumulated by USSR, as well as the in effect attitude of Russia towards perpetuating or wiping out that inheritance. It turned out to form a far reaching and challenging complexity, both strategically and scientifically. The present study concentrates on the strategic as well as scientific spheres shaping that overall issue at large, attempting to thoroughly analyze it through an innovative methodology. One main conclusion thereby reached at is that the Russian military still poses a potential menance, in terms of both stockpiled, probably deployable biological weapons, and prevailing production capacities.

  15. [Myocardial infarction after conduction electrical weapon shock].

    Science.gov (United States)

    Ben Ahmed, H; Bouzouita, K; Selmi, K; Chelli, M; Mokaddem, A; Ben Ameur, Y; Boujnah, M R

    2013-04-01

    Controversy persists over the safety of conducted electrical weapons, which are increasingly used by law enforcement agencies around the world. We report a case of 33-year-old man who had an acute inferior myocardial infarction after he was shot in the chest with an electrical weapon. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  16. Radioactive Fallout From Nuclear Weapons Testing ...

    Science.gov (United States)

    2017-08-07

    Detonating nuclear weapons above ground sends radioactive materials into the atmosphere from the ground level up to very high elevations. Overtime, these materials settle out of the atmosphere and fall to the ground. Fallout typically contains hundreds of different radionuclides. Since the end of aboveground nuclear weapons testing, radionuclides have largely decayed away.

  17. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  18. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.

    1991-08-20

    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  19. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  20. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  1. 基于任务的炮兵武器系统信息能力需求指标分析%Indexes Analysis of Artillery Weapon System Information Ability Requirements Based on Mission

    Institute of Scientific and Technical Information of China (English)

    张庆捷; 吴柏林; 郑斌; 赵瑾

    2011-01-01

    Information ability is regarded as an important part of combat requirement demonstration of artillery weapon system. Based on artillery mission procedure of future combat model-reconnaissance strike integration, the definition of information ability is put forwarded, the continuation of mission flow is taken as the premier of information flow continuation is also made as the conclusion based on the guarantee of information quantity and quality. Thus the three parts of information ability requirements of artillery weapon system are taken as information support ability, information defense ability, and information attack ability. The requirements indexes system and the corresponding indexes of information support ability and information defense ability are mainly discussed based on the criterion and method of building indexes system.%信息能力是炮兵武器系统作战需求论证中的一个重要内容,分析了信息能力的内涵,依据炮兵的未来作战模式-侦察打击一体化作战的炮兵任务流程,从完成火力毁伤任务的角度,得出在保证用户所需信息数量、质量的基础上,信息流的连续是任务流连续的前提的结论。在这一结论下,提出了炮兵武器系统的信息能力需求包含信息支持能力、信息防护能力和信息攻击能力3个方面,从构建指标体系原则、方法出发,结合炮兵的任务和武器系统编成特点,重点研究了信息支持能力、信息防护能力的需求指标体系及相应的测评指标。

  2. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  3. Weapon Involvement in the Victimization of Children.

    Science.gov (United States)

    Mitchell, Kimberly J; Hamby, Sherry L; Turner, Heather A; Shattuck, Anne; Jones, Lisa M

    2015-07-01

    To report the prevalence of weapons involved in the victimization of youth with particular emphasis on weapons with a "high lethality risk" and how such exposure fits into the broader victimization and life experiences of children and adolescents. Data were collected as part of the Second National Survey of Children's Exposure to Violence, a nationally representative telephone survey of youth ages 2 to 17 years and caregivers (N = 4114) conducted in 2011. Estimates from the Second National Survey of Children's Exposure to Violence indicate that almost 14 million youth, ages 2–17, in the United States have been exposed to violence involving a weapon in their lifetimes as witnesses or victims,or .1 in 5 children in this age group [corrected]. More than 2 million youth in the United States (1 in 33) have been directly assaulted in incidents where the high lethality risk weapons of guns and knives were used. Differences were noted between victimizations involving higher and lower lethality risk weapons as well as between any weapon involvement versus none. Poly-victims, youth with 7 or more victimization types, were particularly likely to experience victimization with any weapon, as well as victimization with a highly lethal weapon compared with nonpoly-victims. Findings add to the field's broadening conceptualization of youth victimization highlighting the potentially highly consequential risk factor of weapon exposure as a component of victimization experiences on the mental health of youth. Further work on improving gun safety practices and taking steps to reduce children's exposure to weapon-involved violence is warranted to reduce this problem. Copyright © 2015 by the American Academy of Pediatrics.

  4. Taser and Conducted Energy Weapons.

    Science.gov (United States)

    LeClair, Thomas G; Meriano, Tony

    2015-01-01

    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered.

  5. Air guns: toys or weapons?

    Science.gov (United States)

    Aslan, Sahin; Uzkeser, Mustafa; Katirci, Yavuz; Cakir, Zeynep; Bilir, Ozlem; Bilge, Fatih; Cakir, Murtaza

    2006-09-01

    Air guns and blank guns may appear relatively harmless at first glance, but they are, in fact, potentially destructive, even lethal, weapons. Approximately 2 to 2.5 million nonpowder firearms are sold annually, and again approximately 12.9 per 100,000 population are treated for such injuries in hospital emergency departments each year in the United States. Unfortunately, these guns are considered to be a toy for children. Therefore, incidents of air gun injuries are gradually increasing. Although such injuries may initially be considered trivial, it may signify severe internal tissue pathologies. These apparently trivial injuries may have catastrophic consequences if unnoticed. In this study, we report 4 cases with head injury due to a shot by these guns. The cases indicate that these people had used the guns belonging to their parents for the purpose of suicide. The cases also show that these machines are not innocent.

  6. Electronic eyebox for weapon sights

    Science.gov (United States)

    Szapiel, Stan; Greenhalgh, Catherine; Wagner, Kevin; Nobes, Ryan

    2016-05-01

    We expand the effective size of the eyebox of a magnified telescopic weapon sight by following the movements of the operator's eye to create a larger, `electronic eyebox'. The original eyebox of the telescope is dynamically relocated in space so that proper overlap between the pupil of the eye and the exit pupil of the device is maintained. Therefore, the operator will perceive the entire field of view of the instrument in a much bigger spatial region than the one defined by the original eyebox. Proof-of-the-concept results are presented with a more than 3.5X enlargement of the eyebox volume along with recommendations for the next phase of development.

  7. Performance EvaIuation System Design Based on BSC for the Acquisition of Weapons and Equipments%基于BSC的武器装备采购绩效评价体系设计

    Institute of Scientific and Technical Information of China (English)

    尹铁红; 谢文秀

    2014-01-01

    建立规范实用的武器装备采购绩效评价体系,是当前深入推进我军武器装备采购改革的迫切需要。在简要介绍平衡计分卡(balanced score card, BSC)主要内容和本质内涵的基础上,阐述基于 BSC 的武器装备采购绩效评价体系设计过程,建立了评价模型。%Currently,the driving for acquisition innovation in our army is urgently needed in es-tablishing the standard and applied performance evaluation system for the acquisition of weapons and equipments.On the basis of brief introduction of the content and essence of balanced score card (BSC),the process of performance evaluation system based on BSC is expatiated and the evaluation model are founded.

  8. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  9. A Language/Action Model of Human-Computer Communication in a Psychiatric Hospital

    Science.gov (United States)

    Morelli, R. A.; Goethe, J. W.; Bronzino, J. D.

    1990-01-01

    When a staff physician says to an intern he is supervising “I think you should try medication X,” this statement may differ in meaning from the same string of words spoken between colleagues. In the first case, the statement may have the force of an order (“Do this!”), while in the latter it is merely a suggestion. In either case, the utterance sets up important expectations which constrain the future actions of the parties involved. This paper lays out an analytic framework, based on speech act theory, for representing such “conversations for action” so that they may be used to inform the design of human-computer interaction. The language/action design perspective views the information system -- in this case an expert system that monitors drug treatment -- as one of many “agents” within a broad communicative network. Speech act theory is used to model a typical psychiatric hospital unit as a system of communicative action. In addition to identifying and characterizing the primary communicative agents and speech acts, the model presents a taxonomy of key conversational patterns and shows how they may be applied to the design of a clinical monitoring system. In the final section, the advantages and implications of this design approach are discussed.

  10. Design of a compact low-power human-computer interaction equipment for hand motion

    Science.gov (United States)

    Wu, Xianwei; Jin, Wenguang

    2017-01-01

    Human-Computer Interaction (HCI) raises demand of convenience, endurance, responsiveness and naturalness. This paper describes a design of a compact wearable low-power HCI equipment applied to gesture recognition. System combines multi-mode sense signals: the vision sense signal and the motion sense signal, and the equipment is equipped with the depth camera and the motion sensor. The dimension (40 mm × 30 mm) and structure is compact and portable after tight integration. System is built on a module layered framework, which contributes to real-time collection (60 fps), process and transmission via synchronous confusion with asynchronous concurrent collection and wireless Blue 4.0 transmission. To minimize equipment's energy consumption, system makes use of low-power components, managing peripheral state dynamically, switching into idle mode intelligently, pulse-width modulation (PWM) of the NIR LEDs of the depth camera and algorithm optimization by the motion sensor. To test this equipment's function and performance, a gesture recognition algorithm is applied to system. As the result presents, general energy consumption could be as low as 0.5 W.

  11. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  12. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  13. The Spear: An Effective Weapon Since Antiquity

    OpenAIRE

    Robert E. Dohrenwend

    2012-01-01

    The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. ...

  14. Chemical Demilitarization Assembled Chemical Weapons Alternatives (Chem Demil-ACWA)

    Science.gov (United States)

    2015-12-01

    access machines , two (2) rocket cutting and shearing lines, two (2) neutralization system sampling stations, and three (3) Supercritical Water Oxidation...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-243 Chemical Demilitarization-Assembled Chemical Weapons Alternatives (Chem Demil-ACWA) As...Abbreviations for MDAP Programs Acq O&M - Acquisition-Related Operations and Maintenance ACAT - Acquisition Category ADM - Acquisition Decision

  15. Advanced Naval Surface fire support weapon employment against mobile targets

    OpenAIRE

    Le, Hung B.

    1999-01-01

    Approved for public release; distribution is unlimited Key threat trends have identified shortfalls in Naval Surface Fire Support (NSFS), a mission area that is undergoing rapid evolution. The Navy's ability to effectively provide sea-based fire support to ground forces is profoundly challenged by mobile and reduced dwell time targets. Furthermore, longer range enemy weapon systems, which must be destroyed at greater ranges prior to their engagement of friendly forces, will make NSFS timel...

  16. 36 CFR 1002.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or...

  17. 43 CFR 15.11 - Explosives and dangerous weapons.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond the...

  18. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness.

    Science.gov (United States)

    Taylor, J Eric T; Witt, Jessica K; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.

  19. User participation in the development of the human/computer interface for control centers

    Science.gov (United States)

    Broome, Richard; Quick-Campbell, Marlene; Creegan, James; Dutilly, Robert

    1996-01-01

    Technological advances coupled with the requirements to reduce operations staffing costs led to the demand for efficient, technologically-sophisticated mission operations control centers. The control center under development for the earth observing system (EOS) is considered. The users are involved in the development of a control center in order to ensure that it is cost-efficient and flexible. A number of measures were implemented in the EOS program in order to encourage user involvement in the area of human-computer interface development. The following user participation exercises carried out in relation to the system analysis and design are described: the shadow participation of the programmers during a day of operations; the flight operations personnel interviews; and the analysis of the flight operations team tasks. The user participation in the interface prototype development, the prototype evaluation, and the system implementation are reported on. The involvement of the users early in the development process enables the requirements to be better understood and the cost to be reduced.

  20. Controlling Weapons-Grade Fissile Material

    Science.gov (United States)

    Rotblat, J.

    1977-01-01

    Discusses the problems of controlling weapons-grade fissionable material. Projections of the growth of fission nuclear reactors indicates sufficient materials will be available to construct 300,000 atomic bombs each containing 10 kilograms of plutonium by 1990. (SL)

  1. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)

    1994-07-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  2. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M

    2003-08-29

    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  3. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...... of europium-155 from weapons was estimated at 1400 atoms per 10$^{6}$ fissions, which is close to the yield of europium-155 from fast fission of uranium-238....

  4. [Medical aspects of common non-lethal weapons].

    Science.gov (United States)

    Kunz, Sebastian Niko; Grove, Christina; Monticelli, Fabio

    2014-03-01

    The development and provision of non-lethal weapons (NLW) allow military and law enforcement personnel to exploit gradual engagement in countering potentially hazardous threats. Chemical, kinetic and electrical weapons systems are used to curb violence in civilian crowds. With inappropriate usage, these technologies can cause potentially fatal injuries that are not only of clinical, but also of legal relevance. In this context, the practicing physician is faced with treatment as well as assessment issues of new forms of injuries. In order to assure medical care and to be able to draw competent expert's conclusions, a detailed knowledge of the medical effects of these NLW is necessary. The review at hand presents today's most popular NLW and gives an overview of their possible injury potential and required treatments.

  5. Overall View of Chemical and Biochemical Weapons

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-01-01

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist. PMID:24902078

  6. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  7. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  8. Delays and user performance in human-computer-network interaction tasks.

    Science.gov (United States)

    Caldwell, Barrett S; Wang, Enlie

    2009-12-01

    This article describes a series of studies conducted to examine factors affecting user perceptions, responses, and tolerance for network-based computer delays affecting distributed human-computer-network interaction (HCNI) tasks. HCNI tasks, even with increasing computing and network bandwidth capabilities, are still affected by human perceptions of delay and appropriate waiting times for information flow latencies. Conducted were 6 laboratory studies with university participants in China (Preliminary Experiments 1 through 3) and the United States (Experiments 4 through 6) to examine users' perceptions of elapsed time, effect of perceived network task performance partners on delay tolerance, and expectations of appropriate delays based on task, situation, and network conditions. Results across the six experiments indicate that users' delay tolerance and estimated delay were affected by multiple task and expectation factors, including task complexity and importance, situation urgency and time availability, file size, and network bandwidth capacity. Results also suggest a range of user strategies for incorporating delay tolerance in task planning and performance. HCNI user experience is influenced by combinations of task requirements, constraints, and understandings of system performance; tolerance is a nonlinear function of time constraint ratios or decay. Appropriate user interface tools providing delay feedback information can help modify user expectations and delay tolerance. These tools are especially valuable when delay conditions exceed a few seconds or when task constraints and system demands are high. Interface designs for HCNI tasks should consider assistant-style presentations of delay feedback, information freshness, and network characteristics. Assistants should also gather awareness of user time constraints.

  9. Impact of familiarity on information complexity in human-computer interfaces

    Directory of Open Access Journals (Sweden)

    Bakaev Maxim

    2016-01-01

    Full Text Available A quantitative measure of information complexity remains very much desirable in HCI field, since it may aid in optimization of user interfaces, especially in human-computer systems for controlling complex objects. Our paper is dedicated to exploration of subjective (subject-depended aspect of the complexity, conceptualized as information familiarity. Although research of familiarity in human cognition and behaviour is done in several fields, the accepted models in HCI, such as Human Processor or Hick-Hyman’s law do not generally consider this issue. In our experimental study the subjects performed search and selection of digits and letters, whose familiarity was conceptualized as frequency of occurrence in numbers and texts. The analysis showed significant effect of information familiarity on selection time and throughput in regression models, although the R2 values were somehow low. Still, we hope that our results might aid in quantification of information complexity and its further application for optimizing interaction in human-machine systems.

  10. Manual for national implementation of the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B. [DePaul Univ., Chicago, IL (United States); Tanzman, E.A.; Gualtieri, D.S.; Grimes, S.W. [Argonne National Lab., IL (United States)

    1993-12-01

    The Convention on the Prohibition on the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction, opened for signature, January 13, 1993, in Paris, France (CWC), is an unprecedented multilateral effort to eradicate an entire category of weapons of mass destruction and assure their continued absence through international verification. The CWC has been signed by over 150 nations, and is expected to enter into force in 1995. With its far-reaching system to verify compliance, the CWC presages a new foundation for international security based neither on fear nor on trust, but on the rule of law. A central feature of the CWC is that it requires each State Party to take implementing measures to make the Convention operative. The CWC goes beyond all prior arms control treaties in this regard. For this approach to succeed, and to inspire the eradication of other categories of mass destruction weaponry, coordination and planning are vital to harmonize CWC national implementation among States Parties. This Manual for National Implementation of the Chemical Weapons Convention is designed to assist States Parties, duly taking into account the distinctive aspects of their legal systems, in maximizing CWC enforcement consistent with their national legal obligations.

  11. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  12. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  13. APPLYING ARTIFICIAL INTELLIGENCE TECHNIQUES TO HUMAN-COMPUTER INTERFACES

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1988-01-01

    A description is given of UIMS (User Interface Management System), a system using a variety of artificial intelligence techniques to build knowledge-based user interfaces combining functionality and information from a variety of computer systems that maintain, test, and configure customer telephone...... and data networks. Three artificial intelligence (AI) techniques used in UIMS are discussed, namely, frame representation, object-oriented programming languages, and rule-based systems. The UIMS architecture is presented, and the structure of the UIMS is explained in terms of the AI techniques....

  14. APPLYING ARTIFICIAL INTELLIGENCE TECHNIQUES TO HUMAN-COMPUTER INTERFACES

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1988-01-01

    A description is given of UIMS (User Interface Management System), a system using a variety of artificial intelligence techniques to build knowledge-based user interfaces combining functionality and information from a variety of computer systems that maintain, test, and configure customer telephone...... and data networks. Three artificial intelligence (AI) techniques used in UIMS are discussed, namely, frame representation, object-oriented programming languages, and rule-based systems. The UIMS architecture is presented, and the structure of the UIMS is explained in terms of the AI techniques....

  15. Virtualization of AEGIS: A Study of the Feasibility of Applying Open Architecture Technology to the Surface Navy’s Most Complex Automated Weapon System

    Science.gov (United States)

    2011-09-01

    diagnostics system. Aerospace and Electronic Systems Magazine, IEEE , 9(2), 40–45. Current version released August 2002 in IEEE Xplore . doi: 10.1109...Cramming more components onto integrated circuits. Electronics, 114–117. Reprinted January 1998 in Proceedings of the IEEE , 86(1), 82–85. doi: S 0018

  16. A Study of Electromyogram Based on Human-Computer Interface

    Institute of Scientific and Technical Information of China (English)

    Jun-Ru Ren; Tie-Jun Liu; Yu Huang; De-Zhong Yao

    2009-01-01

    In this paper,a new control system based on forearm electromyogram (EMG) is proposed for computer peripheral control and artificial prosthesis control.This control system intends to realize the commands of six pre-defined hand poses:up,down,left,right,yes,and no.In order to research the possibility of using a unified amplifier for both electro-encephalogram (EEG) and EMG,the surface forearm EMG data is acquired by a 4-channel EEG measure-ment system.The Bayesian classifier is used to classify the power spectral density (PSD) of the signal.The experiment result verifies that this control system can supply a high command recognition rate (average 48%) even the EMG data is collected with an EEG system just with single electrode measurement.

  17. Primary Polymer Aging Processes Identified from Weapon Headspace Chemicals

    Energy Technology Data Exchange (ETDEWEB)

    Chambers, D M; Bazan, J M; Ithaca, J G

    2002-03-25

    A current focus of our weapon headspace sampling work is the interpretation of the volatile chemical signatures that we are collecting. To help validate our interpretation we have been developing a laboratory-based material aging capability to simulate material decomposition chemistries identified. Key to establishing this capability has been the development of an automated approach to process, analyze, and quantify arrays of material combinations as a function of time and temperature. Our initial approach involves monitoring the formation and migration of volatile compounds produced when a material decomposes. This approach is advantageous in that it is nondestructive and provides a direct comparison with our weapon headspace surveillance initiative. Nevertheless, this approach requires us to identify volatile material residue and decomposition byproducts that are not typically monitored and reported in material aging studies. Similar to our weapon monitoring method, our principle laboratory-based method involves static headspace collection by solid phase microextraction (SPME) followed by gas chromatography/mass spectrometry (GC/MS). SPME is a sorbent collection technique that is ideally suited for preconcentration and delivery of trace gas-phase compounds for analysis by GC. When combined with MS, detection limits are routinely in the low- and sub-ppb ranges, even for semivolatile and polar compounds. To automate this process we incorporated a robotic sample processor configured for SPME collection. The completed system will thermally process, sample, and analyze a material sample. Quantification of the instrument response is another process that has been integrated into the system. The current system screens low-milligram quantities of material for the formation or outgas of small compounds as initial indicators of chemical decomposition. This emerging capability offers us a new approach to identify and non-intrusively monitor decomposition mechanisms that are

  18. Correlates of weapon carrying among high school students in the United States

    Science.gov (United States)

    Muula, Adamson S; Rudatsikira, Emmanuel; Siziya, Seter

    2008-01-01

    Background Deaths and injuries arising from interpersonal violence among adolescents are major public health concerns in the United States. The bearing of weapons among adolescents is a critical factor in many of these deaths and injuries. Methods A secondary analysis of the 2005 United States Youth Risk Behavior Surveillance System Survey data was carried out to examine the variables associated with self-reported history of weapon carrying on school property among high school students. We used logistic regression analysis to assess the associations. Results Of the 13,707 respondents who participated in the survey, 10.2% of males and 2.6% of females reported carrying a weapon on school property. In multivariate logistic regression analysis, males were more likely to report having carried a weapon than females (odds ratio (OR) = 5.58; 95% confidence interval (CI) [4.23, 7.62]). Self-reported race/ethnicity was also associated with weapon carrying. Other variables positively associated with weapon carrying at school were substance use (OR = 1.77; 95% CI [1.16, 2.68]), depression (OR = 1.44; 95% CI [1.10, 1.89]), suicidal ideation (OR = 1.64; 95% CI [1.23, 2.19]), having had property stolen or deliberately damaged at school (OR = 1.55; 95% CI [1.21, 1.98]), having been raped (OR = 1.70; 95% CI [1.22, 2.37]), having been threatened or injured with a weapon on school property (OR = 2.19; 95% CI [1.63, 2.95]), and having engaged in physical fighting (OR = 2.02; 95% CI [1.56, 2.63]). Conclusion This research identifies factors that are associated with weapon bearing among adolescents in the United States. These factors may be important in the design of interventions aimed at improving school safety and adolescent health. PMID:18605995

  19. Combat Effectiveness Analysis of a Certain Self-Propelled Cannon-Howitzer Weapon System(Battalion Level)%某型自行加榴炮武器系统(营级)作战效能分析

    Institute of Scientific and Technical Information of China (English)

    卢漪; 许梅生

    2013-01-01

      通过对某型自行加榴炮系统(营级)作战任务剖面分析,给出在一次典型战斗过程中炮兵营系统的作战流程。采用ADC模型,对该型武器系统(营级)初始可用度、各节点可信度以及作战能力向量进行量化分析;并把武器系统的状态在执行任务过程中的变化看成是时间连续的马氏链,进而求取炮兵营在执行任务过程中作战效能的变化,为炮兵营作战行动提供科学依据。%Based on the analysis of one classical combat flow of Artillery Camp system on the combat mission section of a certain self-propelled cannon-howitzer. With the ADC model,it analyses particular iy and calculations on primary availability degree,node reliability and combat capacity about Artillery Camp;And take the appearance of the weapon system in the mission process as continuous-time Markov Chain,The change of combat effectiveness is attained during a little time as Artillery Camp implementing mission at final. The result will offer scientific proving for combat maneuver of Artillery Camp.

  20. Modern weapons and military equipment for issue no. 3-2015

    OpenAIRE

    ЙЕВТИЧ МИЛОШ М.

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  1. MODERN WEAPONS AND MILITARY EQUIPMENT FOR ISSUE NO. 3-2015

    OpenAIRE

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  2. U.S. Nuclear Weapons Modernization - the Stockpile Life Extension Program

    Science.gov (United States)

    Cook, Donald

    2016-03-01

    Underground nuclear testing of U.S. nuclear weapons was halted by President George H.W. Bush in 1992 when he announced a moratorium. In 1993, the moratorium was extended by President Bill Clinton and, in 1995, a program of Stockpile Stewardship was put in its place. In 1996, President Clinton signed the Comprehensive Nuclear Test Ban Treaty (CTBT). Twenty years have passed since then. Over the same time, the average age of a nuclear weapon in the stockpile has increased from 6 years (1992) to nearly 29 years (2015). At its inception, achievement of the objectives of the Stockpile Stewardship Program (SSP) appeared possible but very difficult. The cost to design and construct several large facilities for precision experimentation in hydrodynamics and high energy density physics was large. The practical steps needed to move from computational platforms of less than 100 Mflops/sec to 10 Teraflops/sec and beyond were unknown. Today, most of the required facilities for SSP are in place and computational speed has been increased by more than six orders of magnitude. These, and the physicists and engineers in the complex of labs and plants within the National Nuclear Security Administration (NNSA) who put them in place, have been the basis for underpinning an annual decision, made by the weapons lab directors for each of the past 20 years, that resort to underground nuclear testing is not needed for maintaining confidence in the safety and reliability of the U.S stockpile. A key part of that decision has been annual assessment of the physical changes in stockpiled weapons. These weapons, quite simply, are systems that invariably and unstoppably age in the internal weapon environment of radioactive materials and complex interfaces of highly dissimilar organic and inorganic materials. Without an ongoing program to rebuild some components and replace other components to increase safety or security, i.e., life extending these weapons, either underground testing would again be

  3. Human-Centered Software Engineering: Software Engineering Architectures, Patterns, and Sodels for Human Computer Interaction

    Science.gov (United States)

    Seffah, Ahmed; Vanderdonckt, Jean; Desmarais, Michel C.

    The Computer-Human Interaction and Software Engineering (CHISE) series of edited volumes originated from a number of workshops and discussions over the latest research and developments in the field of Human Computer Interaction (HCI) and Software Engineering (SE) integration, convergence and cross-pollination. A first volume in this series (CHISE Volume I - Human-Centered Software Engineering: Integrating Usability in the Development Lifecycle) aims at bridging the gap between the field of SE and HCI, and addresses specifically the concerns of integrating usability and user-centered systems design methods and tools into the software development lifecycle and practices. This has been done by defining techniques, tools and practices that can fit into the entire software engineering lifecycle as well as by defining ways of addressing the knowledge and skills needed, and the attitudes and basic values that a user-centered development methodology requires. The first volume has been edited as Vol. 8 in the Springer HCI Series (Seffah, Gulliksen and Desmarais, 2005).

  4. The experience of agency in human-computer interactions: a review.

    Science.gov (United States)

    Limerick, Hannah; Coyle, David; Moore, James W

    2014-01-01

    The sense of agency is the experience of controlling both one's body and the external environment. Although the sense of agency has been studied extensively, there is a paucity of studies in applied "real-life" situations. One applied domain that seems highly relevant is human-computer-interaction (HCI), as an increasing number of our everyday agentive interactions involve technology. Indeed, HCI has long recognized the feeling of control as a key factor in how people experience interactions with technology. The aim of this review is to summarize and examine the possible links between sense of agency and understanding control in HCI. We explore the overlap between HCI and sense of agency for computer input modalities and system feedback, computer assistance, and joint actions between humans and computers. An overarching consideration is how agency research can inform HCI and vice versa. Finally, we discuss the potential ethical implications of personal responsibility in an ever-increasing society of technology users and intelligent machine interfaces.

  5. Computer Aided Design in Digital Human Modeling for Human Computer Interaction in Ergonomic Assessment: A Review

    Directory of Open Access Journals (Sweden)

    Suman Mukhopadhyay , Sanjib Kumar Das and Tania Chakraborty

    2012-12-01

    Full Text Available Research in Human-Computer Interaction (HCI hasbeen enormously successful in the area of computeraidedergonomics or human-centric designs. Perfectfit for people has always been a target for productdesign. Designers traditionally used anthropometricdimensions for 3D product design which created a lotof fitting problems when dealing with thecomplexities of the human body shapes. Computeraided design (CAD, also known as Computer aideddesign and drafting (CADD is the computertechnology used for the design processing and designdocumentation. CAD has now been used extensivelyin many applications such as automotive,shipbuilding, aerospace industries, architectural andindustrial designs, prosthetics, computer animationfor special effects in movies, advertising andtechnical manuals. As a technology, digital humanmodeling (DHM has rapidly emerged as atechnology that creates, manipulates and controlhuman representations and human-machine systemsscenes on computers for interactive ergonomic designproblem solving. DHM promises to profoundlychange how products or systems are designed, howergonomics analysis is performed, how disorders andimpairments are assessed and how therapies andsurgeries are conducted. The imperative andemerging need for the DHM appears to be consistentwith the fact that the past decade has witnessedsignificant growth in both the software systemsoffering DHM capabilities as well as the corporateadapting the technology.The authors shall dwell atlength and deliberate on how research in DHM hasfinally brought about an enhanced HCI, in thecontext of computer-aided ergonomics or humancentricdesign and discuss about future trends in thiscontext.

  6. Analysis of the design concept of 'Nora' family artillery weapons

    Directory of Open Access Journals (Sweden)

    Anastas L. Paligorić

    2011-10-01

    Full Text Available The development of the NORA family started as far as back to 1976 at the Military Technical Institute of the Yugoslav's People's Army. The programme covered development of several types of the main artillery weapon: the 152 mm NORA-A towed gun-howitzer, the 152 mm NORA-B self-propelled gun-howitzer and the 152 mm gun-howitzer with APU. Under the same programme, the conversion of the Russian 130 mm towed gun M46 into the 155 mm M46/84 gun (for export needs and the 152 mm M46/86 gun respectively (for the needs of the YPA was completed. Only the 152 mm M84 (NORA-A towed howitzer was introduced in service, while the development of the NORA-B and NORA-C weapons was carried on until 1992. After it had been suspended for many years, the development of the NORAB weapon was continued in 2003, followed by serial production of the 155 mm NORA-B52 self-propelled system for the export needs.

  7. Depleted-Uranium Weapons the Whys and Wherefores

    CERN Document Server

    Gsponer, A

    2003-01-01

    The only military application in which present-day depleted-uranium (DU) alloys out-perform tungsten alloys is long-rod penetration into a main battle-tank's armor. However, this advantage is only on the order of 10% and disappearing when the comparison is made in terms of actual lethality of complete anti-tank systems instead of laboratory-type steel penetration capability. Therefore, new micro- and nano-engineered tungsten alloys may soon out-perform existing DU alloys, enabling the production of tungsten munition which will be better than uranium munition, and whose overall life-cycle cost will be less due to the absence of the problems related to the radioactivity of uranium. The reasons why DU weapons have been introduced and used are analysed from the perspective that their radioactivity must have played an important role in the decision making process. It is found that DU weapons belong to the diffuse category of low-radiological-impact nuclear weapons to which emerging types of low-yield, i.e., fourth...

  8. Color image fusion for concealed weapon detection

    Science.gov (United States)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  9. The Proposal of Demand Estimation of Repairable Items for the Weapon Systems During the Initial Support Period: F-16 Case Study

    Directory of Open Access Journals (Sweden)

    Bahtiyar Eren

    2012-02-01

    Full Text Available Every country that has military systems such as aircraft, radar, warship or tank has to meet the operational needs of those military systems in order to keep them ready for military operations. Logistics support needs are defined basically either before or after procurement. If they are defined before procurement, they are called "initial support requirement", otherwise called "sustainment support requirement". Due to the fact that new system will be added into the Turkish military inventory, it is focused on the initial support requirement phase. In addition to that, it is focused on repairable items since most of the material acquisition cost within the initial support budget is allocated to repairable items. In this study, within the scope of initial support requirements,the method that produces much better results in terms of quantity and cost perspective than the ones used in Turkey and USA is established and demonstrated by using real data set of F-16.

  10. Phenomenology and system engineering of micro- and nano-antenna FPA sensors for detection of concealed weapons and improvised explosive devices

    Science.gov (United States)

    Appleby, R.; Ferguson, S.

    2012-06-01

    The ability of millimetre wave and terahertz systems to penetrate clothing is well known. The fact that the transmission of clothing and the reflectivity of the body vary as a function of frequency is less so. Several instruments have now been developed to exploit this capability. The choice of operating frequency, however, has often been associated with the maturity and the cost of the enabling technology rather than a sound systems engineering approach. Top level user and systems requirements have been derived to inform the development of design concepts. Emerging micro and nano technology concepts have been reviewed and we have demonstrated how these can be evaluated against these requirements by simulation using OpenFx. Openfx is an open source suite of 3D tools for modeling, animation and visualization which has been modified for use at millimeter waves.

  11. Detecting necessary and sufficient parts for assembling a functional weapon

    Science.gov (United States)

    Hempelmann, Christian F.; Solomon, Divya; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Adkins, Tracy; Sirakov, Nikolay M.

    2017-05-01

    Continuing our previous research to visually extract and visually and conceptually match weapons, this study develops a method to determine whether a set of weapon parts visually extracted from images taken from different scenes can be assembled as a firing weapon. This new approach identifies potential weapons in the ontology via tracing detected necessary and sufficient parts through their meronymic relation to the whole weapon. A fast algorithm for identifying potential weapons that can be assembled from a given set of detected parts is presented.

  12. Research on Life Determination and Extension of Missile Weapon System Based on Multilevel Finite Element%基于多级有限元方法的导弹武器定寿延寿研究

    Institute of Scientific and Technical Information of China (English)

    常新龙; 张有宏; 岳春国; 余堰峰; 刘万雷

    2011-01-01

    提出了多级有限元的概念,将导弹结构定寿延寿工作划分为3个有限元分析步骤进行,在有限元分析的过程中考虑了导弹结构原始状态、老化缺陷状态及修理/换件的影响,对导弹结构强度及剩余寿命进行了科学准确的评判.利用该理论对含有老化和裂纹等损伤因素的药柱结构质量状态和对出现的裂纹损伤进行修复的效果进行了评价.结果表明,该方法科学合理,可为导弹武器系统定寿延寿工作提供一定的理论参考.%The concept of multilevel finite element was presented. The life determination and extension of missile structure was divided to three finite element analysis steps. In the finite element analysis, the influence of original state, weathering state, and repair or replacement of missile structure was considered. The structural strength and residual life of missile structure was estimated exactly. Using this method, the quality state of grain considering factors such as aging and crack damage and the effect of repair for crack damage were evaluated. The results showed that this method is scientific and can provide a reference for life determination and extension of missile weapon system.

  13. Situated dialog in speech-based human-computer interaction

    CERN Document Server

    Raux, Antoine; Lane, Ian; Misu, Teruhisa

    2016-01-01

    This book provides a survey of the state-of-the-art in the practical implementation of Spoken Dialog Systems for applications in everyday settings. It includes contributions on key topics in situated dialog interaction from a number of leading researchers and offers a broad spectrum of perspectives on research and development in the area. In particular, it presents applications in robotics, knowledge access and communication and covers the following topics: dialog for interacting with robots; language understanding and generation; dialog architectures and modeling; core technologies; and the analysis of human discourse and interaction. The contributions are adapted and expanded contributions from the 2014 International Workshop on Spoken Dialog Systems (IWSDS 2014), where researchers and developers from industry and academia alike met to discuss and compare their implementation experiences, analyses and empirical findings.

  14. The Social Computer: Combining Machine and Human Computation

    OpenAIRE

    Giunchiglia, Fausto; Robertson, Dave

    2010-01-01

    The social computer is a future computational system that harnesses the innate problem solving, action and information gathering powers of humans and the environments in which they live in order to tackle large scale social problems that are beyond our current capabilities. The hardware of a social computer is supplied by people’s brains and bodies, the environment where they live, including artifacts, e.g., buildings and roads, sensors into the environment, networks and computers; while the ...

  15. New Human-Computer Interface Concepts for Mission Operations

    Science.gov (United States)

    Fox, Jeffrey A.; Hoxie, Mary Sue; Gillen, Dave; Parkinson, Christopher; Breed, Julie; Nickens, Stephanie; Baitinger, Mick

    2000-01-01

    The current climate of budget cuts has forced the space mission operations community to reconsider how it does business. Gone are the days of building one-of-kind control centers with teams of controllers working in shifts 24 hours per day, 7 days per week. Increasingly, automation is used to significantly reduce staffing needs. In some cases, missions are moving towards lights-out operations where the ground system is run semi-autonomously. On-call operators are brought in only to resolve anomalies. Some operations concepts also call for smaller operations teams to manage an entire family of spacecraft. In the not too distant future, a skeleton crew of full-time general knowledge operators will oversee the operations of large constellations of small spacecraft, while geographically distributed specialists will be assigned to emergency response teams based on their expertise. As the operations paradigms change, so too must the tools to support the mission operations team's tasks. Tools need to be built not only to automate routine tasks, but also to communicate varying types of information to the part-time, generalist, or on-call operators and specialists more effectively. Thus, the proper design of a system's user-system interface (USI) becomes even more importance than before. Also, because the users will be accessing these systems from various locations (e.g., control center, home, on the road) via different devices with varying display capabilities (e.g., workstations, home PCs, PDAS, pagers) over connections with various bandwidths (e.g., dial-up 56k, wireless 9.6k), the same software must have different USIs to support the different types of users, their equipment, and their environments. In other words, the software must now adapt to the needs of the users! This paper will focus on the needs and the challenges of designing USIs for mission operations. After providing a general discussion of these challenges, the paper will focus on the current efforts of

  16. Proceedings of the Third International Conference on Intelligent Human Computer Interaction

    CERN Document Server

    Pokorný, Jaroslav; Snášel, Václav; Abraham, Ajith

    2013-01-01

    The Third International Conference on Intelligent Human Computer Interaction 2011 (IHCI 2011) was held at Charles University, Prague, Czech Republic from August 29 - August 31, 2011. This conference was third in the series, following IHCI 2009 and IHCI 2010 held in January at IIIT Allahabad, India. Human computer interaction is a fast growing research area and an attractive subject of interest for both academia and industry. There are many interesting and challenging topics that need to be researched and discussed. This book aims to provide excellent opportunities for the dissemination of interesting new research and discussion about presented topics. It can be useful for researchers working on various aspects of human computer interaction. Topics covered in this book include user interface and interaction, theoretical background and applications of HCI and also data mining and knowledge discovery as a support of HCI applications.

  17. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K[sub a]-band system.

  18. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K{sub a}-band system.

  19. Human Computation in Visualization: Using Purpose Driven Games for Robust Evaluation of Visualization Algorithms.

    Science.gov (United States)

    Ahmed, N; Zheng, Ziyi; Mueller, K

    2012-12-01

    Due to the inherent characteristics of the visualization process, most of the problems in this field have strong ties with human cognition and perception. This makes the human brain and sensory system the only truly appropriate evaluation platform for evaluating and fine-tuning a new visualization method or paradigm. However, getting humans to volunteer for these purposes has always been a significant obstacle, and thus this phase of the development process has traditionally formed a bottleneck, slowing down progress in visualization research. We propose to take advantage of the newly emerging field of Human Computation (HC) to overcome these challenges. HC promotes the idea that rather than considering humans as users of the computational system, they can be made part of a hybrid computational loop consisting of traditional computation resources and the human brain and sensory system. This approach is particularly successful in cases where part of the computational problem is considered intractable using known computer algorithms but is trivial to common sense human knowledge. In this paper, we focus on HC from the perspective of solving visualization problems and also outline a framework by which humans can be easily seduced to volunteer their HC resources. We introduce a purpose-driven game titled "Disguise" which serves as a prototypical example for how the evaluation of visualization algorithms can be mapped into a fun and addicting activity, allowing this task to be accomplished in an extensive yet cost effective way. Finally, we sketch out a framework that transcends from the pure evaluation of existing visualization methods to the design of a new one.

  20. Towards human-computer synergetic analysis of large-scale biological data.

    Science.gov (United States)

    Singh, Rahul; Yang, Hui; Dalziel, Ben; Asarnow, Daniel; Murad, William; Foote, David; Gormley, Matthew; Stillman, Jonathan; Fisher, Susan

    2013-01-01

    Advances in technology have led to the generation of massive amounts of complex and multifarious biological data in areas ranging from genomics to structural biology. The volume and complexity of such data leads to significant challenges in terms of its analysis, especially when one seeks to generate hypotheses or explore the underlying biological processes. At the state-of-the-art, the application of automated algorithms followed by perusal and analysis of the results by an expert continues to be the predominant paradigm for analyzing biological data. This paradigm works well in many problem domains. However, it also is limiting, since domain experts are forced to apply their instincts and expertise such as contextual reasoning, hypothesis formulation, and exploratory analysis after the algorithm has produced its results. In many areas where the organization and interaction of the biological processes is poorly understood and exploratory analysis is crucial, what is needed is to integrate domain expertise during the data analysis process and use it to drive the analysis itself. In context of the aforementioned background, the results presented in this paper describe advancements along two methodological directions. First, given the context of biological data, we utilize and extend a design approach called experiential computing from multimedia information system design. This paradigm combines information visualization and human-computer interaction with algorithms for exploratory analysis of large-scale and complex data. In the proposed approach, emphasis is laid on: (1) allowing users to directly visualize, interact, experience, and explore the data through interoperable visualization-based and algorithmic components, (2) supporting unified query and presentation spaces to facilitate experimentation and exploration, (3) providing external contextual information by assimilating relevant supplementary data, and (4) encouraging user-directed information

  1. Implementation of a True Enterprise Web Based System to Manage Low Level, Mixed, Weapons Grade, Transuranic and Hazardous Waste at Lawrence Livermore National Laboaratory

    Energy Technology Data Exchange (ETDEWEB)

    Collins, J; Plunkett, J; Haigh, D; Plunkett, J; Haigh, D; Collins, J

    2003-11-21

    Faced with increasing challenges imposed by a new mixed waste treatment facility under construction, Lawrence Livermore National Laboratory (LLNL) embarked on a yearlong process of finding and implementing a new system to replace its existing waste tracking software. After a review of several applications, including the IWTS system in use at Idaho National Engineering and Environmental Laboratory (INEEL)a, LLNL decided to implement HazTrack. HazTrack represents a new generation of browser based enterprise level business applications that are replacing the hardcoded client-server software that has been so prevalent for the last 15 years. It is widely believed that the object-oriented application frameworks of these applications, such as the model view controller (MVC) framework for HazTrack will be at the core of leading-edge software technology in the twenty-first century. MVC applications adapt more readily to changes in business and technical requirements than do applications built using traditional programming techniques, anywhere from 2.5 to 12 times faster than propagating the same changes to programmatically implemented solutions. Because of this ability, the HazTrack team was able to rapidly modify the HazTrack application for management of radiological waste storage, including support for an unlimited number of dose conversion factors (DCF's) for calculation of Plutonium Equivalent (Pu-Eq) curies, nuclide tracking, nuclide distribution tracking, and storage area limits management. LLNL also required extensive security management features including a waste approval process with lockdown and audit trail capability that was also incorporated during the implementation, as well as a flexible access control architecture to facilitate customized user views and access rights to functions based on user groups. HazTrack supports the full range of waste handling activities including waste generation, characterization, storage, treatment, and disposal through its

  2. Human-Computer Etiquette Cultural Expectations and the Design Implications They Place on Computers and Technology

    CERN Document Server

    Hayes, Caroline C

    2010-01-01

    Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in t

  3. Human-computer interaction handbook fundamentals, evolving technologies and emerging applications

    CERN Document Server

    Sears, Andrew

    2007-01-01

    This second edition of The Human-Computer Interaction Handbook provides an updated, comprehensive overview of the most important research in the field, including insights that are directly applicable throughout the process of developing effective interactive information technologies. It features cutting-edge advances to the scientific knowledge base, as well as visionary perspectives and developments that fundamentally transform the way in which researchers and practitioners view the discipline. As the seminal volume of HCI research and practice, The Human-Computer Interaction Handbook feature

  4. Variable Combat Weapons Systems External Ballistics Solver%可变动能打击武器系统外弹道解算

    Institute of Scientific and Technical Information of China (English)

    汪勇

    2013-01-01

    动能弹丸在空气中的运动过程十分复杂,近似属于刚体的一般运动,由于弹丸结构形状不是标准弹,枪膛内无膛线,弹丸飞行时不会产生绕其弹轴的转动运动,进行弹丸外弹道研究时,实际上只是对弹丸的平动运动进行分析计算和研究.利用以飞行距离x为自变量的自然坐标系质心运动方程组,通过引入假速度及西亚切替代对动能弹外弹道进行了解算,反向计算得出的恒量动能打击不同距离的有生目标对应的动能弹丸理想枪口初速.%The kinetic energy of the projectile in the air during exercise is very complex,approximation belongs to the rigid body of the general movement,due to the shape of the projectile structure than standard ammunition,bore rifling,projectiles flying around the bomb axis of rotation movement does not produce,conducted projectile the external ballistics Fesearch when in fact only the translational motion of the projectile analytical calculations and research.In this paper,flight distance x independent variable natural coordinate system,the center of mass movement equations,by introducing false speed and Sciacca alternative to understand the operator of the kinetic energy Exterior Ballistic reverse calculated constant kinetic energy to combat different distances animate target the muzzle velocity corresponding to the kinetic energy of the projectile ideal.

  5. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...

  6. The Role of the DOE Weapons Laboratories in a Changing National Security Environment: CNSS Papers No. 8, April 1988

    Science.gov (United States)

    Hecker, S. S.

    1988-04-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security.

  7. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    Energy Technology Data Exchange (ETDEWEB)

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  8. The role of the DOE weapons laboratories in a changing national security environment: CNSS papers No. 8, April 1988

    Energy Technology Data Exchange (ETDEWEB)

    Hecker, S.S.

    1988-01-01

    The contributions of the Department of Energy (DOE) nuclear weapons laboratories to the nation's security are reviewed in testimony before the Subcommittee on Procurement and Military Nuclear Systems of the House Armed Services Committee. Also presented are contributions that technology will make in maintaining the strategic balance through deterrence, treaty verification, and a sound nuclear weapons complex as the nation prepares for significant arms control initiatives. The DOE nuclear weapons laboratories can contribute to the broader context of national security, one that recognizes that military strength can be maintained over the long term only if it is built upon the foundations of economic strength and energy security. 9 refs.

  9. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  10. The simulation of laser-based guided weapon engagements

    Science.gov (United States)

    Al-Jaberi, Mubarak; Richardson, Mark; Coath, John; Jenkin, Robin

    2006-05-01

    The laser is an integrated part of many weapon systems, such as laser guided bombs, laser guided missiles and laser beam-riding missiles. These systems pose a significant threat to military assets on the modern battlefield. The lasers used in beam-riding missiles are particularly hard to detect as they typically use relatively low power lasers. Beamriders are also particularly difficult to defeat as current countermeasure systems have not been optimized against this threat. Some recent field trails conducted in the United Arab Emirates desert have demonstrated poor performance of both laser beam-riding systems and the LWRs designed to detect them. The aim of this research is to build a complete evaluation tool capable of assessing all the phases of an engagement of a main battle tank or armoured fighting vehicle with a laser based guided weapon. To this end a software model has been produced using Matlab & Simulink. This complete model has been verified using lab based experimentation and by comparison to the result of the mentioned field trials. This project will enable both the evaluation and design of any generic laser warning receiver or missile seeker and specific systems if various parameters are known. Moreover, this model will be used as a guide to the development of reliable countermeasures for laser beam-riding missiles.

  11. Optomechanical design of a field-deployable thermal weapon sight

    Science.gov (United States)

    Boucher, Marc-André; Desnoyers, Nichola; Bernier, Sophie; Bergeron, Alain; Doucet, Michel; Lagacé, François; Laou, Philips

    2007-09-01

    The use of uncooled infrared (IR) imaging technology in Thermal Weapon Sight (TWS) systems produces a unique tool that perfectly fulfills the all-weather, day-and-night vision demands in modern battlefields by significantly increasing the effectiveness and survivability of a dismounted soldier. The main advantage of IR imaging is that no illumination is required; therefore, observation can be accomplished in a passive mode. It is particularly well adapted for target detection even through smoke, dust, fog, haze, and other battlefield obscurants. In collaboration with the Defense Research and Development Canada (DRDC Valcartier), INO engineering team developed, produced, and tested a rugged thermal weapon sight. An infrared channel provides for human detection at 800m and recognition at 200m. Technical system requirements included very low overall weight as well as the need to be field-deployable and user-friendly in harsh conditions. This paper describes the optomechanical design and focuses on the catadioptric-based system integration. The system requirements forced the optomechanical engineers to minimize weight while maintaining a sufficient level of rigidity in order to keep the tight optical tolerances. The optical system's main features are: a precision manual focus, a watertight vibration insulated front lens, a bolometer and two gold coated aluminum mirrors. Finite element analyses using ANSYS were performed to validate the subsystems performance. Some of the finite element computations were validated using different laboratory setups.

  12. A Project-Based Learning Setting to Human-Computer Interaction for Teenagers

    Science.gov (United States)

    Geyer, Cornelia; Geisler, Stefan

    2012-01-01

    Knowledge of fundamentals of human-computer interaction resp. usability engineering is getting more and more important in technical domains. However this interdisciplinary field of work and corresponding degree programs are not broadly known. Therefore at the Hochschule Ruhr West, University of Applied Sciences, a program was developed to give…

  13. Enhancing Human-Computer Interaction Design Education: Teaching Affordance Design for Emerging Mobile Devices

    Science.gov (United States)

    Faiola, Anthony; Matei, Sorin Adam

    2010-01-01

    The evolution of human-computer interaction design (HCID) over the last 20 years suggests that there is a growing need for educational scholars to consider new and more applicable theoretical models of interactive product design. The authors suggest that such paradigms would call for an approach that would equip HCID students with a better…

  14. The Human-Computer Interaction of Cross-Cultural Gaming Strategy

    Science.gov (United States)

    Chakraborty, Joyram; Norcio, Anthony F.; Van Der Veer, Jacob J.; Andre, Charles F.; Miller, Zachary; Regelsberger, Alexander

    2015-01-01

    This article explores the cultural dimensions of the human-computer interaction that underlies gaming strategies. The article is a desktop study of existing literature and is organized into five sections. The first examines the cultural aspects of knowledge processing. The social constructs technology interaction is discussed. Following this, the…

  15. Human-Computer Interaction (HCI) in Educational Environments: Implications of Understanding Computers as Media.

    Science.gov (United States)

    Berg, Gary A.

    2000-01-01

    Reviews literature in the field of human-computer interaction (HCI) as it applies to educational environments. Topics include the origin of HCI; human factors; usability; computer interface design; goals, operations, methods, and selection (GOMS) models; command language versus direct manipulation; hypertext; visual perception; interface…

  16. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria

    Science.gov (United States)

    2010-01-01

    ... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and reholster Minimum qualifying = 70%. 4 15 yards 2 5 seconds Draw weapon and fire 2 rounds standing, come to low...

  17. 25 CFR 11.444 - Carrying concealed weapons.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  18. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... for You Shyness Someone at School Has a Weapon. What Should I Do? KidsHealth > For Teens > Someone at School Has a Weapon. What Should I Do? Print A A A ... Why do students bring guns, knives, or other weapons to school? Some are just showing off, others ...

  19. 76 FR 1136 - Electroshock Weapons Test and Measurement Workshop

    Science.gov (United States)

    2011-01-07

    ... National Institute of Standards and Technology Electroshock Weapons Test and Measurement Workshop AGENCY..., academia, military, test instrument manufacturers, etc.) of electroshock weapons that provide stand-off... requirements for electroshock weapons, the Law Enforcement Standards Office (OLES) at NIST has developed...

  20. 46 CFR 386.23 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Weapons and explosives. 386.23 Section 386.23 Shipping... AND GROUNDS AT THE UNITED STATES MERCHANT MARINE ACADEMY § 386.23 Weapons and explosives. No person shall carry or possess firearms, other dangerous or deadly weapons or parts thereof, explosives or items...

  1. 36 CFR 702.7 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 702.7... Weapons and explosives. Except where duly authorized by law, and in the performance of law enforcement functions, no person shall carry firearms, other dangerous or deadly weapons, or explosives, either openly...

  2. 7 CFR 501.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...

  3. 31 CFR 407.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Weapons and explosives. 407.13... TREASURY ANNEX § 407.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...

  4. 49 CFR 1544.219 - Carriage of accessible weapons.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of accessible weapons. 1544.219 Section...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.219 Carriage of accessible weapons. (a... weapons, do not apply to a law enforcement officer (LEO) aboard a flight for which screening is required...

  5. 31 CFR 91.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Weapons and explosives. 91.13 Section... CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either...

  6. 44 CFR 15.15 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Weapons and explosives. 15.15... EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the NETC will carry or possess firearms, other dangerous or deadly weapons, explosives or items intended to...

  7. 7 CFR 502.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...

  8. 32 CFR 552.125 - Disposition of confiscated weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated weapons. 552.125..., Ammunition, and Explosives-Fort Lewis, Washington § 552.125 Disposition of confiscated weapons. Commanders will maintain confiscated weapons in the unit arms room pending final disposition. They will provide...

  9. 36 CFR 504.14 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504... GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or...

  10. 31 CFR 0.215 - Possession of weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly weapons...

  11. 7 CFR 500.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...

  12. 7 CFR 503.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 503.13 Section 503.13... OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.13 Weapons and explosives. No person while in or on the PIADC shall carry firearms or other dangerous or deadly weapons or explosives...

  13. 14 CFR 135.119 - Prohibition against carriage of weapons.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Prohibition against carriage of weapons... Flight Operations § 135.119 Prohibition against carriage of weapons. No person may, while on board an aircraft being operated by a certificate holder, carry on or about that person a deadly or dangerous weapon...

  14. 32 CFR 228.7 - Prohibition on weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Prohibition on weapons and explosives. 228.7... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.7 Prohibition on weapons and explosives. No persons... illegal or legally controlled weapon (e.g., throwing stars, switchblades), explosives, or items intended...

  15. 4 CFR 25.14 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts... AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or possess firearms, other dangerous or deadly weapons, explosives or...

  16. 31 CFR 700.11 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Weapons and explosives. 700.11... FEDERAL LAW ENFORCEMENT TRAINING CENTER (FLETC) BUILDINGS AND GROUNDS § 700.11 Weapons and explosives. No person, while on the property, shall carry firearms, other dangerous or deadly weapons, or explosives...

  17. 43 CFR 423.30 - Weapons, firearms, explosives, and fireworks.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Weapons, firearms, explosives, and... WATERBODIES Rules of Conduct § 423.30 Weapons, firearms, explosives, and fireworks. (a) You may possess... exceptions: (1) You must not have a weapon in your possession when at or in a Reclamation facility. (2) You...

  18. 36 CFR 520.15 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...

  19. 15 CFR 265.39 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...

  20. Fourth and Fifth Amendment issues raised by Chemical Weapons Convention inspections

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A. [Argonne National Lab., IL (United States). Economics and Law Section

    1994-10-21

    The Chemical Weapons Convention (CWC) offers a unique challenge to the United States system of constitutional law. This discussion is about the Fourth and Fifth Amendment issues raised by the CWC and about how federal implementing legislation can allow verification inspections to take place in the United States under the Chemical Weapons Convention while remaining in compliance with the Constitution. By implementing legislation, the author means a federal statute that would be enacted separately from Senate approval of the Convention itself. Although implementing legislation is a relatively unusual accompaniment to a treaty, it will be necessary to the CWC, and the Administration has submitted a bill that was under consideration in the last Congress and presumably will be reintroduced early next year. The Fourth and Fifth Amendment problems posed by the CWC arise from the verification inspection scheme embodied in the treaty. The CWC depends heavily on on-site inspections to verify compliance with its key requirements. These include destroying all chemicals weapons stockpiles and bringing potential chemical weapons precursors under international control. The Convention contains four distinct kinds of inspections: systematic inspections of chemical weapons storage and destruction facilities, routine inspections of various declared facilities, challenge inspections, and a variant on challenge inspections in cases of alleged use of chemical weapons. All inspections are supposed to be only as intrusive as necessary to carry out the Convention. These inspections will be carried out by inspectors employed by the Organization for the Prohibition of Chemical Weapons (OPCW), located in The Hague, which is responsible for enforcing the Convention. Generally, the inspected State Party is permitted to assign observers to accompany the inspectors.

  1. Igniting the Light Elements: The Los Alamos Thermonuclear Weapon Project, 1942-1952

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, Anne C. [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    1999-07-01

    The American system of nuclear weapons research and development was conceived and developed not as a result of technological determinism, but by a number of individual architects who promoted the growth of this large technologically-based complex. While some of the technological artifacts of this system, such as the fission weapons used in World War II, have been the subject of many historical studies, their technical successors--fusion (or hydrogen) devices--are representative of the largely unstudied highly secret realms of nuclear weapons science and engineering. In the postwar period a small number of Los Alamos Scientific Laboratory's staff and affiliates were responsible for theoretical work on fusion weapons, yet the program was subject to both the provisions and constraints of the US Atomic Energy Commission, of which Los Alamos was a part. The Commission leadership's struggle to establish a mission for its network of laboratories, least of all to keep them operating, affected Los Alamos's leaders' decisions as to the course of weapons design and development projects. Adapting Thomas P. Hughes's ''large technological systems'' thesis, I focus on the technical, social, political, and human problems that nuclear weapons scientists faced while pursuing the thermonuclear project, demonstrating why the early American thermonuclear bomb project was an immensely complicated scientific and technological undertaking. I concentrate mainly on Los Alamos Scientific Laboratory's Theoretical, or T, Division, and its members' attempts to complete an accurate mathematical treatment of the ''Super''--the most difficult problem in physics in the postwar period--and other fusion weapon theories. Although tackling a theoretical problem, theoreticians had to address technical and engineering issues as well. I demonstrate the relative value and importance of H-bomb research over time in the postwar era to

  2. Superior Weapons Systems Through Castings (SWC)

    Science.gov (United States)

    2012-11-30

    printed and stored no matter the user platform. Screen captures of the input and resulting output of this application is shown below: «IM si mLM f...cooling, the aluminum contracts by a factor of 5 times more than the silicon carbide. Stress fields develop around each of the particles as the...interfaces to improve the transport of heat while allowing expansion and contraction . If the CTE of the materials can be matched, the layers can be

  3. Fortran Programs for Weapon Systems Analysis

    Science.gov (United States)

    1990-06-01

    lbs/in 2 The following assumptions are imbedded in this equation: zero starting pressures covolume equal to charge volume burning rate proportional... depend on the terrain and weather. More rugged terrain will generally have a smaller average range and flatter terrain will have a larger average range...in a Table for Interpolation Purposes. To interpolate in tables, use the indexx function. Indexx assumes that the dependent variable is stored in a

  4. Direct Licensing in Major Weapon Systems Acquisition.

    Science.gov (United States)

    1980-09-01

    tions. Teledyne, CAE ( TCAE ), the only source that the Government and the developer could agree upon, was selected in September 1978 to be the licensee...Williams, under the licensing program, was required to assist TCAE in establishing its manufacturing and test facilities on a step-by-step basis...and for licensee progress, but no significant leverage was afforded the Government if they failed to meet the milestones or if TCAE was not qualified

  5. United States Army Weapon Systems 2010

    Science.gov (United States)

    2009-09-18

    Countermeasure (MRADC): Acute radiation syndrome (ARS) manifests as hematopoietic (bone marrow), gastrointestinal, and cerebrovascular subsyndromes...materials resulting from offensive conventional strike missions performed by U.S. or allied forces on CBRN facilities; and selected accidental

  6. Program Acquisition Costs by Weapon System

    Science.gov (United States)

    2007-02-01

    modernizes the Army’s ability to move, shoot and communicate on the battlefield. It is the material solution for the Army’s future force. Through FY...2007 is the CRA amount. Budget request totals $131.0 - 81 - OTHER PROGRAMS DOD-WIDE/JOINT PATRIOT MEADS CAP Description: PATRIOT is

  7. Forecasting Demand for Weapon System Items

    Science.gov (United States)

    1994-07-01

    level at quarter n. SL(n) was set using the Presutti- Trepp model that DLA currently uses. Forecast error is required by the model to set the safety level...of inventory investment versus response time, we varied the safety level by changing the "lambda factor" or backorder cost used in the Presutti- Trepp

  8. Engineering Design Handbook: Recoilless Rifle Weapon Systems.

    Science.gov (United States)

    1976-01-15

    given A piezometric efficiency 1 of 0.5 yields, using values of peak acceleration based on Eq. 5-7. Eq. 5-6, 12 V, in. t5 -7) AL 112~j 12P#o. 5) where V...15000 1516 8134 3000 20000 917 7082 20000 1257 6063 30000 996 4054 0.50 1500 6000 1473 4017 0.60 1500 6000 993 393710000 954 2386 10000 658 2392 15000

  9. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    OpenAIRE

    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEW...

  10. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.

    1993-03-16

    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  11. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  12. The Politics of Weapons Standardization in NATO.

    Science.gov (United States)

    1981-07-01

    does raise new and useful perspectives on the problem. And, as he notes, it raises the spectre that instead of attacking the causes of NATO’s malaise...construct- ing his Utopia . 1 58 Two articles, which focus on the weapons procurement process within the United States alone, note the unnecessary

  13. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  14. Human Computation

    CERN Document Server

    CERN. Geneva

    2008-01-01

    What if people could play computer games and accomplish work without even realizing it? What if billions of people collaborated to solve important problems for humanity or generate training data for computers? My work aims at a general paradigm for doing exactly that: utilizing human processing power to solve computational problems in a distributed manner. In particular, I focus on harnessing human time and energy for addressing problems that computers cannot yet solve. Although computers have advanced dramatically in many respects over the last 50 years, they still do not possess the basic conceptual intelligence or perceptual capabilities...

  15. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  16. 基于任务的潜用导弹武器系统保障性仿真评价%Simulation evaluation research on supportability of missile weapon system based on mission

    Institute of Scientific and Technical Information of China (English)

    衡辉; 魏勇; 王新华; 杨迎化

    2013-01-01

    The defects existed in the traditional research of supportability were analyzed,some new evaluation indexes,including operational availability,operational readiness,mission completion success probability,were advanced,and the simulation model was established based on mission.Taking the operational mission,the structure and maintenance process as the foundation,a kind of simulating principle of missile weapon system was set up based on mission by using the theory of Monte-Carlo,Discrete Event and so on.The maintenance support simulation experiment was analyzed by an example.The evaluative parameters of mission capability on duty and support capabilities were acquired 、 Results of its application show that the method is feasible,can offer the decision for useful department and managing department.%分析传统保障性评价存在的缺陷,提出基于任务的使用可用度、战备完好率及任务成功率3个评价指标,建立相应的仿真统计模型.以使用任务、系统结构、维修保障过程分析为基础,引用离散事件、蒙特卡洛等理论建立一种基于任务的保障性评价仿真原理.通过一个实例对导弹武器系统的维修保障仿真试验进行分析,得出了导弹武器系统的执行任务能力和保障能力评价参数.仿真表明该方法是可行的,可为使用、维修保障部门评价装备的任务成功性和战备完好性等提供理论依据和方法支持.

  17. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  18. Glove-Enabled Computer Operations (GECO): Design and Testing of an Extravehicular Activity Glove Adapted for Human-Computer Interface

    Science.gov (United States)

    Adams, Richard J.; Olowin, Aaron; Krepkovich, Eileen; Hannaford, Blake; Lindsay, Jack I. C.; Homer, Peter; Patrie, James T.; Sands, O. Scott

    2013-01-01

    The Glove-Enabled Computer Operations (GECO) system enables an extravehicular activity (EVA) glove to be dual-purposed as a human-computer interface device. This paper describes the design and human participant testing of a right-handed GECO glove in a pressurized glove box. As part of an investigation into the usability of the GECO system for EVA data entry, twenty participants were asked to complete activities including (1) a Simon Says Games in which they attempted to duplicate random sequences of targeted finger strikes and (2) a Text Entry activity in which they used the GECO glove to enter target phrases in two different virtual keyboard modes. In a within-subjects design, both activities were performed both with and without vibrotactile feedback. Participants mean accuracies in correctly generating finger strikes with the pressurized glove were surprisingly high, both with and without the benefit of tactile feedback. Five of the subjects achieved mean accuracies exceeding 99 in both conditions. In Text Entry, tactile feedback provided a statistically significant performance benefit, quantified by characters entered per minute, as well as reduction in error rate. Secondary analyses of responses to a NASA Task Loader Index (TLX) subjective workload assessments reveal a benefit for tactile feedback in GECO glove use for data entry. This first-ever investigation of employment of a pressurized EVA glove for human-computer interface opens up a wide range of future applications, including text chat communications, manipulation of procedureschecklists, cataloguingannotating images, scientific note taking, human-robot interaction, and control of suit andor other EVA systems.

  19. Survey of state-of-the-art technology in remote concealed weapon detection

    Science.gov (United States)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  20. Air gun wounding and current UK laws controlling air weapons.

    Science.gov (United States)

    Bruce-Chwatt, Robert Michael

    2010-04-01

    Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.