WorldWideScience

Sample records for weapon systems human-computer

  1. US Army Weapon Systems Human-Computer Interface (WSHCI) style guide, Version 1

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.

    1996-09-30

    A stated goal of the U.S. Army has been the standardization of the human computer interfaces (HCIS) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of style guides. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide. This document, the U.S. Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide, represents the first version of that style guide. The purpose of this document is to provide HCI design guidance for RT/NRT Army systems across the weapon systems domains of ground, aviation, missile, and soldier systems. Each domain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their domains.

  2. U.S. Army weapon systems human-computer interface style guide. Version 2

    Energy Technology Data Exchange (ETDEWEB)

    Avery, L.W.; O`Mara, P.A.; Shepard, A.P.; Donohoo, D.T.

    1997-12-31

    A stated goal of the US Army has been the standardization of the human computer interfaces (HCIs) of its system. Some of the tools being used to accomplish this standardization are HCI design guidelines and style guides. Currently, the Army is employing a number of HCI design guidance documents. While these style guides provide good guidance for the command, control, communications, computers, and intelligence (C4I) domain, they do not necessarily represent the more unique requirements of the Army`s real time and near-real time (RT/NRT) weapon systems. The Office of the Director of Information for Command, Control, Communications, and Computers (DISC4), in conjunction with the Weapon Systems Technical Architecture Working Group (WSTAWG), recognized this need as part of their activities to revise the Army Technical Architecture (ATA), now termed the Joint Technical Architecture-Army (JTA-A). To address this need, DISC4 tasked the Pacific Northwest National Laboratory (PNNL) to develop an Army weapon systems unique HCI style guide, which resulted in the US Army Weapon Systems Human-Computer Interface (WSHCI) Style Guide Version 1. Based on feedback from the user community, DISC4 further tasked PNNL to revise Version 1 and publish Version 2. The intent was to update some of the research and incorporate some enhancements. This document provides that revision. The purpose of this document is to provide HCI design guidance for the RT/NRT Army system domain across the weapon systems subdomains of ground, aviation, missile, and soldier systems. Each subdomain should customize and extend this guidance by developing their domain-specific style guides, which will be used to guide the development of future systems within their subdomains.

  3. Safety Metrics for Human-Computer Controlled Systems

    Science.gov (United States)

    Leveson, Nancy G; Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems.This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  4. Seventy Years of Computing in the Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Billy Joe [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-30

    Los Alamos has continuously been on the forefront of scientific computing since it helped found the field. This talk will explore the rich history of computing in the Los Alamos weapons program. The current status of computing will be discussed, as will the expectations for the near future.

  5. Development and Application of Computational/In Vitro Toxicological Methods for Chemical Hazard Risk Reduction of New Materials for Advanced Weapon Systems

    Science.gov (United States)

    Frazier, John M.; Mattie, D. R.; Hussain, Saber; Pachter, Ruth; Boatz, Jerry; Hawkins, T. W.

    2000-01-01

    The development of quantitative structure-activity relationship (QSAR) is essential for reducing the chemical hazards of new weapon systems. The current collaboration between HEST (toxicology research and testing), MLPJ (computational chemistry) and PRS (computational chemistry, new propellant synthesis) is focusing R&D efforts on basic research goals that will rapidly transition to useful products for propellant development. Computational methods are being investigated that will assist in forecasting cellular toxicological end-points. Models developed from these chemical structure-toxicity relationships are useful for the prediction of the toxicological endpoints of new related compounds. Research is focusing on the evaluation tools to be used for the discovery of such relationships and the development of models of the mechanisms of action. Combinations of computational chemistry techniques, in vitro toxicity methods, and statistical correlations, will be employed to develop and explore potential predictive relationships; results for series of molecular systems that demonstrate the viability of this approach are reported. A number of hydrazine salts have been synthesized for evaluation. Computational chemistry methods are being used to elucidate the mechanism of action of these salts. Toxicity endpoints such as viability (LDH) and changes in enzyme activity (glutahoione peroxidase and catalase) are being experimentally measured as indicators of cellular damage. Extrapolation from computational/in vitro studies to human toxicity, is the ultimate goal. The product of this program will be a predictive tool to assist in the development of new, less toxic propellants.

  6. The Future of Killing: Ethical and Legal Implications of Fully Autonomous Weapon Systems

    Directory of Open Access Journals (Sweden)

    Martin Lark

    2017-03-01

    Full Text Available Warfare is moving towards full weapon autonomy. Already, there are weapons in service that replace a human at the point of engagement. The remote pilot must adhere to the law and consider the moral and ethical implications of using lethal force. Future fully autonomous weapons will be able to search for, identify and engage targets without human intervention, raising the question of who is responsible for the moral and ethical considerations of using such weapons. In the chaos of war, people are fallible, but they can apply judgement and discretion and identify subtle signals. For example, humans can identify when an enemy wants to surrender, are burying their dead, or are assisting non-combatants. An autonomous weapon may not be so discerning and may not be capable of being programmed to apply discretion, compassion, or mercy, nor can it adapt commanders’ intent or apply initiative. Before fully autonomous weapons use lethal force, it is argued that there needs to be assurances that the ethical implications are understood and that control mechanisms are in place to ensure that oversight of the system is able to prevent incidents that could amount to breaches of the laws of armed conflict.

  7. Thermal weapon sights with integrated fire control computers: algorithms and experiences

    Science.gov (United States)

    Rothe, Hendrik; Graswald, Markus; Breiter, Rainer

    2008-04-01

    The HuntIR long range thermal weapon sight of AIM is deployed in various out of area missions since 2004 as a part of the German Future Infantryman system (IdZ). In 2007 AIM fielded RangIR as upgrade with integrated laser Range finder (LRF), digital magnetic compass (DMC) and fire control unit (FCU). RangIR fills the capability gaps of day/night fire control for grenade machine guns (GMG) and the enhanced system of the IdZ. Due to proven expertise and proprietary methods in fire control, fast access to military trials for optimisation loops and similar hardware platforms, AIM and the University of the Federal Armed Forces Hamburg (HSU) decided to team for the development of suitable fire control algorithms. The pronounced ballistic trajectory of the 40mm GMG requires most accurate FCU-solutions specifically for air burst ammunition (ABM) and is most sensitive to faint effects like levelling or firing up/downhill. This weapon was therefore selected to validate the quality of the FCU hard- and software under relevant military conditions. For exterior ballistics the modified point mass model according to STANAG 4355 is used. The differential equations of motions are solved numerically, the two point boundary value problem is solved iteratively. Computing time varies according to the precision needed and is typical in the range from 0.1 - 0.5 seconds. RangIR provided outstanding hit accuracy including ABM fuze timing in various trials of the German Army and allied partners in 2007 and is now ready for series production. This paper deals mainly with the fundamentals of the fire control algorithms and shows how to implement them in combination with any DSP-equipped thermal weapon sights (TWS) in a variety of light supporting weapon systems.

  8. Emerging nuclear energy systems and nuclear weapon proliferation

    International Nuclear Information System (INIS)

    Gsponer, A.; Sahin, S.; Jasani, B.

    1983-01-01

    Generally when considering problems of proliferation of nuclear weapons, discussions are focused on horizontal proliferation. However, the emerging nuclear energy systems currently have an impact mainly on vertical proliferation. The paper indicates that technologies connected with emerging nuclear energy systems, such as fusion reactors and accelerators, enhance the knowledge of thermonuclear weapon physics and will enable production of military useful nuclear materials (including some rare elements). At present such technologies are enhancing the arsenal of the nuclear weapon states. But one should not forget the future implications for horizontal proliferation of nuclear weapons as some of the techniques will in the near future be within the technological and economic capabilities of non-nuclear weapon states. Some of these systems are not under any international control. (orig.) [de

  9. Why the United States Must Adopt Lethal Autonomous Weapon Systems

    Science.gov (United States)

    2017-05-25

    intelligence , Lethal Autonomous Weapon Systems, energy production, energy storage, three-dimensional printing , bandwidth improvements, computer...views on the morality of artificial intelligence (AI) and robotics technology. Eastern culture sees artificial intelligence as an economic savior...capable of improving their society. In contrast, Western culture regards artificial intelligence with paranoia, anxiety, and skepticism. As Eastern

  10. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  11. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  12. A Model-based Framework for Risk Assessment in Human-Computer Controlled Systems

    Science.gov (United States)

    Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems. This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions. Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  13. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  14. An intelligent multi-media human-computer dialogue system

    Science.gov (United States)

    Neal, J. G.; Bettinger, K. E.; Byoun, J. S.; Dobes, Z.; Thielman, C. Y.

    1988-01-01

    Sophisticated computer systems are being developed to assist in the human decision-making process for very complex tasks performed under stressful conditions. The human-computer interface is a critical factor in these systems. The human-computer interface should be simple and natural to use, require a minimal learning period, assist the user in accomplishing his task(s) with a minimum of distraction, present output in a form that best conveys information to the user, and reduce cognitive load for the user. In pursuit of this ideal, the Intelligent Multi-Media Interfaces project is devoted to the development of interface technology that integrates speech, natural language text, graphics, and pointing gestures for human-computer dialogues. The objective of the project is to develop interface technology that uses the media/modalities intelligently in a flexible, context-sensitive, and highly integrated manner modelled after the manner in which humans converse in simultaneous coordinated multiple modalities. As part of the project, a knowledge-based interface system, called CUBRICON (CUBRC Intelligent CONversationalist) is being developed as a research prototype. The application domain being used to drive the research is that of military tactical air control.

  15. Vulnerability assessment of a space based weapon platform electronic system exposed to a thermonuclear weapon detonation

    Science.gov (United States)

    Perez, C. L.; Johnson, J. O.

    Rapidly changing world events, the increased number of nations with inter-continental ballistic missile capability, and the proliferation of nuclear weapon technology will increase the number of nuclear threats facing the world today. Monitoring these nation's activities and providing an early warning and/or intercept system via reconnaissance and surveillance satellites and space based weapon platforms is a viable deterrent against a surprise nuclear attack. However, the deployment of satellite and weapon platform assets in space will subject the sensitive electronic equipment to a variety of natural and man-made radiation environments. These include Van Allen Belt protons and electrons; galactic and solar flare protons; and neutrons, gamma rays, and x-rays from intentionally detonated fission and fusion weapons. In this paper, the MASH vl.0 code system is used to estimate the dose to the critical electronics components of an idealized space based weapon platform from neutron and gamma-ray radiation emitted from a thermonuclear weapon detonation in space. Fluence and dose assessments were performed for the platform fully loaded, and in several stages representing limited engagement scenarios. The results indicate vulnerabilities to the Command, Control, and Communication bay instruments from radiation damage for a nuclear weapon detonation for certain source/platform orientations. The distance at which damage occurs will depend on the weapon yield (n,(gamma)/kiloton) and size (kilotons).

  16. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    technique involve model structure, system representation and the degree of validity, coupled with the simplicity, of the overall model. ABM is best suited... system representation of the air combat system . We feel that a simulation model that combines ABM with equation-based representation of weapons and...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA

  17. Human-computer systems interaction backgrounds and applications 3

    CERN Document Server

    Kulikowski, Juliusz; Mroczek, Teresa; Wtorek, Jerzy

    2014-01-01

    This book contains an interesting and state-of the art collection of papers on the recent progress in Human-Computer System Interaction (H-CSI). It contributes the profound description of the actual status of the H-CSI field and also provides a solid base for further development and research in the discussed area. The contents of the book are divided into the following parts: I. General human-system interaction problems; II. Health monitoring and disabled people helping systems; and III. Various information processing systems. This book is intended for a wide audience of readers who are not necessarily experts in computer science, machine learning or knowledge engineering, but are interested in Human-Computer Systems Interaction. The level of particular papers and specific spreading-out into particular parts is a reason why this volume makes fascinating reading. This gives the reader a much deeper insight than he/she might glean from research papers or talks at conferences. It touches on all deep issues that ...

  18. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications. In this paper, BLDC Motor and Electromechanical Servo Drive System, operating principle, modeling, characteristics and its application in various weapon system programs are ...

  19. Non-Lethal Weapons Program

    Science.gov (United States)

    Sheets Frequently Asked Questions Non-Lethal Weapons FAQs Active Denial System FAQs Human Electro -Muscular Incapacitation FAQs Related Links Business Opportunities Contact JNLWD Congressional Engagement , Wednesday, Sept 20, 2017. The Active Denial System, blunt-impact munitions, dazzling lasers, LRAD 100X

  20. USAF Weapon System Evaluation Program

    National Research Council Canada - National Science Library

    1999-01-01

    During this task period, Schafer Corporation provided engineering services and analysis to the USAF at Eglin AFB, Florida in direct support of the USAF Air-to-Surface Weapon System Evaluation Program (WSEP...

  1. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    In this paper Brushless DC (BLDC) Technology and its Application in Articulation of Weapon System Launching Platform using Electromechanical Servo Drive is presented. ... Due to inherent properties of BLDC Technology BLDC Motors and Drives are profoundly used in military and strategic weapon system applications.

  2. Weapon plutonium in accelerator driven power system

    International Nuclear Information System (INIS)

    Shvedov, O.V.; Murin, B.P.; Kochurov, B.P.; Shubin, Yu.M.; Volk, V.I.; Bogdanov, P.V.

    1997-01-01

    Accelerator Driven Systems are planned to be developed for the use (or destruction) of dozens of tons of weapon-grade Plutonium (W-Pu) resulted from the reducing of nuclear weapons. In the paper are compared the parameters of various types of accelerators, the physical properties of various types of targets and blankets, and the results of fuel cycle simulation. Some economical aspects are also discussed

  3. Computer aided systems human engineering: A hypermedia tool

    Science.gov (United States)

    Boff, Kenneth R.; Monk, Donald L.; Cody, William J.

    1992-01-01

    The Computer Aided Systems Human Engineering (CASHE) system, Version 1.0, is a multimedia ergonomics database on CD-ROM for the Apple Macintosh II computer, being developed for use by human system designers, educators, and researchers. It will initially be available on CD-ROM and will allow users to access ergonomics data and models stored electronically as text, graphics, and audio. The CASHE CD-ROM, Version 1.0 will contain the Boff and Lincoln (1988) Engineering Data Compendium, MIL-STD-1472D and a unique, interactive simulation capability, the Perception and Performance Prototyper. Its features also include a specialized data retrieval, scaling, and analysis capability and the state of the art in information retrieval, browsing, and navigation.

  4. Prioritization Assessment for Capability Gaps in Weapon System of Systems Based on the Conditional Evidential Network

    Directory of Open Access Journals (Sweden)

    Dong Pei

    2018-02-01

    Full Text Available The prioritization of capability gaps for weapon system of systems is the basis for design and capability planning in the system of systems development process. In order to address input information uncertainties, the prioritization of capability gaps is computed in two steps using the conditional evidential network method. First, we evaluated the belief distribution of degree of required satisfaction for capabilities, and then calculated the reverse conditional belief function between capability hierarchies. We also provided verification for the feasibility and effectiveness of the proposed method through a prioritization of capability gaps calculation using an example of a spatial-navigation-and-positioning system of systems.

  5. Psychosocial and Cultural Modeling in Human Computation Systems: A Gamification Approach

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.; Riensche, Roderick M.; Haack, Jereme N.; Butner, R. Scott

    2013-11-20

    “Gamification”, the application of gameplay to real-world problems, enables the development of human computation systems that support decision-making through the integration of social and machine intelligence. One of gamification’s major benefits includes the creation of a problem solving environment where the influence of cognitive and cultural biases on human judgment can be curtailed through collaborative and competitive reasoning. By reducing biases on human judgment, gamification allows human computation systems to exploit human creativity relatively unhindered by human error. Operationally, gamification uses simulation to harvest human behavioral data that provide valuable insights for the solution of real-world problems.

  6. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  7. Critical Success Factors and Their Application to DOD Weapon System Acquisition

    National Research Council Canada - National Science Library

    Harris, Chad M

    2006-01-01

    Department of Defense weapon systems are growing more complex and expensive and the services are under increasing pressure from Congress to improve the cost schedule and performance of their weapons programs...

  8. Human-centered Computing: Toward a Human Revolution

    OpenAIRE

    Jaimes, Alejandro; Gatica-Perez, Daniel; Sebe, Nicu; Huang, Thomas S.

    2007-01-01

    Human-centered computing studies the design, development, and deployment of mixed-initiative human-computer systems. HCC is emerging from the convergence of multiple disciplines that are concerned both with understanding human beings and with the design of computational artifacts.

  9. Identification of nuclear weapons

    Science.gov (United States)

    Mihalczo, J.T.; King, W.T.

    1987-04-10

    A method and apparatus for non-invasively indentifying different types of nuclear weapons is disclosed. A neutron generator is placed against the weapon to generate a stream of neutrons causing fissioning within the weapon. A first detects the generation of the neutrons and produces a signal indicative thereof. A second particle detector located on the opposite side of the weapon detects the fission particles and produces signals indicative thereof. The signals are converted into a detected pattern and a computer compares the detected pattern with known patterns of weapons and indicates which known weapon has a substantially similar pattern. Either a time distribution pattern or noise analysis pattern, or both, is used. Gamma-neutron discrimination and a third particle detector for fission particles adjacent the second particle detector are preferably used. The neutrons are generated by either a decay neutron source or a pulled neutron particle accelerator.

  10. Object Recognition System in Remote Controlled Weapon Station using SIFT and SURF Methods

    Directory of Open Access Journals (Sweden)

    Midriem Mirdanies

    2013-12-01

    Full Text Available Object recognition system using computer vision that is implemented on Remote Controlled Weapon Station (RCWS is discussed. This system will make it easier to identify and shoot targeted object automatically. Algorithm was created to recognize real time multiple objects using two methods i.e. Scale Invariant Feature Transform (SIFT and Speeded Up Robust Features (SURF combined with K-Nearest Neighbors (KNN and Random Sample Consensus (RANSAC for verification. The algorithm is designed to improve object detection to be more robust and to minimize the processing time required. Objects are registered on the system consisting of the armored personnel carrier, tanks, bus, sedan, big foot, and police jeep. In addition, object selection can use mouse to shoot another object that has not been registered on the system. Kinect™ is used to capture RGB images and to find the coordinates x, y, and z of the object. The programming language used is C with visual studio IDE 2010 and opencv libraries. Object recognition program is divided into three parts: 1 reading image from kinect™ and simulation results, 2 object recognition process, and 3 transfer of the object data to the ballistic computer. Communication between programs is performed using shared memory. The detected object data is sent to the ballistic computer via Local Area Network (LAN using winsock for ballistic calculation, and then the motor control system moves the direction of the weapon model to the desired object. The experimental results show that the SIFT method is more suitable because more accurate and faster than SURF with the average processing time to detect one object is 430.2 ms, two object is 618.4 ms, three objects is 682.4 ms, and four objects is 756.2 ms. Object recognition program is able to recognize multi-objects and the data of the identified object can be processed by the ballistic computer in realtime.

  11. Warhead politics: Livermore and the competitive system of nuclear weapon design

    Energy Technology Data Exchange (ETDEWEB)

    Francis, Sybil [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States)

    1995-06-01

    From the 1950s onward, US evolved a two-laboratory system to design, develop, and test nuclear weapons. LANL (New Mexico) dates from World War II. The founding in 1952 of LLNL in California effectively established the two-laboratory system. Despite essentially identical missions, LANL and LLNL adopted different strategies and approaches to the development of nuclear weapons. This thesis looks to their joint history for an explanation of this and consequent questions (how did the two-laboratory system originate and evolve? how did it function? what impact did it have on nuclear weapons development?) The incentives and constraints that shaped laboratory strategies and outputs was determined by military demand for nuclear weapons, an informal mandate against laboratory duplication, congressional support for competition, and Livermore`s role as the ``second lab.`` This thesis discusses the laboratories` role in the arms race, organizational strategies for coping with changing political environments, dynamics of technological innovation, and the leverage of policymakers over large organizations.

  12. Cognitive engineering models: A prerequisite to the design of human-computer interaction in complex dynamic systems

    Science.gov (United States)

    Mitchell, Christine M.

    1993-01-01

    This chapter examines a class of human-computer interaction applications, specifically the design of human-computer interaction for the operators of complex systems. Such systems include space systems (e.g., manned systems such as the Shuttle or space station, and unmanned systems such as NASA scientific satellites), aviation systems (e.g., the flight deck of 'glass cockpit' airplanes or air traffic control) and industrial systems (e.g., power plants, telephone networks, and sophisticated, e.g., 'lights out,' manufacturing facilities). The main body of human-computer interaction (HCI) research complements but does not directly address the primary issues involved in human-computer interaction design for operators of complex systems. Interfaces to complex systems are somewhat special. The 'user' in such systems - i.e., the human operator responsible for safe and effective system operation - is highly skilled, someone who in human-machine systems engineering is sometimes characterized as 'well trained, well motivated'. The 'job' or task context is paramount and, thus, human-computer interaction is subordinate to human job interaction. The design of human interaction with complex systems, i.e., the design of human job interaction, is sometimes called cognitive engineering.

  13. [Chemical weapons and chemical terrorism].

    Science.gov (United States)

    Nakamura, Katsumi

    2005-10-01

    Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.

  14. Treatment of human-computer interface in a decision support system

    International Nuclear Information System (INIS)

    Heger, A.S.; Duran, F.A.; Cox, R.G.

    1992-01-01

    One of the most challenging applications facing the computer community is development of effective adaptive human-computer interface. This challenge stems from the complex nature of the human part of this symbiosis. The application of this discipline to the environmental restoration and waste management is further complicated due to the nature of environmental data. The information that is required to manage environmental impacts of human activity is fundamentally complex. This paper will discuss the efforts at Sandia National Laboratories in developing the adaptive conceptual model manager within the constraint of the environmental decision-making. A computer workstation, that hosts the Conceptual Model Manager and the Sandia Environmental Decision Support System will also be discussed

  15. Fuel cycle of nuclear power plants and safeguards system of nuclear weapon nonproliferation

    International Nuclear Information System (INIS)

    Malek, Z.

    1980-10-01

    The international safeguard system of nuclear weapon nonproliferation and the IAEA safeguard system are briefly described. In Czechoslovakia, a decree was issued in 1977 governing the accounting for and control of nuclear materials. The contents of the decree are presented. Described are computer processing of accounting data, technical criteria for the safeguard system application, containment and inspection in the IAEA safeguard system. The method is shown of the control of and accounting for nuclear materials in nuclear power plants and in fuel manufacturing, reprocessing and enrichment plants. Nondestructive and destructive methods of nuclear materials analysis are discussed. Nondestructive methods used include gamma spectrometry, neutron techniques, X-ray fluores--cence techniques. (J.P.)

  16. Atmospheric nuclear weapons test history narrated by carbon-14 in human teeth

    International Nuclear Information System (INIS)

    Nishizawa, Kunihide; Nagatsu, Toshiharu; Togari, Akifumi; Matsumoto, Shosei

    1991-01-01

    The atmospheric testing of nuclear weapons since 1945 caused a significant increase in the concentration of atmospheric 14 C. The 14 C concentration in plants that assimilate 14 C directly by photosynthesis reflects the atmospheric 14 C concentration. Carbon-14 is then transferred into the human body through the food chain. Based on animal experiments, the collagen in human teeth is metabolically inert after its formation. This implies that the collagen of each tooth retains the 14 C concentration which reflects the 14 C concentration in the blood at the time collagen metabolism ceased. The distribution of the 14 C concentration in the collagen of teeth from subjects of various ages would follow a pattern similar to that shown by soft tissues. In this paper the authors elucidate the relationship between the number of nuclear weapon tests and the distribution of 14 C concentration in teeth

  17. Verifying a nuclear weapon`s response to radiation environments

    Energy Technology Data Exchange (ETDEWEB)

    Dean, F.F.; Barrett, W.H.

    1998-05-01

    The process described in the paper is being applied as part of the design verification of a replacement component designed for a nuclear weapon currently in the active stockpile. This process is an adaptation of the process successfully used in nuclear weapon development programs. The verification process concentrates on evaluating system response to radiation environments, verifying system performance during and after exposure to radiation environments, and assessing system survivability.

  18. Cognitive engineering in the design of human-computer interaction and expert systems

    International Nuclear Information System (INIS)

    Salvendy, G.

    1987-01-01

    The 68 papers contributing to this book cover the following areas: Theories of Interface Design; Methodologies of Interface Design; Applications of Interface Design; Software Design; Human Factors in Speech Technology and Telecommunications; Design of Graphic Dialogues; Knowledge Acquisition for Knowledge-Based Systems; Design, Evaluation and Use of Expert Systems. This demonstrates the dual role of cognitive engineering. On the one hand cognitive engineering is utilized to design computing systems which are compatible with human cognition and can be effectively and be easily utilized by all individuals. On the other hand, cognitive engineering is utilized to transfer human cognition into the computer for the purpose of building expert systems. Two papers are of interest to INIS

  19. Eye Tracking Based Control System for Natural Human-Computer Interaction

    Directory of Open Access Journals (Sweden)

    Xuebai Zhang

    2017-01-01

    Full Text Available Eye movement can be regarded as a pivotal real-time input medium for human-computer communication, which is especially important for people with physical disability. In order to improve the reliability, mobility, and usability of eye tracking technique in user-computer dialogue, a novel eye control system with integrating both mouse and keyboard functions is proposed in this paper. The proposed system focuses on providing a simple and convenient interactive mode by only using user’s eye. The usage flow of the proposed system is designed to perfectly follow human natural habits. Additionally, a magnifier module is proposed to allow the accurate operation. In the experiment, two interactive tasks with different difficulty (searching article and browsing multimedia web were done to compare the proposed eye control tool with an existing system. The Technology Acceptance Model (TAM measures are used to evaluate the perceived effectiveness of our system. It is demonstrated that the proposed system is very effective with regard to usability and interface design.

  20. Eye Tracking Based Control System for Natural Human-Computer Interaction.

    Science.gov (United States)

    Zhang, Xuebai; Liu, Xiaolong; Yuan, Shyan-Ming; Lin, Shu-Fan

    2017-01-01

    Eye movement can be regarded as a pivotal real-time input medium for human-computer communication, which is especially important for people with physical disability. In order to improve the reliability, mobility, and usability of eye tracking technique in user-computer dialogue, a novel eye control system with integrating both mouse and keyboard functions is proposed in this paper. The proposed system focuses on providing a simple and convenient interactive mode by only using user's eye. The usage flow of the proposed system is designed to perfectly follow human natural habits. Additionally, a magnifier module is proposed to allow the accurate operation. In the experiment, two interactive tasks with different difficulty (searching article and browsing multimedia web) were done to compare the proposed eye control tool with an existing system. The Technology Acceptance Model (TAM) measures are used to evaluate the perceived effectiveness of our system. It is demonstrated that the proposed system is very effective with regard to usability and interface design.

  1. Interactive computer-enhanced remote viewing system

    International Nuclear Information System (INIS)

    Tourtellott, J.A.; Wagner, J.F.

    1995-01-01

    Remediation activities such as decontamination and decommissioning (D ampersand D) typically involve materials and activities hazardous to humans. Robots are an attractive way to conduct such remediation, but for efficiency they need a good three-dimensional (3-D) computer model of the task space where they are to function. This model can be created from engineering plans and architectural drawings and from empirical data gathered by various sensors at the site. The model is used to plan robotic tasks and verify that selected paths am clear of obstacles. This need for a task space model is most pronounced in the remediation of obsolete production facilities and underground storage tanks. Production facilities at many sites contain compact process machinery and systems that were used to produce weapons grade material. For many such systems, a complex maze of pipes (with potentially dangerous contents) must be removed, and this represents a significant D ampersand D challenge. In an analogous way, the underground storage tanks at sites such as Hanford represent a challenge because of their limited entry and the tumbled profusion of in-tank hardware. In response to this need, the Interactive Computer-Enhanced Remote Viewing System (ICERVS) is being designed as a software system to: (1) Provide a reliable geometric description of a robotic task space, and (2) Enable robotic remediation to be conducted more effectively and more economically than with available techniques. A system such as ICERVS is needed because of the problems discussed below

  2. Computational 3-D Model of the Human Respiratory System

    Science.gov (United States)

    We are developing a comprehensive, morphologically-realistic computational model of the human respiratory system that can be used to study the inhalation, deposition, and clearance of contaminants, while being adaptable for age, race, gender, and health/disease status. The model ...

  3. Weapons and hope

    International Nuclear Information System (INIS)

    Dyson, F.

    1984-01-01

    The British-born physicist presents a full-blown critique of US weapons policy. His careful evaluation of opposing views leads him to endorse a live-and-let-live concept of arms control, which would reject both assured destruction and first use of nuclear weapons in favor of abolishing them. Dyson's faith in the humane progress of military technology and his tolerance of dangerous conventional weapons will not please dovish readers, while his denunciation of military idolatry and his support of a nuclear freeze will disappoint some hawks. Along with moving personal memories of war and pacifism, the most original sections of the book are the author's insightful comments about the Soviet Union and the issue of verification

  4. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  5. Computational Fluid and Particle Dynamics in the Human Respiratory System

    CERN Document Server

    Tu, Jiyuan; Ahmadi, Goodarz

    2013-01-01

    Traditional research methodologies in the human respiratory system have always been challenging due to their invasive nature. Recent advances in medical imaging and computational fluid dynamics (CFD) have accelerated this research. This book compiles and details recent advances in the modelling of the respiratory system for researchers, engineers, scientists, and health practitioners. It breaks down the complexities of this field and provides both students and scientists with an introduction and starting point to the physiology of the respiratory system, fluid dynamics and advanced CFD modeling tools. In addition to a brief introduction to the physics of the respiratory system and an overview of computational methods, the book contains best-practice guidelines for establishing high-quality computational models and simulations. Inspiration for new simulations can be gained through innovative case studies as well as hands-on practice using pre-made computational code. Last but not least, students and researcher...

  6. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  7. Political accountability and autonomous weapons

    Directory of Open Access Journals (Sweden)

    James Igoe Walsh

    2015-09-01

    Full Text Available Autonomous weapons would have the capacity to select and attack targets without direct human input. One important objection to the introduction of such weapons is that they will make it more difficult to identify and hold accountable those responsible for undesirable outcomes such as mission failures and civilian casualties. I hypothesize that individuals can modify their attribution of responsibility in predicable ways to accommodate this new technology. The results of a survey experiment are consistent with this; subjects continue to find responsible and hold accountable political and military leaders when autonomous weapons are used, but also attribute responsibility to the designers and programmers of such weapons.

  8. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    OpenAIRE

    J.P. Dudeja; G.S. Kalsey

    2000-01-01

    Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs) are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper com...

  9. Computers in Defence: An Assessment

    OpenAIRE

    R.K. Bagga

    1993-01-01

    Computer technology has revolutionised weapons system and hardware during the last decade 'miracle chip' has had impact in all areas of battlefield. The recent Gulf War has amply demonstrated the important role of computer technology in warfare. The best of the high technology was used during the 45 days of air battle followed by 100 hours of ground offensive. Computer and communication formed the heart of every weapon system from Tomahawk, SLAM, Scud, Patriot missile to night vision o...

  10. Fundamentals of human-computer interaction

    CERN Document Server

    Monk, Andrew F

    1985-01-01

    Fundamentals of Human-Computer Interaction aims to sensitize the systems designer to the problems faced by the user of an interactive system. The book grew out of a course entitled """"The User Interface: Human Factors for Computer-based Systems"""" which has been run annually at the University of York since 1981. This course has been attended primarily by systems managers from the computer industry. The book is organized into three parts. Part One focuses on the user as processor of information with studies on visual perception; extracting information from printed and electronically presented

  11. Opportunities for Russian Nuclear Weapons Institute developing computer-aided design programs for pharmaceutical drug discovery. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-23

    The goal of this study is to determine whether physicists at the Russian Nuclear Weapons Institute can profitably service the need for computer aided drug design (CADD) programs. The Russian physicists` primary competitive advantage is their ability to write particularly efficient code able to work with limited computing power; a history of working with very large, complex modeling systems; an extensive knowledge of physics and mathematics, and price competitiveness. Their primary competitive disadvantage is their lack of biology, and cultural and geographic issues. The first phase of the study focused on defining the competitive landscape, primarily through interviews with and literature searches on the key providers of CADD software. The second phase focused on users of CADD technology to determine deficiencies in the current product offerings, to understand what product they most desired, and to define the potential demand for such a product.

  12. Kinematics of Laying an Automated Weapon System

    Science.gov (United States)

    2017-07-19

    UNCLASSIFIED UNCLASSIFIED AD-E403 899 Technical Report ARWSE-TR-16024 KINEMATICS OF LAYING AN AUTOMATED WEAPON SYSTEM...information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of

  13. Implementation of a Cost-Accounting System for Visibility of Weapon Systems Life-Cycle Costs

    National Research Council Canada - National Science Library

    Ugone, Mary

    2001-01-01

    .... The DoD Acquisition Reform Goal 10 required DoD to define requirements and establish an implementation plan for a cost-accounting system that provides routine visibility into weapon system life-cycle...

  14. Language evolution and human-computer interaction

    Science.gov (United States)

    Grudin, Jonathan; Norman, Donald A.

    1991-01-01

    Many of the issues that confront designers of interactive computer systems also appear in natural language evolution. Natural languages and human-computer interfaces share as their primary mission the support of extended 'dialogues' between responsive entities. Because in each case one participant is a human being, some of the pressures operating on natural languages, causing them to evolve in order to better support such dialogue, also operate on human-computer 'languages' or interfaces. This does not necessarily push interfaces in the direction of natural language - since one entity in this dialogue is not a human, this is not to be expected. Nonetheless, by discerning where the pressures that guide natural language evolution also appear in human-computer interaction, we can contribute to the design of computer systems and obtain a new perspective on natural languages.

  15. Dual-Modality Imaging of the Human Finger Joint Systems by Using Combined Multispectral Photoacoustic Computed Tomography and Ultrasound Computed Tomography

    Directory of Open Access Journals (Sweden)

    Yubin Liu

    2016-01-01

    Full Text Available We developed a homemade dual-modality imaging system that combines multispectral photoacoustic computed tomography and ultrasound computed tomography for reconstructing the structural and functional information of human finger joint systems. The fused multispectral photoacoustic-ultrasound computed tomography (MPAUCT system was examined by the phantom and in vivo experimental tests. The imaging results indicate that the hard tissues such as the bones and the soft tissues including the blood vessels, the tendon, the skins, and the subcutaneous tissues in the finger joints systems can be effectively recovered by using our multimodality MPAUCT system. The developed MPAUCT system is able to provide us with more comprehensive information of the human finger joints, which shows its potential for characterization and diagnosis of bone or joint diseases.

  16. Asynchronous data-driven classification of weapon systems

    International Nuclear Information System (INIS)

    Jin, Xin; Mukherjee, Kushal; Gupta, Shalabh; Ray, Asok; Phoha, Shashi; Damarla, Thyagaraju

    2009-01-01

    This communication addresses real-time weapon classification by analysis of asynchronous acoustic data, collected from microphones on a sensor network. The weapon classification algorithm consists of two parts: (i) feature extraction from time-series data using symbolic dynamic filtering (SDF), and (ii) pattern classification based on the extracted features using the language measure (LM) and support vector machine (SVM). The proposed algorithm has been tested on field data, generated by firing of two types of rifles. The results of analysis demonstrate high accuracy and fast execution of the pattern classification algorithm with low memory requirements. Potential applications include simultaneous shooter localization and weapon classification with soldier-wearable networked sensors. (rapid communication)

  17. Human Pacman: A Mobile Augmented Reality Entertainment System Based on Physical, Social, and Ubiquitous Computing

    Science.gov (United States)

    Cheok, Adrian David

    This chapter details the Human Pacman system to illuminate entertainment computing which ventures to embed the natural physical world seamlessly with a fantasy virtual playground by capitalizing on infrastructure provided by mobile computing, wireless LAN, and ubiquitous computing. With Human Pacman, we have a physical role-playing computer fantasy together with real human-social and mobile-gaming that emphasizes on collaboration and competition between players in a wide outdoor physical area that allows natural wide-area human-physical movements. Pacmen and Ghosts are now real human players in the real world experiencing mixed computer graphics fantasy-reality provided by using the wearable computers on them. Virtual cookies and actual tangible physical objects are incorporated into the game play to provide novel experiences of seamless transitions between the real and virtual worlds. This is an example of a new form of gaming that anchors on physicality, mobility, social interaction, and ubiquitous computing.

  18. Atmospheric nuclear weapon test history as characterized by the deposition of 14C in human teeth

    International Nuclear Information System (INIS)

    Nishizawa, K.; Togari, A.; Matsumoto, S.; Nagatsu, T.

    1990-01-01

    The 14 C concentration in the collagen of human teeth was retrospectively investigated to determine whether its incorporation was related to atmospheric testing of nuclear weapons. Teeth were extracted for dental therapy from July 1987 to February 1988 from patients who were residents in Japan. Tooth collagen was extracted with HCl and converted to amorphous C by heating in a vacuum line. Specimens for 14 C analysis were prepared by mixing the amorphous C with silver powder. The 14 C concentration was measured by mass spectrometer. The 14 C concentration in tooth collagen rapidly increased in 1961 after the bomb tests, peaked around 1967-1968, and then gradually decreased. The collagen of human teeth maintains the 14 C concentration at the age of root completion for life. The results of this study indicate that the history of environmental contamination from atmospheric nuclear weapon's tests has been characterized by deposition of 14 C in the tooth collagen 14 C of human beings

  19. Implementation of a Cost-Accounting System for Visibility of Weapon Systems Life-Cycle Costs

    National Research Council Canada - National Science Library

    Ugone, Mary

    2001-01-01

    ... costs through activity-based costing and management. The system must deliver timely, integrated data for management purposes to permit understanding of total weapon costs, provide a basis for estimating costs of future systems, and feed other tools for life-cycle cost management.

  20. Human brain as the model of a new computer system. II

    Energy Technology Data Exchange (ETDEWEB)

    Holtz, K; Langheld, E

    1981-12-09

    For Pt. I see IBID., Vol. 29, No. 22, P. 13 (1981). The authors describe the self-generating system of connections of a self-teaching no-program associative computer. The self-generating systems of connections are regarded as simulation models of the human brain and compared with the brain structure. The system hardware comprises microprocessor, PROM, memory, VDU, keyboard unit.

  1. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    In recent years, the development of autonomous weapon systems and so-called ‘killer robots’, has caused a number of serious legal and ethical concerns in the international community, including questions of compliance with International Humanitarian Law and the Laws of Armed Conflict. On the other...

  2. Stereo Vision for Unrestricted Human-Computer Interaction

    OpenAIRE

    Eldridge, Ross; Rudolph, Heiko

    2008-01-01

    Human computer interfaces have come long way in recent years, but the goal of a computer interpreting unrestricted human movement remains elusive. The use of stereo vision in this field has enabled the development of systems that begin to approach this goal. As computer technology advances we come ever closer to a system that can react to the ambiguities of human movement in real-time. In the foreseeable future stereo computer vision is not likely to replace the keyboard or mouse. There is at...

  3. Ubiquitous human computing.

    Science.gov (United States)

    Zittrain, Jonathan

    2008-10-28

    Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a drawing pin and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This paper explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.

  4. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  5. Wounds and weapons

    International Nuclear Information System (INIS)

    Vogel, H.; Dootz, B.

    2007-01-01

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports

  6. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  7. Autonomous Weapon Systems and Risk Management in Hybrid Networks

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    hand, governments and military services hope to develop game-changing technologies, that are ‘better, faster and cheaper’. In this paper, I wish to show how different and competing regimes of justification shape the technopolitical controversy and risk management of autonomous weapon systems...... of justification and risk management in contemporary conflicts....

  8. The epistemology and ontology of human-computer interaction

    NARCIS (Netherlands)

    Brey, Philip A.E.

    2005-01-01

    This paper analyzes epistemological and ontological dimensions of Human-Computer Interaction (HCI) through an analysis of the functions of computer systems in relation to their users. It is argued that the primary relation between humans and computer systems has historically been epistemic:

  9. Simulated ICJ Judgment : Revisiting the Lawfulness of the Threat or Use of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-04-01

    Full Text Available The author prepared this simulated judgment at the request of Cadmus editors to demonstrate that there is ample ground for revisiting and revising the landmark 1996 advisory opinion of the ICJ on the legality of nuclear weapons. The ICJ failed to anticipate the proliferation of nuclear weapons, which expands the evolution of the concept of sovereignty, the potential cataclysmic impact of nuclear war on climate change, the multiplication of nuclear-weapon-free zones as evidence of a widespread rejection, mounting evidence regarding the physical and psychological harm, and unwillingness of the nuclear weapons states to fulfill their obligations under the NPT. This article challenges the notion that a few sovereign states should be the sole arbiters of international law and affirms the legitimate claim of the global community of protection from the existential threat posed by nuclear weapons. The use or threat of use undermines foundational values of the international legal system and the specific rules of self-defense and humanitarian law. The contribution seeks to give an accentuated role for the explicit use of the fundamental values of international legal order, in crafting an innovative methodology for the formulation of the judgment. The very existence of these weapons undermines the rights of all of humanity. The ICJ should be moved to categorically declare the use and possession of nuclear weapons a crime against humanity.

  10. Weapon System Requirements: Detailed Systems Engineering Prior to Product Development Positions Programs for Success

    Science.gov (United States)

    2016-11-01

    modified, replaced, or sustained by consumers or different manufacturers in addition to the manufacturer that developed the system. It also allows...WEAPON SYSTEM REQUIREMENTS Detailed Systems Engineering Prior to Product Development Positions Programs for Success...Engineering Prior to Product Development Positions Programs for Success Why GAO Did This Study Cost and schedule growth in DOD major defense

  11. Occupational stress in human computer interaction.

    Science.gov (United States)

    Smith, M J; Conway, F T; Karsh, B T

    1999-04-01

    There have been a variety of research approaches that have examined the stress issues related to human computer interaction including laboratory studies, cross-sectional surveys, longitudinal case studies and intervention studies. A critical review of these studies indicates that there are important physiological, biochemical, somatic and psychological indicators of stress that are related to work activities where human computer interaction occurs. Many of the stressors of human computer interaction at work are similar to those stressors that have historically been observed in other automated jobs. These include high workload, high work pressure, diminished job control, inadequate employee training to use new technology, monotonous tasks, por supervisory relations, and fear for job security. New stressors have emerged that can be tied primarily to human computer interaction. These include technology breakdowns, technology slowdowns, and electronic performance monitoring. The effects of the stress of human computer interaction in the workplace are increased physiological arousal; somatic complaints, especially of the musculoskeletal system; mood disturbances, particularly anxiety, fear and anger; and diminished quality of working life, such as reduced job satisfaction. Interventions to reduce the stress of computer technology have included improved technology implementation approaches and increased employee participation in implementation. Recommendations for ways to reduce the stress of human computer interaction at work are presented. These include proper ergonomic conditions, increased organizational support, improved job content, proper workload to decrease work pressure, and enhanced opportunities for social support. A model approach to the design of human computer interaction at work that focuses on the system "balance" is proposed.

  12. Doctor of Philosophy Thesis in Military Informatics : Lethal Autonomy of Weapons is Designed and/or Recessive

    OpenAIRE

    Nyagudi, Nyagudi Musandu

    2016-01-01

    p { margin-bottom: 0.1in; line-height: 120%; } My original contribution to knowledge is : Any weapon that exhibits intended and/or untended lethal autonomy in targeting and interdiction – does so by way of design and/or recessive flaw(s) in its systems of control – any such weapon is capable of war-fighting and other battle-space interaction in a manner that its Human Commander does not anticipate. A lethal autonomous weapons is therefore independently capable of ex...

  13. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. The data base management system alternative for computing in the human services.

    Science.gov (United States)

    Sircar, S; Schkade, L L; Schoech, D

    1983-01-01

    The traditional incremental approach to computerization presents substantial problems as systems develop and grow. The Data Base Management System approach to computerization was developed to overcome the problems resulting from implementing computer applications one at a time. The authors describe the applications approach and the alternative Data Base Management System (DBMS) approach through their developmental history, discuss the technology of DBMS components, and consider the implications of choosing the DBMS alternative. Human service managers need an understanding of the DBMS alternative and its applicability to their agency data processing needs. The basis for a conscious selection of computing alternatives is outlined.

  16. Application of image simulation in weapon system development

    CSIR Research Space (South Africa)

    Willers, CJ

    2007-09-01

    Full Text Available systems. Index Terms—image simulation, scene modelling, weapon eval- uation, infrared I. INTRODUCTION Simulation is used increasingly to support military system development throughout all the product life cycle phases, from concept analysis... the theoretical models. The signature 0 2 4 6 8 10 12 14 0 0.1 0.2 0.3 0.4 0.5 Wavelength [ m]� Tr a n sm itt an ce Path length = 10 000 m Sub-arctic Summer: 14 C ambient, 75% RH, Navy maritime aerosol, 23 km visibility Very high humidity: 35 C...

  17. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons

    International Nuclear Information System (INIS)

    Blix, H.; Journe, V.

    2010-01-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  18. Human Computation

    CERN Multimedia

    CERN. Geneva

    2008-01-01

    What if people could play computer games and accomplish work without even realizing it? What if billions of people collaborated to solve important problems for humanity or generate training data for computers? My work aims at a general paradigm for doing exactly that: utilizing human processing power to solve computational problems in a distributed manner. In particular, I focus on harnessing human time and energy for addressing problems that computers cannot yet solve. Although computers have advanced dramatically in many respects over the last 50 years, they still do not possess the basic conceptual intelligence or perceptual capabilities...

  19. Applying systemic-structural activity theory to design of human-computer interaction systems

    CERN Document Server

    Bedny, Gregory Z; Bedny, Inna

    2015-01-01

    Human-Computer Interaction (HCI) is an interdisciplinary field that has gained recognition as an important field in ergonomics. HCI draws on ideas and theoretical concepts from computer science, psychology, industrial design, and other fields. Human-Computer Interaction is no longer limited to trained software users. Today people interact with various devices such as mobile phones, tablets, and laptops. How can you make such interaction user friendly, even when user proficiency levels vary? This book explores methods for assessing the psychological complexity of computer-based tasks. It also p

  20. Cross-sectional associations between violent video and computer game playing and weapon carrying in a national cohort of children.

    Science.gov (United States)

    Ybarra, Michele L; Huesmann, L Rowell; Korchmaros, Josephine D; Reisner, Sari L

    2014-01-01

    Data were collected from 9 to 18 year olds surveyed nationally in a three-wave longitudinal survey. The population-average (generalized estimating equation, GEE) odds of carrying a weapon to school in the last month were estimated as a function of past-year exposure to violent content in video, computer, and Internet games, as well as peer aggression and biological sex. The sample included youth who were at risk for both the exposure (i.e., game play) and the outcome (i.e., who attended public or private school). 3,397 observations from 1,489 youth were included in analyses. 1.4% of youth reported carrying a weapon to school in the last month and 69% reported that at least some of the games they played depicted violence. After adjusting for other potentially influential characteristics (e.g., aggressive behavior), playing at least some violent games in the past year was associated with a fourfold increase in odds of also reporting carrying a weapon to school in the last month. Although youth who reported frequent and intense peer victimization in the past year were more likely to report carrying a weapon to school in the last month, this relation was explained by other influential characteristics. Consistent with the predictions of social-cognitive, observational learning theory, this study supports the hypothesis that carrying weapons to school is associated with violent game play. As one of the first studies of its kind, findings should be interpreted cautiously and need to be replicated. © 2014 Wiley Periodicals, Inc.

  1. Cross-Sectional Associations Between Violent Video and Computer Game Playing and Weapon Carrying in a National Cohort of Children

    Science.gov (United States)

    Ybarra, Michele L.; Huesmann, L. Rowell; Korchmaros, Josephine D.; Reisner, Sari L.

    2015-01-01

    Data were collected from 9 to 18 year olds surveyed nationally in a three-wave longitudinal survey. The population-average (generalized estimating equation, GEE) odds of carrying a weapon to school in the last month were estimated as a function of past-year exposure to violent content in video, computer, and Internet games, as well as peer aggression and biological sex. The sample included youth who were at risk for both the exposure (i.e., game play) and the outcome (i.e., who attended public or private school). 3,397 observations from 1,489 youth were included in analyses. 1.4% of youth reported carrying a weapon to school in the last month and 69% reported that at least some of the games they played depicted violence. After adjusting for other potentially influential characteristics (e.g., aggressive behavior), playing at least some violent games in the past year was associated with a fourfold increase in odds of also reporting carrying a weapon to school in the last month. Although youth who reported frequent and intense peer victimization in the past year were more likely to report carrying a weapon to school in the last month, this relation was explained by other influential characteristics. Consistent with the predictions of social-cognitive, observational learning theory, this study supports the hypothesis that carrying weapons to school is associated with violent game play. As one of the first studies of its kind, findings should be interpreted cautiously and need to be replicated. PMID:24464267

  2. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  3. Verification of Chemical Weapons Destruction

    International Nuclear Information System (INIS)

    Lodding, J.

    2010-01-01

    The Chemical Weapons Convention is the only multilateral treaty that bans completely an entire category of weapons of mass destruction under international verification arrangements. Possessor States, i.e. those that have chemical weapons stockpiles at the time of becoming party to the CWC, commit to destroying these. All States undertake never to acquire chemical weapons and not to help other States acquire such weapons. The CWC foresees time-bound chemical disarmament. The deadlines for destruction for early entrants to the CWC are provided in the treaty. For late entrants, the Conference of States Parties intervenes to set destruction deadlines. One of the unique features of the CWC is thus the regime for verifying destruction of chemical weapons. But how can you design a system for verification at military sites, while protecting military restricted information? What degree of assurance is considered sufficient in such circumstances? How do you divide the verification costs? How do you deal with production capability and initial declarations of existing stockpiles? The founders of the CWC had to address these and other challenges in designing the treaty. Further refinement of the verification system has followed since the treaty opened for signature in 1993 and since inspection work was initiated following entry-into-force of the treaty in 1997. Most of this work concerns destruction at the two large possessor States, Russia and the United States. Perhaps some of the lessons learned from the OPCW experience may be instructive in a future verification regime for nuclear weapons. (author)

  4. Human performance models for computer-aided engineering

    Science.gov (United States)

    Elkind, Jerome I. (Editor); Card, Stuart K. (Editor); Hochberg, Julian (Editor); Huey, Beverly Messick (Editor)

    1989-01-01

    This report discusses a topic important to the field of computational human factors: models of human performance and their use in computer-based engineering facilities for the design of complex systems. It focuses on a particular human factors design problem -- the design of cockpit systems for advanced helicopters -- and on a particular aspect of human performance -- vision and related cognitive functions. By focusing in this way, the authors were able to address the selected topics in some depth and develop findings and recommendations that they believe have application to many other aspects of human performance and to other design domains.

  5. Global strike hypersonic weapons

    Science.gov (United States)

    Lewis, Mark J.

    2017-11-01

    Beginning in the 1940's, the United States has pursued the development of hypersonic technologies, enabling atmospheric flight in excess of five times the speed of sound. Hypersonic flight has application to a range of military and civilian applications, including commercial transport, space access, and various weapons and sensing platforms. A number of flight tests of hypersonic vehicles have been conducted by countries around the world, including the United States, Russia, and China, that could lead the way to future hypersonic global strike weapon systems. These weapons would be especially effective at penetrating conventional defenses, and could pose a significant risk to national security.

  6. Code system to compute radiation dose in human phantoms

    International Nuclear Information System (INIS)

    Ryman, J.C.; Cristy, M.; Eckerman, K.F.; Davis, J.L.; Tang, J.S.; Kerr, G.D.

    1986-01-01

    Monte Carlo photon transport code and a code using Monte Carlo integration of a point kernel have been revised to incorporate human phantom models for an adult female, juveniles of various ages, and a pregnant female at the end of the first trimester of pregnancy, in addition to the adult male used earlier. An analysis code has been developed for deriving recommended values of specific absorbed fractions of photon energy. The computer code system and calculational method are described, emphasizing recent improvements in methods

  7. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  8. HumanComputer Systems Interaction Backgrounds and Applications 2 Part 2

    CERN Document Server

    Kulikowski, Juliusz; Mroczek, Teresa

    2012-01-01

    This volume of the book contains a collection of chapters selected from the papers which originally (in shortened form) have been presented at the 3rd International Conference on Human-Systems Interaction held in Rzeszow, Poland, in 2010. The chapters are divided into five sections concerning: IV. Environment monitoring and robotic systems, V. Diagnostic systems, VI. Educational Systems, and VII. General Problems. The novel concepts and realizations of humanoid robots, talking robots and orthopedic surgical robots, as well as those of direct brain-computer interface  are examples of particularly interesting topics presented in Sec. VI. In Sec. V the problems of  skin cancer recognition, colonoscopy diagnosis, and brain strokes diagnosis as well as more general problems of ontology design for  medical diagnostic knowledge are presented. Example of an industrial diagnostic system and a concept of new algorithm for edges detection in computer-analyzed images  are also presented in this Section. Among the edu...

  9. Development and evaluation of a computer-aided system for analyzing human error in railway operations

    International Nuclear Information System (INIS)

    Kim, Dong San; Baek, Dong Hyun; Yoon, Wan Chul

    2010-01-01

    As human error has been recognized as one of the major contributors to accidents in safety-critical systems, there has been a strong need for techniques that can analyze human error effectively. Although many techniques have been developed so far, much room for improvement remains. As human error analysis is a cognitively demanding and time-consuming task, it is particularly necessary to develop a computerized system supporting this task. This paper presents a computer-aided system for analyzing human error in railway operations, called Computer-Aided System for Human Error Analysis and Reduction (CAS-HEAR). It supports analysts to find multiple levels of error causes and their causal relations by using predefined links between contextual factors and causal factors as well as links between causal factors. In addition, it is based on a complete accident model; hence, it helps analysts to conduct a thorough analysis without missing any important part of human error analysis. A prototype of CAS-HEAR was evaluated by nine field investigators from six railway organizations in Korea. Its overall usefulness in human error analysis was confirmed, although development of its simplified version and some modification of the contextual factors and causal factors are required in order to ensure its practical use.

  10. HCI^2 Workbench: A Development Tool for Multimodal Human-Computer Interaction Systems

    NARCIS (Netherlands)

    Shen, Jie; Wenzhe, Shi; Pantic, Maja

    In this paper, we present a novel software tool designed and implemented to simplify the development process of Multimodal Human-Computer Interaction (MHCI) systems. This tool, which is called the HCI^2 Workbench, exploits a Publish / Subscribe (P/S) architecture [13] [14] to facilitate efficient

  11. HCI^2 Framework: A software framework for multimodal human-computer interaction systems

    NARCIS (Netherlands)

    Shen, Jie; Pantic, Maja

    2013-01-01

    This paper presents a novel software framework for the development and research in the area of multimodal human-computer interface (MHCI) systems. The proposed software framework, which is called the HCI∧2 Framework, is built upon publish/subscribe (P/S) architecture. It implements a

  12. Meaningful Human Control over Autonomous Systems: A Philosophical Account

    Directory of Open Access Journals (Sweden)

    Filippo Santoni de Sio

    2018-02-01

    Full Text Available Debates on lethal autonomous weapon systems have proliferated in the past 5 years. Ethical concerns have been voiced about a possible raise in the number of wrongs and crimes in military operations and about the creation of a “responsibility gap” for harms caused by these systems. To address these concerns, the principle of “meaningful human control” has been introduced in the legal–political debate; according to this principle, humans not computers and their algorithms should ultimately remain in control of, and thus morally responsible for, relevant decisions about (lethal military operations. However, policy-makers and technical designers lack a detailed theory of what “meaningful human control” exactly means. In this paper, we lay the foundation of a philosophical account of meaningful human control, based on the concept of “guidance control” as elaborated in the philosophical debate on free will and moral responsibility. Following the ideals of “Responsible Innovation” and “Value-sensitive Design,” our account of meaningful human control is cast in the form of design requirements. We identify two general necessary conditions to be satisfied for an autonomous system to remain under meaningful human control: first, a “tracking” condition, according to which the system should be able to respond to both the relevant moral reasons of the humans designing and deploying the system and the relevant facts in the environment in which the system operates; second, a “tracing” condition, according to which the system should be designed in such a way as to grant the possibility to always trace back the outcome of its operations to at least one human along the chain of design and operation. As we think that meaningful human control can be one of the central notions in ethics of robotics and AI, in the last part of the paper, we start exploring the implications of our account for the design and use of non

  13. The weapons effect.

    Science.gov (United States)

    Benjamin, Arlin James; Bushman, Brad J

    2018-02-01

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain why the weapons effect occurs. This model postulates that exposure to weapons increases aggressive thoughts and hostile appraisals, thus explaining why weapons facilitate aggressive behavior. Data from meta-analytic reviews are consistent with the General Aggression Model. These findings have important practical as well as theoretical implications. They suggest that the link between weapons and aggression is very strong in semantic memory, and that merely seeing a weapon can make people more aggressive. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Igniting the Light Elements: The Los Alamos Thermonuclear Weapon Project, 1942-1952

    Energy Technology Data Exchange (ETDEWEB)

    Fitzpatrick, Anne C. [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    1999-07-01

    The American system of nuclear weapons research and development was conceived and developed not as a result of technological determinism, but by a number of individual architects who promoted the growth of this large technologically-based complex. While some of the technological artifacts of this system, such as the fission weapons used in World War II, have been the subject of many historical studies, their technical successors--fusion (or hydrogen) devices--are representative of the largely unstudied highly secret realms of nuclear weapons science and engineering. In the postwar period a small number of Los Alamos Scientific Laboratory's staff and affiliates were responsible for theoretical work on fusion weapons, yet the program was subject to both the provisions and constraints of the US Atomic Energy Commission, of which Los Alamos was a part. The Commission leadership's struggle to establish a mission for its network of laboratories, least of all to keep them operating, affected Los Alamos's leaders' decisions as to the course of weapons design and development projects. Adapting Thomas P. Hughes's ''large technological systems'' thesis, I focus on the technical, social, political, and human problems that nuclear weapons scientists faced while pursuing the thermonuclear project, demonstrating why the early American thermonuclear bomb project was an immensely complicated scientific and technological undertaking. I concentrate mainly on Los Alamos Scientific Laboratory's Theoretical, or T, Division, and its members' attempts to complete an accurate mathematical treatment of the ''Super''--the most difficult problem in physics in the postwar period--and other fusion weapon theories. Although tackling a theoretical problem, theoreticians had to address technical and engineering issues as well. I demonstrate the relative value and importance of H-bomb research over time in the postwar era to

  15. Investigation and evaluation into the usability of human-computer interfaces using a typical CAD system

    Energy Technology Data Exchange (ETDEWEB)

    Rickett, J D

    1987-01-01

    This research program covers three topics relating to the human-computer interface namely, voice recognition, tools and techniques for evaluation, and user and interface modeling. An investigation into the implementation of voice-recognition technologies examines how voice recognizers may be evaluated in commercial software. A prototype system was developed with the collaboration of FEMVIEW Ltd. (marketing a CAD package). A theoretical approach to evaluation leads to the hypothesis that human-computer interaction is affected by personality, influencing types of dialogue, preferred methods for providing helps, etc. A user model based on personality traits, or habitual-behavior patterns (HBP) is presented. Finally, a practical framework is provided for the evaluation of human-computer interfaces. It suggests that evaluation is an integral part of design and that the iterative use of evaluation techniques throughout the conceptualization, design, implementation and post-implementation stages will ensure systems that satisfy the needs of the users and fulfill the goal of usability.

  16. Enabling Lead Free Interconnects in DoD Weapon Systems

    Science.gov (United States)

    2017-09-28

    STATEMENT Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT An enhanced multi-pronged technology transfer approach will be designed to communicate...the needs of the weapon system program managers. Examples of risk will be given and information will be provided on where to access more detailed...Paul Zutter, Janelle Fowler, Holley Wingard, Jon Ahlbin, Charles Peltier, – Air Force • Paul Steiner, Tim Kalt, Gary Dowdy – NAVSEA • Mick Miller

  17. Joint Sustainment of Weapon Systems. Would We Be Better Off?

    National Research Council Canada - National Science Library

    Hall, Richard A

    2006-01-01

    .... As depots within the military begin to implement new procedures based on the Lean Six Sigma model, a proposed consolidation of efforts based on major weapon systems could lead to improved cost benefits and decreased maintenance time. Tied with the current Joint Depot Maintenance Program, Lean Six Sigma can continue to improve the Service's depot performance.

  18. Microelectronic Status Analysis and Secondary Part Procureability Assessment of the HAWK Weapon System

    National Research Council Canada - National Science Library

    Maddux, Gary

    2000-01-01

    The MT Division, Engineering Directorate (ED), RDEC, AMCOM has the mission and function of providing microelectronic technology assessments, and producibility and supportability analyses for the HAWK weapon system...

  19. Microelectronic Status Analysis and Secondary Part Procureability Assessment of the HAWK Weapon System

    National Research Council Canada - National Science Library

    Maddux, Gary

    1999-01-01

    The Industrial Operations Division (IOD), SEPD, RDEC, AMCOM has the mission and function of providing microelectronic technology assessments, and producibility and supportability analyses for the HAWK weapon system...

  20. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    Energy Technology Data Exchange (ETDEWEB)

    Paul, J. N.; Chin, M. R.; Sjoden, G. E. [Nuclear and Radiological Engineering Program, George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, 770 State St, Atlanta, GA 30332-0745 (United States)

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  1. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  2. A Conceptual Model to Identify Intent to Use Chemical-Biological Weapons

    Directory of Open Access Journals (Sweden)

    Mary Zalesny

    2017-10-01

    Full Text Available This paper describes a conceptual model to identify and interrelate indicators of intent of non-state actors to use chemical or biological weapons. The model expands on earlier efforts to understand intent to use weapons of mass destruction by building upon well-researched theories of intent and behavior and focusing on a sub-set of weapons of mass destruction (WMD to account for the distinct challenges of employing different types of WMD in violent acts. The conceptual model is presented as a first, critical step in developing a computational model for assessing the potential for groups to use chemical or biological weapons.

  3. New Weapons and the Arms Race

    Science.gov (United States)

    Tsipis, Kosta

    1983-10-01

    In speaking about technologies that could further animate the weapons competition between the United States and the U.S.S.R., it would be useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, adn can best be described by the tasks that they can perform rather than any specific weapons application. Let me begin with the latter class.

  4. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    evaluation and weapon assignment in maritime combat scenarios. Lloyd also acts as a liaison for the Weapons and Combat Systems Division with the ANZAC...positively identified a number of targets as threats, whether they are an enemy ship (i.e., specifically, its weapon launcher systems) or a directed

  5. Flexible weapons architecture design

    Science.gov (United States)

    Pyant, William C., III

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilian casualties. This thesis shows that the architecture design factors of damage mechanism, fusing, weapons weight, guidance, and propulsion are significant in enhancing weapon performance objectives, and would benefit from modularization. Additionally, this thesis constructs an algorithm that can be used to design a weapon set for a particular target class based on these modular components.

  6. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  7. Flexible weapons architecture design

    OpenAIRE

    Pyant, William C.

    2015-01-01

    Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilia...

  8. The Morality of Employing Remotely Piloted Weapon Systems in Combat

    Science.gov (United States)

    2013-03-01

    ethics of remotely piloted weapon systems involve utilitarianism and Just War Theory. Although the other two perspectives, pacifism and realism, do...perspectives of utilitarianism , Just War Theory, pacifism, and realism are evaluated to justify the claim. With the exception of pacifism, each of these...of utilitarianism , Just War Theory, pacifism, and realism are evaluated to justify the claim. With the exception of pacifism, each of these

  9. Nuclear weapons headed for the trash

    International Nuclear Information System (INIS)

    Arkin, W.M.; Durrant, D.; Kristensen, H.

    1991-01-01

    Whether he intended it or not, Bush has taken steps that mean the beginning of the end for nuclear weapons. His proposals significantly reduce the numbers of nuclear weapons and the burdens associated with deploying and controlling them. And although he retains many of the options for continuing and regenerating the nuclear arsenal, he has exposed the fact that there are no longer any grand justifications or doctrinal needs for nuclear weapons - and that the nuclear machine is choking on its economic, political, environmental, and human contradictions. The initiatives fundamentally altered the nuclear stance of both nations. Yet, as momentous as the changes were, they were set in motion in an almost businesslike manner. Neither leader truly framed the moves as an end to the nuclear age. But they didn't need to. The steps they have taken practically guarantee it

  10. Dismantlement and destruction of chemical, nuclear and conventional weapons

    International Nuclear Information System (INIS)

    Schulte, N.T.

    1997-01-01

    The safe destruction and dismantling of chemical, nuclear and conventional weapons is of fundamental importance to the security of all countries represented in this volume. Expertise in the field is not confined to one country or organisation: all can benefit from each other. There is an ever present danger of proliferation of weapons of mass destruction: approximately two dozen countries have ongoing programmes to develop or acquire such weapons, and many are also gaining the capability to build air-surface delivery systems. But much can be done to prevent proliferation by reducing leakage of materials and know-how and by solving the problems of the destruction of surplus weapons systems, which has now come to be a key issue. In 13 sessions of the workshop attention was paid to (1) Dismantlement and Destruction of Chemical, Nuclear and Conventional Weapons; (2) Status of Implementation of Arms Control Treaties and Voluntary Commitments; (3) National Perspectives on Cooperation in Disarmament; (4) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Chemical Weapons; (5) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Nuclear Weapons; (6) Stocktaking of National and Bilateral Disposal/Destruction Programmes: Conventional Weapons. Session; (7) Experience with Currently Employed Chemical Destruction Technologies; (8) Alternative Chemical Destruction Technologies; (9) Deactivation, Dismantlement and Destruction of Delivery Systems and Infrastructure for Nuclear Weapons; (10) Storage, Safeguarding and Disposition of Fissile Materials; (11) Technologies for Conversion and Civil Use of Demilitarized Materials; (12) International Organizations; and (13) Environmental Challenges Posed by Chemical and Nuclear Disarmament

  11. My4Sight: A Human Computation Platform for Improving Flu Predictions

    OpenAIRE

    Akupatni, Vivek Bharath

    2015-01-01

    While many human computation (human-in-the-loop) systems exist in the field of Artificial Intelligence (AI) to solve problems that can't be solved by computers alone, comparatively fewer platforms exist for collecting human knowledge, and evaluation of various techniques for harnessing human insights in improving forecasting models for infectious diseases, such as Influenza and Ebola. In this thesis, we present the design and implementation of My4Sight, a human computation system develope...

  12. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing

    CERN Document Server

    Chao, Han-Chieh; Deng, Der-Jiunn; Park, James; HumanCom and EMC 2013

    2014-01-01

    The theme of HumanCom and EMC are focused on the various aspects of human-centric computing for advances in computer science and its applications, embedded and multimedia computing and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. And the theme of EMC (Advanced in Embedded and Multimedia Computing) is focused on the various aspects of embedded system, smart grid, cloud and multimedia computing, and it provides an opportunity for academic, industry professionals to discuss the latest issues and progress in the area of embedded and multimedia computing. Therefore this book will be include the various theories and practical applications in human-centric computing and embedded and multimedia computing.

  13. TSUNAMI analysis of the applicability of proposed experiments to reactor-grade and weapons-grade mixed-oxide systems

    International Nuclear Information System (INIS)

    Rearden, Bradley T.; Hopper, Calvin M.; Elam, Karla R.

    2005-01-01

    The applicability of proposed critical experiments for the criticality code validation of a series of prototypic reactor-grade and weapons-grade mixed-oxide systems has been assessed with the TSUNAMI methodology from SCALE 5. The application systems were proposed by the Nuclear Energy Agency (NEA) Organization for Economic Cooperation and Development (OECD) Working Party on Nuclear Criticality Safety MOX Experimental Needs Working Group. Forty-eight application systems were conceived to envelope the range of conditions in processing and fabrication of reactor-grade and weapons-grade MOX fuel. The applicability of 303 existing critical benchmarks to each of the 48 applications was assessed, and validation coverage was found to be lacking for certain applications. Two series of proposed critical experiments were also considered in this analysis. The TSUNAMI analysis has revealed that both series of proposed experiments are applicable to numerous configurations of the reactor-grade and weapons-grade systems. A detailed assessment of which experiments were revealed by TSUNAMI to be most applicable to specific prototypic fuel processing systems has been performed. (author)

  14. Microelectronic Status Analysis and Secondary Part Procureability Assessment of the ATACMS-BAT Weapon System

    National Research Council Canada - National Science Library

    Maddux, Gary

    2000-01-01

    The MT Division, Engineering Directorate (ED), RDEC, AMCOM has the mission and function of providing microelectronic technology assessments, and producibility and supportability analyses for the ATACMS-BAT weapon system...

  15. War Reserve Analysis and Secondary Item Procureability Assessment of the AMCOM Supported Weapon Systems

    National Research Council Canada - National Science Library

    Maddux, Gary

    2000-01-01

    .... IOD evaluates the impacts of nonavailability of secondary items on the life cycle supportability of AMCOM weapon systems and evaluates the producibility of secondary items for war reserve requirements...

  16. Experimental Investigations of a Precision Sensor for an Automatic Weapons Stabilizer System

    Directory of Open Access Journals (Sweden)

    Igor Korobiichuk

    2016-12-01

    Full Text Available This paper presents the results of experimental investigations of a precision sensor for an automatic weapons stabilizer system. It also describes the experimental equipment used and the structure of the developed sensor. A weapons stabilizer is designed for automatic guidance of an armament unit in the horizontal and vertical planes when firing at ground and air targets that are quickly maneuvering, and at lower speeds when firing anti-tank missiles, as well as the bypass of construction elements by the armament unit, and the automatic tracking of moving targets when interacting with a fire control system. The results of experimental investigations have shown that the error of the precision sensor developed on the basis of a piezoelectric element is 6 × 10−10 m/s2 under quasi-static conditions, and ~10−5 m/s2 for mobile use. This paper defines metrological and calibration properties of the developed sensor.

  17. High-Energy Laser Weapon Integration with Ground Vehicles

    National Research Council Canada - National Science Library

    Hafften, Michael; Stratton, Robert

    2004-01-01

    .... The architecture of an electric, solid-state HEL weapon system would likely be based upon a hybrid electric vehicle that provides a common electrical power source for the propulsion and weapon subsystems...

  18. Systems analysis and the computer

    Energy Technology Data Exchange (ETDEWEB)

    Douglas, A S

    1983-08-01

    The words systems analysis are used in at least two senses. Whilst the general nature of the topic is well understood in the or community, the nature of the term as used by computer scientists is less familiar. In this paper, the nature of systems analysis as it relates to computer-based systems is examined from the point of view that the computer system is an automaton embedded in a human system, and some facets of this are explored. It is concluded that or analysts and computer analysts have things to learn from each other and that this ought to be reflected in their education. The important role played by change in the design of systems is also highlighted, and it is concluded that, whilst the application of techniques developed in the artificial intelligence field have considerable relevance to constructing automata able to adapt to change in the environment, study of the human factors affecting the overall systems within which the automata are embedded has an even more important role. 19 references.

  19. 15 CFR Supplement No. 7 to Part 742 - Description of Major Weapons Systems

    Science.gov (United States)

    2010-01-01

    ... Major Weapons Systems (1) Battle Tanks: Tracked or wheeled self-propelled armored fighting vehicles with...) Armored Combat Vehicles: Tracked, semi-tracked, or wheeled self-propelled vehicles, with armored..., including versions of these aircraft which perform specialized electronic warfare, suppression of air...

  20. Human Computation An Integrated Approach to Learning from the Crowd

    CERN Document Server

    Law, Edith

    2011-01-01

    Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the Web to perform complex computation. There are various genres of human computation applications that exist today. Games with a purpose (e.g., the ESP Game) specifically target online gamers who generate useful data (e.g., image tags) while playing an enjoy

  1. Accident sequence analysis of human-computer interface design

    International Nuclear Information System (INIS)

    Fan, C.-F.; Chen, W.-H.

    2000-01-01

    It is important to predict potential accident sequences of human-computer interaction in a safety-critical computing system so that vulnerable points can be disclosed and removed. We address this issue by proposing a Multi-Context human-computer interaction Model along with its analysis techniques, an Augmented Fault Tree Analysis, and a Concurrent Event Tree Analysis. The proposed augmented fault tree can identify the potential weak points in software design that may induce unintended software functions or erroneous human procedures. The concurrent event tree can enumerate possible accident sequences due to these weak points

  2. Some think of all rises on efficiency and performance for antisubmarine weapon

    International Nuclear Information System (INIS)

    Wan Qian

    2003-01-01

    The integrated antisubmarine weapon system is new antisubmarine weapon system studied by our country. The efficiency and performance of the system was not put into fullplay in the trying on. The reason for thus is much, such as: personnel, training, management, use, arm system and son on. The author presented some think of all rises on efficiency and performance for integrated antisubmarine weapon

  3. Multimodal Information Presentation for High-Load Human Computer Interaction

    NARCIS (Netherlands)

    Cao, Y.

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but

  4. 48 CFR 225.7005 - Restriction on certain chemical weapons antidote.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Restriction on certain chemical weapons antidote. 225.7005 Section 225.7005 Federal Acquisition Regulations System DEFENSE... on certain chemical weapons antidote. ...

  5. The weapons effect

    NARCIS (Netherlands)

    Benjamin, Arlin James; Bushman, Brad J.

    In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain

  6. Human Computer Music Performance

    OpenAIRE

    Dannenberg, Roger B.

    2012-01-01

    Human Computer Music Performance (HCMP) is the study of music performance by live human performers and real-time computer-based performers. One goal of HCMP is to create a highly autonomous artificial performer that can fill the role of a human, especially in a popular music setting. This will require advances in automated music listening and understanding, new representations for music, techniques for music synchronization, real-time human-computer communication, music generation, sound synt...

  7. Welcome to Systems — A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    Directory of Open Access Journals (Sweden)

    Thomas Huynh

    2012-04-01

    Full Text Available Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies. Understanding of natural systems is essential to the survival of the human species, which is intertwined with the survival of other species on earth. Having the knowledge and ability to build human-made systems is critical to the employment of systems that effectively serve the needs of their users. To gain such understanding and to acquire such knowledge and ability, it is necessary that cutting-edge research in systems science, systems engineering, and systems-related fields continue. This open access journal aims to achieve quick and global dissemination of results of such research. [...

  8. Research Summary 3-D Computational Fluid Dynamics (CFD) Model Of The Human Respiratory System

    Science.gov (United States)

    The U.S. EPA’s Office of Research and Development (ORD) has developed a 3-D computational fluid dynamics (CFD) model of the human respiratory system that allows for the simulation of particulate based contaminant deposition and clearance, while being adaptable for age, ethnicity,...

  9. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  10. What transformations in the international system are prerequisites for the complete elimination of nuclear weapons?

    International Nuclear Information System (INIS)

    Wheeler, M.

    1993-01-01

    Pointing out that the task presented to the panel is to explore how and when the world might cross the threshold to the post-nuclear-weapon age, the author deals with the topic by first stating several basic assumptions which help frame the discussion in general terms; then constructing a model of a phased approach for dealing practically with nuclear weapons during the next several decades; and finally identifying changes needed in the international system if a program of nuclear disarmament is to have any chance of success over the long term

  11. Using Modeling and Simulation to Complement Testing for Increased Understanding of Weapon Subassembly Response.

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Michael K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Davidson, Megan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    As part of Sandia’s nuclear deterrence mission, the B61-12 Life Extension Program (LEP) aims to modernize the aging weapon system. Modernization requires requalification and Sandia is using high performance computing to perform advanced computational simulations to better understand, evaluate, and verify weapon system performance in conjunction with limited physical testing. The Nose Bomb Subassembly (NBSA) of the B61-12 is responsible for producing a fuzing signal upon ground impact. The fuzing signal is dependent upon electromechanical impact sensors producing valid electrical fuzing signals at impact. Computer generated models were used to assess the timing between the impact sensor’s response to the deceleration of impact and damage to major components and system subassemblies. The modeling and simulation team worked alongside the physical test team to design a large-scale reverse ballistic test to not only assess system performance, but to also validate their computational models. The reverse ballistic test conducted at Sandia’s sled test facility sent a rocket sled with a representative target into a stationary B61-12 (NBSA) to characterize the nose crush and functional response of NBSA components. Data obtained from data recorders and high-speed photometrics were integrated with previously generated computer models in order to refine and validate the model’s ability to reliably simulate real-world effects. Large-scale tests are impractical to conduct for every single impact scenario. By creating reliable computer models, we can perform simulations that identify trends and produce estimates of outcomes over the entire range of required impact conditions. Sandia’s HPCs enable geometric resolution that was unachievable before, allowing for more fidelity and detail, and creating simulations that can provide insight to support evaluation of requirements and performance margins. As computing resources continue to improve, researchers at Sandia are hoping

  12. Combating the spread of weapons of mass destruction: Some reflections. Essay, published in Le Monde

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2003-01-01

    With all the changes in international relations since the end of the Cold War, nuclear weapons have continued to have a position of prominence as the currency of ultimate power. And although a number of countries such as South Africa have given up their nuclear weapons or nuclear weapons ambitions, the nuclear umbrellas of NATO and other alliances continue to expand. More importantly, the objectives embodied in the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), developed in the early 1970s to control the spread of nuclear weapons and to move us towards nuclear disarmament, are under growing stress. Several thousands of nuclear weapons continue to exist in the five nuclear weapon States party to the NPT (China, France, Russia, the United Kingdom, and the United States). And of the three countries that remain outside the NPT, two India and Pakistan have in the last few years demonstrated their nuclear weapons capability, while the third Israel is generally presumed to have such weapons. Most recently North Korea, a party to the NPT, has decided to walk away from the Treaty and, not unlike some other parties to the Treaty, is suspected of working to acquire nuclear weapons. Other States, on the other hand, have opted for the 'poor man's alternative' by pursuing the acquisition of chemical and biological weapons. And in the aftermath of the events of 11 September 2001, the threat of Weapons of mass destruction (WMD) proliferation gained a new dimension: the prospect of sub-national groups seeking to acquire and use these weapons. Faced with this reality, one must conclude that it is futile to try to combat the spread of WMD through a collective, rule-based system of international security and that people have to acquiesce to living in a world plagued with the constant threat of a nuclear holocaust or other disasters? But reliance on a system of collective security to curb the proliferation of WMD will require bold thinking, a willingness to work together

  13. Acquisition Logistics Guidelines for Improving the Argentine Air Force Weapon System Acquisition Process

    Science.gov (United States)

    1999-03-01

    the Argentine Air Force Academy, in 1979. He earned a degree as an Aeronautical and Mechanical Engineer from Escuela de Ingenieria Aeronäutica in...Independent Assessments Innovative Practices Continuos Improvement Legality of Weapons Under International Law Software Intensive Systems...optimize total system performance and life cycle cost. The term total implies the prime mission equipment -hardware and software -, its operational and

  14. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  15. Human Systems Design Criteria

    DEFF Research Database (Denmark)

    Rasmussen, Jens

    1982-01-01

    This paper deals with the problem of designing more humanised computer systems. This problem can be formally described as the need for defining human design criteria, which — if used in the design process - will secure that the systems designed get the relevant qualities. That is not only...... the necessary functional qualities but also the needed human qualities. The author's main argument is, that the design process should be a dialectical synthesis of the two points of view: Man as a System Component, and System as Man's Environment. Based on a man's presentation of the state of the art a set...... of design criteria is suggested and their relevance discussed. The point is to focus on the operator rather than on the computer. The crucial question is not to program the computer to work on its own conditions, but to “program” the operator to function on human conditions....

  16. Lipophilic super-absorbent swelling gels as cleaners for use on weapons systems and platforms

    Science.gov (United States)

    Increasingly stringent environmental regulations on volatile organic compounds (VOCs) and hazardous air pollutants (HAPs) demand the development of disruptive technologies for cleaning weapons systems and platforms. Currently employed techniques such as vapor degreasing, solvent, aqueous, or blast c...

  17. Nuclear weapon testing and the monkey business

    International Nuclear Information System (INIS)

    Murthy, M.S.S.

    1978-01-01

    Reasons for India's total ban on the export of rhesus monkeys to U.S. have been explained. The major reason is that some of the animals were used in nuclear weapon related radiation experiments. This was a clear violation of a stricture in the agreement about supply of monkeys. The stricture prohibited the use of animals for research concerning military operations, including nuclear weapon testing. It is pleaded that a strict enforcement of strictures rather than a total ban on the export of monkeys would be better in the interest of advancement of knowledge in human medicine and disease control. (M.G.B.)

  18. Hybrid Human-Computing Distributed Sense-Making: Extending the SOA Paradigm for Dynamic Adjudication and Optimization of Human and Computer Roles

    Science.gov (United States)

    Rimland, Jeffrey C.

    2013-01-01

    In many evolving systems, inputs can be derived from both human observations and physical sensors. Additionally, many computation and analysis tasks can be performed by either human beings or artificial intelligence (AI) applications. For example, weather prediction, emergency event response, assistive technology for various human sensory and…

  19. Human-Centered Design of Human-Computer-Human Dialogs in Aerospace Systems

    Science.gov (United States)

    Mitchell, Christine M.

    1998-01-01

    A series of ongoing research programs at Georgia Tech established a need for a simulation support tool for aircraft computer-based aids. This led to the design and development of the Georgia Tech Electronic Flight Instrument Research Tool (GT-EFIRT). GT-EFIRT is a part-task flight simulator specifically designed to study aircraft display design and single pilot interaction. ne simulator, using commercially available graphics and Unix workstations, replicates to a high level of fidelity the Electronic Flight Instrument Systems (EFIS), Flight Management Computer (FMC) and Auto Flight Director System (AFDS) of the Boeing 757/767 aircraft. The simulator can be configured to present information using conventional looking B757n67 displays or next generation Primary Flight Displays (PFD) such as found on the Beech Starship and MD-11.

  20. Cross-Sectional Associations Between Violent Video and Computer Game Playing and Weapon Carrying in a National Cohort of Children

    OpenAIRE

    Ybarra, Michele L.; Huesmann, L. Rowell; Korchmaros, Josephine D.; Reisner, Sari L.

    2014-01-01

    Data were collected from 9 to 18 year olds surveyed nationally in a three-wave longitudinal survey. The population-average (generalized estimating equation, GEE) odds of carrying a weapon to school in the last month were estimated as a function of past-year exposure to violent content in video, computer, and Internet games, as well as peer aggression and biological sex. The sample included youth who were at risk for both the exposure (i.e., game play) and the outcome (i.e., who attended publi...

  1. Reliability Evaluation for the Surface to Air Missile Weapon Based on Cloud Model

    Directory of Open Access Journals (Sweden)

    Deng Jianjun

    2015-01-01

    Full Text Available The fuzziness and randomness is integrated by using digital characteristics, such as Expected value, Entropy and Hyper entropy. The cloud model adapted to reliability evaluation is put forward based on the concept of the surface to air missile weapon. The cloud scale of the qualitative evaluation is constructed, and the quantitative variable and the qualitative variable in the system reliability evaluation are corresponded. The practical calculation result shows that it is more effective to analyze the reliability of the surface to air missile weapon by this way. The practical calculation result also reflects the model expressed by cloud theory is more consistent with the human thinking style of uncertainty.

  2. Detection and treatment of chemical weapons and/or biological pathogens

    Science.gov (United States)

    Mariella Jr., Raymond P.

    2004-09-07

    A system for detection and treatment of chemical weapons and/or biological pathogens uses a detector system, an electrostatic precipitator or scrubber, a circulation system, and a control. The precipitator or scrubber is activated in response to a signal from the detector upon the detection of chemical weapons and/or biological pathogens.

  3. From humans to computers cognition through visual perception

    CERN Document Server

    Alexandrov, Viktor Vasilievitch

    1991-01-01

    This book considers computer vision to be an integral part of the artificial intelligence system. The core of the book is an analysis of possible approaches to the creation of artificial vision systems, which simulate human visual perception. Much attention is paid to the latest achievements in visual psychology and physiology, the description of the functional and structural organization of the human perception mechanism, the peculiarities of artistic perception and the expression of reality. Computer vision models based on these data are investigated. They include the processes of external d

  4. Instruments of war weapons and technologies that have changed history

    CERN Document Server

    Tucker, Spencer C

    2015-01-01

    In war, the weapons and technologies employed have direct effects on how battles are waged. When new weapons are introduced, they can dramatically alter the outcomes of warfare-and consequently change the course of history itself. This reference work provides a fascinating overview of the major weapon systems and military technologies that have had a major impact on world history. Addressing weapons as crude as the club used by primitive man to the high-tech weapons of today such as unmanned drones, Instruments of War: Weapons and Technologies That Have Changed History offers nearly 270 profusely illustrated entries that examine the key roles played by specific weapons and identify their success and failures. The book begins with an introductory essay that frames the subject matter of the work and discusses the history of weapons as a whole. The text is concise and accessible to general readers without extensive backgrounds in military history yet provides the detailed information necessary to convey the comp...

  5. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  6. [Prospects in getting accordance between chemical analytic control means and medical technical requirements to safety system concerning chemical weapons destruction].

    Science.gov (United States)

    Rembovskiĭ, V R; Mogilenkova, L A; Savel'eva, E I

    2005-01-01

    The major unit monitoring chemical weapons destruction objects is a system of chemical analyticcontrol over the technologic process procedures and possibility of environment and workplace pollution withtoxicchemicals and their destruction products. At the same time, physical and chemical control means meet sanitary and hygienic requirements incompletely. To provide efficient control, internationally recognized approaches should be adapted to features of Russian system monitoring pollution of chemical weapons destruction objects with toxic chemicals.

  7. A U.S. utility view of using former weapons material

    International Nuclear Information System (INIS)

    Larkin, D.L.

    1995-01-01

    In the next several years, it is anticipated that the President will declare approximately 50 metric tons of weapons-grade plutonium surplus to national security requirements. The Department of Energy is examining alternatives for the disposal of this material and is scheduled to issue their decision in August of 1996. One option would be to burn this material as fuel in commercial reactors. Last year the Supply System announced its intention to explore the possibility of fueling two of its nuclear power plants with mixed oxide (MOX) fuel. This fuel would be comprised of a mixture of uranium and surplus weapons-grade plutonium. Sales of generated electricity would help off-set the costs of destroying the plutonium. The Supply System proposal has a number of virtually unique features that make it quite attractive to the federal government, including the plants location on the restricted access Hanford Reservation. While there is a significant amount of experience with island design MOX fuel from recycled plutonium, disposing of the weapons-grade plutonium on an accelerated schedule would require full MOX reload designs. To resolve any issues involved, the Supply System is proposing that DOE sponsor a lead fuel program of four MOX fuel assemblies for operation in WNP-2. A decision to proceed by October 1995 could lead to loading the fuel in the spring of 1997. The objective of the program would be to resolve any technical issues with the use of gadolinia and gallium in mixed-oxide rods. The lead fuel would also be used to validate the application of current fuel and core design computer codes to MOX in modern designs to extended burnups

  8. PERANCANGAN COMPUTER AIDED SYSTEM DALAM MENGANALISA HUMAN ERROR DI PERKERETAAPIAN INDONESIA

    Directory of Open Access Journals (Sweden)

    Wiwik Budiawan

    2013-06-01

    the occurrence of a train crash in Indonesia. However, it is not clear how this analysis technique is done. Studies of human error made ​​National Transportation Safety Committee (NTSC is still relatively limited, is not equipped with a systematic method. There are several methods that have been developed at this time, but for railway transportation is not widely developed. Human Factors Analysis and Classification System (HFACS is a human error analysis method were developed and adapted to the Indonesian railway system. To improve the reliability of the analysis of human error, HFACS then developed in the form of web-based applications that can be accessed on a computer or smartphone. The results could be used by the NTSC as railway accident analysis methods particularly associated with human error. Keywords: human error, HFACS, CAS, railways

  9. Perceived popularity of adolescents who use weapons in violence and adolescents who only carry weapons.

    Science.gov (United States)

    Wallace, Lacey N

    2017-01-01

    Prior research has found that persistently delinquent youth or more violent youth were less popular than their less delinquent peers (Young, 2013). However, recent research has also found that weapon carrying is associated with being more popular in adolescence (Dijkstra et al., 2010). The present paper examines the perceived popularity of adolescents who carry weapons in comparison to those who both carry and use weapons in acts of violence or threatened violence. Data consist of two waves from the National Longitudinal Study of Adolescent to Adult Health. Analyses use OLS regression with lagged predictors. This paper found no differences in number of friends between weapon carriers and weapon users. However, among both male and female gang members, those who did not use or carry weapons (abstainers) named significantly fewer friends than weapon users. Among females, weapon abstainers both named and were named by significantly more people than weapon users. These differences were not observed for males. Implications of these results and directions for future research are discussed.

  10. Defining Weapons of Mass Destruction

    Science.gov (United States)

    2012-01-01

    Cyprus, Liberia, Malta, Marshall Islands , Mongolia, Panama, and St. Vin- cent and the Grenadines, according to a State Department summary available...1972 Biological and Toxin Weapons Convention, and the 1993 Chemical Weapons Convention. As such, NBC weapons represent a group of weapons that the...Development, Produc- tion and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction contains two references to WMD

  11. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    of their nonstrategic nuclear weapons and eliminate many of them. These 1991 announcements, coming after the abortive coup in Moscow in July 1991...of these weapons. The abortive coup in Moscow in August 1991 had also caused alarms about the strength of central control over nuclear weapons...assure other allies of the U.S. commitment to their security, but these assurances do not necessarily include legally binding commitments to retaliate

  12. Homo ludens in the loop playful human computation systems

    CERN Document Server

    Krause, Markus

    2014-01-01

    The human mind is incredible. It solves problems with ease that will elude machines even for the next decades. This book explores what happens when humans and machines work together to solve problems machines cannot yet solve alone. It explains how machines and computers can work together and how humans can have fun helping to face some of the most challenging problems of artificial intelligence. In this book, you will find designs for games that are entertaining and yet able to collect data to train machines for complex tasks such as natural language processing or image understanding. You wil

  13. Best Practices. An Integrated Portfolio Management Approach to Weapon System Investments Could Improve DOD's Acquisition Outcomes

    National Research Council Canada - National Science Library

    2007-01-01

    .... Specifically, GAO compared DOD's processes for investing in weapon systems to the best practices that successful commercial companies use to achieve a balanced mix of new products, and identified...

  14. The opportunity to limit and reduce inventories of fissionable weapon materials

    International Nuclear Information System (INIS)

    Hebel, L.C.

    1991-01-01

    As the United States and the Soviet government agree on major reductions in nuclear weapon delivery systems, they need to address the disposal of the nuclear warheads and bombs for those systems. Such measures could be strongly reinforced if the two nations also institute restraints and reductions in the total amount of fissionable materials available for weapons. Many metric tonnes of such materials would be made surplus by the reductions in strategic nuclear weapons due to the Strategic Arms Reduction Treaty (START-I). Equally large reductions in short-range (theater) nuclear weapons are expected in the wake of the recent Treaty on Conventional Forces in Europe (CFE)

  15. Towards passive brain-computer interfaces: applying brain-computer interface technology to human-machine systems in general.

    Science.gov (United States)

    Zander, Thorsten O; Kothe, Christian

    2011-04-01

    Cognitive monitoring is an approach utilizing realtime brain signal decoding (RBSD) for gaining information on the ongoing cognitive user state. In recent decades this approach has brought valuable insight into the cognition of an interacting human. Automated RBSD can be used to set up a brain-computer interface (BCI) providing a novel input modality for technical systems solely based on brain activity. In BCIs the user usually sends voluntary and directed commands to control the connected computer system or to communicate through it. In this paper we propose an extension of this approach by fusing BCI technology with cognitive monitoring, providing valuable information about the users' intentions, situational interpretations and emotional states to the technical system. We call this approach passive BCI. In the following we give an overview of studies which utilize passive BCI, as well as other novel types of applications resulting from BCI technology. We especially focus on applications for healthy users, and the specific requirements and demands of this user group. Since the presented approach of combining cognitive monitoring with BCI technology is very similar to the concept of BCIs itself we propose a unifying categorization of BCI-based applications, including the novel approach of passive BCI.

  16. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  17. Financial Management: Financial Reporting of Deferred Maintenance Information on Navy Weapon Systems for FY 2002

    National Research Council Canada - National Science Library

    Granetto, Paul

    2003-01-01

    .... The Navy reported an estimated $ 1.3 billion of deterred maintenance at the beginning of FY 2002 on its aircraft, ships, missiles, combat vehicles, and other weapon systems national defense property, plant, and equipment (PP&E) commodities...

  18. Computer-Mediated Communication Systems

    Directory of Open Access Journals (Sweden)

    Bin Yu

    2011-10-01

    Full Text Available The essence of communication is to exchange and share information. Computers provide a new medium to human communication. CMC system, composed of human and computers, absorbs and then extends the advantages of all former formats of communication, embracing the instant interaction of oral communication, the abstract logics of printing dissemination, and the vivid images of movie and television. It also creates a series of new communication formats, such as Hyper Text, Multimedia etc. which are the information organizing methods, and cross-space message delivering patterns. Benefiting from the continuous development of technique and mechanism, the computer-mediated communication makes the dream of transmitting information cross space and time become true, which will definitely have a great impact on our social lives.

  19. Nuclear weapons free zones

    International Nuclear Information System (INIS)

    Stahl, K.

    1990-01-01

    The article analyses the concept and problems of the two nuclear weapons free zones in Latin America and in the South Pacific established by the Treaty of Tlatelolco and the Treaty of Rarotonga. So far the nuclear weapons states except China have refused to sign the additional protocols of the Treaties or have signed them only with considerable provisos. Therefore they don't fully recognize the nuclear weapons free status of those zones, or they don't recognize it at all. Both Treaties contain no provisions to regulate the transit of nuclear weapons through the zones. This allows de facto the stationing of nuclear weapons in the military bases of the US which are located within the nuclear weapons free zone of Latin America. The Treaty of Tlatelolco contains also the right of the states, party to the Treaty, to explode nuclear devices for peaceful purposes. Since peaceful and military nuclear explosions cannot be distinguished technically, this right could also undermine the nuclear weapons free status of the region. Important nuclear threshold countries like Argentina and Brazil have furthermore refrained from putting the Treaty into force. (orig.) [de

  20. Chemical Weapons Convention

    National Research Council Canada - National Science Library

    1997-01-01

    On April 29, 1997, the Convention on the Prohibition of the Development, Production, Stockpiling, and Use of Chemical Weapons and on Their Destruction, known as the Chemical Weapons Convention (CWC...

  1. 50 kW laser weapon demonstrator of Rheinmetall Waffe munition

    Science.gov (United States)

    Ludewigt, K.; Riesbeck, Th.; Graf, A.; Jung, M.

    2013-10-01

    We will present the setup of a 50 kW Laser Weapon Demonstrator (LWD) and results achieved with this system. The LWD is a ground based Air Defence system consisting of a Skyguard sensor unit for target acquisition and two laser equipped weapon turrets. The weapon turrets used are standard air defence turrets of Rheinmetall Air Defence which were equipped with several 10 kW Laser Weapon Modules (LWM). Each LWM consists of one 10 kW fiber laser and a beam forming unit (BFU). Commercial of the shelf fiber laser were modified for our defence applications. The BFU providing diffraction limited beam focusing, target imaging and fine tracking of the target was developed. The LWD was tested in a firing campaign at Rheinmetall test ground in Switzerland. All laser beams of both weapon turrets were superimposed on stationary and dynamic targets. Test results of the LWD for the scenarios Air Defence and C-RAMM (counter rockets, artillery, mortar and missiles) will be presented. An outlook for the next development stage towards a 100 kW class laser weapon on RWM will be given.

  2. A Perspective on Computational Human Performance Models as Design Tools

    Science.gov (United States)

    Jones, Patricia M.

    2010-01-01

    The design of interactive systems, including levels of automation, displays, and controls, is usually based on design guidelines and iterative empirical prototyping. A complementary approach is to use computational human performance models to evaluate designs. An integrated strategy of model-based and empirical test and evaluation activities is particularly attractive as a methodology for verification and validation of human-rated systems for commercial space. This talk will review several computational human performance modeling approaches and their applicability to design of display and control requirements.

  3. A Software Framework for Multimodal Human-Computer Interaction Systems

    NARCIS (Netherlands)

    Shen, Jie; Pantic, Maja

    2009-01-01

    This paper describes a software framework we designed and implemented for the development and research in the area of multimodal human-computer interface. The proposed framework is based on publish / subscribe architecture, which allows developers and researchers to conveniently configure, test and

  4. Antisatellite weapons

    International Nuclear Information System (INIS)

    Garwin, R.L.; Gottfried, K.; Hafner, D.L.

    1984-01-01

    The authors take issue with the assessment that the advent of antisatellite weapons implies that the beneficial role of satellites in arms control, confidence building, and conflict resolution has been judged less important than their ability to support actual military operations. They argue that there is still an opportunity to negotiate a militarily significant and verifiable constraint on the growth of antisatellite technology that would be in the security interest of the US and the world as a whole. They base their opinion on an assessment of the roles of the existing military satellites and their vulnerability to antisatellite weapons and the probable impact of antisatellite weapons on various kinds of crisis and conflict. 10 figures, 1 table

  5. Introduction to human-computer interaction

    CERN Document Server

    Booth, Paul

    2014-01-01

    Originally published in 1989 this title provided a comprehensive and authoritative introduction to the burgeoning discipline of human-computer interaction for students, academics, and those from industry who wished to know more about the subject. Assuming very little knowledge, the book provides an overview of the diverse research areas that were at the time only gradually building into a coherent and well-structured field. It aims to explain the underlying causes of the cognitive, social and organizational problems typically encountered when computer systems are introduced. It is clear and co

  6. High Speed Marine Craft Threat: Buoyancy and Stability Requirements for a Sub-Launched Weapon System

    National Research Council Canada - National Science Library

    Lowery, John

    1999-01-01

    ...) that would be used for coastal infiltration. The most practical scenario would utilize a torpedo stow for a weapon system that would be tube launched, thus ensuring the maximum cruise missile capability of the submarine with a minimal sacrifice...

  7. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Is the nuclear weapon taboo? The nuclear weapon is useless and expensive. Let us not leave the nuclear weapon as an inheritance

    International Nuclear Information System (INIS)

    Gauchet, Nathalie; Norlain, Bernard; Beach, Hugh; Beckett, Margaret; Quiles, Paul; Rocard, Michel; Ramsbotham, David

    2012-03-01

    Starting with the definition of the word taboo as stated in a dictionary (a topic it would be unbecoming to evoke, under social and moral proprieties), the author of the first article discusses the status of the nuclear weapon, outlining that it is expensive, useless and monstrous. She notices that conventions on chemical weapons seem to be more efficient than the NPT, that, even if the reasons for abolition are known as well as ways to reach it, it seems difficult to actually address this issue. She evokes different voices coming from different countries or international bodies calling for this abolition. She also states that the nuclear weapon is not a deterrent weapon but a weapon of domination, and calls for the mobilisation of the civil society throughout the world. A second article states that the nuclear weapon is useless and expensive, and that we have to get rid of this hazard for the sake of the planet. Former ministers, Prime ministers, and generals consider that we can and must give up nuclear weapons, notably because the strategic context has completely changed since the fall of the Berlin wall, and support the action of Global Zero

  9. Major weapon system environmental life-cycle cost estimating for Conservation, Cleanup, Compliance and Pollution Prevention (C3P2)

    Science.gov (United States)

    Hammond, Wesley; Thurston, Marland; Hood, Christopher

    1995-01-01

    The Titan 4 Space Launch Vehicle Program is one of many major weapon system programs that have modified acquisition plans and operational procedures to meet new, stringent environmental rules and regulations. The Environmental Protection Agency (EPA) and the Department of Defense (DOD) mandate to reduce the use of ozone depleting chemicals (ODC's) is just one of the regulatory changes that has affected the program. In the last few years, public environmental awareness, coupled with stricter environmental regulations, has created the need for DOD to produce environmental life-cycle cost estimates (ELCCE) for every major weapon system acquisition program. The environmental impact of the weapon system must be assessed and budgeted, considering all costs, from cradle to grave. The Office of the Secretary of Defense (OSD) has proposed that organizations consider Conservation, Cleanup, Compliance and Pollution Prevention (C(sup 3)P(sup 2)) issues associated with each acquisition program to assess life-cycle impacts and costs. The Air Force selected the Titan 4 system as the pilot program for estimating life-cycle environmental costs. The estimating task required participants to develop an ELCCE methodology, collect data to test the methodology and produce a credible cost estimate within the DOD C(sup 3)P(sup 2) definition. The estimating methodology included using the Program Office weapon system description and work breakdown structure together with operational site and manufacturing plant visits to identify environmental cost drivers. The results of the Titan IV ELCCE process are discussed and expanded to demonstrate how they can be applied to satisfy any life-cycle environmental cost estimating requirement.

  10. The UK Human Genome Mapping Project online computing service.

    Science.gov (United States)

    Rysavy, F R; Bishop, M J; Gibbs, G P; Williams, G W

    1992-04-01

    This paper presents an overview of computing and networking facilities developed by the Medical Research Council to provide online computing support to the Human Genome Mapping Project (HGMP) in the UK. The facility is connected to a number of other computing facilities in various centres of genetics and molecular biology research excellence, either directly via high-speed links or through national and international wide-area networks. The paper describes the design and implementation of the current system, a 'client/server' network of Sun, IBM, DEC and Apple servers, gateways and workstations. A short outline of online computing services currently delivered by this system to the UK human genetics research community is also provided. More information about the services and their availability could be obtained by a direct approach to the UK HGMP-RC.

  11. Oil and influence: the oil weapon examined

    Energy Technology Data Exchange (ETDEWEB)

    Maull, H

    1975-01-01

    The term ''oil weapon'' as used here signifies any manipulation of the price and/or supply of oil by exporting nations with the intention of changing the political behavior of the consumer nations. The political potential of the oil price is fairly restricted so, in effect, the supply interruptions are of prime concern. Manipulating price does, in principle, offer the possibilities of both conferring rewards and inflicting sanctions. Oil could be sold on preferential prices and terms. A precondition for using the oil weapon successfully would be the ability to cause real and serious damage to the consumer countries. Four damaging potentials for using the oil weapon could include its application by: (1) one producer against one consumer; (2) one producer against all consumers; (3) a group of producers against one consumer; and (4) by a group of producers against all consumers. It is concluded that the oil weapon will continue to be a force in the international system. (MCW)

  12. Turkey’s Response to Threats of Weapons of Mass Destruction

    Science.gov (United States)

    2001-12-01

    categories of unconventional weapons and was prepared to invest enormous financial and human resources to achieve this goal. 5 Iraqi attempts to seek...Ministry of Defense White Paper of 2001 defines “Religious Fundementalism ” among the internal threats directed against Turkey’s security in the post...Therefore, Syria will likely continue to develop an extensive chemical and biological weapons arsenal and will also invest in upgrading the accuracy of

  13. Elimination of ballistic missiles: An important step towards a nuclear-weapon-free world

    International Nuclear Information System (INIS)

    Scheffran, J.

    1997-01-01

    Although the Non-Proliferation Treaty preamble emphasises 'the elimination from national arsenals of nuclear weapons and the means of their delivery pursuant to a Treaty on general and complete disarmament under strict and effective international control', the Non-Proliferation Treaty does not further specify how this ultimate goal could be achieved for delivery systems. Delivery systems are an important and costly part of nuclear weapons which should be sophisticated, therefore the control of nuclear-capable delivery systems would be an important step to make nuclear weapons useless and reduce the threat od their use. This is especially true for ballistic missiles, which represent effective and powerful means to deploy nuclear weapons

  14. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1992-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  15. Estimates of radiological risk from depleted uranium weapons in war scenarios.

    Science.gov (United States)

    Durante, Marco; Pugliese, Mariagabriella

    2002-01-01

    Several weapons used during the recent conflict in Yugoslavia contain depleted uranium, including missiles and armor-piercing incendiary rounds. Health concern is related to the use of these weapons, because of the heavy-metal toxicity and radioactivity of uranium. Although chemical toxicity is considered the more important source of health risk related to uranium, radiation exposure has been allegedly related to cancers among veterans of the Balkan conflict, and uranium munitions are a possible source of contamination in the environment. Actual measurements of radioactive contamination are needed to assess the risk. In this paper, a computer simulation is proposed to estimate radiological risk related to different exposure scenarios. Dose caused by inhalation of radioactive aerosols and ground contamination induced by Tomahawk missile impact are simulated using a Gaussian plume model (HOTSPOT code). Environmental contamination and committed dose to the population resident in contaminated areas are predicted by a food-web model (RESRAD code). Small values of committed effective dose equivalent appear to be associated with missile impacts (50-y CEDE radiological risk. These computer simulations suggest that little radiological risk is associated to the use of depleted uranium weapons.

  16. Does Britain need nuclear weapons?

    International Nuclear Information System (INIS)

    Hill, C.R.; Pease, R.S.; Peierls, R.E.; Rotblat, J.

    1995-01-01

    This report from the British Pugwash Group follows up a detailed international study of the desirability and feasibility of a world free from nuclear weapons with an analysis of issues particular to British nuclear weapons and the associated defense policies. United Kingdom nuclear weapons are reviewed historically, as are the nuclear weapons policies of other countries. A critique of present government policy is presented, with alternative uses for nuclear weapons in the post-Cold war world. The document concludes with a summary of the text and suggests how a British government could move towards global nuclear disarmament. (UK)

  17. From the lab to the battlefield? Nanotechnology and fourth generation nuclear weapons

    OpenAIRE

    Gsponer, Andre

    2005-01-01

    The paper addresses some major implications of microelectromechanical systems (MEMS) engineering and nanotechnology for the improvement of existing types of nuclear weapons, and the development of more robust versions of these weapons, as well as for the development of fourth generations nuclear weapons in which nanotechnology will play an essential role.

  18. Retrofitting of NPP Computer systems

    International Nuclear Information System (INIS)

    Pettersen, G.

    1994-01-01

    Retrofitting of nuclear power plant control rooms is a continuing process for most utilities. This involves introducing and/or extending computer-based solutions for surveillance and control as well as improving the human-computer interface. The paper describes typical requirements when retrofitting NPP process computer systems, and focuses on the activities of Institute for energieteknikk, OECD Halden Reactor project with respect to such retrofitting, using examples from actual delivery projects. In particular, a project carried out for Forsmarksverket in Sweden comprising upgrade of the operator system in the control rooms of units 1 and 2 is described. As many of the problems of retrofitting NPP process computer systems are similar to such work in other kinds of process industries, an example from a non-nuclear application area is also given

  19. Cooperation in human-computer communication

    OpenAIRE

    Kronenberg, Susanne

    2000-01-01

    The goal of this thesis is to simulate cooperation in human-computer communication to model the communicative interaction process of agents in natural dialogs in order to provide advanced human-computer interaction in that coherence is maintained between contributions of both agents, i.e. the human user and the computer. This thesis contributes to certain aspects of understanding and generation and their interaction in the German language. In spontaneous dialogs agents cooperate by the pro...

  20. Sea-dumped chemical weapons: environmental risk, occupational hazard.

    Science.gov (United States)

    Greenberg, M I; Sexton, K J; Vearrier, D

    2016-01-01

    Chemical weapons dumped into the ocean for disposal in the twentieth century pose a continuing environmental and human health risk. In this review we discuss locations, quantity, and types of sea-dumped chemical weapons, related environmental concerns, and human encounters with sea-dumped chemical weapons. We utilized the Ovid (http://ovidsp.tx.ovid.com) and PubMed (http://www.pubmed.org) search engines to perform MEDLINE searches for the terms 'sea-dumped chemical weapons', 'chemical warfare agents', and 'chemical munitions'. The searches returned 5863 articles. Irrelevant and non-English articles were excluded. A review of the references for these articles yielded additional relevant sources, with a total of 64 peer-reviewed articles cited in this paper. History and geography of chemical weapons dumping at sea: Hundreds of thousands of tons of chemical munitions were disposed off at sea following World War II. European, Russian, Japanese, and United States coasts are the areas most affected worldwide. Several areas in the Baltic and North Seas suffered concentrated large levels of dumping, and these appear to be the world's most studied chemical warfare agent marine dumping areas. Chemical warfare agents: Sulfur mustard, Lewisite, and the nerve agents appear to be the chemical warfare agents most frequently disposed off at sea. Multiple other type of agents including organoarsenicals, blood agents, choking agents, and lacrimators were dumped at sea, although in lesser volumes. Environmental concerns: Numerous geohydrologic variables contribute to the rate of release of chemical agents from their original casings, leading to difficult and inexact modeling of risk of release into seawater. Sulfur mustard and the organoarsenicals are the most environmentally persistent dumped chemical agents. Sulfur mustard in particular has a propensity to form a solid or semi-solid lump with a polymer coating of breakdown products, and can persist in this state on the ocean floor

  1. Chemical and biological weapons

    International Nuclear Information System (INIS)

    Harris, E.D.

    1991-01-01

    This paper discusses the prospects of the multilateral negotiations aimed at achieving a complete and total ban on chemical weapons the Chemical Weapons convention (CWC). The control of the proliferation of chemical weapons is no longer just on East-West issue; it is also an issue of concern in Third World Countries, and in some of the wealthier middle eastern nations, such as Kuwait

  2. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  3. Nuclear weapons complex

    International Nuclear Information System (INIS)

    Rezendes, V.S.

    1992-04-01

    In addition to long-standing safety and environmental problems plaguing the nuclear weapons complex, this paper reports that the Department of Energy (DOE) faces a major new challenge-how to reconfigure the weapons complex to meet the nation's defense needs in the 21st century. Key decisions still need to be made about the size of the complex; where, if necessary, to relocate various operations; what technologies to use for new tritium production; and what to do with excess weapons-grade material. The choices confronting DOE and Congress are difficult given the conflicting demands for limited resources

  4. Pilots of the future - Human or computer?

    Science.gov (United States)

    Chambers, A. B.; Nagel, D. C.

    1985-01-01

    In connection with the occurrence of aircraft accidents and the evolution of the air-travel system, questions arise regarding the computer's potential for making fundamental contributions to improving the safety and reliability of air travel. An important result of an analysis of the causes of aircraft accidents is the conclusion that humans - 'pilots and other personnel' - are implicated in well over half of the accidents which occur. Over 70 percent of the incident reports contain evidence of human error. In addition, almost 75 percent show evidence of an 'information-transfer' problem. Thus, the question arises whether improvements in air safety could be achieved by removing humans from control situations. In an attempt to answer this question, it is important to take into account also certain advantages which humans have in comparison to computers. Attention is given to human error and the effects of technology, the motivation to automate, aircraft automation at the crossroads, the evolution of cockpit automation, and pilot factors.

  5. Peo Life Cycle Cost Accountability: Viability Of Foreign Suppliers For Weapon System Development

    Science.gov (United States)

    2016-02-16

    Germany, South Korea and others. The overarching categories of items the U.S. purchases from these countries are clothing and textiles , electronics...production at the Mountain Pass rare earths plant Oct 20, 2015. However, their plants in Estonia and China are in place to continue providing rare...technologies critical to the production and sustainment of advanced military weapon systems; and maintaining critical design skills to ensure that

  6. Application of inertial confinement fusion to weapon technology

    International Nuclear Information System (INIS)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved

  7. High School Students' Written Argumentation Qualities with Problem-Based Computer-Aided Material (PBCAM) Designed about Human Endocrine System

    Science.gov (United States)

    Vekli, Gülsah Sezen; Çimer, Atilla

    2017-01-01

    This study investigated development of students' scientific argumentation levels in the applications made with Problem-Based Computer-Aided Material (PBCAM) designed about Human Endocrine System. The case study method was used: The study group was formed of 43 students in the 11th grade of the science high school in Rize. Human Endocrine System…

  8. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  9. Mortality associated with use of weapons in armed conflicts, wartime atrocities, and civilian mass shootings: literature review.

    Science.gov (United States)

    Coupland, R M; Meddings, D R

    1999-08-14

    To determine the implications of variation in mortality associated with use of weapons in different contexts. Literature review. Armed conflicts and civilian mass shootings, 1929-96. Mortality from wounds. During the fighting of war the number of people wounded is at least twice the number killed and may be 13 times as high; this ratio of the number wounded to the number killed results from the impact of a weapon system on human beings in the particular context of war. When firearms are used against people who are immobilised, in a confined space, or unable to defend themselves the wounded to killed ratio has been lower than 1 or even 0. Mortality from firearms depends not only on the technology of the weapon or its ammunition but also on the context in which it is used. The increased mortality resulting from the use of firearms in situations other than war requires a complex interaction of factors explicable in terms of wound ballistics and the psychology of the user. Understanding these factors has implications for recognition of war crimes. In addition, the lethality of conventional weapons may be increased if combatants are disabled by the new non-lethal weapons beforehand; this possibility requires careful legal examination within the framework of the Geneva Conventions.

  10. Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program

    National Research Council Canada - National Science Library

    1998-01-01

    We performed the audit in response to allegations made to the Defense Hotline concerning conflicts of interest among members of the Defense Special Weapons Agency Advisory Panel on the Nuclear Weapon Effects Program...

  11. Nuclear weapons in the India-Pakistan context

    International Nuclear Information System (INIS)

    Sanjay Badri-Maharaj

    2002-01-01

    This thesis deals with the possible employment of nuclear weapons in the ongoing confrontation between India and Pakistan. After reviewing the nuclear capabilities of both Indian and Pakistan and assessing their possible delivery systems, this dissertation explores the emerging picture regarding the Indian and Pakistani nuclear doctrines. It is argued that, after exploring the current structure of the armed forces in both countries and after analyzing the theatres of operations, it is highly unlikely that either country seeks to employ nuclear weapons in a tactical, battlefield role. It is also argued that neither India or Pakistan is making an effort to evolve a nuclear war-fighting doctrine. Moreover, it is shown that nuclear weapons have simply led to a re-thinking of military tactics on the part of India so as to minimize the chance of a nuclear strike by limiting the aims and objectives of any Indian military action. In stark contrast, it is shown that South Asian cities present far more lucrative targets for nuclear strikes. As a result of this and the geographic and tactical limitations of South Asian battlefields, it is argued that both India and Pakistan have based their fledgling nuclear strategies around a 'city-busting' concept. The existing command and control systems in both countries are examined and found to be adequate if both countries adopt a strict 'second-strike' approach to the employment of nuclear weapons. It is further argued that nuclear weapons, while limiting the scale of any future India-Pakistan war, will not play a major role in preventing a conflict between the two countries. Rather, the basic operational parity that exists between the two countries in terms of their conventional forces is responsible for preventing the outbreak of war. The thesis also briefly explores the rationale behind the acquisition of nuclear weapons in both countries and on their basic security perceptions. The issue of confidence building measures and the

  12. BLDC technology and its application in weapon system launching ...

    African Journals Online (AJOL)

    user

    Motors and Drives are profoundly used in military and strategic weapon ... electric field by means of a split physical commutator and brushes. ... Figure 3.1: Akash Missile Launching Platform on Wheeled Vehicle (downloaded from internet). 4.

  13. What Happens to Deterrence as Nuclear Weapons Decrease Toward Zero?

    Science.gov (United States)

    Drell, Sidney

    2011-04-01

    Steps reducing reliance on deployed nuclear weapons en route to zero will be discussed. They include broadly enhancing cooperation and transparency agreements beyond the provisions for verifying limits on deployed strategic nuclear warheads and delivery systems in the New START treaty. Two questions that will be addressed are: What conditions would have to be established in order to maintain strategic stability among nations as nuclear weapons recede in importance? What would nuclear deterrence be like in a world without nuclear weapons?

  14. Simulation training tools for nonlethal weapons using gaming environments

    Science.gov (United States)

    Donne, Alexsana; Eagan, Justin; Tse, Gabriel; Vanderslice, Tom; Woods, Jerry

    2006-05-01

    Modern simulation techniques have a growing role for evaluating new technologies and for developing cost-effective training programs. A mission simulator facilitates the productive exchange of ideas by demonstration of concepts through compellingly realistic computer simulation. Revolutionary advances in 3D simulation technology have made it possible for desktop computers to process strikingly realistic and complex interactions with results depicted in real-time. Computer games now allow for multiple real human players and "artificially intelligent" (AI) simulated robots to play together. Advances in computer processing power have compensated for the inherent intensive calculations required for complex simulation scenarios. The main components of the leading game-engines have been released for user modifications, enabling game enthusiasts and amateur programmers to advance the state-of-the-art in AI and computer simulation technologies. It is now possible to simulate sophisticated and realistic conflict situations in order to evaluate the impact of non-lethal devices as well as conflict resolution procedures using such devices. Simulations can reduce training costs as end users: learn what a device does and doesn't do prior to use, understand responses to the device prior to deployment, determine if the device is appropriate for their situational responses, and train with new devices and techniques before purchasing hardware. This paper will present the status of SARA's mission simulation development activities, based on the Half-Life gameengine, for the purpose of evaluating the latest non-lethal weapon devices, and for developing training tools for such devices.

  15. Humans, computers and wizards human (simulated) computer interaction

    CERN Document Server

    Fraser, Norman; McGlashan, Scott; Wooffitt, Robin

    2013-01-01

    Using data taken from a major European Union funded project on speech understanding, the SunDial project, this book considers current perspectives on human computer interaction and argues for the value of an approach taken from sociology which is based on conversation analysis.

  16. Nuclear Weapons Enterprise Transformation - A Sustainable Approach

    International Nuclear Information System (INIS)

    O'Brien, K H

    2005-01-01

    Nuclear weapons play an essential role in United States (U.S.) National Security Policy and a succession of official reviews has concluded that nuclear weapons will continue to have a role for the foreseeable future. Under the evolving U.S. government policy, it is clear that role will be quite different from what it was during the Cold War. The nuclear-weapons stockpile as well as the nuclear-weapons enterprise needs to continue to change to reflect this evolving role. Stockpile reductions in the early 1990s and the Stockpile Stewardship Program (SSP), established after the cessation of nuclear testing in 1992, began this process of change. Further evolution is needed to address changing security environments, to enable further reductions in the number of stockpiled weapons, and to create a nuclear enterprise that is cost effective and sustainable for the long term. The SSP has successfully maintained the U.S. nuclear stockpile for more than a decade, since the end of nuclear testing. Current plans foresee maintaining warheads produced in the 1980s until about 2040. These warheads continue to age and they are expensive to refurbish. The current Life Extension Program plans for these legacy warheads are straining both the nuclear-weapons production and certification infrastructure making it difficult to respond rapidly to problems or changes in requirements. Furthermore, refurbishing and preserving Cold-War-era nuclear weapons requires refurbishing and preserving an infrastructure geared to support old technology. Stockpile Stewardship could continue this refurbishment approach, but an alternative approach could be considered that is more focused on sustainable technologies, and developing a more responsive nuclear weapons infrastructure. Guided by what we have learned from SSP during the last decade, the stewardship program can be evolved to address this increasing challenge using its computational and experimental tools and capabilities. This approach must start

  17. Computational Human Performance Modeling For Alarm System Design

    Energy Technology Data Exchange (ETDEWEB)

    Jacques Hugo

    2012-07-01

    The introduction of new technologies like adaptive automation systems and advanced alarms processing and presentation techniques in nuclear power plants is already having an impact on the safety and effectiveness of plant operations and also the role of the control room operator. This impact is expected to escalate dramatically as more and more nuclear power utilities embark on upgrade projects in order to extend the lifetime of their plants. One of the most visible impacts in control rooms will be the need to replace aging alarm systems. Because most of these alarm systems use obsolete technologies, the methods, techniques and tools that were used to design the previous generation of alarm system designs are no longer effective and need to be updated. The same applies to the need to analyze and redefine operators’ alarm handling tasks. In the past, methods for analyzing human tasks and workload have relied on crude, paper-based methods that often lacked traceability. New approaches are needed to allow analysts to model and represent the new concepts of alarm operation and human-system interaction. State-of-the-art task simulation tools are now available that offer a cost-effective and efficient method for examining the effect of operator performance in different conditions and operational scenarios. A discrete event simulation system was used by human factors researchers at the Idaho National Laboratory to develop a generic alarm handling model to examine the effect of operator performance with simulated modern alarm system. It allowed analysts to evaluate alarm generation patterns as well as critical task times and human workload predicted by the system.

  18. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  19. Human Inspired Self-developmental Model of Neural Network (HIM): Introducing Content/Form Computing

    Science.gov (United States)

    Krajíček, Jiří

    This paper presents cross-disciplinary research between medical/psychological evidence on human abilities and informatics needs to update current models in computer science to support alternative methods for computation and communication. In [10] we have already proposed hypothesis introducing concept of human information model (HIM) as cooperative system. Here we continue on HIM design in detail. In our design, first we introduce Content/Form computing system which is new principle of present methods in evolutionary computing (genetic algorithms, genetic programming). Then we apply this system on HIM (type of artificial neural network) model as basic network self-developmental paradigm. Main inspiration of our natural/human design comes from well known concept of artificial neural networks, medical/psychological evidence and Sheldrake theory of "Nature as Alive" [22].

  20. Physical effects of thermonuclear weapons

    International Nuclear Information System (INIS)

    Rotblat, J.

    1984-01-01

    The detonation of nuclear weapons gives rise to the following: blast wave; thermal wave; initial radiation (neutrons and gamma-rays); local radioactive fallout; global radioactive fallout; electromagnetic pulse; atmospheric disturbances. Some of these phenomena became known only as a result of the use or testing of bombs and are not as yet fully understood. They produce physical or biological effects or both, almost all of which are directly detrimental to human health. Some are likely to damage the environment

  1. From Human-Computer Interaction to Human-Robot Social Interaction

    OpenAIRE

    Toumi, Tarek; Zidani, Abdelmadjid

    2014-01-01

    Human-Robot Social Interaction became one of active research fields in which researchers from different areas propose solutions and directives leading robots to improve their interactions with humans. In this paper we propose to introduce works in both human robot interaction and human computer interaction and to make a bridge between them, i.e. to integrate emotions and capabilities concepts of the robot in human computer model to become adequate for human robot interaction and discuss chall...

  2. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  3. The New Dogs of War: The Future of Weaponized Artificial Intelligence

    Science.gov (United States)

    2017-09-13

    access into local industry systems. An entire shipment of contaminated food passes through the system and is moved through the Southwest. People start...shipment of contaminated food passes through the system and is moved through the Southwest. People start dying and they trace the cause back to the food ...AI Weapons Factory Traditional munitions factories that manufactured weapons for warfighting have until now been easily defined, identified, and

  4. Making weapons, talking peace

    International Nuclear Information System (INIS)

    York, H.F.

    1987-01-01

    The memoirs of the author traces his life from his first-year graduate studies in physics at the University of Rochester in 1942 to his present position as Director of the University of California's Institute on Global Conflict and Cooperation. The part of his life involved in making weapons extends from 1942 to 1961. During this period, he worked with E.O. Lawrence on the Manhattan Project and served as director of Livermore after it became the Atomic Energy Commission's second nuclear weapons laboratory. He also served on many government advisory boards and commissions dealing with nuclear and other weapons. In 1961, the combination of a heart attack and changes in administration in Washington led York too return to the University of California for the talking peace portion of his life. He has since become a public exponent of arms control and disarmament and the futility of seeking increased security through more and better nuclear weapons. York's explanation of his move from making weapons to talking peace leaves the reader with a puzzle

  5. Do Weapons Facilitate Adolescent Delinquency? An Examination of Weapon Carrying and Delinquency Among Adolescents.

    Science.gov (United States)

    Emmert, Amanda D; Hall, Gina Penly; Lizotte, Alan J

    2018-03-01

    This article examines whether weapon carrying influences the frequency and variety of violent, property, and drug delinquency adolescents commit through fixed-effects analyses of data from the Rochester Youth Development Study (RYDS). We conclude that weapon carrying contributes to violent, substance, and property delinquency, and delinquent behaviors learned during weapon carrying continue to affect substance and property delinquency long after carrying has ceased.

  6. A Novel Wearable Forehead EOG Measurement System for Human Computer Interfaces.

    Science.gov (United States)

    Heo, Jeong; Yoon, Heenam; Park, Kwang Suk

    2017-06-23

    Amyotrophic lateral sclerosis (ALS) patients whose voluntary muscles are paralyzed commonly communicate with the outside world using eye movement. There have been many efforts to support this method of communication by tracking or detecting eye movement. An electrooculogram (EOG), an electro-physiological signal, is generated by eye movements and can be measured with electrodes placed around the eye. In this study, we proposed a new practical electrode position on the forehead to measure EOG signals, and we developed a wearable forehead EOG measurement system for use in Human Computer/Machine interfaces (HCIs/HMIs). Four electrodes, including the ground electrode, were placed on the forehead. The two channels were arranged vertically and horizontally, sharing a positive electrode. Additionally, a real-time eye movement classification algorithm was developed based on the characteristics of the forehead EOG. Three applications were employed to evaluate the proposed system: a virtual keyboard using a modified Bremen BCI speller and an automatic sequential row-column scanner, and a drivable power wheelchair. The mean typing speeds of the modified Bremen brain-computer interface (BCI) speller and automatic row-column scanner were 10.81 and 7.74 letters per minute, and the mean classification accuracies were 91.25% and 95.12%, respectively. In the power wheelchair demonstration, the user drove the wheelchair through an 8-shape course without collision with obstacles.

  7. Prerequisites for a nuclear weapons convention

    International Nuclear Information System (INIS)

    Liebert, W.

    1999-01-01

    A Nuclear Weapons Convention (NWC) would prohibit the research, development, production, testing, stockpiling, transfer, use and threat of use of nuclear weapons and would serve their total elimination.' In this fashion it follows the model laid out by the biological and chemical weapons conventions. The NWC would encompass a few other treaties and while replacing them should learn from their experiences. The Nuclear Weapons Convention should at some given point in the future replace the Non-Proliferation Treaty (NPT) and so resolve its contradictions and shortcomings. The main objectives of an NWC Would be: reduction of the nuclear arsenals of the 'five' nuclear weapons powers down to zero within a set of fixed periods of time; elimination of stockpiles of weapons-usable materials and, where existent, nuclear warheads in de-facto nuclear weapon and threshold states; providing assurance that all states will retain their non-nuclear status forever

  8. When computers were human

    CERN Document Server

    Grier, David Alan

    2013-01-01

    Before Palm Pilots and iPods, PCs and laptops, the term ""computer"" referred to the people who did scientific calculations by hand. These workers were neither calculating geniuses nor idiot savants but knowledgeable people who, in other circumstances, might have become scientists in their own right. When Computers Were Human represents the first in-depth account of this little-known, 200-year epoch in the history of science and technology. Beginning with the story of his own grandmother, who was trained as a human computer, David Alan Grier provides a poignant introduction to the wider wo

  9. Hazards of chemical weapons release during war: new perspectives.

    Science.gov (United States)

    Reutter, S

    1999-01-01

    The two major threat classes of chemical weapons are mustard gas and the nerve agents, and this has not changed in over 50 years. Both types are commonly called gases, but they are actually liquids that are not remarkably volatile. These agents were designed specifically to harm people by any route of exposure and to be effective at low doses. Mustard gas was used in World War I, and the nerve agents were developed shortly before, during, and after World War II. Our perception of the potency of chemical weapons has changed, as well as our concern over potential effects of prolonged exposures to low doses and potential target populations that include women and children. Many of the toxicologic studies and human toxicity estimates for both mustard and nerve agents were designed for the purpose of quickly developing maximal casualties in the least sensitive male soldier. The "toxicity" of the chemical weapons has not changed, but our perception of "toxicity" has. PMID:10585902

  10. Maintaining non-nuclear weapon status

    International Nuclear Information System (INIS)

    Muller, H.

    1991-01-01

    Among the some 170 sovereign states in the world, five are legally recognized as nuclear weapon states (NWS) under the terms of the 1968 Non-Proliferation Treaty (NPT). Six countries (Argentina, Brazil, India, Israel, Pakistan, and South Africa) are counted as threshold states: they possess sizeable unsafeguarded nuclear facilities or have passed the brink of a nuclear test or of clandestine weapon production. Six other countries (Iran, Iraq, Libya, Taiwan, and North and South Korea) have been suspected periodically of either considering the nuclear weapon option or of working secretly on the development of weapons. Thus, about 150 non-nuclear weapon states (NNWS) remain which neither possess nuclear weapons nor strive to acquire them. These states are distributed throughout the globe and encompass highly industrialized as well as underdeveloped countries, liberal democracies, socialist states, sheikdoms and dictatorships. Some NNWS face acute military threats; other are far removed from the quarrels of the world, as in the case of some remote fortunate islands. Furthermore, NNWS may be members of nuclear-umbrella alliances or may have opted for a policy of neutrality or non-alignment

  11. The return of nuclear weapons

    International Nuclear Information System (INIS)

    Calvez, Jean-Yves

    2005-01-01

    Written after the 2005 NPT review conference, this article first recalls the early stages of nuclear proliferation: acquisition of nuclear weapons by Great-Britain, USSR, France and China, and creation of the NPT in 1970. The author briefly evokes some weaknesses and violations of this treaty: emergence of new nuclear powers (India, Pakistan, Israel) and of nuclear weapon programmes (Iran, North Korea). He outlines the lack of true rules to impede countries to develop nuclear weapons, and then states that the only solution seems to be a simple abolition of these weapons. This option is notably supported by the Catholic Church as outlined and recalled here. The author discusses the situation of this abolition option, and notices that, even though NPT members committed themselves on this way, some also decided to develop new and smaller weapons. Then, it becomes always more difficult to persuade countries not to possess these weapons. The author finally discusses the issues of terrorism threat in relationship to the miniaturisation process, and regrets the lack of commitment in an abolition process

  12. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  13. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  14. The chemical and biological weapon terrorism by the Aum Shnirikyo

    International Nuclear Information System (INIS)

    Furukawa, K.

    2009-01-01

    The Aum Shinrikyo, an obscure cult religious group, attacked the Tokyo subways employing sarin gas in March 1995, which was viewed as a mark of a new era in terrorism. The Aum Shinrikyo remains the one empirical example of a religiously motivated cult with an affluent amount of financial and human resources and motivations to use unconventional weapons. The Aum Shinrikyo's leaders included the scientific elite of a young generation as well as former Yakuza members who had close ties with organized crime networks. Aum succeeded in establishing an extensive network to procure weapons, material, and drug, primarily in Russia but also other countries including the United States and even North Korea. Despite the fact that the law enforcement authority had already obtained various pieces of information that reasonably indicated that Aum was producing sarin by late 1994, the law enforcement authority became too cautious to advance its investigation to arrest Aum members until it was too late. Japan's experience with the Aum Shinrikyo's threats provides valuable insights for democratic governments seeking to thwart the deadly plans of religiously motivated non-state actors. It reveals the tremendous difficulties for a democratic society to confront the terrorists who were willing to pursue their deadly 'divine' objectives, especially when the society had no experience to encounter such a threat. This presentation will explain the chemical and biological weapon programs of the Aum Shinrikyo, especially focusing on the following elements: Intention and capability of the Aum Shinrikyo; Weapon systems and mode of attacks, including their target selections; The lessons learned from this case for the prevention and crisis/consequence management n the event of CBW terrorism. The views expressed here are those of the author and do not represent those of the Research Institute for Science and Technology for Society or its research sponsors.(author)

  15. Feedback Loops in Communication and Human Computing

    NARCIS (Netherlands)

    op den Akker, Hendrikus J.A.; Heylen, Dirk K.J.; Pantic, Maja; Pentland, Alex; Nijholt, Antinus; Huang, Thomas S.

    Building systems that are able to analyse communicative behaviours or take part in conversations requires a sound methodology in which the complex organisation of conversations is understood and tested on real-life samples. The data-driven approaches to human computing not only have a value for the

  16. Safeguarding nuclear weapon: Usable materials in Russia

    International Nuclear Information System (INIS)

    Cochran, T.

    1998-01-01

    Both the United States and Russia are retaining as strategic reserves more plutonium and HEU for potential reuse as weapons, than is legitimately needed. Both have engaged in discussions and have programs in various stages of development to dispose of excess plutonium and HEU. These fissile material disposition programs will take decades to complete. In the interim there will be, as there is now, hundreds of tons of separated weapon-usable fissile material stored in tens of thousands of transportable canisters, each containing from a few to several tons of kgs of weapon-usable fissile material. This material must be secured against theft and unauthorized use. To have high confidence that the material is secure, one must establish criteria against which the adequacy of the protective systems can be judged. For example, one finds such criteria in US Nuclear Regulatory Commission (USNRC) regulations for the protection of special nuclear materials

  17. Human-computer interaction : Guidelines for web animation

    OpenAIRE

    Galyani Moghaddam, Golnessa; Moballeghi, Mostafa

    2006-01-01

    Human-computer interaction in the large is an interdisciplinary area which attracts researchers, educators, and practioners from many differenf fields. Human-computer interaction studies a human and a machine in communication, it draws from supporting knowledge on both the machine and the human side. This paper is related to the human side of human-computer interaction and focuses on animations. The growing use of animation in Web pages testifies to the increasing ease with which such multim...

  18. Stability of transition to a world without nuclear weapons: Technical problems of verification

    International Nuclear Information System (INIS)

    Zhigalov, V.

    1998-01-01

    A serious psychological barrier to acceptance of the concept for achieving the nuclear-weapon-free world is fear of facing the prospect that one or more nations or extremist political groups might develop their own nuclear weapons. Actually this is a question of stability of the nuclear-weapon-free world. From this point of view the most effective system of verification is an absolute necessity. This system must ensure detection of so called undeclared nuclear activity at early stage. Scientists of Russian nuclear centers are working today on solving this problem. This paper is considered to be a comprehensive attempt to analyze the technical and organizational aspects of the problems of transition to a nuclear-weapons-free world, setting aside the difficulties of resolving purely political problems

  19. HuRECA: Human Reliability Evaluator for Computer-based Control Room Actions

    International Nuclear Information System (INIS)

    Kim, Jae Whan; Lee, Seung Jun; Jang, Seung Cheol

    2011-01-01

    As computer-based design features such as computer-based procedures (CBP), soft controls (SCs), and integrated information systems are being adopted in main control rooms (MCR) of nuclear power plants, a human reliability analysis (HRA) method capable of dealing with the effects of these design features on human reliability is needed. From the observations of human factors engineering verification and validation experiments, we have drawn some major important characteristics on operator behaviors and design-related influencing factors (DIFs) from the perspective of human reliability. Firstly, there are new DIFs that should be considered in developing an HRA method for computer-based control rooms including especially CBP and SCs. In the case of the computer-based procedure rather than the paper-based procedure, the structural and managerial elements should be considered as important PSFs in addition to the procedural contents. In the case of the soft controllers, the so-called interface management tasks (or secondary tasks) should be reflected in the assessment of human error probability. Secondly, computer-based control rooms can provide more effective error recovery features than conventional control rooms. Major error recovery features for computer-based control rooms include the automatic logic checking function of the computer-based procedure and the information sharing feature of the general computer-based designs

  20. Computer-assisted machine-to-human protocols for authentication of a RAM-based embedded system

    Science.gov (United States)

    Idrissa, Abdourhamane; Aubert, Alain; Fournel, Thierry

    2012-06-01

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification? In this paper, two cryptographic protocols are proposed to achieve the verification of a RAM-based system through a trusted auxiliary machine. Such a system is assumed to be composed of a RAM memory and a secure block (in practice a FPGA or a configurable microcontroller). The system is connected to an input/output interface and contains a Non Volatile Memory where the configuration data are stored. Here, except the secure block, all the blocks are exposed to attacks. At the registration stage of the first protocol, the MAC of both the secret and the configuration data, denoted M0 is computed by the mobile device without saving it then transmitted to the user in a secure environment. At the verification stage, the reader which is challenged with nonces sendsMACs / HMACs of both nonces and MAC M0 (to be recomputed), keyed with the secret. These responses are verified by the user through a trusted auxiliary MAC computer unit. Here the verifier does not need to tract a (long) list of challenge / response pairs. This makes the protocol tractable for a human verifier as its participation in the authentication process is increased. In counterpart the secret has to be shared with the auxiliary unit. This constraint is relaxed in a second protocol directly derived from Fiat-Shamir's scheme.

  1. Human Computing and Machine Understanding of Human Behavior: A Survey

    NARCIS (Netherlands)

    Pantic, Maja; Pentland, Alex; Nijholt, Antinus; Huang, Thomas; Quek, F.; Yang, Yie

    2006-01-01

    A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the foreground. If this prediction is to come true, then next generation computing, which we will call human computing, should

  2. Disposition of excess weapons plutonium from dismantled weapons

    International Nuclear Information System (INIS)

    Jardine, L.J.

    1997-01-01

    With the end of the Cold War and the implementation of various nuclear arms reduction agreements, US and Russia have been actively dismantling tens of thousands of nuclear weapons. As a result,large quantities of fissile materials, including more than 100 (tonnes?) of weapons-grade Pu, have become excess to both countries' military needs. To meet nonproliferation goals and to ensure the irreversibility of nuclear arms reductions, this excess weapons Pu must be placed in secure storage and then, in timely manner, either used in nuclear reactors as fuel or discarded in geologic repositories as solid waste. This disposition in US and Russia must be accomplished in a safe, secure manner and as quickly as practical. Storage of this Pu is a prerequisite to any disposition process, but the length of storage time is unknown. Whether by use as fuel or discard as solid waste, disposition of that amount of Pu will require decades--and perhaps longer, if disposition operations encounter delays. Neither US nor Russia believes that long-term secure storage is a substitute for timely disposition of excess Pu, but long-term, safe, secure storage is a critical element of all excess Pu disposition activities

  3. Performance-based service acquisition (PBSA) of TRIDENT strategic weapons systems (SWS) technical engineering support (TES) services

    OpenAIRE

    Arcidiacono, William J.

    2003-01-01

    CIVINS (Civilian Institutions) Thesis document Approved for public release ; distribution is unlimited The objective of this thesis is to determine whether the Strategic Systems Programs (SSP) should apply the concepts of Performance-Based Service Acquisition (PBSA) to Strategic Weapons Systems (SWS) Technical Engineering Support (TES) Services. This thesis provides a Department of Defense (DoD), Department of the Navy (DON), and SSP SWS program acquisition and PBSA history background, ...

  4. 2012 International Conference on Human-centric Computing

    CERN Document Server

    Jin, Qun; Yeo, Martin; Hu, Bin; Human Centric Technology and Service in Smart Space, HumanCom 2012

    2012-01-01

    The theme of HumanCom is focused on the various aspects of human-centric computing for advances in computer science and its applications and provides an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of human-centric computing. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in human-centric computing. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.

  5. Non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    Fischer, D.; Haeckel, E.; Haefele, W.; Lauppe, W.D.; Mueller, H.; Ungerer, W.

    1991-01-01

    During the turbulant transitional events in world politics in the nineties, the control of nuclear weapons plays a major role. While the superpowers are reducing their nuclear arsenal, the danger of nuclear anarchy in the world remains virulent. The NPT of 1968 is up for review soon. The falling apart of the former communist sphere of power, and the regions of conflict in the Third World present new risks for the proliferation of nuclear arms. For unified Germany, which explicitly renounced nuclear weapons, this situation presents difficult questions concerning national safety policies and international responsibility. This volume presents contributions which take a new look at topical and long-term problems of nuclear NP politics. The authors evaluate the conditions under which the NP regime came into being, and assess short- and long-term possibilities and risks. The following papers are included: 1.) Basic controversies during the negotiations concerning the Treaty on non-proliferation of nuclear weapons (Ungerer); 2.) Prologation of the NPT 1995 and appropriate problems concerning safety and control (Haefele/Lauppe); 3.) Consequences of the Iraq case for NP policy (Ficher); 4.) Problems of nuclear technology control (Mueller); 5.) Framework conditions of a nuclear world system (Haeckel). (orig./HP) [de

  6. Attributing Agency to Automated Systems: Reflections on Human-Robot Collaborations and Responsibility-Loci.

    Science.gov (United States)

    Nyholm, Sven

    2017-07-18

    Many ethicists writing about automated systems (e.g. self-driving cars and autonomous weapons systems) attribute agency to these systems. Not only that; they seemingly attribute an autonomous or independent form of agency to these machines. This leads some ethicists to worry about responsibility-gaps and retribution-gaps in cases where automated systems harm or kill human beings. In this paper, I consider what sorts of agency it makes sense to attribute to most current forms of automated systems, in particular automated cars and military robots. I argue that whereas it indeed makes sense to attribute different forms of fairly sophisticated agency to these machines, we ought not to regard them as acting on their own, independently of any human beings. Rather, the right way to understand the agency exercised by these machines is in terms of human-robot collaborations, where the humans involved initiate, supervise, and manage the agency of their robotic collaborators. This means, I argue, that there is much less room for justified worries about responsibility-gaps and retribution-gaps than many ethicists think.

  7. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  8. Los Alamos National Laboratory Weapons Neutron Research Facility

    International Nuclear Information System (INIS)

    Woods, R.

    1981-01-01

    The Weapons Neutron Research (WNR) spallation neutron source utilizes 800-MeV protons from the Los Alamos Meson Physics linac. The proton beam transport system, the target systems, and the data acquisition and control system are described. Operating experience, present status, and planned improvements are discussed

  9. Overview Electrotactile Feedback for Enhancing Human Computer Interface

    Science.gov (United States)

    Pamungkas, Daniel S.; Caesarendra, Wahyu

    2018-04-01

    To achieve effective interaction between a human and a computing device or machine, adequate feedback from the computing device or machine is required. Recently, haptic feedback is increasingly being utilised to improve the interactivity of the Human Computer Interface (HCI). Most existing haptic feedback enhancements aim at producing forces or vibrations to enrich the user’s interactive experience. However, these force and/or vibration actuated haptic feedback systems can be bulky and uncomfortable to wear and only capable of delivering a limited amount of information to the user which can limit both their effectiveness and the applications they can be applied to. To address this deficiency, electrotactile feedback is used. This involves delivering haptic sensations to the user by electrically stimulating nerves in the skin via electrodes placed on the surface of the skin. This paper presents a review and explores the capability of electrotactile feedback for HCI applications. In addition, a description of the sensory receptors within the skin for sensing tactile stimulus and electric currents alsoseveral factors which influenced electric signal to transmit to the brain via human skinare explained.

  10. Design of Computer Fault Diagnosis and Troubleshooting System ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... 2Department of Computer Science. Cross River University ... owners in dealing with their computer problems especially when the time is limited and human expert is not ..... questions with the system responding to each of the ...

  11. Guest Editorial Special Issue on Human Computing

    NARCIS (Netherlands)

    Pantic, Maja; Santos, E.; Pentland, A.; Nijholt, Antinus

    2009-01-01

    The seven articles in this special issue focus on human computing. Most focus on two challenging issues in human computing, namely, machine analysis of human behavior in group interactions and context-sensitive modeling.

  12. Hybrid soft computing systems for electromyographic signals analysis: a review.

    Science.gov (United States)

    Xie, Hong-Bo; Guo, Tianruo; Bai, Siwei; Dokos, Socrates

    2014-02-03

    Electromyographic (EMG) is a bio-signal collected on human skeletal muscle. Analysis of EMG signals has been widely used to detect human movement intent, control various human-machine interfaces, diagnose neuromuscular diseases, and model neuromusculoskeletal system. With the advances of artificial intelligence and soft computing, many sophisticated techniques have been proposed for such purpose. Hybrid soft computing system (HSCS), the integration of these different techniques, aims to further improve the effectiveness, efficiency, and accuracy of EMG analysis. This paper reviews and compares key combinations of neural network, support vector machine, fuzzy logic, evolutionary computing, and swarm intelligence for EMG analysis. Our suggestions on the possible future development of HSCS in EMG analysis are also given in terms of basic soft computing techniques, further combination of these techniques, and their other applications in EMG analysis.

  13. For a convention for nuclear weapon elimination

    International Nuclear Information System (INIS)

    2008-03-01

    This document contains two texts linked with the project of an international convention for the elimination of nuclear weapons (the text of this project has been sent to the UN General Secretary and is part of an international campaign to abolish nuclear weapons, ICAN). These two texts are contributions presented in London at the Global Summit for a Nuclear Weapon-free World. The first one calls into question the deterrence principle and the idea of a nuclear weapon-based security. It calls for different forms of action to promote a nuclear weapon-free world. The second text stresses the role and the responsibility of states with nuclear weapons in nuclear disarmament and in the reinforcement of the nuclear non proliferation treaty (NPT)

  14. Human performance modeling for system of systems analytics.

    Energy Technology Data Exchange (ETDEWEB)

    Dixon, Kevin R.; Lawton, Craig R.; Basilico, Justin Derrick; Longsine, Dennis E. (INTERA, Inc., Austin, TX); Forsythe, James Chris; Gauthier, John Henry; Le, Hai D.

    2008-10-01

    A Laboratory-Directed Research and Development project was initiated in 2005 to investigate Human Performance Modeling in a System of Systems analytic environment. SAND2006-6569 and SAND2006-7911 document interim results from this effort; this report documents the final results. The problem is difficult because of the number of humans involved in a System of Systems environment and the generally poorly defined nature of the tasks that each human must perform. A two-pronged strategy was followed: one prong was to develop human models using a probability-based method similar to that first developed for relatively well-understood probability based performance modeling; another prong was to investigate more state-of-art human cognition models. The probability-based modeling resulted in a comprehensive addition of human-modeling capability to the existing SoSAT computer program. The cognitive modeling resulted in an increased understanding of what is necessary to incorporate cognition-based models to a System of Systems analytic environment.

  15. Reliability and protection against failure in computer systems

    International Nuclear Information System (INIS)

    Daniels, B.K.

    1979-01-01

    Computers are being increasingly integrated into the control and safety systems of large and potentially hazardous industrial processes. This development introduces problems which are particular to computer systems and opens the way to new techniques of solving conventional reliability and availability problems. References to the developing fields of software reliability, human factors and software design are given, and these subjects are related, where possible, to the quantified assessment of reliability. Original material is presented in the areas of reliability growth and computer hardware failure data. The report draws on the experience of the National Centre of Systems Reliability in assessing the capability and reliability of computer systems both within the nuclear industry, and from the work carried out in other industries by the Systems Reliability Service. (author)

  16. A computer vision system for rapid search inspired by surface-based attention mechanisms from human perception.

    Science.gov (United States)

    Mohr, Johannes; Park, Jong-Han; Obermayer, Klaus

    2014-12-01

    Humans are highly efficient at visual search tasks by focusing selective attention on a small but relevant region of a visual scene. Recent results from biological vision suggest that surfaces of distinct physical objects form the basic units of this attentional process. The aim of this paper is to demonstrate how such surface-based attention mechanisms can speed up a computer vision system for visual search. The system uses fast perceptual grouping of depth cues to represent the visual world at the level of surfaces. This representation is stored in short-term memory and updated over time. A top-down guided attention mechanism sequentially selects one of the surfaces for detailed inspection by a recognition module. We show that the proposed attention framework requires little computational overhead (about 11 ms), but enables the system to operate in real-time and leads to a substantial increase in search efficiency. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Nuclear power and weapons proliferation

    International Nuclear Information System (INIS)

    Greenwood, T.; Rathjens, C.W.; Ruina, J.

    1977-01-01

    The relationship between nuclear weapons development and nuclear electric power is examined. A brief description of nuclear weapons design is first given. This is then followed by a discussion of various aspects of nuclear power technology and of how they affect a nuclear weapon programme. These include fuel cycles, chemical reprocessing of spent fuel, uranium enrichment, and the control of dissemination of nuclear technology. In conclusion there is a discussion of possible political and institutional controls for limiting nuclear proliferation. (U.K.)

  18. The transportation of British nuclear weapons by road. Hiroshima is waiting to happen in the UK

    International Nuclear Information System (INIS)

    Harris, E.J.

    1993-01-01

    This leaflet describes the transportation of nuclear weapons on United Kingdom roads. The author seeks to question the safety and desirability of such activities, and points out the potential hazards to humans and the environment should convoy accidents occur. Correspondence is included between the author and various Government sources to illustrate the difficulty of obtaining full, accurate information on the design and safety of weapons transportation vehicles and the reasons and frequency of weapons convoys. The author contrasts these difficulties with the free available government information in the United States of America because of the Freedom of Information Act. Readers are urged to contribute to monitoring the routes and occurrence of UK weapons convoys to assist in data collection. (UK)

  19. Open-Box Muscle-Computer Interface: Introduction to Human-Computer Interactions in Bioengineering, Physiology, and Neuroscience Courses

    Science.gov (United States)

    Landa-Jiménez, M. A.; González-Gaspar, P.; Pérez-Estudillo, C.; López-Meraz, M. L.; Morgado-Valle, C.; Beltran-Parrazal, L.

    2016-01-01

    A Muscle-Computer Interface (muCI) is a human-machine system that uses electromyographic (EMG) signals to communicate with a computer. Surface EMG (sEMG) signals are currently used to command robotic devices, such as robotic arms and hands, and mobile robots, such as wheelchairs. These signals reflect the motor intention of a user before the…

  20. Effects of the use of ABC weapons

    International Nuclear Information System (INIS)

    Karl-Rueckert, E.

    1980-01-01

    The effects of ABC-weapons are presented. The various classes of chemical weapons and their effects are discussed. It is pointed out that there is hardly a means of protection against these weapons. (MG) [de

  1. Defense Computers: DOD Y2K Functional End-to-End Testing Progress and Test Event Management

    National Research Council Canada - National Science Library

    1999-01-01

    ... (DOD) which relies on a complex and broad array of interconnected computer systems-including weapons, command and control, satellite, inventory management, transportation management, health, financial...

  2. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  3. Managing nuclear weapons in a changing world: Proceedings

    International Nuclear Information System (INIS)

    1992-01-01

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL's Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents

  4. Managing nuclear weapons in a changing world: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-31

    The Center for Security and Technology Studies was established at the Lawrence Livermore National Laboratory to support long-range technical studies on issues of importance to US national security. An important goal of the Center is to bring together Laboratory staff and the broader outside community through a program of technical studies, visitors, symposia, seminars, workshops, and publications. With this in mind, the Center and LLNL`s Defense Systems Program sponsored a conference on Managing Nuclear Weapons in a Changing World held on November 17--18,1992. The first day of the meeting focused on nuclear weapons issues in the major geographical areas of the world. On the second day, the conference participants discussed what could be done to manage, control, and account for nuclear weapons in this changing world. Each of the talks and the concluding panel discussion are being indexed as separate documents.

  5. Hybrid soft computing systems for electromyographic signals analysis: a review

    Science.gov (United States)

    2014-01-01

    Electromyographic (EMG) is a bio-signal collected on human skeletal muscle. Analysis of EMG signals has been widely used to detect human movement intent, control various human-machine interfaces, diagnose neuromuscular diseases, and model neuromusculoskeletal system. With the advances of artificial intelligence and soft computing, many sophisticated techniques have been proposed for such purpose. Hybrid soft computing system (HSCS), the integration of these different techniques, aims to further improve the effectiveness, efficiency, and accuracy of EMG analysis. This paper reviews and compares key combinations of neural network, support vector machine, fuzzy logic, evolutionary computing, and swarm intelligence for EMG analysis. Our suggestions on the possible future development of HSCS in EMG analysis are also given in terms of basic soft computing techniques, further combination of these techniques, and their other applications in EMG analysis. PMID:24490979

  6. Nuclear power and nuclear weapons

    International Nuclear Information System (INIS)

    Vaughen, V.C.A.

    1983-01-01

    The proliferation of nuclear weapons and the expanded use of nuclear energy for the production of electricity and other peaceful uses are compared. The difference in technologies associated with nuclear weapons and nuclear power plants are described

  7. Chemical and Biological Defense: DOD Needs Consistent Policies and Clear Processes to Address the Survivability of Weapon Systems Against Chemical and Biological Threats

    National Research Council Canada - National Science Library

    2006-01-01

    DOD, joint, and military service weapon system acquisition policies inconsistently address and do not establish a clear process for considering and testing system chemical and biological survivability...

  8. Computer programming and computer systems

    CERN Document Server

    Hassitt, Anthony

    1966-01-01

    Computer Programming and Computer Systems imparts a "reading knowledge? of computer systems.This book describes the aspects of machine-language programming, monitor systems, computer hardware, and advanced programming that every thorough programmer should be acquainted with. This text discusses the automatic electronic digital computers, symbolic language, Reverse Polish Notation, and Fortran into assembly language. The routine for reading blocked tapes, dimension statements in subroutines, general-purpose input routine, and efficient use of memory are also elaborated.This publication is inten

  9. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons; Armes de terreur. Debarrasser le monde des armes nucleaires, biologiques et chimiques - Commission sur les armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Journe, V.

    2010-07-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  10. Safety and injury profile of conducted electrical weapons used by law enforcement officers against criminal suspects.

    Science.gov (United States)

    Bozeman, William P; Hauda, William E; Heck, Joseph J; Graham, Derrel D; Martin, Brian P; Winslow, James E

    2009-04-01

    Conducted electrical weapons such as the Taser are commonly used by law enforcement agencies. The safety of these weapons has been the subject of scrutiny and controversy; previous controlled studies in animals and healthy humans may not accurately reflect the risks of conducted electrical weapons used in actual conditions. We seek to determine the safety and injury profile of conducted electrical weapons used against criminal suspects in a field setting. This prospective, multicenter, observational trial tracked a consecutive case series of all conducted electrical weapon uses against criminal suspects at 6 US law enforcement agencies. Mandatory review of each conducted electrical weapon use incorporated physician review of police and medical records. Injuries were classified as mild, moderate, or severe according to a priori definitions. The primary outcome was a composite of moderate and severe injuries, termed significant injuries. Conducted electrical weapons were used against 1,201 subjects during 36 months. One thousand one hundred twenty-five subjects (94%) were men; the median age was 30 years (range 13 to 80 years). Mild or no injuries were observed after conducted electrical weapon use in 1,198 subjects (99.75%; 95% confidence interval 99.3% to 99.9%). Of mild injuries, 83% were superficial puncture wounds from conducted electrical weapon probes. Significant injuries occurred in 3 subjects (0.25%; 95% confidence interval 0.07% to 0.7%), including 2 intracranial injuries from falls and 1 case of rhabdomyolysis. Two subjects died in police custody; medical examiners did not find conducted electrical weapon use to be causal or contributory in either case. To our knowledge, these findings represent the first large, independent, multicenter study of conducted electrical weapon injury epidemiology and suggest that more than 99% of subjects do not experience significant injuries after conducted electrical weapon use.

  11. Mathematical Capture of Human Data for Computer Model Building and Validation

    Science.gov (United States)

    2014-04-03

    weapon. The Projectile, the VDE , and the IDE weapons had effects of financial loss for the targeted participant, while the MRAD yielded its own...for LE, Centroid and TE for the baseline and The VDE weapon conditions since p-values exceeded α. All other conditions rejected the null...hypothesis except the LE for VDE weapon. The K-S Statistics were correspondingly lower for the measures that failed to reject the null hypothesis. The CDF

  12. Computers, the Human Mind, and My In-Laws' House.

    Science.gov (United States)

    Esque, Timm J.

    1996-01-01

    Discussion of human memory, computer memory, and the storage of information focuses on a metaphor that can account for memory without storage and can set the stage for systemic research around a more comprehensive, understandable theory. (Author/LRW)

  13. A Research Roadmap for Computation-Based Human Reliability Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Boring, Ronald [Idaho National Lab. (INL), Idaho Falls, ID (United States); Mandelli, Diego [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Groth, Katrina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    The United States (U.S.) Department of Energy (DOE) is sponsoring research through the Light Water Reactor Sustainability (LWRS) program to extend the life of the currently operating fleet of commercial nuclear power plants. The Risk Informed Safety Margin Characterization (RISMC) research pathway within LWRS looks at ways to maintain and improve the safety margins of these plants. The RISMC pathway includes significant developments in the area of thermalhydraulics code modeling and the development of tools to facilitate dynamic probabilistic risk assessment (PRA). PRA is primarily concerned with the risk of hardware systems at the plant; yet, hardware reliability is often secondary in overall risk significance to human errors that can trigger or compound undesirable events at the plant. This report highlights ongoing efforts to develop a computation-based approach to human reliability analysis (HRA). This computation-based approach differs from existing static and dynamic HRA approaches in that it: (i) interfaces with a dynamic computation engine that includes a full scope plant model, and (ii) interfaces with a PRA software toolset. The computation-based HRA approach presented in this report is called the Human Unimodels for Nuclear Technology to Enhance Reliability (HUNTER) and incorporates in a hybrid fashion elements of existing HRA methods to interface with new computational tools developed under the RISMC pathway. The goal of this research effort is to model human performance more accurately than existing approaches, thereby minimizing modeling uncertainty found in current plant risk models.

  14. A Research Roadmap for Computation-Based Human Reliability Analysis

    International Nuclear Information System (INIS)

    Boring, Ronald; Mandelli, Diego; Joe, Jeffrey; Smith, Curtis; Groth, Katrina

    2015-01-01

    The United States (U.S.) Department of Energy (DOE) is sponsoring research through the Light Water Reactor Sustainability (LWRS) program to extend the life of the currently operating fleet of commercial nuclear power plants. The Risk Informed Safety Margin Characterization (RISMC) research pathway within LWRS looks at ways to maintain and improve the safety margins of these plants. The RISMC pathway includes significant developments in the area of thermalhydraulics code modeling and the development of tools to facilitate dynamic probabilistic risk assessment (PRA). PRA is primarily concerned with the risk of hardware systems at the plant; yet, hardware reliability is often secondary in overall risk significance to human errors that can trigger or compound undesirable events at the plant. This report highlights ongoing efforts to develop a computation-based approach to human reliability analysis (HRA). This computation-based approach differs from existing static and dynamic HRA approaches in that it: (i) interfaces with a dynamic computation engine that includes a full scope plant model, and (ii) interfaces with a PRA software toolset. The computation-based HRA approach presented in this report is called the Human Unimodels for Nuclear Technology to Enhance Reliability (HUNTER) and incorporates in a hybrid fashion elements of existing HRA methods to interface with new computational tools developed under the RISMC pathway. The goal of this research effort is to model human performance more accurately than existing approaches, thereby minimizing modeling uncertainty found in current plant risk models.

  15. Technical analysis of US Army Weapons Systems and related advanced technologies of military interest. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1991-06-14

    This report summarizes the activities and accomplishments of an US Army technology security project designed to identify and develop effective policy guidelines for militarily critical technologies in specific Army systems and in broad generic technology areas of military interest, Individual systems analyses are documented in separate Weapons Systems Technical Assessments (WSTAs) and the general generic technology areas are evaluated in the Advanced Technology Assessment Reports (ATARs), However, specific details of these assessments are not addressed here, only recommendations regarding aspects of the defined approach, methodology, and format are provided and discussed.

  16. A New Human-Machine Interfaces of Computer-based Procedure System to Reduce the Team Errors in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Sa Kil; Sim, Joo Hyun; Lee, Hyun Chul

    2016-01-01

    In this study, we identify the emerging types of team errors, especially, in digitalized control room of nuclear power plants such as the APR-1400 main control room of Korea. Most works in nuclear industry are to be performed by a team of more than two persons. Even though the individual errors can be detected and recovered by the qualified others and/or the well trained team, it is rather seldom that the errors by team could be easily detected and properly recovered by the team itself. Note that the team is defined as two or more people who are appropriately interacting with each other, and the team is a dependent aggregate, which accomplishes a valuable goal. Organizational errors sometimes increase the likelihood of operator errors through the active failure pathway and, at the same time, enhance the possibility of adverse outcomes through defensive weaknesses. We incorporate the crew resource management as a representative approach to deal with the team factors of the human errors. We suggest a set of crew resource management training procedures under the unsafe environments where human errors can have devastating effects. We are on the way to develop alternative interfaces against team error in a condition of using a computer-based procedure system in a digitalized main control room. The computer-based procedure system is a representative feature of digitalized control room. In this study, we will propose new interfaces of computer-based procedure system to reduce feasible team errors. We are on the way of effectiveness test to validate whether the new interface can reduce team errors during operating with a computer-based procedure system in a digitalized control room

  17. A New Human-Machine Interfaces of Computer-based Procedure System to Reduce the Team Errors in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sa Kil; Sim, Joo Hyun; Lee, Hyun Chul [Korea Atomic Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    In this study, we identify the emerging types of team errors, especially, in digitalized control room of nuclear power plants such as the APR-1400 main control room of Korea. Most works in nuclear industry are to be performed by a team of more than two persons. Even though the individual errors can be detected and recovered by the qualified others and/or the well trained team, it is rather seldom that the errors by team could be easily detected and properly recovered by the team itself. Note that the team is defined as two or more people who are appropriately interacting with each other, and the team is a dependent aggregate, which accomplishes a valuable goal. Organizational errors sometimes increase the likelihood of operator errors through the active failure pathway and, at the same time, enhance the possibility of adverse outcomes through defensive weaknesses. We incorporate the crew resource management as a representative approach to deal with the team factors of the human errors. We suggest a set of crew resource management training procedures under the unsafe environments where human errors can have devastating effects. We are on the way to develop alternative interfaces against team error in a condition of using a computer-based procedure system in a digitalized main control room. The computer-based procedure system is a representative feature of digitalized control room. In this study, we will propose new interfaces of computer-based procedure system to reduce feasible team errors. We are on the way of effectiveness test to validate whether the new interface can reduce team errors during operating with a computer-based procedure system in a digitalized control room.

  18. Bugs and gas: Agreements banning chemical and biological weapons

    Science.gov (United States)

    Mikulak, Robert P.

    2017-11-01

    The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.

  19. Nuclear experts and nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Mueller, H.

    1979-01-01

    In Germany the issue of nuclear weapons proliferation has attracted scant attention. Most potential nuclear weapon states are important trade partners of the FRG and, since further proliferation of nuclear weapons could worsen conflicts involving these, it should be in the FRG's interest to limit proliferation. The security of the FRG is also dependent on the common interest of the great powers to avoid nuclear war. The contradictory positions of Usa and the USSR on nuclear weapons policy regarding themselves and non-nuclear weapon states encourages less developed countries to see nuclear weaponry as useful. The NPT and IAEA safeguards have only limited inhibiting effect. The nuclear export policy of the FRG has been dominated by short term economic advantage, neglecting the negative long term effects of decreased political stability. The FRG should formulate a policy based on self-restraint, positive stimuli and extension of controls, using its economic strength to deter proliferation. (JIW)

  20. Reframing the debate against nuclear weapons

    International Nuclear Information System (INIS)

    Tyson, Rhianna

    2005-01-01

    'Some 35,000 nuclear weapons remain in the arsenals of the nuclear powers, with thousands still deployed on hair-trigger alert. Whatever rationale these weapons may once have had has long since dwindled. Political, moral, and legal constraints on actually using them further undermine their strategic utility without, however, reducing the risks of inadvertent war or proliferation. The objective of nuclear non-proliferation is not helped by the fact that the nuclear weapon States continue to insist that those weapons in their hands enhance security, while in the hands of others they are a threat to world peace. If we were making steady progress towards disarmament, this situation would be less alarming. Unfortunately, the reverse is true.' - United Nations Secretary-General Kofi Annan. 'Something is wrong with the nuclear disarmament and non-proliferation regime. Although seemingly well-equipped with an arsenal of legal and political mechanisms, such as the Nuclear Non-Proliferation Treaty (NPT), the 1996 Advisory Opinion of the International Court of Justice (ICJ), decades' worth of General Assembly (GA) resolutions and even a recent slew of ad-hoc, plurilateral initiatives such as the Proliferation Security Initiative, the regime created to prevent the catastrophe of nuclear war remains inadequate. This insufficiency is even starker when viewed in relation to the regimes controlling other weapons of mass destruction. Despite its own challenges, the Organization for the Prohibition on Chemical Weapons remains relatively well-funded and well-situated to facilitate the implementation of the Chemical Weapons Convention (CWC). Even the Biological and Toxin Weapons Convention (BTWC), while still lacking the necessary verification mechanisms, has managed to effectively criminalize not just the use and threat of use of biological weapons, but also their production, development and stockpiling. Meanwhile, the anti-nuclear regime seems to be faltering. Progress made in

  1. Domain Decomposition for Computing Extremely Low Frequency Induced Current in the Human Body

    OpenAIRE

    Perrussel , Ronan; Voyer , Damien; Nicolas , Laurent; Scorretti , Riccardo; Burais , Noël

    2011-01-01

    International audience; Computation of electromagnetic fields in high resolution computational phantoms requires solving large linear systems. We present an application of Schwarz preconditioners with Krylov subspace methods for computing extremely low frequency induced fields in a phantom issued from the Visible Human.

  2. Confidence in Nuclear Weapons as Numbers Decrease and Time Since Testing Increases

    Science.gov (United States)

    Adams, Marvin

    2011-04-01

    As numbers and types of nuclear weapons are reduced, the U.S. objective is to maintain a safe, secure and effective nuclear deterrent without nuclear-explosive testing. A host of issues combine to make this a challenge. An evolving threat environment may prompt changes to security systems. Aging of weapons has led to ``life extension programs'' that produce weapons that differ in some ways from the originals. Outdated and changing facilities pose difficulties for life-extension, surveillance, and dismantlement efforts. A variety of factors can make it a challenge to recruit, develop, and retain outstanding people with the skills and experience that are needed to form the foundation of a credible deterrent. These and other issues will be discussed in the framework of proposals to reduce and perhaps eliminate nuclear weapons.

  3. Between Allies and Rivals: Turkey, Nuclear Weapons, and BMD

    International Nuclear Information System (INIS)

    Kibaroglu, Mustafa

    2014-01-01

    This paper discusses Turkey's attitudes vis-a-vis nuclear weapons and Ballistic Missile Defense in the light of recent developments in the Iranian nuclear program and NATO's evolving concept of extended deterrence. On the one hand, the long-standing forward deployment of US tactical nuclear weapons in Turkey and the country's role in the US Phased Adaptive Approach BMD architecture are still considered to be key elements of national security. On the other, security guarantees offered to Turkey by NATO and the US appear less and less credible in the face of rising regional threats. As this paper shows, there is a growing gap between official policy and public perceptions inside Turkey vis-a-vis the US, Iran, and nuclear weapons, as well as a growing Turkish aspiration to autonomy in its security and defense policy. While one should not expect Turkey to develop nuclear weapons anytime soon, an unchecked Iranian regional power could bring Ankara to hedge its bets in the long term. Turkey's controversial recent decision to buy a Chinese system for its national air and missile defense rather than European or US equipment should be seen in the light of this search for autonomy. (author)

  4. Weapons material and the commercial fuel cycle

    International Nuclear Information System (INIS)

    Steyn, J.J.

    1993-01-01

    In 1991, the United States and the former USSR had arsenals of ∼18,000 and 27,200 nuclear weapons, respectively. Approximately 10,000 of the US and 13,000 of the former USSR weapons were in the strategic category, and the remainder were tactical weapons. The dramatic changes in the political climate between the United States and the republics of the former USSR have resulted in the signing of the Strategic Arms Reduction Treaty (START I and II), agreements to substantially reduce nuclear weapons arsenals. Tactical weapons have already been collected in Russia, and strategic weapons are to be collected by the end of 1994. The major issues in accomplishing the treaty reductions appear to be funding, transport safety, storage capacity, and political issues between Russia and Ukraine because the latter seems to be using its weapons for political leverage on other matters. Collectively, the US and former USSR warhead stockpiles contain tremendous inventories of high-enriched uranium and weapons-grade plutonium which if converted to light water reactor fuel would equate to an enormous economic supply of natural uranium, conversion services, and enrichment separative work. The potential for this material entering the light water reactor fuel marketplace was enhanced in July 1992, when the two US industrial companies, Nuclear Fuel Services and Allied-Signal, announced that they had reached a preliminary agreement with the Russian ministry, Minatom, and the Russian Academay of Sciences to convert Russian high-enriched uranium to low-enriched uranium

  5. Making IBM's Computer, Watson, Human

    Science.gov (United States)

    Rachlin, Howard

    2012-01-01

    This essay uses the recent victory of an IBM computer (Watson) in the TV game, "Jeopardy," to speculate on the abilities Watson would need, in addition to those it has, to be human. The essay's basic premise is that to be human is to behave as humans behave and to function in society as humans function. Alternatives to this premise are considered…

  6. Digital image processing and analysis human and computer vision applications with CVIPtools

    CERN Document Server

    Umbaugh, Scott E

    2010-01-01

    Section I Introduction to Digital Image Processing and AnalysisDigital Image Processing and AnalysisOverviewImage Analysis and Computer VisionImage Processing and Human VisionKey PointsExercisesReferencesFurther ReadingComputer Imaging SystemsImaging Systems OverviewImage Formation and SensingCVIPtools SoftwareImage RepresentationKey PointsExercisesSupplementary ExercisesReferencesFurther ReadingSection II Digital Image Analysis and Computer VisionIntroduction to Digital Image AnalysisIntroductionPreprocessingBinary Image AnalysisKey PointsExercisesSupplementary ExercisesReferencesFurther Read

  7. Treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2000-01-01

    The document reproduces the statement of the Director General of the IAEA to the Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons, New York, 24 April 2000. The speech focus on the IAEA activities relevant to the implementation of the Treaty, namely: verification through the IAEA safeguards, peaceful nuclear co-operation in the field of human health, food and agriculture, water resources management, environmental pollution monitoring, training

  8. HumanComputer Systems Interaction Backgrounds and Applications 2 Part 1

    CERN Document Server

    Kulikowski, Juliusz; Mroczek, Teresa

    2012-01-01

    The main contemporary human-system interaction (H-SI) problems consist in design and/or improvement of the tools for effective exchange of information between individual humans or human groups and technical systems created for humans aiding in reaching their vital goals. This book is a second issue in a series devoted to the novel in H-SI results and contributions reached for the last years by many research groups in European and extra-European countries. The preliminary (usually shortened) versions of the chapters  were presented as conference papers at the 3rd International Conference on H-SI held in Rzeszow, Poland, in 2010. A  large number of valuable papers  selected for publication caused a necessity to publish the book in two volumes. The given, 1st Volume  consists of sections devoted to: I. Decision Supporting Systems, II. Distributed Knowledge Bases and WEB Systems and III. Impaired Persons  Aiding Systems. The decision supporting systems concern various application areas, like enterprises mana...

  9. Effects of Weapons on Aggressive Thoughts, Angry Feelings, Hostile Appraisals, and Aggressive Behavior: A Meta-Analytic Review of the Weapons Effect Literature.

    Science.gov (United States)

    Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J

    2017-09-01

    Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).

  10. Characterising the online weapons trafficking on cryptomarkets.

    Science.gov (United States)

    Rhumorbarbe, Damien; Werner, Denis; Gilliéron, Quentin; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin

    2018-02-01

    Weapons related webpages from nine cryptomarkets were manually duplicated in February 2016. Information about the listings (i.e. sales proposals) and vendors' profiles were extracted to draw an overview of the actual online trafficking of weapons. Relationships between vendors were also inferred through the analysis of online digital traces and content similarities. Weapons trafficking is mainly concentrated on two major cryptomarkets. Besides, it accounts for a very small proportion of the illicit trafficking on cryptomarkets compared to the illicit drugs trafficking. Among all weapon related listings (n=386), firearms only account for approximately 25% of sales proposal since the proportion of non-lethal and melee weapons is important (around 46%). Based on the recorded pseudonyms, a total of 96 vendor profiles were highlighted. Some pseudonyms were encountered on several cryptomarkets, suggesting that some vendors may manage accounts on different markets. This hypothesis was strengthened by comparing pseudonyms to online traces such as PGP keys, images and profiles descriptions. Such a method allowed to estimate more accurately the number of vendors offering weapons across cryptomarkets. Finally, according to the gathered data, the extent of the weapons trafficking on the cryptomarkets appear to be limited compared to other illicit goods. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. The Modern Space Domain: On the Eve of Weaponization

    Science.gov (United States)

    2018-04-09

    Space Warfighting Domain; Weaponization of Space; Space history UNCLAS UNCLAS UNCLAS UNCLAS; Unlimited 59 Mark A. Hauser 618-795-3900 NATIONAL DEFENSE...humans have traced history and made scientific discoveries. Man has touched the moon and seeks interplanetary journeys. Space has inspired many...open to national security engagement. The United States responded to the Soviet advances by developing technology for satellite employment, space

  12. Nuclear weapons industry

    International Nuclear Information System (INIS)

    Bertsch, K.A.; Shaw, L.S.

    1984-01-01

    This unique study was written specifically as a reference source for institutional investors concerned about the threat posed to their stock portfolios by the debate over nuclear arms production. The authors focus their analysis on the 26 leading companies in the field. The perspective is neutral and refreshing. Background information on strategic policy, arms control and disarmament, and the influence of the industry on defense policy and the economy is presented rationally. The study also discusses the economic significance of both the conversion from military to civilian production and nuclear freeze initiatives. An appendix contains a fact-filled guide to nuclear weapon systems

  13. Aspects of computer control from the human engineering standpoint

    International Nuclear Information System (INIS)

    Huang, T.V.

    1979-03-01

    A Computer Control System includes data acquisition, information display and output control signals. In order to design such a system effectively we must first determine the required operational mode: automatic control (closed loop), computer assisted (open loop), or hybrid control. The choice of operating mode will depend on the nature of the plant, the complexity of the operation, the funds available, and the technical expertise of the operating staff, among many other factors. Once the mode has been selected, consideration must be given to the method (man/machine interface) by which the operator interacts with this system. The human engineering factors are of prime importance to achieving high operating efficiency and very careful attention must be given to this aspect of the work, if full operator acceptance is to be achieved. This paper will discuss these topics and will draw on experience gained in setting up the computer control system in Main Control Center for Stanford University's Accelerator Center (a high energy physics research facility)

  14. A multiobjective approach towards weapon assignment in a ground ...

    African Journals Online (AJOL)

    A typical ground-based air defence (GBAD) environment comprises defended assets on the ground which require protection from enemy aircraft entering the defended airspace. ... of computerised threat evaluation and weapon assignment (TEWA) decision support systems (DSSs) within the context of a GBAD system.

  15. Civil nuclear energy and the proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1990-04-01

    The issue of whether civil nuclear programmes contribute to the risk of proliferation of nuclear weapons has been discussed since civil programmes were first considered, and has always complicated public attitudes to civil nuclear energy. This paper seeks to define the extent to which there is such ''linkage''. It does not deal with the linkages that exist between nuclear weapons and other industries and activities - for example, those involved in weapons delivery systems -since these are not within the Uranium Institute's area of competence. Linkage concerns regarding civil nuclear programmes arise primarily over the possibility of their being used to produce highly enriched uranium or plutonium for use in weapons. The technologies which can give rise directly to these materials are therefore ''sensitive'' in proliferation terms. Linkage may also arise through the relevant experience of the trained workforce. Such linkage is, however, limited by institutional, technical and economic factors. First, important institutional constraints on using a civil programme for military purposes exist in the form of a network of bilateral agreements and international treaties - most particularly the Nuclear Non-Proliferation Treaty - and the international safeguards inspections. Secondly, without access to the technologies of enrichment or reprocessing, the fissile material needed for an explosive cannot be obtained from any plant or process used to produce electricity. Finally, establishing a civil programme - with equipment whose design is optimized for electricity production - in order to develop weapons is an expensive route compared to specialized facilities. (author)

  16. Functional safeguards for computers for protection systems for Savannah River reactors

    International Nuclear Information System (INIS)

    Kritz, W.R.

    1977-06-01

    Reactors at the Savannah River Plant have recently been equipped with a ''safety computer'' system. This system utilizes dual digital computers in a primary protection system that monitors individual fuel assembly coolant flow and temperature. The design basis for the (SRP safety) computer systems allowed for eventual failure of any input sensor or any computer component. These systems are routinely used by reactor operators with a minimum of training in computer technology. The hardware configuration and software design therefore contain safeguards so that both hardware and human failures do not cause significant loss of reactor protection. The performance of the system to date is described

  17. COMPUTER-BASED REASONING SYSTEMS: AN OVERVIEW

    Directory of Open Access Journals (Sweden)

    CIPRIAN CUCU

    2012-12-01

    Full Text Available Argumentation is nowadays seen both as skill that people use in various aspects of their lives, as well as an educational technique that can support the transfer or creation of knowledge thus aiding in the development of other skills (e.g. Communication, critical thinking or attitudes. However, teaching argumentation and teaching with argumentation is still a rare practice, mostly due to the lack of available resources such as time or expert human tutors that are specialized in argumentation. Intelligent Computer Systems (i.e. Systems that implement an inner representation of particular knowledge and try to emulate the behavior of humans could allow more people to understand the purpose, techniques and benefits of argumentation. The proposed paper investigates the state of the art concepts of computer-based argumentation used in education and tries to develop a conceptual map, showing benefits, limitation and relations between various concepts focusing on the duality “learning to argue – arguing to learn”.

  18. Precursor of other nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Roman-Morey, E.

    1997-01-01

    Based on the analysis of the long process of negotiations for implementing the Treaty of Tlatelolco and its history during the last three decades, especially its influence on other regions of the world for stimulating the creation of new nuclear-weapon-free zones, the following conclusions were drawn: nuclear danger still persists; the end of Cold War implies the end of a nuclear threat; the nuclear fear should not become nuclear complacency and be accepted by international community; common security as the goal of international community should be recognised and definitive abolition of nuclear weapons should be sought; the Treaty of Tlatelolco represents the cornerstone for creating new nuclear-weapon-free zones; Treaties of Tlatelolco, Rarotonga, Bangkok and Pelindaba should be examples to be followed by other regions and groups of countries for creating new nuclear-weapon-free zones which should be recognised as very important phase in achieving a nuclear-weapon-free world and means for attaining an international regime of non-proliferation of weapons for mass destruction

  19. China's mixed signals on nuclear weapons

    International Nuclear Information System (INIS)

    Fieldhouse, R.

    1991-01-01

    Ultimately, it is nuclear whether the Chinese leadership has made up its collective mind on practical nuclear weapons. It is known from Chinese official sources, including articles in Communist Party and military publications and histories of the Chinese nuclear program, that an internal debate has proceeded for more than two decades, punctuated by occasional nuclear exercises or low-yield warhead tests. But China presumably has less reason now to pursue development of tactical nuclear weapons than in previous decades: relations with the Soviet Union have improved and military confrontation has eased; China's relations with India and Vietnam are also improving. The decision may already have been made, however, and the weapons built. The mystery surrounding Chinese tactical nuclear weapons is itself interesting, but it is also symbolic of the difficulty of understanding China's nuclear weapons program and policies. The West has accumulated a considerable body of knowledge about China's nuclear forces, especially historical material. But important aspects of China's nuclear behavior and its future as a nuclear power are hard to discern. A key question is China's future role in the spread of nuclear-capable weapons to other countries. China might add to international efforts to stem the proliferation of nuclear related technology, or it might become the world's missile merchant. It could make a constructive contribution to arms control efforts in general, or it could act as a spoiler

  20. Small Arms - Hand and Shoulder Weapons and Machine Guns

    Science.gov (United States)

    2016-06-24

    weapon barrels between firing trials is permitted. A locally fabricated rack can be used for barrels that are detached from the weapon; the air should...Lubricating oil, weapons MIL-L-14107 (LAW) 19. Hydraulic fluid, petroleum base MIL-H-5606 20. Hydraulic fluid, fire - resistant MIL-H-46170...weapon from the test environment to perform maintenance. 4.20.8 Smoke . a. Background. The smoke cloud accumulated during weapon firing can

  1. Polonium-210 as Weapon for Mass Destruction

    International Nuclear Information System (INIS)

    Koteng, A.O.

    2010-01-01

    Properties of Po-210 make it possible for its use as weapon of mass destruction. Po-210 occurs naturally in minute quantities in the human body, in Uranium ore (< 0.1 mg Po-210 / ton ) and as a product of Radon-222 gas decay chain. Po-210 also occurs as deposition on vegetation (tobacco leaves). Po-210 is produced by bombardment of Bi-209 with neutrons in a nuclear reactor. Russia produces 8 grams per year for export to USA market

  2. Human factors information system

    International Nuclear Information System (INIS)

    Goodman, P.C.; DiPalo, C.A.

    1991-01-01

    Nuclear power plant safety is dependent upon human performance related to plant operations. To provide improvements in human performance, data collection and assessment play key roles. This paper reports on the Human factors Information System (HFIS) which is designed to meet the needs of the human factors specialists of the United States Nuclear Regulatory Commission. These specialists identify personnel errors and provide guidance designed to prevent such errors. HFIS is a simple and modular system designed for use on a personal computer. It is designed to contain four separate modules that provide information indicative of program or function effectiveness as well as safety-related human performance based on programmatic and performance data. These modules include the Human Factors Status module; the Regulatory Programs module; the Licensee Event Report module; and the Operator Requalification Performance module. Information form these modules can either be used separately or can be combined due to the integrated nature of the system. HFIS has the capability, therefore, to provide insights into those areas of human factors that can reduce the probability of events caused by personnel error at nuclear power plants and promote the health and safety of the public. This information system concept can be applied to other industries as well as the nuclear industry

  3. Anti-3D Weapon Model Detection for Safe 3D Printing Based on Convolutional Neural Networks and D2 Shape Distribution

    Directory of Open Access Journals (Sweden)

    Giao N. Pham

    2018-03-01

    Full Text Available With the development of 3D printing, weapons are easily printed without any restriction from the production managers. Therefore, anti-3D weapon model detection is necessary issue in safe 3D printing to prevent the printing of 3D weapon models. In this paper, we would like to propose an anti-3D weapon model detection algorithm to prevent the printing of anti-3D weapon models for safe 3D printing based on the D2 shape distribution and an improved convolutional neural networks (CNNs. The purpose of the proposed algorithm is to detect anti-3D weapon models when they are used in 3D printing. The D2 shape distribution is computed from random points on the surface of a 3D weapon model and their geometric features in order to construct a D2 vector. The D2 vector is then trained by improved CNNs. The CNNs are used to detect anti-3D weapon models for safe 3D printing by training D2 vectors which have been constructed from the D2 shape distribution of 3D weapon models. Experiments with 3D weapon models proved that the D2 shape distribution of 3D weapon models in the same class is the same. Training and testing results also verified that the accuracy of the proposed algorithm is higher than the conventional works. The proposed algorithm is applied in a small application, and it could detect anti-3D weapon models for safe 3D printing.

  4. Blast Computations over a Hemicylindrical Aircraft Shelter

    Science.gov (United States)

    1981-07-01

    Westmoreland, C.D., "The HULL Hydro- dinamics Computer Code", AFWL-TR-76-183, U.S. Air Force Wocpon Laboratory, Kirtland Air Force Baze, IN (Septenber...DISTRIBUTION LIST No. of No. of Copies Organization Copies Organization 2 Commander 1 Director Defense Technical Info Center Weapons Systems Evaluation Gp ATTN...DRDTA-’’. Fort Monroe, VA 23651 Warrel, MI 48090 2 Director Commander US Army TRADOC Systems US Army Foreign Scienco and Analysis Activity Technology

  5. The real value of nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    Carasales, J.

    1998-01-01

    The international community has greeted the establishment of two new nuclear weapon-free zones with praise. Africa and South Asia are the regions which will join, once the respective treaties are ratified and in force, Latin America and the South Pacific to ensure that extensive areas of the earth remain free of nuclear weapons. The usual reaction to these accomplishments is to hail them as important contributions to international peace and security, and as meaningful steps towards a world free of nuclear weapons. The nuclear weapon-free zones have their value but this value relates mainly to the countries within the zone. The interest of nuclear-weapon states are not really affected, or, if they are, the influence is not significant. One should bear in mind that the really important and meaningful nuclear weapon-free zones have yet to be achieved

  6. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  7. Data Management Standards in Computer-aided Acquisition and Logistic Support (CALS)

    Science.gov (United States)

    Jefferson, David K.

    1990-01-01

    Viewgraphs and discussion on data management standards in computer-aided acquisition and logistic support (CALS) are presented. CALS is intended to reduce cost, increase quality, and improve timeliness of weapon system acquisition and support by greatly improving the flow of technical information. The phase 2 standards, industrial environment, are discussed. The information resource dictionary system (IRDS) is described.

  8. Modeling multimodal human-computer interaction

    NARCIS (Netherlands)

    Obrenovic, Z.; Starcevic, D.

    2004-01-01

    Incorporating the well-known Unified Modeling Language into a generic modeling framework makes research on multimodal human-computer interaction accessible to a wide range off software engineers. Multimodal interaction is part of everyday human discourse: We speak, move, gesture, and shift our gaze

  9. Nuclear Weapons in Russia's approach to conflict

    International Nuclear Information System (INIS)

    Johnson, Dave

    2016-11-01

    President Putin has moved nuclear weapons to the foreground of the European security landscape. New risks and dangers arise from the apparent coupling of nuclear weapons capabilities with Moscow's revanchist and irredentist foreign and defence policies toward its neighbours. Nuclear weapons are the central feature and capstone capability in Russia's evolving concept of strategic deterrence and are important tools for achieving Russia's geopolitical aims. Russian thinking on the role and place of nuclear weapons in upholding national security and in achieving strategic aims is reflected in military policy, force structure and posture, and exercises and operations. Russia's political and military leaders are not only re-conceptualising the role of nuclear weapons. They are also building the military capabilities that can credibly threaten the calibrated employment of nuclear weapons for deterrence, de-escalation and war-fighting from the regional to large-scale and global levels of conflict. New and still developing concepts for the employment of conventional long-range precision weapons in tandem with nuclear weapons for regional deterrence and containment of local and regional conflicts add volatility to the regional tensions and uncertainties created by recent Russian aggression. Russia's reliance upon integrated conventional and nuclear capabilities in reasserting its influence in its perceived sphere of special interest, intended to contain conflicts at a manageable level, could actually increase the risk of the potential employment of nuclear weapons. NATO nations collectively, and the three NATO nuclear powers (Great Britain, France, and the United States) individually, have recognized this new reality and have begun to adapt to it. In that context, the aim of this paper is to elaborate a clearer understanding of the place and role of nuclear weapons in Russia's approach to conflict, based on nuclear-related policy statements and military-theoretical writing

  10. Human-Computer Interaction, Tourism and Cultural Heritage

    Science.gov (United States)

    Cipolla Ficarra, Francisco V.

    We present a state of the art of the human-computer interaction aimed at tourism and cultural heritage in some cities of the European Mediterranean. In the work an analysis is made of the main problems deriving from training understood as business and which can derail the continuous growth of the HCI, the new technologies and tourism industry. Through a semiotic and epistemological study the current mistakes in the context of the interrelations of the formal and factual sciences will be detected and also the human factors that have an influence on the professionals devoted to the development of interactive systems in order to safeguard and boost cultural heritage.

  11. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  12. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  13. Camera systems in human motion analysis for biomedical applications

    Science.gov (United States)

    Chin, Lim Chee; Basah, Shafriza Nisha; Yaacob, Sazali; Juan, Yeap Ewe; Kadir, Aida Khairunnisaa Ab.

    2015-05-01

    Human Motion Analysis (HMA) system has been one of the major interests among researchers in the field of computer vision, artificial intelligence and biomedical engineering and sciences. This is due to its wide and promising biomedical applications, namely, bio-instrumentation for human computer interfacing and surveillance system for monitoring human behaviour as well as analysis of biomedical signal and image processing for diagnosis and rehabilitation applications. This paper provides an extensive review of the camera system of HMA, its taxonomy, including camera types, camera calibration and camera configuration. The review focused on evaluating the camera system consideration of the HMA system specifically for biomedical applications. This review is important as it provides guidelines and recommendation for researchers and practitioners in selecting a camera system of the HMA system for biomedical applications.

  14. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  15. Minimal mobile human computer interaction

    NARCIS (Netherlands)

    el Ali, A.

    2013-01-01

    In the last 20 years, the widespread adoption of personal, mobile computing devices in everyday life, has allowed entry into a new technological era in Human Computer Interaction (HCI). The constant change of the physical and social context in a user's situation made possible by the portability of

  16. Future of clip-on weapon sights: pros and cons from an applications perspective

    Science.gov (United States)

    Knight, C. Reed; Greenslade, Ken; Francisco, Glen

    2015-05-01

    US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions

  17. Fourth and Fifth Amendment issues raised by Chemical Weapons Convention inspections

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A. [Argonne National Lab., IL (United States). Economics and Law Section

    1994-10-21

    The Chemical Weapons Convention (CWC) offers a unique challenge to the United States system of constitutional law. This discussion is about the Fourth and Fifth Amendment issues raised by the CWC and about how federal implementing legislation can allow verification inspections to take place in the United States under the Chemical Weapons Convention while remaining in compliance with the Constitution. By implementing legislation, the author means a federal statute that would be enacted separately from Senate approval of the Convention itself. Although implementing legislation is a relatively unusual accompaniment to a treaty, it will be necessary to the CWC, and the Administration has submitted a bill that was under consideration in the last Congress and presumably will be reintroduced early next year. The Fourth and Fifth Amendment problems posed by the CWC arise from the verification inspection scheme embodied in the treaty. The CWC depends heavily on on-site inspections to verify compliance with its key requirements. These include destroying all chemicals weapons stockpiles and bringing potential chemical weapons precursors under international control. The Convention contains four distinct kinds of inspections: systematic inspections of chemical weapons storage and destruction facilities, routine inspections of various declared facilities, challenge inspections, and a variant on challenge inspections in cases of alleged use of chemical weapons. All inspections are supposed to be only as intrusive as necessary to carry out the Convention. These inspections will be carried out by inspectors employed by the Organization for the Prohibition of Chemical Weapons (OPCW), located in The Hague, which is responsible for enforcing the Convention. Generally, the inspected State Party is permitted to assign observers to accompany the inspectors.

  18. A computational method for probabilistic safety assessment of I and C systems and human operators in nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Seong, Poong Hyun

    2006-01-01

    To make probabilistic safety assessment (PSA) more realistic, the improvements of human reliability analysis (HRA) are essential. But, current HRA methods have many limitations including the lack of considerations on the interdependency between instrumentation and control (I and C) systems and human operators, and lack of theoretical basis for situation assessment of human operators. To overcome these limitations, we propose a new method for the quantitative safety assessment of I and C systems and human operators. The proposed method is developed based on the computational models for the knowledge-driven monitoring and the situation assessment of human operators, with the consideration of the interdependency between I and C systems and human operators. The application of the proposed method to an example situation demonstrates that the quantitative description by the proposed method for a probable scenario well matches with the qualitative description of the scenario. It is also demonstrated that the proposed method can probabilistically consider all possible scenarios and the proposed method can be used to quantitatively evaluate the effects of various context factor on the safety of nuclear power plants. In our opinion, the proposed method can be used as the basis for the development of advanced HRA methods

  19. Issues of weapons of mass destruction non-proliferation in Tajikistan

    International Nuclear Information System (INIS)

    Mirsaidov, U.M.

    2010-01-01

    This article is devoted to issues of weapons of mass destruction non-proliferation in Tajikistan. Over a period of 20 century, starting from First World War, the weapons of mass destruction arouse serious concern of world community. Geneva protocol of 1925 prohibits the use of chemical and biological weapons. Once nuclear weapon was created, the weapons of mass destruction distributions become the subject of high concern. Besides, during the end of 'cold war', regional conflicts, collapse of Soviet Union, as well as access to sensitive technologies considerably increase the danger of weapons of mass destruction distribution. More than 10 countries have active programs, relating to weapons of mass destruction and, possibly, more than ten countries have potential to start implementing such kinds of programs. Nowadays, trans national organized criminal groups and international terrorist networks are appeared in the world scene, which show interest in obtaining an access to sensitive materials, technologies, weapons and their distribution. After 11 September events, the risk of such weapons of mass destruction components use by such forces for Governments blackmail become real scene, which, despite of low possibility of this threat implementation, could have very serious and disastrous consequences. International community responded to these problems and challenges, basically through the following actions, which is detailed regime development of multilateral international treaties, directed to weapons of mass destruction distribution prevention. Non-proliferation treaty of nuclear weapons, Convention on prohibition of chemical weapons and Convention on prohibition of biological and toxin weapons are some of them. As it is known, Tajikistan signed all these treaties. For different reasons these treaties were subject of serious tests. Nuclear weapons tests in India and Pakistan in 1998 year, actual Israel status as state having nuclear weapon and North Korean program on

  20. Neural computing thermal comfort index for HVAC systems

    International Nuclear Information System (INIS)

    Atthajariyakul, S.; Leephakpreeda, T.

    2005-01-01

    The primary purpose of a heating, ventilating and air conditioning (HVAC) system within a building is to make occupants comfortable. Without real time determination of human thermal comfort, it is not feasible for the HVAC system to yield controlled conditions of the air for human comfort all the time. This paper presents a practical approach to determine human thermal comfort quantitatively via neural computing. The neural network model allows real time determination of the thermal comfort index, where it is not practical to compute the conventional predicted mean vote (PMV) index itself in real time. The feed forward neural network model is proposed as an explicit function of the relation of the PMV index to accessible variables, i.e. the air temperature, wet bulb temperature, globe temperature, air velocity, clothing insulation and human activity. An experiment in an air conditioned office room was done to demonstrate the effectiveness of the proposed methodology. The results show good agreement between the thermal comfort index calculated from the neural network model in real time and those calculated from the conventional PMV model

  1. Human brain as the model for a new computer system. I

    Energy Technology Data Exchange (ETDEWEB)

    Holtz, K; Langheld, E

    1981-11-25

    The authors discuss ideas for the design of a self-teaching no-program associative computer. A simple system, requiring no programming, is based on the construction of a system of concepts with self-arranging data.

  2. Toxic industrial chemicals (TICs) as asymmetric weapons: the design basis threat

    International Nuclear Information System (INIS)

    Skinner, L.

    2009-01-01

    Asymmetric warfare concepts relate well to the use of improvised chemical weapons against urban targets. Sources of information on toxic industrial chemicals (TICs) and lists of high threat chemicals are available that point to likely choices for an attack. Accident investigations can be used as a template for attacks, and to judge the possible effectiveness of an attack using TICs. The results of a chlorine rail car accident in South Carolina, USA and the Russian military assault on a Moscow theater provide many illustrative points for similar incidents that mighty be carried out deliberately. Computer modeling of outdoor releases shows how an attack might take into consideration issues of stand-off distance and dilution. Finally, the preceding may be used to estimate with some accuracy the design basis threat posed by the used of TICs as weapons.(author)

  3. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  4. Consequences of the Use of Neutron Weapons

    International Nuclear Information System (INIS)

    Ilijas, B.

    1998-01-01

    In modern conceptions of the use of nuclear weapons there is a significant role of so called enhanced radiation weapons, also known as neutron weapons. Its most important feature is that all other effects (blast, thermal) are minimized in favour of neutron radiation. Because of the great penetrative capability and biological efficiency, neutron beam is ideal weapon against people in shelters and armoured vehicles. Material goods stay saved and also there is no significant long- term radioactive contamination. After the use of this weapons, which is possible even for tactical tasks on limited area, one must count with great number of people irradiated with doses in wide range - from those enough for instantaneous incapacitation to those which cause only long-term effects. For the purpose of maximal efficiency in this situation, it is necessary to work out plans for dosimetric control, first aid, transport and medical treatment of irradiated people (soldiers and civilians) in war conditions. (author)

  5. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  6. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    Science.gov (United States)

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  7. Why are sexually selected weapons almost absent in females?

    Directory of Open Access Journals (Sweden)

    Anders BERGLUND

    2013-08-01

    Full Text Available In sex role reversed species, predominantly females evolve sexually selected traits, such as ornaments and/or weapons. Female ornaments are common and their function well documented in many species, whether sex role reversed or not. However, sexually selected female weapons seem totally absent except for small wing spurs in three jacana species, present in both males and females. This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles: males commonly have evolved sexually selected weapons as well as ornaments. At the same time, females in many taxa have naturally selected weapons, used in competition over resources or in predator defence. Why are sexually selected weapons then so rare, almost absent, in females? Here I briefly review weaponry in females and the function of these weapons, conclude that the near absence of sexually selected weapons begs an explanation, and suggest that costs of sexually selected weapons may exceed costs of ornaments. Females are more constrained when evolving sexually selected traits compared to males, at least compared to those males that do not provide direct benefits, as trait costs reduce a female’s fecundity. I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons. The same may apply to paternally investing males. Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated [Current Zoology 59 (4: 564–568, 2013].

  8. A Human-Centred Tangible approach to learning Computational Thinking

    Directory of Open Access Journals (Sweden)

    Tommaso Turchi

    2016-08-01

    Full Text Available Computational Thinking has recently become a focus of many teaching and research domains; it encapsulates those thinking skills integral to solving complex problems using a computer, thus being widely applicable in our society. It is influencing research across many disciplines and also coming into the limelight of education, mostly thanks to public initiatives such as the Hour of Code. In this paper we present our arguments for promoting Computational Thinking in education through the Human-centred paradigm of Tangible End-User Development, namely by exploiting objects whose interactions with the physical environment are mapped to digital actions performed on the system.

  9. Weapon identification using antemortem CT with 3D reconstruction, is it always possible?--A report in a case of facial blunt and sharp injuries using an ashtray.

    Science.gov (United States)

    Aromatario, Mariarosaria; Cappelletti, Simone; Bottoni, Edoardo; Fiore, Paola Antonella; Ciallella, Costantino

    2016-01-01

    An interesting case of homicide involving the use of a heavy glass ashtray is described. The victim, a 81-years-old woman, has survived for few days and died in hospital. The external examination of the victim showed extensive blunt and sharp facial injuries and defense injuries on both the hands. The autopsy examination showed numerous tears on the face, as well as multiple fractures of the facial bones. Computer tomography scan, with 3D reconstruction, performed in hospital before death, was used to identify the weapon used for the crime. In recent years new diagnostics tools such as computer tomography has been widely used, especially in cases involving sharp and blunt forces. Computer tomography has proven to be very valuable in analyzing fractures of the cranial teca for forensic purpose, in particular antemortem computer tomography with 3D reconstruction is becoming an important tool in the process of weapon identification, thanks to the possibility to identify and make comparison between the shape of the object used to commit the crime, the injury and the objects found during the investigations. No previous reports on the use of this technique, for the weapon identification process, in cases of isolated facial fractures were described. We report a case in which, despite the correct use of this technique, it was not possible for the forensic pathologist to identify the weapon used to commit the crime. Authors wants to highlight the limits encountered in the use of computer tomography with 3D reconstruction as a tool for weapon identification when facial fractures occurred. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Peaceful uses of nuclear weapon plutonium

    International Nuclear Information System (INIS)

    Burtak, F.

    1996-01-01

    In 1993, the U.S.A. and the CIS signed Start 2 (the Strategic Arms Reduction Treaty) in which they committed themselves the reduce their nuclear weapon arsenals to a fraction of that of 1991. For forty-five years the antagonism between the superpowers had been a dominating factor in world history, determining large areas of social life. When Start 2 will have been completed in 2003, some 200 t of weapon grade plutonium and some 2000 t of highly enriched uranium (Heu) will arise from dismantling nuclear weapons. In the absence of the ideological ballast of the debate about Communism versus Capitalism of the past few decades there is a chance of the grave worldwide problem of safe disposal and utilization of this former nuclear weapon material being solved. Under the heading of 'swords turned into plowshares', plutonium and uranium could be used for peaceful electricity generation. (orig.) [de

  11. Weapons dismantlement issues in independent Ukraine

    International Nuclear Information System (INIS)

    Zack, N.R.

    1995-01-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993 in Kiev, Ukraine, titled, ''Toward a Nuclear-Free Future--Barriers and Problems.'' It brought together Ukrainians, Belarusians and Americans to discuss the legal, political, economic, technical, and safeguards and security dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, the Ukrainian Parliament's nonapproval of START 1, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues. This paper will highlight and detail the issues, concerns and possible impacts of the Ukraine's dismantlement of its nuclear weapons

  12. Verifying Stability of Dynamic Soft-Computing Systems

    Science.gov (United States)

    Wen, Wu; Napolitano, Marcello; Callahan, John

    1997-01-01

    Soft computing is a general term for algorithms that learn from human knowledge and mimic human skills. Example of such algorithms are fuzzy inference systems and neural networks. Many applications, especially in control engineering, have demonstrated their appropriateness in building intelligent systems that are flexible and robust. Although recent research have shown that certain class of neuro-fuzzy controllers can be proven bounded and stable, they are implementation dependent and difficult to apply to the design and validation process. Many practitioners adopt the trial and error approach for system validation or resort to exhaustive testing using prototypes. In this paper, we describe our on-going research towards establishing necessary theoretic foundation as well as building practical tools for the verification and validation of soft-computing systems. A unified model for general neuro-fuzzy system is adopted. Classic non-linear system control theory and recent results of its applications to neuro-fuzzy systems are incorporated and applied to the unified model. It is hoped that general tools can be developed to help the designer to visualize and manipulate the regions of stability and boundedness, much the same way Bode plots and Root locus plots have helped conventional control design and validation.

  13. Beyond the nuclear weapon

    International Nuclear Information System (INIS)

    Quinlan, M.

    2001-01-01

    Since the end of the cold war, many people called for the elimination of nuclear weapons. That this decision seems difficult to realize because of the world political environment. Meanwhile the reduction of the nuclear weapons costs and risks believes more than ever a challenge of the international relations and more particularly in the proliferation domain. In this perspective the proliferation fight strategies need to be studied with a special interest in the domain of the alternatives and the possibilities of synergy. (A.L.B.)

  14. Pakistan's Nuclear Weapons: Proliferation and Security Issues

    National Research Council Canada - National Science Library

    Kerr, Paul; Nikitin, Mary B

    2007-01-01

    Pakistan's nuclear arsenal consists of approximately 60 nuclear warheads. Pakistan continues fissile material production for weapons, and is adding to its weapons production facilities and delivery vehicles...

  15. Computed aided system for separation and classification of the abnormal erythrocytes in human blood

    Science.gov (United States)

    Wąsowicz, Michał; Grochowski, Michał; Kulka, Marek; Mikołajczyk, Agnieszka; Ficek, Mateusz; Karpieńko, Katarzyna; Cićkiewicz, Maciej

    2017-12-01

    The human peripheral blood consists of cells (red cells, white cells, and platelets) suspended in plasma. In the following research the team assessed an influence of nanodiamond particles on blood elements over various periods of time. The material used in the study consisted of samples taken from ten healthy humans of various age, different blood types and both sexes. The markings were leaded by adding to the blood unmodified diamonds and oxidation modified. The blood was put under an impact of two diamond concentrations: 20μl and 100μl. The amount of abnormal cells increased with time. The percentage of echinocytes as a result of interaction with nanodiamonds in various time intervals for individual specimens was scarce. The impact of the two diamond types had no clinical importance on red blood cells. It is supposed that as a result of longlasting exposure a dehydratation of red cells takes place, because of the function of the cells. The analysis of an influence of nanodiamond particles on blood elements was supported by computer system designed for automatic counting and classification of the Red Blood Cells (RBC). The system utilizes advanced image processing methods for RBCs separation and counting and Eigenfaces method coupled with the neural networks for RBCs classification into normal and abnormal cells purposes.

  16. Autonomous bio-chemical decontaminator (ABCD) against weapons of mass destruction

    Science.gov (United States)

    Hyacinthe, Berg P.

    2006-05-01

    The proliferation of weapons of mass destruction (WMD) and the use of such elements pose an eminent asymmetric threat with disastrous consequences to the national security of any nation. In particular, the use of biochemical warfare agents against civilians and unprotected troops in international conflicts or by terrorists against civilians is considered as a very peculiar threat. Accordingly, taking a quarantine-before-inhalation approach to biochemical warfare, the author introduces the notion of autonomous biochemical decontamination against WMD. In the unfortunate event of a biochemical attack, the apparatus proposed herein is intended to automatically detect, identify, and more importantly neutralize a biochemical threat. Along with warnings concerning a cyber-WMD nexus, various sections cover discussions on human senses and computer sensors, corroborating evidence related to detection and neutralization of chemical toxins, and cyber-assisted olfaction in stand alone, peer-to-peer, and network settings. In essence, the apparatus can be used in aviation and mass transit security to initiate mass decontamination by dispersing a decontaminant aerosol or to protect the public water supply against a potential bioterrorist attack. Future effort may involve a system-on-chip (SoC) embodiment of this apparatus that allows a safer environment for the emerging phenomenon of cyber-assisted olfaction and morph cell phones into ubiquitous sensors/decontaminators. Although this paper covers mechanisms and protocols to avail a neutralizing substance, further research will need to explore the substance's various pharmacological profiles and potential side effects.

  17. Manual for national implementation of the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B. [DePaul Univ., Chicago, IL (United States); Tanzman, E.A.; Gualtieri, D.S.; Grimes, S.W. [Argonne National Lab., IL (United States)

    1993-12-01

    The Convention on the Prohibition on the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction, opened for signature, January 13, 1993, in Paris, France (CWC), is an unprecedented multilateral effort to eradicate an entire category of weapons of mass destruction and assure their continued absence through international verification. The CWC has been signed by over 150 nations, and is expected to enter into force in 1995. With its far-reaching system to verify compliance, the CWC presages a new foundation for international security based neither on fear nor on trust, but on the rule of law. A central feature of the CWC is that it requires each State Party to take implementing measures to make the Convention operative. The CWC goes beyond all prior arms control treaties in this regard. For this approach to succeed, and to inspire the eradication of other categories of mass destruction weaponry, coordination and planning are vital to harmonize CWC national implementation among States Parties. This Manual for National Implementation of the Chemical Weapons Convention is designed to assist States Parties, duly taking into account the distinctive aspects of their legal systems, in maximizing CWC enforcement consistent with their national legal obligations.

  18. Glove-Enabled Computer Operations (GECO): Design and Testing of an Extravehicular Activity Glove Adapted for Human-Computer Interface

    Science.gov (United States)

    Adams, Richard J.; Olowin, Aaron; Krepkovich, Eileen; Hannaford, Blake; Lindsay, Jack I. C.; Homer, Peter; Patrie, James T.; Sands, O. Scott

    2013-01-01

    The Glove-Enabled Computer Operations (GECO) system enables an extravehicular activity (EVA) glove to be dual-purposed as a human-computer interface device. This paper describes the design and human participant testing of a right-handed GECO glove in a pressurized glove box. As part of an investigation into the usability of the GECO system for EVA data entry, twenty participants were asked to complete activities including (1) a Simon Says Games in which they attempted to duplicate random sequences of targeted finger strikes and (2) a Text Entry activity in which they used the GECO glove to enter target phrases in two different virtual keyboard modes. In a within-subjects design, both activities were performed both with and without vibrotactile feedback. Participants mean accuracies in correctly generating finger strikes with the pressurized glove were surprisingly high, both with and without the benefit of tactile feedback. Five of the subjects achieved mean accuracies exceeding 99 in both conditions. In Text Entry, tactile feedback provided a statistically significant performance benefit, quantified by characters entered per minute, as well as reduction in error rate. Secondary analyses of responses to a NASA Task Loader Index (TLX) subjective workload assessments reveal a benefit for tactile feedback in GECO glove use for data entry. This first-ever investigation of employment of a pressurized EVA glove for human-computer interface opens up a wide range of future applications, including text chat communications, manipulation of procedureschecklists, cataloguingannotating images, scientific note taking, human-robot interaction, and control of suit andor other EVA systems.

  19. Computer simulation of human motion in sports biomechanics.

    Science.gov (United States)

    Vaughan, C L

    1984-01-01

    his or her model is merely a simplified representation of the real-world system and, as such, has certain limitations. In conclusion, it is evident that the path we have followed has been an interesting and varied one. The way ahead looks equally interesting and diverse, and we can certainly look forward with confidence to the exciting challenges and benefits that computer simulation of human motion will bring.

  20. On problems related to the deployment of depleted uranium weapons in the Balkans

    International Nuclear Information System (INIS)

    Mietelski, J. W.; Waligorski, M.P.R.; Zunic, Z.S.

    2002-01-01

    The likely long-term environmental and health effects of the deployment of weapons containing depleted uranium (DU) in the Balkans are discussed. To determine whether depleted uranium or spent reactor fuel was used in the weapons, knowledge is required of the 235 U to 238 U activity (or concentration) ratio in the measured samples. To this end, and to distinguish between uranium originating from natural and man-made sources, we discuss some of the methodology and metrology issues involved in performing alpha- and gamma- spectrometry of uranium in environmental and human samples. We present results of nuclear spectrometry performed on DU core deposits from the aluminium jacket of a PGU-14 bullet found in South Serbia. We draw attention to aspects involving ionising radiation, which are likely to be of importance when formulating a prognosis of the possible environmental and health impact of the deployment of DU weapons, indicating the importance of the inhalation pathway in children. (author)

  1. Impact of Defense Industry Mergers on The Cost of Military Weapons Systems

    National Research Council Canada - National Science Library

    Alfonso, Grisko R

    2007-01-01

    .... The Selected Acquisition Reports (SARs) provided the data for this research. The analysis of the data suggests that the defense industry's consolidation did not result in higher costs for DoD's military weapons in the post-merger period...

  2. Democracy, public opinion, and nuclear weapons

    International Nuclear Information System (INIS)

    Russett, B.

    1989-01-01

    To the degree that people's fears of nuclear war are deep and pervasive, they become subject to manipulation by cynical or politically utopian promises, whether those promises be to abolish nuclear weapons from the earth or to create a leakproof peace shield (SDI). But the basic yearning for protection could also be mobilized to support serious arms reduction and arms control agreements. Nuclear weapons provide the basis for a vivid form of symbolic politics, perhaps equivalent in foreign policy considerations to the Korean and Vietnam wars during their durations, and in similar ways (although not necessarily as severe) as unemployment does among domestic policy issues. This paper presents survey research directed specifically at the role of public opinion on nuclear imagery (difference between expectation of nuclear war versus any kind of weapon war; willingness to spend on nuclear weapons versus conventional ones or general defense spending) can help in understanding these phenomena

  3. Applicability of Computational Systems Biology in Toxicology

    DEFF Research Database (Denmark)

    Kongsbak, Kristine Grønning; Hadrup, Niels; Audouze, Karine Marie Laure

    2014-01-01

    be used to establish hypotheses on links between the chemical and human diseases. Such information can also be applied for designing more intelligent animal/cell experiments that can test the established hypotheses. Here, we describe how and why to apply an integrative systems biology method......Systems biology as a research field has emerged within the last few decades. Systems biology, often defined as the antithesis of the reductionist approach, integrates information about individual components of a biological system. In integrative systems biology, large data sets from various sources...... and databases are used to model and predict effects of chemicals on, for instance, human health. In toxicology, computational systems biology enables identification of important pathways and molecules from large data sets; tasks that can be extremely laborious when performed by a classical literature search...

  4. A nuclear-weapon-free world and true disarmament

    International Nuclear Information System (INIS)

    Salvini, G.

    1999-01-01

    This preliminary note about is important to consider when discussing hopes of achieving a nuclear-weapon-free world. Without a serious effort to establish intelligent, powerful bodies to control and judge the behavior of the nations on Earth, whatever they future weapons may be, the objective to reach a nuclear-weapon-free world may even succeed, but it is not enough to stop wars and death. Even more than that: if taken alone, as the 'Great Way', it could prove negative, for it could slow down the general effort to achieve peace on out planet. A nuclear-weapon-free world is of course a very good idea but two points must be discussed: how to achieve the nuclear-weapon-free world; and what will happen afterwards. Some considerations on the second point are made

  5. A low cost maritime control aircraft-ship-weapons system. [antiship missile defense

    Science.gov (United States)

    Fluk, H.

    1981-01-01

    It is pointed out that the long-range antiship standoff missile is emerging as the foremost threat on the seas. Delivered by high speed bombers, surface ships, and submarines, a missile attack can be mounted against selected targets from any point on the compass. An investigation is conducted regarding the configuration of a system which could most efficiently identify and destroy standoff threats before they launch their weapons. It is found that by using ships for carrying and launching missiles, and employing aircraft with a powerful radar only for search and missile directing operations, aircraft cost and weight can be greatly reduced. The employment of V/STOL aircraft in preference to other types of aircraft makes it possible to use ships of smaller size for carrying the aircraft. However, in order to obtain an all-weather operational capability for the system, ships are selected which are still big enough to display the required stability in heavy seas.

  6. Measuring Multimodal Synchrony for Human-Computer Interaction

    NARCIS (Netherlands)

    Reidsma, Dennis; Nijholt, Antinus; Tschacher, Wolfgang; Ramseyer, Fabian; Sourin, A.

    2010-01-01

    Nonverbal synchrony is an important and natural element in human-human interaction. It can also play various roles in human-computer interaction. In particular this is the case in the interaction between humans and the virtual humans that inhabit our cyberworlds. Virtual humans need to adapt their

  7. A mobile Nursing Information System based on human-computer interaction design for improving quality of nursing.

    Science.gov (United States)

    Su, Kuo-Wei; Liu, Cheng-Li

    2012-06-01

    A conventional Nursing Information System (NIS), which supports the role of nurse in some areas, is typically deployed as an immobile system. However, the traditional information system can't response to patients' conditions in real-time, causing delays on the availability of this information. With the advances of information technology, mobile devices are increasingly being used to extend the human mind's limited capacity to recall and process large numbers of relevant variables and to support information management, general administration, and clinical practice. Unfortunately, there have been few studies about the combination of a well-designed small-screen interface with a personal digital assistant (PDA) in clinical nursing. Some researchers found that user interface design is an important factor in determining the usability and potential use of a mobile system. Therefore, this study proposed a systematic approach to the development of a mobile nursing information system (MNIS) based on Mobile Human-Computer Interaction (M-HCI) for use in clinical nursing. The system combines principles of small-screen interface design with user-specified requirements. In addition, the iconic functions were designed with metaphor concept that will help users learn the system more quickly with less working-memory. An experiment involving learnability testing, thinking aloud and a questionnaire investigation was conducted for evaluating the effect of MNIS on PDA. The results show that the proposed MNIS is good on learning and higher satisfaction on symbol investigation, terminology and system information.

  8. Neutron weapons. War prevention by credible deterrence

    International Nuclear Information System (INIS)

    1981-11-01

    The neutron bomb has prompted fierce and controversial public discussions which are more emotional than based on facts. Unaware of the factual repercussions this weapon has, it has been described as the most inhumane weapon ever. By saying so, the public is wrongly informed and is made feel insecure. The following contributions made by competent authorities may be used for getting to the point, pointing out that the neutron bomb is primarily a defensive weapon. (orig.) [de

  9. Brief history of the nuclear weapon - Between proliferation and disarmament

    International Nuclear Information System (INIS)

    Chagnollaud, Jean-Paul

    2011-01-01

    During the hardest times of the Cold War, like in October 1962 with the Cuba crisis, the World lived in the fear of a nuclear confrontation between the USA and the USSR. If this time seems far away now, the risks of a nuclear conflict are probably greater today because no serious progress has bee done during the last ten years and because, from now on, nine, and maybe ten states possess nuclear weapons. In April 2009, US President Barack Obama, gave a talk in Prague (Czech Republic) in which he stressed again on the enormous risks that this situation was running on humanity and urged the world to get rid of nuclear weapons. The aim of this book is to present the main steps of this process, which started in the 1960's, and the arguments which justify its necessity. (J.S.)

  10. Nuclear weapon-free zone, non-proliferation treaty and South Asia

    International Nuclear Information System (INIS)

    Jayaramu, P.S.

    1980-01-01

    Emergence of and the motivations behind the concept of nuclear weapon free zone, the conceptual linkage between the nuclear weapon free zone and the Non-Proliferation Treaty and the problems involved in the implementation of nuclear weapon free zone proposals put forward from time to time are discussed. Pakistan's proposal for a nuclear weapon free zone in South Asia, motivations behind the proposal, and India's response to it are examined. It is pointed out that both the NPT and nuclear weapon free zone indirectly grant a certain amount of legitimacy to the use of nuclear weapons. (M.G.B.)

  11. A case for human systems neuroscience.

    Science.gov (United States)

    Gardner, J L

    2015-06-18

    Can the human brain itself serve as a model for a systems neuroscience approach to understanding the human brain? After all, how the brain is able to create the richness and complexity of human behavior is still largely mysterious. What better choice to study that complexity than to study it in humans? However, measurements of brain activity typically need to be made non-invasively which puts severe constraints on what can be learned about the internal workings of the brain. Our approach has been to use a combination of psychophysics in which we can use human behavioral flexibility to make quantitative measurements of behavior and link those through computational models to measurements of cortical activity through magnetic resonance imaging. In particular, we have tested various computational hypotheses about what neural mechanisms could account for behavioral enhancement with spatial attention (Pestilli et al., 2011). Resting both on quantitative measurements and considerations of what is known through animal models, we concluded that weighting of sensory signals by the magnitude of their response is a neural mechanism for efficient selection of sensory signals and consequent improvements in behavioral performance with attention. While animal models have many technical advantages over studying the brain in humans, we believe that human systems neuroscience should endeavor to validate, replicate and extend basic knowledge learned from animal model systems and thus form a bridge to understanding how the brain creates the complex and rich cognitive capacities of humans. Copyright © 2014 IBRO. Published by Elsevier Ltd. All rights reserved.

  12. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  13. The future of nuclear weapons in Europe workshop summary

    International Nuclear Information System (INIS)

    Larsen, J.A.; Garrity, P.J.

    1991-12-01

    A summary is presented of a workshop that addressed the future of nuclear weapons in Europe. The workshop topics included the evolving European security environment; the Soviet Union, Eastern Europe, and nuclear weapons; the United States, NATO, and nuclear weapons; and Western Europe and nuclear weapons. The workshop, held at Los Alamos July 26, 1991, was sponsored by the Center for National Security Studies of the Los Alamos National Laboratory

  14. Interactive computer-enhanced remote viewing system

    Energy Technology Data Exchange (ETDEWEB)

    Tourtellott, J.A.; Wagner, J.F. [Mechanical Technology Incorporated, Latham, NY (United States)

    1995-10-01

    Remediation activities such as decontamination and decommissioning (D&D) typically involve materials and activities hazardous to humans. Robots are an attractive way to conduct such remediation, but for efficiency they need a good three-dimensional (3-D) computer model of the task space where they are to function. This model can be created from engineering plans and architectural drawings and from empirical data gathered by various sensors at the site. The model is used to plan robotic tasks and verify that selected paths are clear of obstacles. This report describes the development of an Interactive Computer-Enhanced Remote Viewing System (ICERVS), a software system to provide a reliable geometric description of a robotic task space, and enable robotic remediation to be conducted more effectively and more economically.

  15. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  16. Plants and Human Affairs: Educational Enhancement Via a Computer.

    Science.gov (United States)

    Crovello, Theodore J.; Smith, W. Nelson

    To enhance both teaching and learning in an advanced undergraduate elective course on the interrelationships of plants and human affairs, the computer was used for information retrieval, multiple choice course review, and the running of three simulation models--plant related systems (e.g., the rise in world coffee prices after the 1975 freeze in…

  17. DoD Nuclear Weapons Personnel Reliability Assurance

    Science.gov (United States)

    2016-04-27

    systems, positive control material (PCM) and equipment, and special nuclear material (SNM) and subject to a nuclear weapons personnel reliability...assurance implementation guidance for consistency and compliance with this issuance. c. Conducts programmatic reviews, manages audits , and directs...personnel reliability assurance education and training materials . 2.4. ASSISTANT SECRETARY OF DEFENSE FOR HEALTH AFFAIRS (ASD(HA)). Under the authority

  18. Memory systems, computation, and the second law of thermodynamics

    International Nuclear Information System (INIS)

    Wolpert, D.H.

    1992-01-01

    A memory is a physical system for transferring information form one moment in time to another, where that information concerns something external to the system itself. This paper argues on information-theoretic and statistical mechanical grounds that useful memories must be of one of two types, exemplified by memory in abstract computer programs and by memory in photographs. Photograph-type memories work by exploring a collapse of state space flow to an attractor state. (This attractor state is the open-quotes initializedclose quotes state of the memory.) The central assumption of the theory of reversible computation tells us that in any such collapsing, regardless of whether the collapsing must increase in entropy of the system. In concert with the second law, this establishes the logical necessity of the empirical observation that photograph-type memories are temporally asymmetric (they can tell us about the past but not about the future). Under the assumption that human memory is a photograph-type memory, this result also explains why we humans can remember only our past and not our future. In contrast to photo-graph-type memories, computer-type memories do not require any initialization, and therefore are not directly affected by the second law. As a result, computer memories can be of the future as easily as of the past, even if the program running on the computer is logically irreversible. This is entirely in accord with the well-known temporal reversibility of the process of computation. This paper ends by arguing that the asymmetry of the psychological arrow of time is a direct consequence of the asymmetry of human memory. With the rest of this paper, this explains, explicitly and rigorously, why the psychological and thermodynamic arrows of time are correlated with one another. 24 refs

  19. Psychological markers underlying murder weapon profile: a quantitative study.

    Science.gov (United States)

    Kamaluddin, M R; Othman, A; Ismail, K H; Mat Saat, G A

    2017-12-01

    The horrific nature of murder using different types of weapons has been an important focal point of many criminological studies. Weapons that are used in murders seem to play dominant roles in murder investigations as they may provide information leading to arrest. The established factors for weapon usage include environmental context, demography and availability of weapons. However, there is insufficient research attention on the psychological functioning of murderers for particular weapon usage. In light of this, the current study seeks to narrow this gap of information by identifying the influences of psychological traits on weapon usage among a sample of male murderers. The present cross-sectional study was conducted among 71 male murderers incarcerated in 11 prisons within Peninsular Malaysia. The selection of the sample was based on predetermined selection criteria using a purposive sampling method. A guided self-administered questionnaire comprising sociodemography variables and four Malay validated psychometric instruments: Zuckerman-Kuhlman Personality Questionnaire-40-Cross-Culture, Self-control Scale, "How I Think" Questionnaire and Aggression Questionnaire; was used. Independent sample t-test was performed to establish the mean score differences of psychological traits between the murderers who used single and multiple weapons while Kruskal-Wallis tests were carried out to ascertain the differences between the specific types of weapons used among the murderers. Following this, one-way ANOVA was carried out to ascertain the psychological trait differences among the murderers according to the different sources of weapon. Results indicated specific psychological traits influenced the number(s), source(s) and type(s) of weapon used in committing murder. The findings have implications for the psychological profiling of unknown murderers within the Malaysian context.

  20. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  1. Developing Human-Computer Interface Models and Representation Techniques(Dialogue Management as an Integral Part of Software Engineering)

    OpenAIRE

    Hartson, H. Rex; Hix, Deborah; Kraly, Thomas M.

    1987-01-01

    The Dialogue Management Project at Virginia Tech is studying the poorly understood problem of human-computer dialogue development. This problem often leads to low usability in human-computer dialogues. The Dialogue Management Project approaches solutions to low usability in interfaces by addressing human-computer dialogue development as an integral and equal part of the total system development process. This project consists of two rather distinct, but dependent, parts. One is development of ...

  2. 15 CFR 742.18 - Chemical Weapons Convention (CWC or Convention).

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Chemical Weapons Convention (CWC or... REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.18 Chemical Weapons Convention (CWC or Convention). States... Use of Chemical Weapons and on Their Destruction, also known as the Chemical Weapons Convention (CWC...

  3. National Certification Methodology for the Nuclear Weapons Stockpile

    International Nuclear Information System (INIS)

    Goodwin, B T; Juzaitis, R J

    2006-01-01

    Lawrence Livermore and Los Alamos National Laboratories have developed a common framework and key elements of a national certification methodology called Quantification of Margins and Uncertainties (QMU). A spectrum from senior managers to weapons designers has been engaged in this activity at the two laboratories for on the order of a year to codify this methodology in an overarching and integrated paper. Following is the certification paper that has evolved. In the process of writing this paper, an important outcome has been the realization that a joint Livermore/Los Alamos workshop on QMU, focusing on clearly identifying and quantifying differences between approaches between the two labs plus developing an even stronger technical foundation on methodology, will be valuable. Later in FY03, such a joint laboratory workshop will be held. One of the outcomes of this workshop will be a new version of this certification paper. A comprehensive approach to certification must include specification of problem scope, development of system baseline models, formulation of standards of performance assessment, and effective procedures for peer review and documentation. This document concentrates on the assessment and peer review aspects of the problem. In addressing these points, a central role is played by a 'watch list' for weapons derived from credible failure modes and performance gate analyses. The watch list must reflect our best assessment of factors that are critical to weapons performance. High fidelity experiments and calculations as well as full exploitation of archival test data are essential to this process. Peer review, advisory groups and red teams play an important role in confirming the validity of the watch list. The framework for certification developed by the Laboratories has many basic features in common, but some significant differences in the detailed technical implementation of the overall methodology remain. Joint certification workshops held in June

  4. Human-computer interaction for alert warning and attention allocation systems of the multimodal watchstation

    Science.gov (United States)

    Obermayer, Richard W.; Nugent, William A.

    2000-11-01

    The SPAWAR Systems Center San Diego is currently developing an advanced Multi-Modal Watchstation (MMWS); design concepts and software from this effort are intended for transition to future United States Navy surface combatants. The MMWS features multiple flat panel displays and several modes of user interaction, including voice input and output, natural language recognition, 3D audio, stylus and gestural inputs. In 1999, an extensive literature review was conducted on basic and applied research concerned with alerting and warning systems. After summarizing that literature, a human computer interaction (HCI) designer's guide was prepared to support the design of an attention allocation subsystem (AAS) for the MMWS. The resultant HCI guidelines are being applied in the design of a fully interactive AAS prototype. An overview of key findings from the literature review, a proposed design methodology with illustrative examples, and an assessment of progress made in implementing the HCI designers guide are presented.

  5. Development of a novel active muzzle brake for an artillery weapon system / Dirk Johannes Downing

    OpenAIRE

    Downing, Dirk Johannes

    2002-01-01

    A conventional muzzle brake is a baffle device located at some distance in front of the muzzle exit of a gun. The purpose of a muzzle brake is to alleviate the force on the weapon platform by diverting a portion of the muzzle gas resulting in a forward impulse being exerted on the recoiling parts of the weapon. A very efficient muzzle brake unfortunately gives rise to an excessive overpressure in the crew environment due to the deflection of the emerging shock waves. The novel ...

  6. Human factors in computing systems: focus on patient-centered health communication at the ACM SIGCHI conference.

    Science.gov (United States)

    Wilcox, Lauren; Patel, Rupa; Chen, Yunan; Shachak, Aviv

    2013-12-01

    Health Information Technologies, such as electronic health records (EHR) and secure messaging, have already transformed interactions among patients and clinicians. In addition, technologies supporting asynchronous communication outside of clinical encounters, such as email, SMS, and patient portals, are being increasingly used for follow-up, education, and data reporting. Meanwhile, patients are increasingly adopting personal tools to track various aspects of health status and therapeutic progress, wishing to review these data with clinicians during consultations. These issues have drawn increasing interest from the human-computer interaction (HCI) community, with special focus on critical challenges in patient-centered interactions and design opportunities that can address these challenges. We saw this community presenting and interacting at the ACM SIGCHI 2013, Conference on Human Factors in Computing Systems, (also known as CHI), held April 27-May 2nd, 2013 at the Palais de Congrès de Paris in France. CHI 2013 featured many formal avenues to pursue patient-centered health communication: a well-attended workshop, tracks of original research, and a lively panel discussion. In this report, we highlight these events and the main themes we identified. We hope that it will help bring the health care communication and the HCI communities closer together. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Handbook of human computation

    CERN Document Server

    Michelucci, Pietro

    2013-01-01

    This volume addresses the emerging area of human computation, The chapters, written by leading international researchers, explore existing and future opportunities to combine the respective strengths of both humans and machines in order to create powerful problem-solving capabilities. The book bridges scientific communities, capturing and integrating the unique perspective and achievements of each. It coalesces contributions from industry and across related disciplines in order to motivate, define, and anticipate the future of this exciting new frontier in science and cultural evolution. Reade

  8. Human computer confluence applied in healthcare and rehabilitation.

    Science.gov (United States)

    Viaud-Delmon, Isabelle; Gaggioli, Andrea; Ferscha, Alois; Dunne, Stephen

    2012-01-01

    Human computer confluence (HCC) is an ambitious research program studying how the emerging symbiotic relation between humans and computing devices can enable radically new forms of sensing, perception, interaction, and understanding. It is an interdisciplinary field, bringing together researches from horizons as various as pervasive computing, bio-signals processing, neuroscience, electronics, robotics, virtual & augmented reality, and provides an amazing potential for applications in medicine and rehabilitation.

  9. Evidence Report: Risk of Inadequate Human-Computer Interaction

    Science.gov (United States)

    Holden, Kritina; Ezer, Neta; Vos, Gordon

    2013-01-01

    Human-computer interaction (HCI) encompasses all the methods by which humans and computer-based systems communicate, share information, and accomplish tasks. When HCI is poorly designed, crews have difficulty entering, navigating, accessing, and understanding information. HCI has rarely been studied in an operational spaceflight context, and detailed performance data that would support evaluation of HCI have not been collected; thus, we draw much of our evidence from post-spaceflight crew comments, and from other safety-critical domains like ground-based power plants, and aviation. Additionally, there is a concern that any potential or real issues to date may have been masked by the fact that crews have near constant access to ground controllers, who monitor for errors, correct mistakes, and provide additional information needed to complete tasks. We do not know what types of HCI issues might arise without this "safety net". Exploration missions will test this concern, as crews may be operating autonomously due to communication delays and blackouts. Crew survival will be heavily dependent on available electronic information for just-in-time training, procedure execution, and vehicle or system maintenance; hence, the criticality of the Risk of Inadequate HCI. Future work must focus on identifying the most important contributing risk factors, evaluating their contribution to the overall risk, and developing appropriate mitigations. The Risk of Inadequate HCI includes eight core contributing factors based on the Human Factors Analysis and Classification System (HFACS): (1) Requirements, policies, and design processes, (2) Information resources and support, (3) Allocation of attention, (4) Cognitive overload, (5) Environmentally induced perceptual changes, (6) Misperception and misinterpretation of displayed information, (7) Spatial disorientation, and (8) Displays and controls.

  10. Neutronics benchmark of a MOX assembly with near-weapons-grade plutonium

    International Nuclear Information System (INIS)

    Difilippo, F.C.; Fisher, S.E.

    1998-01-01

    One of the proposed ways to dispose of surplus weapons-grade plutonium (Pu) is to irradiate the high-fissile material in light-water reactors in order to reduce the Pu enrichment to the level of spent fuels from commercial reactors. Considerable experience has been accumulated about the behavior of mixed-oxide (MOX) uranium and plutonium fuels for plutonium recycling in commercial reactors, but the experience is related to Pu enrichments typical of spent fuels quite below the values of weapons-grade plutonium. Important decisions related to the kind of reactors to be used for the disposition of the plutonium are going to be based on calculations, so the validation of computational algorithms related to all aspects of the fuel cycle (power distributions, isotopics as function of the burnup, etc.), for weapons-grade isotopics is very important. Analysis of public domain data reveals that the cycle-2 irradiation in the Quad cities boiling-water reactor (BWR) is the most recent US destructive examination. This effort involved the irradiation of five MOX assemblies using 80 and 90% fissile plutonium. These benchmark data were gathered by General Electric under the sponsorship of the Electric Power Research Institute. It is emphasized, however, that global parameters are not the focus of this benchmark, since the five bundles containing MOX fuels did not significantly affect the overall core performance. However, since the primary objective of this work is to compare against measured post-irradiation assembly data, the term benchmark is applied here. One important reason for performing the benchmark on Quad Cities irradiation is that the fissile blends (up to 90%) are higher than reactor-grade and, quite close to, weapons-grade isotopics

  11. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  12. Metasynthetic computing and engineering of complex systems

    CERN Document Server

    Cao, Longbing

    2015-01-01

    Provides a comprehensive overview and introduction to the concepts, methodologies, analysis, design and applications of metasynthetic computing and engineering. The author: Presents an overview of complex systems, especially open complex giant systems such as the Internet, complex behavioural and social problems, and actionable knowledge discovery and delivery in the big data era. Discusses ubiquitous intelligence in complex systems, including human intelligence, domain intelligence, social intelligence, network intelligence, data intelligence and machine intelligence, and their synergy thro

  13. An Interdisciplinary Bibliography for Computers and the Humanities Courses.

    Science.gov (United States)

    Ehrlich, Heyward

    1991-01-01

    Presents an annotated bibliography of works related to the subject of computers and the humanities. Groups items into textbooks and overviews; introductions; human and computer languages; literary and linguistic analysis; artificial intelligence and robotics; social issue debates; computers' image in fiction; anthologies; writing and the…

  14. Nuclear weapons in Europe: Why zero is better

    International Nuclear Information System (INIS)

    Daalder, I.H.

    1993-01-01

    Given the fundamental changes in the political context and NATO's perception of nuclear weapons, what role remains for US nuclear weapons in preserving security in Europe? Are US nuclear deployments on the continent still necessary? Is there a requirement for extended deterrence and, if so, does its credibility depend on the continued basing of US nuclear weapons in Europe? And what is the role of arms control in effecting any desirable restructuring in nuclear force postures? In addressing these questions, it becomes clear that US nuclear weapons can now be removed from Europe - they no longer serve the political and military functions they once did

  15. Strategies for denaturing the weapons-grade plutonium stockpile

    International Nuclear Information System (INIS)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons

  16. Joint Non-Lethal Weapons Program Science and Technology Strategic Plan

    Science.gov (United States)

    2016-03-31

    Human Effects Modeling  Representation of a human effects model for characterizing non‐lethal effects    Human Electro‐ Muscular  Incapacitation (HEMI...investment objectives in human effects research, conducted energy  weapons (human electro‐ muscular  incapacitation), and sound and light that will advance...with populations of ten million or more) in the  world. A number that is expected to  grow  to nearly 40 during the next ten years3, with many of  them

  17. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  18. A strategy for weapons-grade plutonium disposition

    International Nuclear Information System (INIS)

    Sylvester, K.W.B.

    1994-09-01

    A political as well as technical analysis was performed to determine the feasibility of glassification (vitrification) for weapons grade plutonium (WGPu) disposition. The political analysis provided the criteria necessary to compare alternative storage forms. The technical areas of weapon useability and environmental safety were then computationally and experimentally explored and a vitrification implementation strategy postulated. The Monte Carlo Neutron Photon (MCNP) computer code was used to model the effect of blending WGPu with reactor grade Pu (RGPu). A mixture of 30% RGPu and 70% WGPu more than doubled the surface flux from a bare sphere of the mixture which assumedly correlates to a significantly increased predetonation probability. Rare earth diluents were also examined (using MCNP) for their ability to increase the compressed critical mass of the WGPu mixture. The rare earths (notably Eu) were effective in this regard. As Pu-239 has a 24,100 year half life, reactivity control in the long term is an environmental safety issue. Rare earths were investigated as criticality controllers due to their neutron absorption capabilities and insolubility in aqueous environments. Thorium (a Pu surrogate) and the rare earths Eu, Gd, and Sm were added to two standard frits (ARM-1 and SRL-165) and formed into glass. Aqueous leach tests were performed (using MCC-1P guidelines) to measure rare earth leaching and determine the added elements' effects on glass durability. Europium was much more leach resistant than boron in the glasses tested. The elements had no negative effect on the environmental durability of the glasses tested at 90 C and minimal effect at room temperature. No fission product releases were detected in the ARM-1 compositions (which contained numerous simulated fission products)

  19. A strategy for weapons-grade plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Sylvester, K.W.B. [Iowa State Univ., Ames, IA (United States)

    1994-09-01

    A political as well as technical analysis was performed to determine the feasibility of glassification (vitrification) for weapons grade plutonium (WGPu) disposition. The political analysis provided the criteria necessary to compare alternative storage forms. The technical areas of weapon useability and environmental safety were then computationally and experimentally explored and a vitrification implementation strategy postulated. The Monte Carlo Neutron Photon (MCNP) computer code was used to model the effect of blending WGPu with reactor grade Pu (RGPu). A mixture of 30% RGPu and 70% WGPu more than doubled the surface flux from a bare sphere of the mixture which assumedly correlates to a significantly increased predetonation probability. Rare earth diluents were also examined (using MCNP) for their ability to increase the compressed critical mass of the WGPu mixture. The rare earths (notably Eu) were effective in this regard. As Pu-239 has a 24,100 year half life, reactivity control in the long term is an environmental safety issue. Rare earths were investigated as criticality controllers due to their neutron absorption capabilities and insolubility in aqueous environments. Thorium (a Pu surrogate) and the rare earths Eu, Gd, and Sm were added to two standard frits (ARM-1 and SRL-165) and formed into glass. Aqueous leach tests were performed (using MCC-1P guidelines) to measure rare earth leaching and determine the added elements` effects on glass durability. Europium was much more leach resistant than boron in the glasses tested. The elements had no negative effect on the environmental durability of the glasses tested at 90 C and minimal effect at room temperature. No fission product releases were detected in the ARM-1 compositions (which contained numerous simulated fission products).

  20. Nuclear power and atomic weapons. Chapter 7

    International Nuclear Information System (INIS)

    1978-01-01

    Following a brief historical introduction the concept of proliferation, vertical horizontal and subnational, is presented, and its relationship to nuclear power discussed. The risk of nuclear weapon proliferation, based on political decision, motivation and costs, is related to access to enriched uranium, plutonium and uranium 233. The possibilities for diversion and theft from nuclear facilities are discussed. International measures to prevent proliferation, the Non-Proliferation Treaty (NPT)and the IAEA safeguards system, are described and discussed. Measures which may be enacted against countries which break the NPT are discussed. Restrictions on international nuclear trude, both multilateral and unilateral, are also discussed, especially those at present, or shortly to be, enforced by USA, Canada and Australia. The International Nuclear Feel Cycle Evaluation (INFCE) is briefly presented. The physical protection of nuclear materials is also discussed. Finally the basc principles of nuclear weapons are briefly presented. (JIW)

  1. Nuclear power and atomic weapons. Chapter 7

    International Nuclear Information System (INIS)

    1978-01-01

    Following a brief historical introduction the concept of proliferation, vertical and horizontal and subnational, is presented, and its relationship to nuclear power discussed. The risk of nuclear weapon proliferation, based on political decision motivation and costs, is related to access to enriched uranium, plutonium and uranium 233. The possibilities for diversion and theft from nuclear facilities are discussed. International measures to prevent proliferation, the Non-Proliferation Treaty (NPT) and the IAEA safeguards system, are described and discussed. Measures which may be enacted against countries which break the NPT are discussed. Restrictions on international nuclear trade, both multilateral and unilateral, are also discussed, especially those at present, or shortly to be, enforced by USA, Canada and Australia. The International Nuclear Fuel Cycle Evaluation (INFCE) is briefly presented. The physical protection of nuclear materials is also discussed. Finally the basic principles of nuclear weapons are briefly presented. (JIW)

  2. US and Russia face urgent decisions on weapons plutonium

    International Nuclear Information System (INIS)

    Hileman, B.

    1994-01-01

    Surplus plutonium poses a ''clear and present danger to national and international security,'' warns a National Academy of Sciences (NAS) study released in January, titled ''The Management and Disposition of Excess Weapons Plutonium.'' Over the past few years, many different methods of disposing of plutonium have been proposed. They range from shooting it into the Sun with missiles, to deep-seabed disposal, to fissioning it within a new generation of nuclear reactors. The NAS report rejects most of the methods suggested so far, but does recommend pursuing two of the options. One is to incorporate the plutonium in mixed-oxide fuel, a mixture of plutonium and uranium oxides, and use it to fuel commercial nuclear reactors. The other is to mix the plutonium with high-level waste and molten glass and mold the resulting material into large glass logs for eventual geologic disposal. Both are discussed here. The panel that wrote the NAS study is a standing committee called the Committee on International Security ampersand Arms Control. It suggests steps that should be taken now to guard supplies of plutonium removed from weapons. One step is bilateral US-Russian monitoring of warhead dismantlement. Others include setting up secure interim storage for the fissile materials and establishing an international monitoring system to verify the stockpiles and ensure that materials are not withdrawn for use in new weapons. The panel also urges Russia to stop producing fissile weapons materials and both countries to commit a very large fraction of their plutonium and highly enriched uranium from dismantled weapons to nonaggressive uses. The US and Russia have already made initial moves to accomplish these goals but have not fully implemented any of them

  3. Is a nuclear weapon-free world desirable?

    International Nuclear Information System (INIS)

    Tertrais, Bruno

    2009-01-01

    In this article, the author shows that a nuclear weapon-free world would probably be more dangerous than today's world because benefits of the existence of nuclear weapons are probably more important that the risks related to their existence. He outlines that nuclear deterrence has been very efficient for these last 65 years. He states that the disappearance of nuclear weapons could be envisaged only after a large transformation of safety conditions, but that such transformations are actually not at all under way. It would indeed require peaceful and democratic world governance

  4. Interactive computer-enhanced remote viewing system

    International Nuclear Information System (INIS)

    Tourtellott, J.A.; Wagner, J.F.

    1995-01-01

    Remediation activities such as decontamination and decommissioning (D ampersand D) typically involve materials and activities hazardous to humans. Robots are an attractive way to conduct such remediation, but for efficiency they need a good three-dimensional (3-D) computer model of the task space where they are to function. This model can be created from engineering plans and architectural drawings and from empirical data gathered by various sensors at the site. The model is used to plan robotic tasks and verify that selected paths are clear of obstacles. This report describes the development of an Interactive Computer-Enhanced Remote Viewing System (ICERVS), a software system to provide a reliable geometric description of a robotic task space, and enable robotic remediation to be conducted more effectively and more economically

  5. 76 FR 71980 - SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's...

    Science.gov (United States)

    2011-11-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA-2010-P-0176] SEDASYS Computer-Assisted Personalized Sedation System; Ethicon Endo-Surgery, Incorporated's Petition for... SEDASYS computer-assisted personalized sedation system (SEDASYS) submitted by Ethicon Endo-Surgery Inc...

  6. The Next Wave: Humans, Computers, and Redefining Reality

    Science.gov (United States)

    Little, William

    2018-01-01

    The Augmented/Virtual Reality (AVR) Lab at KSC is dedicated to " exploration into the growing computer fields of Extended Reality and the Natural User Interface (it is) a proving ground for new technologies that can be integrated into future NASA projects and programs." The topics of Human Computer Interface, Human Computer Interaction, Augmented Reality, Virtual Reality, and Mixed Reality are defined; examples of work being done in these fields in the AVR Lab are given. Current new and future work in Computer Vision, Speech Recognition, and Artificial Intelligence are also outlined.

  7. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    ... stands within the context of a ground based air defence system (GBADS) at the turn of the twenty first century. However, much of the contents of the paper maye generalized to military environments other than a GBADS one. Keywords: Threat evaluation, weapon assignment, decision support. ORiON Vol. 23 (2) 2007: pp.

  8. CHI '13 Extended Abstracts on Human Factors in Computing Systems

    DEFF Research Database (Denmark)

    also deeply appreciate the huge amount of time donated to this process by the 211-member program committee, who paid their own way to attend the face-to-face program committee meeting, an event larger than the average ACM conference. We are proud of the work of the CHI 2013 program committee and hope...... a tremendous amount of work from all areas of the human-computer interaction community. As co-chairs of the process, we are amazed at the ability of the community to organize itself to accomplish this task. We would like to thank the 2680 individual reviewers for their careful consideration of these papers. We...

  9. Nuclear weapons decision-making; an application of organization theory to the mini-nuke case

    International Nuclear Information System (INIS)

    Kangas, J.L.

    1985-01-01

    This dissertation addresses the problem of constructing and developing normative theory responsive to the need for improving the quality of decision-making in the nuclear weapons policy-making. Against the background of a critical evaluation of various paradigms in the literature (systems analysis and opposed-systems designed, the bureaucratic politics model, and the cybernetic theory of decision) an attempt is made to design an alternative analytic framework based on the writings of numerous organization theorists such as Herbert Simon and Kenneth Arrow. The framework is applied to the case of mini-nukes, i.e., proposals in the mid-1970s to develop and deploy tens of thousands of very low-yield (sub-kiloton), miniaturized fission weapons in NATO. Heuristic case study identifies the type of study undertaken in the dissertation in contrast to the more familiar paradigmatic studies identified, for example, with the Harvard Weapons Project. Application of the analytic framework developed in the dissertation of the mini-nuke case resulted in an empirical understanding of why decision making concerning tactical nuclear weapons has been such a complex task and why force modernization issues in particular have been so controversial and lacking in policy resolution

  10. Human computing and machine understanding of human behavior: A survey

    NARCIS (Netherlands)

    Pentland, Alex; Huang, Thomas S.; Huang, Th.S.; Nijholt, Antinus; Pantic, Maja; Pentland, A.

    2007-01-01

    A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the foreground. If this prediction is to come true, then next generation computing should be about anticipatory user interfaces

  11. Islamic State and Chemical Weapons

    Directory of Open Access Journals (Sweden)

    Lukáš Rafay

    2016-09-01

    Full Text Available The article deals with topic of Islamic State and chemical weapons. The issue is analysed in three dimensions: origin of used chemical weapons and possibility of independent production; known chemical attacks and tactical regularities in their execution; and traits of future chemical terrorist attacks. By providing a thorough examination of the problem, the article aims at predicting the future development of the group’s chemical program as well as describing any prospective chemical terrorist attacks in Europe

  12. UFOs and nukes. Extraordinary encounters at nuclear weapons sites

    International Nuclear Information System (INIS)

    Hastings, Robert L.

    2015-01-01

    Everyone knows about the reported recovery of a crashed alien spaceship near Roswell, New Mexico in July 1947. However, most people are unaware that, at the time of the incident, Roswell Army Airfield was home to the world's only atomic bomber squadron, the 509th Bomb Group. Was this merely a coincidence? During the Cold War, the United States and the Soviet Union built thousands of the far more destructive hydrogen bombs, some of them a thousand times as destructive as the first atomic bombs dropped on Japan. If the nuclear standoff between the superpowers had erupted into World War III, human civilization - and perhaps the very survival of our species - would have been at risk. Did this ominous state of affairs come to the attention of outside observers? Was there a connection between the atomic bomber squadron based at Roswell and the reported crash of a UFO nearby? Did those who pilot the UFOs monitor the superpowers' nuclear arms race during the dangerous Cold War era? Do they scrutinize American and Russian weapons sites even now? UFOs and Nukes provides the startling and sometimes shocking answers to these questions. Veteran researcher Robert Hastings has investigated nuclear weapons-related UFO incidents for more than three decades and has interviewed more than 120 ex-US Air Force personnel, from former Airmen to retired Colonels, who witnessed extraordinary UFO encounters at nuclear weapons sites. Their amazing stories are presented here.

  13. Nuclear weapons in Europe

    International Nuclear Information System (INIS)

    Pierre, A.J.

    1984-01-01

    In this introduction to ''Nuclear Weapons in Europe'', the author summarized the views of two Americans and two Europeans, whose articles make up the volume. The introduction explains the different assumptions of the four authors before discussing their views on the military and political rationales for a nuclear force in the North Atlantic Treaty Organization (NATO) and the debate over battlefield nuclear weapons, conventional defense, and arms control proposals and talks. The four contributors whose views are analyzed are William G. Hyland, Lawrence D. Freeman, Paul C. Warnke, and Karstan D. Voight. The introduction notes that the agreements and differences do not fall strictly on American versus European dividing lines

  14. The medical consequences of nuclear weapons

    International Nuclear Information System (INIS)

    Humphrey, J.; Hartog, M.; Middleton, H.

    1982-01-01

    A pamphlet has been produced by the Medical Campaign Against Nuclear Weapons (MCANW) and by the Medical Association for the Prevention of War (MAPW) to bring the catastrophic effects that the use of nuclear weapons would entail to the attention of the general public, politicians and members of the medical profession. It describes the medical consequences of the effects of blast, heat and ionizing radiation from nuclear weapons, including details from the Hiroshima and Nagasaki atomic bombings. The medical consequences of a nuclear attack including consideration of the casualties, care of the injured, psychological effects and the outcome are also discussed. It is concluded that if for none other than purely medical reasons, nuclear warfare must never be allowed to happen. (UK)

  15. Approaching Engagement towards Human-Engaged Computing

    DEFF Research Database (Denmark)

    Niksirat, Kavous Salehzadeh; Sarcar, Sayan; Sun, Huatong

    2018-01-01

    Debates regarding the nature and role of HCI research and practice have intensified in recent years, given the ever increasingly intertwined relations between humans and technologies. The framework of Human-Engaged Computing (HEC) was proposed and developed over a series of scholarly workshops to...

  16. Selection and implementation of a laboratory computer system.

    Science.gov (United States)

    Moritz, V A; McMaster, R; Dillon, T; Mayall, B

    1995-07-01

    The process of selection of a pathology computer system has become increasingly complex as there are an increasing number of facilities that must be provided and stringent performance requirements under heavy computing loads from both human users and machine inputs. Furthermore, the continuing advances in software and hardware technology provide more options and innovative new ways of tackling problems. These factors taken together pose a difficult and complex set of decisions and choices for the system analyst and designer. The selection process followed by the Microbiology Department at Heidelberg Repatriation Hospital included examination of existing systems, development of a functional specification followed by a formal tender process. The successful tenderer was then selected using predefined evaluation criteria. The successful tenderer was a software development company that developed and supplied a system based on a distributed network using a SUN computer as the main processor. The software was written using Informix running on the UNIX operating system. This represents one of the first microbiology systems developed using a commercial relational database and fourth generation language. The advantages of this approach are discussed.

  17. Reliable computer systems.

    Science.gov (United States)

    Wear, L L; Pinkert, J R

    1993-11-01

    In this article, we looked at some decisions that apply to the design of reliable computer systems. We began with a discussion of several terms such as testability, then described some systems that call for highly reliable hardware and software. The article concluded with a discussion of methods that can be used to achieve higher reliability in computer systems. Reliability and fault tolerance in computers probably will continue to grow in importance. As more and more systems are computerized, people will want assurances about the reliability of these systems, and their ability to work properly even when sub-systems fail.

  18. LSI development for microcomputer application to weapon control

    International Nuclear Information System (INIS)

    Huen, T.

    1975-01-01

    The concept of the secure PAL (permissive-action link) system has been proposed for the control of nuclear weapons. Essential to the successful application of this system is the design of a miniature, all-LSI (large-scale-integration), secure PAL coded switch (SPCS). Two prototypes have been constructed to demonstrate the feasibility of a coded switch that occupies a volume of less than 0.5 cm 3 . Engineering development work on this system since 1972 is discussed, as is current activity. (auth)

  19. Space weapon technology and policy

    Science.gov (United States)

    Hitchens, Theresa

    2017-11-01

    The military use of space, including in support of nuclear weapons infrastructure, has greatly increased over the past 30 years. In the current era, rising geopolitical tensions between the United States and Russia and China have led to assumptions in all three major space powers that warfighting in space now is inevitable, and possible because of rapid technological advancements. New capabilities for disrupting and destroying satellites include radio-frequency jamming, the use of lasers, maneuverable space objects and more capable direct-ascent anti-satellite weapons. This situation, however, threatens international security and stability among nuclear powers. There is a continuing and necessary role for diplomacy, especially the establishment of normative rules of behavior, to reduce risks of misperceptions and crisis escalation, including up to the use of nuclear weapons. U.S. policy and strategy should seek a balance between traditional military approaches to protecting its space assets and diplomatic tools to create a more secure space environment.

  20. The nuclear weapon; L'arme nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2008-07-01

    The author presents the technology, the concept of deterrence, the today means and the international control, concerning the nuclear weapon. The conclusion is pessimistic. The author sees only two issues: the substitution of a new weapon more powerful, or its use. (A.L.B.)

  1. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    International Nuclear Information System (INIS)

    Luke, S.J.

    2011-01-01

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  2. Exploring the Possible Use of Information Barriers for future Biological Weapons Verification Regimes

    Energy Technology Data Exchange (ETDEWEB)

    Luke, S J

    2011-12-20

    This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of the US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the

  3. Verifying the transition from low levels of nuclear weapons to a nuclear weapon-free world. VERTIC research report no. 2

    International Nuclear Information System (INIS)

    Milne, T.; Wilson, H.

    1999-01-01

    The process of verifying the complete elimination of nuclear warheads in national stockpiles can be divided, conceptually, into four stages: first, comprehensive declarations of warhead and material inventories, as a base-line from which verified disarmament can proceed; second, the transfer of all nuclear weapons and weapons-grade fissile material into bonded store; third, demilitarisation measures, such as to render warheads unusable without disassembly and refabrication; fourth, dismantlement of warheads and disposition of fissile material. Many of the technologies and technologies and techniques needed for verifying the elimination of nuclear warheads have been worked out at a general level, largely in US studies. While it is essential that these techniques are refined and improved, what is most important now, if disarmament is to proceed expeditiously, is for each of the nuclear weapon states (NWS) themselves to study the central verification problems and requirements in order to identify particular techniques and approaches that meet their needs. As yet there is no system of integrated data exchange and verification that any of the NWS is willing to endorse. Each of the NWS should give detailed consideration to the logistics of dismantling the warheads in their respective stockpiles, including, for example, the practicalities of accommodating international verification at their potential dismantlement facilities. Each of the NWS might usefully review exactly which details of warhead design and construction have to remain secret in the course of the disarmament process, in the first place from one another, and second from the IAEA or any other international body that might be involved in international disarmament arrangements. Introducing transparency and verification into national nuclear weapons programmes might have a significant financial cost. Research and ingenuity might reduce this cost, however, and early investments in these fields, with sharing of

  4. Find and neutralize clandestine nuclear weapons

    International Nuclear Information System (INIS)

    Canavan, G.H.

    1997-09-01

    The objective of finding nuclear material at entry portals is to provide a secure perimeter as large as a weapon damage radius so that operations could be conducted within it relatively unencumbered. The objective of wide area search for nuclear material to provide a safe zone of similar dimensions in an area in which it is not possible to maintain a secure perimeter, to provide assurance for civilians living at an area at risk, or to provide rapid, wide area search of regions that could conceal nuclear threats to forces in the field. This rapid, wide-area, and confident detection of nuclear materials is the essential first step in developing the ability to negate terrorist nuclear assemblies or weapons. The ability to detect and negate nuclear materials are necessary to prevent the forced, massive evacuation of urban populations or the disruption of military operations in response to terrorist threats. This paper describes the limitations to current sensors used for nuclear weapon detection and discusses a novel approach to nuclear weapon detection using a combination of directional information (imaging) and gamma ray energy (color) to produce a gamma ray color camera

  5. Nuclear weapons proliferation and the new world order

    International Nuclear Information System (INIS)

    Krause, J.

    1994-01-01

    The proliferation of nuclear weapons has become the priority safety problem since the end of the cold war. The danger that new nuclear states may arise from the former Soviet Union, the limited effectiveness of existing control systems, the increased attractiveness of nuclear weapons for countries in which a 'safety vacuum' has developed since the withdrawal of American and Russian forces, as well as the danger that additional nuclear states (China, India, Pakistan) may become unstable or disintegrate, make it necessary to explore and show the ensuing risks. The study contains analyses from well-respected experts from Germany, Russia, Japan and the USA. They show how the changes in regional security situations could lead to nuclear risks under certain circumstances, and the likely international consequences. A second point of emphasis consens the feasibility of new approaches or instruments in international non-proliferatic policy. New possibilities for the improvement of excisting control systems and the extension of international consensus on an intensification of the non-proliferation regime are offered by the changes in world politics. (orig.) [de

  6. The contribution of human resources management systems in achieving competitive advantage

    Directory of Open Access Journals (Sweden)

    Anuta Porutiu

    2010-12-01

    Full Text Available Competition has become a current and difficult problem for any organization. This raises the need for the companies to obtain competitive advantages. One way to do this is making use of appropriate information technology, which is the task of information systems for top management. Computer technology and data communication technology alter the parameters within which competition unfolds in all fields. Whereas in the past information technology was oriented to data storage, in the modern world it must provide a dynamic vision on the organization, facilitating adaptation to changes in business environment and thus ensuring competitiveness. In this way, information technology becomes a competitive weapon which is extremely effective in achieving the objectives of the organization. In addition, it is applicable in any field of activity regardless of the organization’s size.

  7. Advanced Simulation and Computing FY17 Implementation Plan, Version 0

    Energy Technology Data Exchange (ETDEWEB)

    McCoy, Michel [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Archer, Bill [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hendrickson, Bruce [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wade, Doug [National Nuclear Security Administration (NNSA), Washington, DC (United States). Office of Advanced Simulation and Computing and Institutional Research and Development; Hoang, Thuc [National Nuclear Security Administration (NNSA), Washington, DC (United States). Computational Systems and Software Environment

    2016-08-29

    The Stockpile Stewardship Program (SSP) is an integrated technical program for maintaining the safety, surety, and reliability of the U.S. nuclear stockpile. The SSP uses nuclear test data, computational modeling and simulation, and experimental facilities to advance understanding of nuclear weapons. It includes stockpile surveillance, experimental research, development and engineering programs, and an appropriately scaled production capability to support stockpile requirements. This integrated national program requires the continued use of experimental facilities and programs, and the computational capabilities to support these programs. The Advanced Simulation and Computing Program (ASC) is a cornerstone of the SSP, providing simulation capabilities and computational resources that support annual stockpile assessment and certification, study advanced nuclear weapons design and manufacturing processes, analyze accident scenarios and weapons aging, and provide the tools to enable stockpile Life Extension Programs (LEPs) and the resolution of Significant Finding Investigations (SFIs). This requires a balance of resource, including technical staff, hardware, simulation software, and computer science solutions. ASC is now focused on increasing predictive capabilities in a three-dimensional (3D) simulation environment while maintaining support to the SSP. The program continues to improve its unique tools for solving progressively more difficult stockpile problems (sufficient resolution, dimensionality, and scientific details), and quantifying critical margins and uncertainties. Resolving each issue requires increasingly difficult analyses because the aging process has progressively moved the stockpile further away from the original test base. Where possible, the program also enables the use of high performance computing (HPC) and simulation tools to address broader national security needs, such as foreign nuclear weapon assessments and counter nuclear terrorism.

  8. Towards the complete prohibition and elimination of nuclear weapons

    International Nuclear Information System (INIS)

    Xie Zhiqiong

    1998-01-01

    For 40 years, the Pugwash Conference on Science and world affairs has been making unremitting efforts to achieve it main objectives the struggle to eliminate nuclear weapons, the elimination of wars and maintenance of world peace. The end of the Cold War vigorously encouraged world efforts in arms control and disarmament. On the day of exploding her first nuclear bomb in October 1964, China declared solemnly that it would never be the first to use nuclear weapons at any time under any circumstances. China has also committed unconditionally not to use nuclear weapons or threaten to use nuclear weapons against non-nuclear weapon states and nuclear free zones. China is the sole nuclear weapon state that has made this commitment, and she has kept her word. China is in favour of comprehensive nuclear test ban in the move towards complete nuclear disarmament, taking an active part in the CTBT negotiations in Geneva and contributing to the conclusion of a fair, reasonable, verifiable treaty of universal adherence and unlimited duration within this year

  9. Proceedings of the topical meeting on advances in human factors research on man/computer interactions

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    This book discusses the following topics: expert systems and knowledge engineering-I; verification and validation of software; methods for modeling UMAN/computer performance; MAN/computer interaction problems in producing procedures -1-2; progress and problems with automation-1-2; experience with electronic presentation of procedures-2; intelligent displays and monitors; modeling user/computer interface; and computer-based human decision-making aids

  10. You've asked us about nuclear weapons

    International Nuclear Information System (INIS)

    Robins, S.

    1987-11-01

    Judging from its name alone, the Atomic Energy Control Board would seem a logical place to get information on nuclear weapons. If we are involved in the control of atomic energy, we must know something about its military uses. In actual fact, however, our regulatory activities are restricted to the development and use of nuclear energy for peaceful purposes, and our safeguards - an international audit system to discourage the diversion of nuclear materials and equipment from peaceful applications to the production of explosive devices. Not being the best source of information on the subject of weapons, we have prepared this fact sheet to assist your research. Simply look for the topic heading that interests you, to find out where to go for more information. The publications listed under the various headings are available to the public free of charge, upon request. A bibliography of books and periodicals is also attached for your reference

  11. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  12. Practical Applications of Cosmic Ray Science: Spacecraft, Aircraft, Ground-Based Computation and Control Systems, Exploration, and Human Health and Safety

    Science.gov (United States)

    Koontz, Steve

    2015-01-01

    In this presentation a review of galactic cosmic ray (GCR) effects on microelectronic systems and human health and safety is given. The methods used to evaluate and mitigate unwanted cosmic ray effects in ground-based, atmospheric flight, and space flight environments are also reviewed. However not all GCR effects are undesirable. We will also briefly review how observation and analysis of GCR interactions with planetary atmospheres and surfaces and reveal important compositional and geophysical data on earth and elsewhere. About 1000 GCR particles enter every square meter of Earth’s upper atmosphere every second, roughly the same number striking every square meter of the International Space Station (ISS) and every other low- Earth orbit spacecraft. GCR particles are high energy ionized atomic nuclei (90% protons, 9% alpha particles, 1% heavier nuclei) traveling very close to the speed of light. The GCR particle flux is even higher in interplanetary space because the geomagnetic field provides some limited magnetic shielding. Collisions of GCR particles with atomic nuclei in planetary atmospheres and/or regolith as well as spacecraft materials produce nuclear reactions and energetic/highly penetrating secondary particle showers. Three twentieth century technology developments have driven an ongoing evolution of basic cosmic ray science into a set of practical engineering tools needed to design, test, and verify the safety and reliability of modern complex technological systems and assess effects on human health and safety effects. The key technology developments are: 1) high altitude commercial and military aircraft; 2) manned and unmanned spacecraft; and 3) increasingly complex and sensitive solid state micro-electronics systems. Space and geophysical exploration needs drove the development of the instruments and analytical tools needed to recover compositional and structural data from GCR induced nuclear reactions and secondary particle showers. Finally, the

  13. Foreign trade legislation, war weapons control legislation

    International Nuclear Information System (INIS)

    Hucko, E.M.

    1993-01-01

    The volume contains, in addition to an introduction into the matter, the texts of the Foreign Trade Act (FTA), the War Weapons Control Act and all relevant ordinances. Foreign trade transactions of the Federal Republic of Germany are essentially, but not exclusively, governed by the FTA. They are strongly influenced by the legislation of the European Communities which in the form of directives are immediately effective here, and in the form of guidelines oblige the German lawgiver or ordinance giver to translate them into practice, mostly by appropriate modifications of the foreign trade ordinance, the import and export lists. It is not the war weapons which are the problem, but the so-called dual-use goods, namely articles, technologies and knowledge which, as a rule, serve civil purposes, which, however, may be used also to produce weapons, in particular ABC weapons or rockets. Nowadays we are concerned about several third-world states which are obsessed by the wish to build their own atomic bomb. (orig./HSCH) [de

  14. Aum Shinrikyo's Chemical and Biological Weapons: More Than Sarin.

    Science.gov (United States)

    Tu, A T

    2014-07-01

    The radical religious group Aum Shinrikyo was founded in Japan in the 1980s and grew rapidly in the 1990s. Aum members perpetrated a mass murder in Matsumoto City in 1994, where they used sarin as a chemical weapon to poison approximately 500 civilians. On March 20, 1995, Aum deployed sarin in an even larger terrorist attack on the Tokyo Subway System, which poisoned some 6,000 people. After the Tokyo Subway attack, the Japanese Police arrested the sect's senior members. From 2005 through 2011, 13 of these senior members were sentenced to death. In this article, aspects of Aum's chemical and biological terrorism are reviewed. Sarin production efforts by the sect are described, including how the degradation product of sarin in soil, methylphosphonic acid, enabled the detection of sarin production sites. Also, Aum's chemical-warfare agents other than sarin are described, as are its biological weapons. The author was permitted by the Japanese government to interview Dr. Tomomasa Nakagawa, one of the senior members of Aum Shinrikyo. From Dr. Nakagawa the author obtained valuable inside information about Aum's chemical and biological weapons programs. Copyright © 2014 Central Police University.

  15. Structural adaptations to diverse fighting styles in sexually selected weapons.

    Science.gov (United States)

    McCullough, Erin L; Tobalske, Bret W; Emlen, Douglas J

    2014-10-07

    The shapes of sexually selected weapons differ widely among species, but the drivers of this diversity remain poorly understood. Existing explanations suggest weapon shapes reflect structural adaptations to different fighting styles, yet explicit tests of this hypothesis are lacking. We constructed finite element models of the horns of different rhinoceros beetle species to test whether functional specializations for increased performance under species-specific fighting styles could have contributed to the diversification of weapon form. We find that horns are both stronger and stiffer in response to species-typical fighting loads and that they perform more poorly under atypical fighting loads, which suggests weapons are structurally adapted to meet the functional demands of fighting. Our research establishes a critical link between weapon form and function, revealing one way male-male competition can drive the diversification of animal weapons.

  16. Nuclear Weapons and U.S. National Security: A Need for Weapons Programs?

    National Research Council Canada - National Science Library

    Woolf, Amy F

    2003-01-01

    .... nuclear weapons that goes beyond the concept of deterrence from the Cold War. It also identified a new targeting strategy that would seek to threaten specific capabilities in adversary nations...

  17. Meaningful Human Control Over Autonomous Systems : A Philosophical Account

    NARCIS (Netherlands)

    Santoni De Sio, F.; van den Hoven, M.J.

    2018-01-01

    Debates on lethal autonomous weapon systems have proliferated in the past 5 years. Ethical concerns have been voiced about a possible raise in the number of wrongs and crimes in military operations and about the creation of a “responsibility gap” for harms caused by these systems. To address these

  18. From weapons to waste: The future of the nuclear weapons complex

    International Nuclear Information System (INIS)

    Wasserman Goodman, Sherri

    1992-01-01

    This paper examines how decision-making power has shifted within the nuclear weapons complex, from the federal government operating agency, in which power was originally vested by the Atomic Energy Act, to the states and to regulatory authorities. Additionally, when the original operating agency, the Atomic Energy Commission (AEC), was abolished in the 1970s, substantial decision-making power shifted from Washington to the field sites. This paper identifies the needs for future materials and weapons production, and recommends that restart of old plants be abandoned as no longer militarily necessary. Instead, the U. S. should take advantage of what may be a unique opportunity to 'leapfrog' to new, smaller, technologically-advanced plants that will meet the needs of the nuclear arsenal in the post-Cold War world. This paper then looks at the current state of DOE's environmental restoration/waste management program, and the technological, legal and political problems it faces in trying to accomplish its mission of cleaning up all nuclear weapons sites. This paper argues that the U. S. government no longer has the exclusive authority to make and carry out critical decisions affecting a cleanup program that will cost the U. S. over $200 billion over the next 20-40 years. Moreover, there are competing theories about the principles that should guide the cleanup program. Finally, the author examines alternative futures for the DOE'S environmental restoration/waste management program. (author)

  19. Image Visual Realism: From Human Perception to Machine Computation.

    Science.gov (United States)

    Fan, Shaojing; Ng, Tian-Tsong; Koenig, Bryan L; Herberg, Jonathan S; Jiang, Ming; Shen, Zhiqi; Zhao, Qi

    2017-08-30

    Visual realism is defined as the extent to which an image appears to people as a photo rather than computer generated. Assessing visual realism is important in applications like computer graphics rendering and photo retouching. However, current realism evaluation approaches use either labor-intensive human judgments or automated algorithms largely dependent on comparing renderings to reference images. We develop a reference-free computational framework for visual realism prediction to overcome these constraints. First, we construct a benchmark dataset of 2520 images with comprehensive human annotated attributes. From statistical modeling on this data, we identify image attributes most relevant for visual realism. We propose both empirically-based (guided by our statistical modeling of human data) and CNN-learned features to predict visual realism of images. Our framework has the following advantages: (1) it creates an interpretable and concise empirical model that characterizes human perception of visual realism; (2) it links computational features to latent factors of human image perception.

  20. Worldwide governmental efforts to locate and destroy chemical weapons and weapons materials: minimizing risk in transport and destruction.

    Science.gov (United States)

    Trapp, Ralf

    2006-09-01

    The article gives an overview on worldwide efforts to eliminate chemical weapons and facilities for their production in the context of the implementation of the 1997 Chemical Weapons Convention (CWC). It highlights the objectives of the Organisation for the Prohibition of Chemical Weapons (OPCW), the international agency set up in The Hague to implement the CWC, and provides an overview of the present status of implementation of the CWC requirements with respect to chemical weapons (CW) destruction under strict international verification. It addresses new requirements that result from an increased threat that terrorists might attempt to acquire or manufacture CW or related materials. The article provides an overview of risks associated with CW and their elimination, from storage or recovery to destruction. It differentiates between CW in stockpile and old/abandoned CW, and gives an overview on the factors and key processes that risk assessment, management, and communication need to address. This discussion is set in the overall context of the CWC that requires the completion of the destruction of all declared CW stockpiles by 2012 at the latest.

  1. Parallel structures in human and computer memory

    Science.gov (United States)

    Kanerva, Pentti

    1986-08-01

    If we think of our experiences as being recorded continuously on film, then human memory can be compared to a film library that is indexed by the contents of the film strips stored in it. Moreover, approximate retrieval cues suffice to retrieve information stored in this library: We recognize a familiar person in a fuzzy photograph or a familiar tune played on a strange instrument. This paper is about how to construct a computer memory that would allow a computer to recognize patterns and to recall sequences the way humans do. Such a memory is remarkably similar in structure to a conventional computer memory and also to the neural circuits in the cortex of the cerebellum of the human brain. The paper concludes that the frame problem of artificial intelligence could be solved by the use of such a memory if we were able to encode information about the world properly.

  2. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  3. Intelligent systems and soft computing for nuclear science and industry

    International Nuclear Information System (INIS)

    Ruan, D.; D'hondt, P.; Govaerts, P.; Kerre, E.E.

    1996-01-01

    The second international workshop on Fuzzy Logic and Intelligent Technologies in Nuclear Science (FLINS) addresses topics related to intelligent systems and soft computing for nuclear science and industry. The proceedings contain 52 papers in different fields such as radiation protection, nuclear safety (human factors and reliability), safeguards, nuclear reactor control, production processes in the fuel cycle, dismantling, waste and disposal, decision making, and nuclear reactor control. A clear link is made between theory and applications of fuzzy logic such as neural networks, expert systems, robotics, man-machine interfaces, and decision-support techniques by using modern and advanced technologies and tools. The papers are grouped in three sections. The first section (Soft computing techniques) deals with basic tools to treat fuzzy logic, neural networks, genetic algorithms, decision-making, and software used for general soft-computing aspects. The second section (Intelligent engineering systems) includes contributions on engineering problems such as knowledge-based engineering, expert systems, process control integration, diagnosis, measurements, and interpretation by soft computing. The third section (Nuclear applications) focusses on the application of soft computing and intelligent systems in nuclear science and industry

  4. Impact of familiarity on information complexity in human-computer interfaces

    Directory of Open Access Journals (Sweden)

    Bakaev Maxim

    2016-01-01

    Full Text Available A quantitative measure of information complexity remains very much desirable in HCI field, since it may aid in optimization of user interfaces, especially in human-computer systems for controlling complex objects. Our paper is dedicated to exploration of subjective (subject-depended aspect of the complexity, conceptualized as information familiarity. Although research of familiarity in human cognition and behaviour is done in several fields, the accepted models in HCI, such as Human Processor or Hick-Hyman’s law do not generally consider this issue. In our experimental study the subjects performed search and selection of digits and letters, whose familiarity was conceptualized as frequency of occurrence in numbers and texts. The analysis showed significant effect of information familiarity on selection time and throughput in regression models, although the R2 values were somehow low. Still, we hope that our results might aid in quantification of information complexity and its further application for optimizing interaction in human-machine systems.

  5. Status of integration of small computers into NDE systems

    International Nuclear Information System (INIS)

    Dau, G.J.; Behravesh, M.M.

    1988-01-01

    Introduction of computers in nondestructive evaluations (NDE) has enabled data acquisition devices to provide a more thorough and complete coverage in the scanning process, and has aided human inspectors in their data analysis and decision making efforts. The price and size/weight of small computers, coupled with recent increases in processing and storage capacity, have made small personal computers (PC's) the most viable platform for NDE equipment. Several NDE systems using minicomputers and newer PC-based systems, capable of automatic data acquisition, and knowledge-based analysis of the test data, have been field tested in the nuclear power plant environment and are currently available through commercial sources. While computers have been in common use for several NDE methods during the last few years, their greatest impact, however, has been on ultrasonic testing. This paper discusses the evolution of small computers and their integration into the ultrasonic testing process

  6. Development of a proton Computed Tomography Detector System

    Energy Technology Data Exchange (ETDEWEB)

    Naimuddin, Md. [Delhi U.; Coutrakon, G. [Northern Illinois U.; Blazey, G. [Northern Illinois U.; Boi, S. [Northern Illinois U.; Dyshkant, A. [Northern Illinois U.; Erdelyi, B. [Northern Illinois U.; Hedin, D. [Northern Illinois U.; Johnson, E. [Northern Illinois U.; Krider, J. [Northern Illinois U.; Rukalin, V. [Northern Illinois U.; Uzunyan, S. A. [Northern Illinois U.; Zutshi, V. [Northern Illinois U.; Fordt, R. [Fermilab; Sellberg, G. [Fermilab; Rauch, J. E. [Fermilab; Roman, M. [Fermilab; Rubinov, P. [Fermilab; Wilson, P. [Fermilab

    2016-02-04

    Computer tomography is one of the most promising new methods to image abnormal tissues inside the human body. Tomography is also used to position the patient accurately before radiation therapy. Hadron therapy for treating cancer has become one of the most advantegeous and safe options. In order to fully utilize the advantages of hadron therapy, there is a necessity of performing radiography with hadrons as well. In this paper we present the development of a proton computed tomography system. Our second-generation proton tomography system consists of two upstream and two downstream trackers made up of fibers as active material and a range detector consisting of plastic scintillators. We present details of the detector system, readout electronics, and data acquisition system as well as the commissioning of the entire system. We also present preliminary results from the test beam of the range detector.

  7. Application of cation-exchange solid-phase extraction for the analysis of amino alcohols from water and human plasma for verification of Chemical Weapons Convention.

    Science.gov (United States)

    Kanaujia, Pankaj K; Tak, Vijay; Pardasani, Deepak; Gupta, A K; Dubey, D K

    2008-03-28

    The analysis of nitrogen containing amino alcohols, which are the precursors and degradation products of nitrogen mustards and nerve agent VX, constitutes an important aspect for verifying the compliance to the CWC (Chemical Weapons Convention). This work devotes on the development of solid-phase extraction method using silica- and polymer-based SCX (strong cation-exchange) and MCX (mixed-mode strong cation-exchange) cartridges for N,N-dialkylaminoethane-2-ols and alkyl N,N-diethanolamines, from water. The extracted analytes were analyzed by GC-MS (gas chromatography-mass spectrometry) in the full scan and selected ion monitoring modes. The extraction efficiencies of SCX and MCX cartridges were compared, and results revealed that SCX performed better. Extraction parameters, such as loading capacity, extraction solvent, its volume, and washing solvent were optimized. Best recoveries were obtained using 2 mL methanol containing 10% NH(4)OH and limits of detection could be achieved up to 5 x 10(-3) microg mL(-1) in the selected ion monitoring mode and 0.01 microg mL(-1) in full scan mode. The method was successfully employed for the detection and identification of amino alcohol present in water sample sent by Organization for Prohibition of Chemical Weapons (OPCW) in the official proficiency tests. The method was also applied to extract the analytes from human plasma. The SCX cartridge showed good recoveries of amino alcohols from human plasma after protein precipitation.

  8. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  9. Advanced intelligent computational technologies and decision support systems

    CERN Document Server

    Kountchev, Roumen

    2014-01-01

    This book offers a state of the art collection covering themes related to Advanced Intelligent Computational Technologies and Decision Support Systems which can be applied to fields like healthcare assisting the humans in solving problems. The book brings forward a wealth of ideas, algorithms and case studies in themes like: intelligent predictive diagnosis; intelligent analyzing of medical images; new format for coding of single and sequences of medical images; Medical Decision Support Systems; diagnosis of Down’s syndrome; computational perspectives for electronic fetal monitoring; efficient compression of CT Images; adaptive interpolation and halftoning for medical images; applications of artificial neural networks for real-life problems solving; present and perspectives for Electronic Healthcare Record Systems; adaptive approaches for noise reduction in sequences of CT images etc.

  10. Proposals for chemical weapons during the American Civil War.

    Science.gov (United States)

    Hasegawa, Guy R

    2008-05-01

    Proposals for chemical weapons that arose during the American Civil War are described. Most incendiary and all biological agents are excluded. The described proposals appeared primarily in periodicals or letters to government officials on both sides. The weapons were usually meant to temporarily disable enemy combatants, but some might have been lethal, and Civil War caregivers were ill-prepared to deal with the weapons' effects. Evidently, none of the proposed weapons were used. In only one instance was use against civilians mentioned. Among the agents most commonly proposed were cayenne pepper or other plant-based irritants such as black pepper, snuff, mustard, and veratria. Other suggested agents included chloroform, chlorine, hydrogen cyanide, arsenic compounds, sulfur, and acids. Proponents usually suggested that the chemicals be included in explosive artillery projectiles. Less commonly proposed vehicles of delivery included fire engines, kites, and manned balloons. Some of the proposed weapons have modern counterparts.

  11. Redundant and fault-tolerant algorithms for real-time measurement and control systems for weapon equipment.

    Science.gov (United States)

    Li, Dan; Hu, Xiaoguang

    2017-03-01

    Because of the high availability requirements from weapon equipment, an in-depth study has been conducted on the real-time fault-tolerance of the widely applied Compact PCI (CPCI) bus measurement and control system. A redundancy design method that uses heartbeat detection to connect the primary and alternate devices has been developed. To address the low successful execution rate and relatively large waste of time slices in the primary version of the task software, an improved algorithm for real-time fault-tolerant scheduling is proposed based on the Basic Checking available time Elimination idle time (BCE) algorithm, applying a single-neuron self-adaptive proportion sum differential (PSD) controller. The experimental validation results indicate that this system has excellent redundancy and fault-tolerance, and the newly developed method can effectively improve the system availability. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Enrichment of Human-Computer Interaction in Brain-Computer Interfaces via Virtual Environments

    Directory of Open Access Journals (Sweden)

    Alonso-Valerdi Luz María

    2017-01-01

    Full Text Available Tridimensional representations stimulate cognitive processes that are the core and foundation of human-computer interaction (HCI. Those cognitive processes take place while a user navigates and explores a virtual environment (VE and are mainly related to spatial memory storage, attention, and perception. VEs have many distinctive features (e.g., involvement, immersion, and presence that can significantly improve HCI in highly demanding and interactive systems such as brain-computer interfaces (BCI. BCI is as a nonmuscular communication channel that attempts to reestablish the interaction between an individual and his/her environment. Although BCI research started in the sixties, this technology is not efficient or reliable yet for everyone at any time. Over the past few years, researchers have argued that main BCI flaws could be associated with HCI issues. The evidence presented thus far shows that VEs can (1 set out working environmental conditions, (2 maximize the efficiency of BCI control panels, (3 implement navigation systems based not only on user intentions but also on user emotions, and (4 regulate user mental state to increase the differentiation between control and noncontrol modalities.

  13. Responsibilities of the nuclear-weapon states

    International Nuclear Information System (INIS)

    Wang Jun

    1994-01-01

    The responsibilities of Nuclear Weapon States are presented by a straightforward analysis together with the ways in which they could fulfill them. The complete undertaking of all the commitments by the Nuclear Weapon States may take a long time. However they do not have a single excuse to neglect such a historic opportunity to do their best to provide a genuinely secure world environment for the international community, of which they too are members

  14. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  15. From the nuclear stalemate to a nuclear-weapon free world. In memory of Klaus Fuchs

    International Nuclear Information System (INIS)

    Flach, Guenter; Fuchs-Kittowski, Klaus

    2012-01-01

    The following topics were dealt with: The first soviet atomic bomb and Klaus Fuchs, in illusory worlds of Andrei Sakharov, Edward Teller, and Klaus Fuchs, Klaus Fuchs as grandfather of the hydrogen bomb, memories of and thinking about Klaus Fuchs, the Scottish years of Klaus Fuchs 1937-1941, Klaus Fuchs in the mirror of the Venona documents, Gernot Zippe and the ultracentrifuge or east-west technology transfer in the cold war, secret impulses for the soviet nuclear project, responsibility of knowledge with anti-facism, philosophy, and science as well as peace as the first human right in the work of Klaus Fuchs, the request of Klaus Fuchs for a lasting peace, Klaus Fuchs in Daniel Granin's roman ''Escape to Russia'', ways to a nuclear-weapon free world, Otto Hahn and the declarations of Mainau and Goettingen, nuclear winter, initiatives of the GDR for the prohibition of weapons of mass destruction, nuclear weapons in negative entropy, militarism and antimilitarism of the nuclear age, contributions of the young Klaus Fuchs to statistical physics, nuclear disarmament and the peaceful use of nuclear energy, the responsibility of the scientists for a socially effective and efficient energy change, Berlin-Bucher contributions to a world free of biological weapons. (HSI)

  16. The Relative Effectiveness of Human Tutoring, Intelligent Tutoring Systems, and Other Tutoring Systems

    Science.gov (United States)

    VanLehn, Kurt

    2011-01-01

    This article is a review of experiments comparing the effectiveness of human tutoring, computer tutoring, and no tutoring. "No tutoring" refers to instruction that teaches the same content without tutoring. The computer tutoring systems were divided by their granularity of the user interface interaction into answer-based, step-based, and…

  17. Atomic Weapons Establishment Bill

    International Nuclear Information System (INIS)

    Clark, Alan; Dalyell, Tam; Haynes, Frank

    1990-01-01

    The Bill debated concerns the government's proposal for the future organisations of the atomic weapons establishment in the United Kingdom. The proposals arise from a full review carried out in 1989 and include points raised by the Select Committee on the Trident programme. Studies of productivity, pay and conditions, information systems and long term manufacturing strategy have been started to enable recommendations of the reorganisation of the establishments to be made. The details of the Bill were debated for just over two hours. The debate is reported verbatim. The main issues were over the principle of contractorisation, possible staff redundancies, conditions of employment, safety and security. The proposal that the Bill be read a second time was carried. (UK)

  18. Legality of the threat or use of nuclear weapons

    International Nuclear Information System (INIS)

    Chang Yenchiang

    2009-01-01

    This paper examines international treaties in relation to the threat or use of nuclear weapons including the 1968 Nuclear Non-Proliferation Treaty and the 1996 Comprehensive Test Ban Treaty. It can be concluded that the effect of the aforesaid international treaties is still in doubt without explicit enforcement mechanisms and penalty for non-compliance. This paper also reviews the International Court of Justice's advisory opinion on the legality of the threat or use of nuclear weapons and comments that a clear explanation on the legality of use of nuclear weapons in 'extreme circumstances of self-defence' is required. Examples from current state practice in relation to nuclear non-proliferation efforts are also provided, with special attention to China, North Korea and Iran. This paper suggests that China as a leader of developing countries should extend its efforts on nuclear non-proliferation and conduct communication between North Korea and Iran and other nuclear weapons states to reduce or prohibit nuclear weapons.

  19. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    Science.gov (United States)

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  20. System and method for multi-stage bypass, low operating temperature suppressor for automatic weapons

    Science.gov (United States)

    Moss, William C.; Anderson, Andrew T.

    2015-06-09

    The present disclosure relates to a suppressor for use with a weapon. The suppressor may be formed to have a body portion having a bore extending concentric with a bore axis of the weapon barrel. An opening in the bore extends at least substantially circumferentially around the bore. A flow path communicates with the opening and defines a channel for redirecting gasses flowing in the bore out from the bore, through the opening, into a rearward direction in the flow path. The flow path raises a pressure at the opening to generate a Mach disk within the bore at a location approximately coincident with the opening. The Mach disk forms as a virtual baffle to divert at least a portion of the gasses into the opening and into the flow path.

  1. Information Systems and the Humanities: A Symbiotic Relationship?

    OpenAIRE

    Kroeze, JH

    2009-01-01

    The lecture explores the nature of the relationship between the study fields of Information Systems and the humanities. Although literature on Humanities Computing states in principle that there is a bi-directional, beneficial symbiotic relationship, most studies and reflections investigate only the application of information technology in the humanities. This suggests that the relation is commensalistic rather that mutualistic. However, studies do exist that implement theor...

  2. Non proliferation of nuclear weapons?

    International Nuclear Information System (INIS)

    Le Guelte, Georges

    2015-10-01

    After having evoked the behaviour of nuclear countries regarding the development of nuclear weapons and uranium procurement, or nuclear programmes after the Second World War until nowadays, the author presents the non proliferation Treaty (NPT) as a construction at the service of super-powers. He comments and discusses the role of the IAEA control system and its evolutions: a control limited to declared installations, an export control with the spectre of plutonium, a control system thwarted by some technological innovations, information systems coming in, and an additional protocol related to the application of guarantees. He comments the evolution of the context from a bipolar world to a world without pole which raises the issue of how to have commitments respected: description of the role and practice of non proliferation during the Cold War, after the Cold War, and in a world without governance

  3. Technology and effects of a war with nuclear weapons

    International Nuclear Information System (INIS)

    Broda, E.

    1981-01-01

    The development and the status of the nuclear weapons systems and of the systems for their delivery are explained. It will be shown, that all these systems have made tremendous progress since the 1960s. Technical progress has had, especially through the MIRV principle and the cruise missile, a destabilizing influence and threatens the equilibrium of terror. New strategic doctrines for winning rather than preventing nuclear war have come to the foreground. Plans for the tactical first-use of nuclear weapons have been accepted. Alternatively, the retaliation capacity of the opponent could be destroyed by surprise attack - The First Strike. In a nuclear conflict, the commanders-in-chief are overburdened by the need for ultra-urgent decisions. This applies especially to a First Strike situation. As a consequence tendencies in the direction of increasing automatization become ever more conspicuous. The increasing automatization leads to further escalation of insecurity for the whole world. Solutions for the principal problem of the world, war or peace, cannot be found On the level of technology, but only on that of practical policy of detente, disarmament, collaboration and reconciliation. (nowak) [de

  4. Missile signal processing common computer architecture for rapid technology upgrade

    Science.gov (United States)

    Rabinkin, Daniel V.; Rutledge, Edward; Monticciolo, Paul

    2004-10-01

    may be programmed under existing real-time operating systems using parallel processing software libraries, resulting in highly portable code that can be rapidly migrated to new platforms as processor technology evolves. Use of standardized development tools and 3rd party software upgrades are enabled as well as rapid upgrade of processing components as improved algorithms are developed. The resulting weapon system will have a superior processing capability over a custom approach at the time of deployment as a result of a shorter development cycles and use of newer technology. The signal processing computer may be upgraded over the lifecycle of the weapon system, and can migrate between weapon system variants enabled by modification simplicity. This paper presents a reference design using the new approach that utilizes an Altivec PowerPC parallel COTS platform. It uses a VxWorks-based real-time operating system (RTOS), and application code developed using an efficient parallel vector library (PVL). A quantification of computing requirements and demonstration of interceptor algorithm operating on this real-time platform are provided.

  5. Artifical Intelligence for Human Computing

    NARCIS (Netherlands)

    Huang, Th.S.; Nijholt, Antinus; Pantic, Maja; Pentland, A.; Unknown, [Unknown

    2007-01-01

    This book constitutes the thoroughly refereed post-proceedings of two events discussing AI for Human Computing: one Special Session during the Eighth International ACM Conference on Multimodal Interfaces (ICMI 2006), held in Banff, Canada, in November 2006, and a Workshop organized in conjunction

  6. Batch Computed Tomography Analysis of Projectiles

    Science.gov (United States)

    2016-05-01

    ARL-TR-7681 ● MAY 2016 US Army Research Laboratory Batch Computed Tomography Analysis of Projectiles by Michael C Golt, Chris M...Laboratory Batch Computed Tomography Analysis of Projectiles by Michael C Golt and Matthew S Bratcher Weapons and Materials Research...values to account for projectile variability in the ballistic evaluation of armor. 15. SUBJECT TERMS computed tomography , CT, BS41, projectiles

  7. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...

  8. Deep Attack Weapons Mix Study (DAWMS) Case Study

    National Research Council Canada - National Science Library

    Bexfield, James

    2001-01-01

    .... This report describes the process used to conduct the Deep Attack Weapons Mix Study (DAWMS) in 1995-1997. This case study focuses on the weapons being procured by the Services and whether a joint viewpoint would result in a more effective mix...

  9. Identification of Enhancers In Human: Advances In Computational Studies

    KAUST Repository

    Kleftogiannis, Dimitrios A.

    2016-03-24

    Roughly ~50% of the human genome, contains noncoding sequences serving as regulatory elements responsible for the diverse gene expression of the cells in the body. One very well studied category of regulatory elements is the category of enhancers. Enhancers increase the transcriptional output in cells through chromatin remodeling or recruitment of complexes of binding proteins. Identification of enhancer using computational techniques is an interesting area of research and up to now several approaches have been proposed. However, the current state-of-the-art methods face limitations since the function of enhancers is clarified, but their mechanism of function is not well understood. This PhD thesis presents a bioinformatics/computer science study that focuses on the problem of identifying enhancers in different human cells using computational techniques. The dissertation is decomposed into four main tasks that we present in different chapters. First, since many of the enhancer’s functions are not well understood, we study the basic biological models by which enhancers trigger transcriptional functions and we survey comprehensively over 30 bioinformatics approaches for identifying enhancers. Next, we elaborate more on the availability of enhancer data as produced by different enhancer identification methods and experimental procedures. In particular, we analyze advantages and disadvantages of existing solutions and we report obstacles that require further consideration. To mitigate these problems we developed the Database of Integrated Human Enhancers (DENdb), a centralized online repository that archives enhancer data from 16 ENCODE cell-lines. The integrated enhancer data are also combined with many other experimental data that can be used to interpret the enhancers content and generate a novel enhancer annotation that complements the existing integrative annotation proposed by the ENCODE consortium. Next, we propose the first deep-learning computational

  10. The tale of the shrinking weapon: seasonal changes in nutrition affect weapon size and sexual dimorphism, but not contemporary evolution.

    Science.gov (United States)

    Miller, C W; McDonald, G C; Moore, A J

    2016-11-01

    Sexually selected traits are often highly variable in size within populations due to their close link with the physical condition of individuals. Nutrition has a large impact on physical condition, and thus, any seasonal changes in nutritional quality are predicted to alter the average size of sexually selected traits as well as the degree of sexual dimorphism in populations. However, although traits affected by mate choice are well studied, we have a surprising lack of knowledge of how natural variation in nutrition affects the expression of sexually selected weapons and sexual dimorphism. Further, few studies explicitly test for differences in the heritability and mean-scaled evolvability of sexually selected traits across conditions. We studied Narnia femorata (Hemiptera: Coreidae), an insect where males use their hind legs as weapons and the femurs are enlarged, to understand the extent to which weapon expression, sexual dimorphism and evolvability change across the actual range of nutrition available in the wild. We found that insects raised on a poor diet (cactus without fruit) are nearly monomorphic, whereas those raised on a high-quality diet (cactus with ripe fruit) are distinctly sexually dimorphic via the expression of large hind leg weapons in males. Contrary to our expectations, we found little evidence of a potential for evolutionary change for any trait measured. Thus, although we show weapons are highly condition dependent, and changes in weapon expression and dimorphism could alter evolutionary dynamics, our populations are unlikely to experience further evolutionary changes under current conditions. © 2016 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2016 European Society For Evolutionary Biology.

  11. Human monitoring and decision-making in man/machine systems

    International Nuclear Information System (INIS)

    Johannsen, G.

    1979-01-01

    Monitoring and decision-making together are very well characterizing the role of the human operator in highly automated systems. In this report, the analysis of human monitoring and decision-making behavior as well as its modeling are described. The goal is to present a survey. 'Classic' and optimal control theoretic monitoring models are dealt with. The relationship between attention allocation and eye movements is discussed. As an example for applications, the evaluation of predictor displays by means of the optimal control model is explained. Fault detection in continuous signals and decision-making behavior of the human operator in fault diagnosis during different operation and maintenance situations are illustrated. The computer-aided decision-making is considered as a queueing problem. It is shown to what extent computer-aiding may be based on the state of human activity as measured by psychophysiological quantities. Finally, management information systems for different application areas are mentioned. As an appendix, the report includes an English-written paper in which the possibilities of mathematical modeling of human behavior in complex man-machine systems are critically assessed. (orig.) 891 GL/orig. 892 MKO [de

  12. Biological and Chemical Weapons: Criminal Sanctions and Federal Regulations

    National Research Council Canada - National Science Library

    Garcia, Michael J

    2004-01-01

    The Biological Weapons Convention and the Chemical Weapons Convention, both of which have been signed and ratified by the United States, obligate signatory parties to enact legislation or otherwise...

  13. Non-Lethal Chemical Weapons

    National Research Council Canada - National Science Library

    Weilacher, Lester A

    2003-01-01

    Little more than a month after terrorists took control of four passenger aircraft in the United States and unleashed the horror of 9/11, 50 Chechen terrorists armed with automatic weapons and carrying...

  14. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Figure 17: Examples of Knowledge Scorecards 61 Page vi GAO-17-333SP Assessments of Selected Weapon Programs...programs. Page 61 GAO-17-333SP Assessments of Selected Weapon Programs Figure 17: Examples of Knowledge Scorecards Pursuant to a...had direct access to the USD AT&L and other senior acquisition officials, and some approval authorities were delegated to lower levels. For example

  15. Radiation, chemical and biological protection. Mass destruction weapons

    International Nuclear Information System (INIS)

    Janasek, D.; Svetlik, J.

    2005-01-01

    In this text-book mass destruction weapons and radiation, chemical and biological protection are reviewed. The text-book contains the following chapter: (1) Mass destruction weapons; (2) Matter and material; (3) Radioactive materials; (4) Toxic materials; (5) Biological resources; (6) Nuclear energetic equipment; Appendices; References.

  16. The Past, Present and Future of Human Computer Interaction

    KAUST Repository

    Churchill, Elizabeth

    2018-01-16

    Human Computer Interaction (HCI) focuses on how people interact with, and are transformed by computation. Our current technology landscape is changing rapidly. Interactive applications, devices and services are increasingly becoming embedded into our environments. From our homes to the urban and rural spaces, we traverse everyday. We are increasingly able toヨoften required toヨmanage and configure multiple, interconnected devices and program their interactions. Artificial intelligence (AI) techniques are being used to create dynamic services that learn about us and others, that make conclusions about our intents and affiliations, and that mould our digital interactions based in predictions about our actions and needs, nudging us toward certain behaviors. Computation is also increasingly embedded into our bodies. Understanding human interactions in the everyday digital and physical context. During this lecture, Elizabeth Churchill -Director of User Experience at Google- will talk about how an emerging landscape invites us to revisit old methods and tactics for understanding how people interact with computers and computation, and how it challenges us to think about new methods and frameworks for understanding the future of human-centered computation.

  17. Principle of human system interface (HSI) design for new reactor console of PUSPATI TRIGA Reactor (RTP)

    International Nuclear Information System (INIS)

    Zareen Khan Abdul Jalil Khan; Ridzuan Abdul Mutalib; Mohd Idris Taib; Mohd Khairulezwan Abdul Manan; Nurfarhana Ayuni Joha; Mohd Sabri Minhat; Izhar Abu Hussin

    2013-01-01

    Full-text: This paper will describe the principle of human system interface design for new reactor console in control room at TRIGA reactor facility. In order to support these human system interface challenges in digital reactor console. Software-based instrumentation and control (I and C) system for new reactor console could lead to new human machine integration. The proposed of Human System Interface (HSI) which included the large display panels which shows reactor status, compact and computer-based workstations for monitoring, control and protection function. The proposed Human System Interface (HIS) has been evaluated using various human factor engineering. It can be concluded that the Human System Interface (HIS) is designed as to address the safety related computer controlled system. (author)

  18. Capability-based computer systems

    CERN Document Server

    Levy, Henry M

    2014-01-01

    Capability-Based Computer Systems focuses on computer programs and their capabilities. The text first elaborates capability- and object-based system concepts, including capability-based systems, object-based approach, and summary. The book then describes early descriptor architectures and explains the Burroughs B5000, Rice University Computer, and Basic Language Machine. The text also focuses on early capability architectures. Dennis and Van Horn's Supervisor; CAL-TSS System; MIT PDP-1 Timesharing System; and Chicago Magic Number Machine are discussed. The book then describes Plessey System 25

  19. Can abolition of nuclear weapons be adequately verified?

    International Nuclear Information System (INIS)

    Rotblat, J.

    1993-01-01

    Speaking on the problems of preventing proliferations of nuclear weapons and nuclear disarmament the author suggests the following measures to reach these goals: signing a treaty that binds all the nuclear weapon states to the no-first-use principle as a basic policy; the United Nations should put the elimination of nuclear weapons on its agenda; having the treaty safeguarded two-pronged verification regime, one would be technological verification, the second one - so called societal verification which means that not just a group of experts but everybody would be asked to take part in ensuring that the treaty would not be violated

  20. Operator role definition and human-system integration

    International Nuclear Information System (INIS)

    Knee, H.E.; Schryver, J.C.

    1989-01-01

    This paper discusses operator role definition and human-system integration from a perspective of systems engineering and allocation of functions. Current and traditional allocation of tasks/functions can no longer by applied to systems that are significantly more sophisticated and dynamic than current system designs. For such advanced and automated designs, explicit attention must be given to the role of the operator in order to facilitate efficient system performance. Furthermore, such systems will include intelligent automated systems which will support the cognitive activities of the operator. If such systems share responsibility and control with the human operator, these computer-based assistants/associates should be viewed as intelligent team members. As such, factors such as trust, intentions, and expectancies, among team members must be considered by the systems designer. Such design considerations are discussed in this paper. This paper also discusses the area of dynamic allocation of functions, and the need for models of the human operator in support of machine forecast of human performance. The Integrated Reactor Operator/System (INTEROPS) model is discussed as an example of a cognitive model capable of functioning beyond a rule-based behavioral structure

  1. Intermittent control: a computational theory of human control.

    Science.gov (United States)

    Gawthrop, Peter; Loram, Ian; Lakie, Martin; Gollee, Henrik

    2011-02-01

    The paradigm of continuous control using internal models has advanced understanding of human motor control. However, this paradigm ignores some aspects of human control, including intermittent feedback, serial ballistic control, triggered responses and refractory periods. It is shown that event-driven intermittent control provides a framework to explain the behaviour of the human operator under a wider range of conditions than continuous control. Continuous control is included as a special case, but sampling, system matched hold, an intermittent predictor and an event trigger allow serial open-loop trajectories using intermittent feedback. The implementation here may be described as "continuous observation, intermittent action". Beyond explaining unimodal regulation distributions in common with continuous control, these features naturally explain refractoriness and bimodal stabilisation distributions observed in double stimulus tracking experiments and quiet standing, respectively. Moreover, given that human control systems contain significant time delays, a biological-cybernetic rationale favours intermittent over continuous control: intermittent predictive control is computationally less demanding than continuous predictive control. A standard continuous-time predictive control model of the human operator is used as the underlying design method for an event-driven intermittent controller. It is shown that when event thresholds are small and sampling is regular, the intermittent controller can masquerade as the underlying continuous-time controller and thus, under these conditions, the continuous-time and intermittent controller cannot be distinguished. This explains why the intermittent control hypothesis is consistent with the continuous control hypothesis for certain experimental conditions.

  2. The use of neutron scattering in nuclear weapons research

    International Nuclear Information System (INIS)

    Juzaitis, R.J.

    1995-01-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a 'short-sleeve' workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE's contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects

  3. IAEA verification of weapon-origin fissile material in the Russian Federation and the United States

    International Nuclear Information System (INIS)

    2001-01-01

    The Secretary of Energy of the United States, Spencer Abraham, Minister of the Russian Federation on Atomic Energy, Alexander Rumyantsev, and Director General of the International Atomic Energy Agency (IAEA), Mohamed ElBaradei, met in Vienna on 18 September 2001 to review progress on the Trilateral Initiative. The Initiative was launched in 1996 to develop a new IAEA verification system for weapon-origin material designated by the United States and the Russian Federation as released from their defence programmes. The removal of weapon-origin fissile material from the defence programmes of the Russian Federation and the United States is in furtherance of the commitment to disarmament undertaken by the two States pursuant to Article VI of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). IAEA verification under this Initiative is intended to promote international confidence that fissile material made subject by either of the two States to Agency verification remains irreversibly removed from nuclear weapon programmes

  4. Advanced Simulation & Computing FY15 Implementation Plan Volume 2, Rev. 0.5

    Energy Technology Data Exchange (ETDEWEB)

    McCoy, Michel [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Archer, Bill [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Matzen, M. Keith [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-16

    The Stockpile Stewardship Program (SSP) is a single, highly integrated technical program for maintaining the surety and reliability of the U.S. nuclear stockpile. The SSP uses nuclear test data, computational modeling and simulation, and experimental facilities to advance understanding of nuclear weapons. It includes stockpile surveillance, experimental research, development and engineering programs, and an appropriately scaled production capability to support stockpile requirements. This integrated national program requires the continued use of experimental facilities and programs, and the computational enhancements to support these programs. The Advanced Simulation and Computing Program (ASC) is a cornerstone of the SSP, providing simulation capabilities and computational resources that support annual stockpile assessment and certification, study advanced nuclear weapons design and manufacturing processes, analyze accident scenarios and weapons aging, and provide the tools to enable stockpile Life Extension Programs (LEPs) and the resolution of Significant Finding Investigations (SFIs). This requires a balance of resource, including technical staff, hardware, simulation software, and computer science solutions. As the program approaches the end of its second decade, ASC is intently focused on increasing predictive capabilities in a three-dimensional (3D) simulation environment while maintaining support to the SSP. The program continues to improve its unique tools for solving progressively more difficult stockpile problems (sufficient resolution, dimensionality, and scientific details), quantify critical margins and uncertainties, and resolve increasingly difficult analyses needed for the SSP. Where possible, the program also enables the use of high-performance simulation and computing tools to address broader national security needs, such as foreign nuclear weapon assessments and counternuclear terrorism.

  5. North Korea's nuclear weapons development. Implications for future policy

    International Nuclear Information System (INIS)

    Pollack, J.D.

    2010-01-01

    This essay assesses North Korea's long-standing quest for nuclear weapons; alternative strategies for inhibiting Pyongyang's weapons development; and the potential implications for regional security and nonproliferation should the Democratic People's Republic of Korea (DPRK) retain and enhance its weapons programs. North Korea's pursuit of a nuclear weapons capability has long provoked heated debate among policy makers and research analysts about the purposes of engagement with the North, reflecting the repeated frustrations in efforts to negotiate Korean denuclearization. These debates reflect widely divergent views of the North Korean regime; its sustainability as an autonomous political, economic, and military system; and the potential consequences of continued nuclear development in this isolated, highly idiosyncratic state. These questions assume additional salience as North Korea approaches a leadership succession for only the second time in its six-decade history. The effort to inhibit North Korea's pursuit of nuclear weapons is among the longest running and least successful sagas in international security and non-proliferation policy of the past quarter century. In early 2010, Pyongyang claims a rudimentary nuclear capability by possession of weaponized plutonium, the conduct of two nuclear tests, and advances in the production of enriched uranium as an alternative means of fissile material production, though the latter step is nominally justified as a source for reactor fuel. North Korea defends its pursuit of a nuclear deterrent to counter what Pyongyang deems existential threats posed by the United States.Despite the resumption of high-level diplomatic contact between Washington and Pyongyang in late 2009, realization of a non-nuclear Korean Peninsula remains a very remote prospect. The DPRK insists that a peace agreement between the U.S. and North Korea and hence the cessation of 'hostile DPRK-U.S. relations' are necessary before any consideration of

  6. Quantum Computing's Classical Problem, Classical Computing's Quantum Problem

    OpenAIRE

    Van Meter, Rodney

    2013-01-01

    Tasked with the challenge to build better and better computers, quantum computing and classical computing face the same conundrum: the success of classical computing systems. Small quantum computing systems have been demonstrated, and intermediate-scale systems are on the horizon, capable of calculating numeric results or simulating physical systems far beyond what humans can do by hand. However, to be commercially viable, they must surpass what our wildly successful, highly advanced classica...

  7. A nuclear-weapon-free Middle East

    International Nuclear Information System (INIS)

    Jortner, Joshua

    1986-01-01

    The paper examines the issue of nuclear-weapon States involvement in regional conflicts, and whether such a conflict in the Middle East could trigger a nuclear war between the Super-Powers. Comments on the Middle Eastern situation are given, along with a discussion of the Non-Proliferation Treaty (NPT) and the Middle East, Israel and the NPT, and the nuclear potential in Arab countries. The proposal, by Israel, of a nuclear weapon-free zone in the Middle East is outlined. (UK)

  8. Controlling weapons of mass destruction through the rule of law

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.A.

    1995-08-08

    Many who speak of the end of the Cold War emphasize the improvement in international relations when they speak of the momentous consequences of this event. According to this image, the half century since Trinity has been a period of sparse international communication during which the Eastern and Western blocs hibernated in their isolated dens of security alliances. The emphasis in the phrase ``Cold War`` was on the word ``cold,`` and relations with the former Communist regimes are now ``warm`` by comparison. It is equally valid to consider what has happened to the word ``was` in this highly descriptive phrase. While meaningful international dialogue was in a state of relative lethargy during much of the last fifty years, the military establishments of the Great Powers were actively engaged in using as much force as possible in their efforts to control world affairs, short of triggering a nuclear holocaust. Out of these military postures a tense peace ironically emerged, but the terms by which decisions were made about controlling weapons of mass destruction (i.e., nuclear, chemical, and biological weapons) were the terms of war. The thesis of this paper is that the end of the Cold War marks a shift away from reliance on military might toward an international commitment to controlling weapons,of mass destruction through the ``rule of law.`` Rawls wrote that ``legal system is a coercive order of public rules addressed to rational persons for the purpose of regulating their conduct and providing the framework for social cooperation. The regular and impartial administration of public rules, becomes the rule of law when applied to the legal system.`` Inparticular, Rawls identifies as part of this system of public rules those laws that aim to prevent free riders on the economic system and those that aim to correct such externalities as environmental pollution.``

  9. A Single Camera Motion Capture System for Human-Computer Interaction

    Science.gov (United States)

    Okada, Ryuzo; Stenger, Björn

    This paper presents a method for markerless human motion capture using a single camera. It uses tree-based filtering to efficiently propagate a probability distribution over poses of a 3D body model. The pose vectors and associated shapes are arranged in a tree, which is constructed by hierarchical pairwise clustering, in order to efficiently evaluate the likelihood in each frame. Anew likelihood function based on silhouette matching is proposed that improves the pose estimation of thinner body parts, i. e. the limbs. The dynamic model takes self-occlusion into account by increasing the variance of occluded body-parts, thus allowing for recovery when the body part reappears. We present two applications of our method that work in real-time on a Cell Broadband Engine™: a computer game and a virtual clothing application.

  10. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems

    DEFF Research Database (Denmark)

    also deeply appreciate the huge amount of time donated to this process by the 211-member program committee, who paid their own way to attend the face-to-face program committee meeting, an event larger than the average ACM conference. We are proud of the work of the CHI 2013 program committee and hope...... a tremendous amount of work from all areas of the human-computer interaction community. As co-chairs of the process, we are amazed at the ability of the community to organize itself to accomplish this task. We would like to thank the 2680 individual reviewers for their careful consideration of these papers. We...

  11. Comparison of methodologies for assessing the risks from nuclear weapons and from nuclear reactors

    International Nuclear Information System (INIS)

    Benjamin, A.S.

    1996-01-01

    There are important differences between the safety principles for nuclear weapons and for nuclear reactors. For example, a principal concern for nuclear weapons is to prevent electrical energy from reaching the nuclear package during accidents produced by crashes, fires, and other hazards, whereas the foremost concern for nuclear reactors is to maintain coolant around the core in the event of certain system failures. Not surprisingly, new methods have had to be developed to assess the risk from nuclear weapons. These include fault tree transformations that accommodate time dependencies, thermal and structural analysis techniques that are fast and unconditionally stable, and parameter sampling methods that incorporate intelligent searching. This paper provides an overview of the new methods for nuclear weapons and compares them with existing methods for nuclear reactors. It also presents a new intelligent searching process for identifying potential nuclear detonation vulnerabilities. The new searching technique runs very rapidly on a workstation and shows promise for providing an accurate assessment of potential vulnerabilities with far fewer physical response calculations than would be required using a standard Monte Carlo sampling procedure

  12. Benefits of Subliminal Feedback Loops in Human-Computer Interaction

    OpenAIRE

    Walter Ritter

    2011-01-01

    A lot of efforts have been directed to enriching human-computer interaction to make the user experience more pleasing or efficient. In this paper, we briefly present work in the fields of subliminal perception and affective computing, before we outline a new approach to add analog communication channels to the human-computer interaction experience. In this approach, in addition to symbolic predefined mappings of input to output, a subliminal feedback loop is used that provides feedback in evo...

  13. Computations, Complexity, Experiments, and the World Outside Physics

    International Nuclear Information System (INIS)

    Kadanoff, L.P

    2009-01-01

    Computer Models in the Sciences and Social Sciences. 1. Simulation and Prediction in Complex Systems: the Good the Bad and the Awful. This lecture deals with the history of large-scale computer modeling mostly in the context of the U.S. Department of Energy's sponsorship of modeling for weapons development and innovation in energy sources. 2. Complexity: Making a Splash-Breaking a Neck - The Making of Complexity in Physical System. For ages thinkers have been asking how complexity arise. The laws of physics are very simple. How come we are so complex? This lecture tries to approach this question by asking how complexity arises in physical fluids. 3. Forrester, et. al. Social and Biological Model-Making The partial collapse of the world's economy has raised the question of whether we could improve the performance of economic and social systems by a major effort on creating understanding via large-scale computer models. (author)

  14. Man and computer

    International Nuclear Information System (INIS)

    Fischbach, K.F.

    1981-01-01

    The discussion of cultural and sociological consequences of computer evolution is hindered by human prejudice. For example the sentence 'a computer is at best as intelligent as its programmer' veils actual developments. Theoretical limits of computer intelligence are the limits of intelligence in general. Modern computer systems replace not only human labour, but also human decision making and thereby human responsibility. The historical situation is unique. Human head-work is being automated and man is loosing function. (orig.) [de

  15. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  16. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man Sung

    2015-01-01

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK

  17. Does nuclear power lead to nuclear weapons

    International Nuclear Information System (INIS)

    Prawitz, J.

    1977-01-01

    It is pointed out that 'reactor grade' plutonium usually contains about 30 % Pu240 and is unsuitable for weapons. While it is possible to obtain an explosion, it is more difficult to initiate one and its effect, which will be considerably less than with bomb grade plutonium, is difficult to predict. The critical mass will be larger and more cooling required. The proliferation problem is then discussed and the four aspects, vertical, horizontal, sub-national and revolutionary, mentioned. In connection with nuclear power it is the second and third aspects which are of interest. In discussing the possibility of terrorist groups obtaining plutonium, a study by the Swedish Defence Research Institute is quoted as estimating that 10-20 qualified specialists and several years secret preparation would be necessary to make a nuclear weapon. Other authors, e.g. Ted Taylor, have maintained that it would be much easier, but examples of 'student designs' are primitive and unlikely to detonate. Even so, it is emphasised that safeguards and physical security are necessary. Horizontal proliferation is a more real problem and the NPT and IAEA safeguards are discussed in this connection. In conclusion the question of whether the proliferation of nuclear weapons via nuclear power can be prevented cannot be answered with a clear yes or no. Certain states may use nuclear weapon potential as a bargaining factor. However the decision to acquire nuclear weapons is political and while a nuclear power industry would be of help, it would not be decisively so. (JIW)

  18. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  19. The spread of nuclear weapons among nations: militarization or development

    International Nuclear Information System (INIS)

    Khan, A.Q.

    1986-01-01

    The paper reviews nuclear proliferation among nations. Nuclear weapons promotion and proliferation are discussed, including both motivation and lack of motivation to manufacture nuclear weapons. The failure of the Non-Proliferation Treaty is examined with respect to vertical and horizontal proliferation, and the containment of horizontal proliferation. Risks of nuclear war by accident are outlined, as well as nuclear weapon development. (UK)

  20. The Uncertain Consequences of Nuclear Weapons Use

    Science.gov (United States)

    2015-04-15

    this genre is the venerable, and classified, official “bible” of nuclear weapons effects, Capabilities of Nuclear Weapons. Widely referred to by...weekly comic Shukan Shonen Jampu and was later made into several film versions, a television drama series, and ten books, which follow Gen’s...civilized behavior. The film , distributed internationally and shown on Soviet television, was widely discussed in the United States and both depressed

  1. Man-machine interface in a submarine command and weapon control system: features and design experience

    Directory of Open Access Journals (Sweden)

    Johan H. Aas

    1989-01-01

    Full Text Available Important man-machine interface (MMI issues concerning a submarine command and weapon control system (CWCS such as crew organization, automation level and decision support are discussed in this paper. Generic submarine CWCS functions and operating conditions are outlined. Detailed, dynamic and real-time prototypes were used to support the MMI design. The prototypes are described and experience with detailed prototyping is discussed. Some of the main interaction principles are summarized and a restricted example of the resulting design is given. Our design experience and current work have been used to outline future perspectives of MMI design in naval CWCSs. The need for both formal and experimental approaches is emphasized.

  2. The prevention of geographical proliferation of nuclear weapons: Nuclear-weapon-free zones and zones of peace in the Southern hemisphere

    International Nuclear Information System (INIS)

    Fujita, E.

    1989-01-01

    It is understandable that many Non-Nuclear Weapons States (NNWS) worry about the dangers of further geographical or spatial proliferation of nuclear weapons, as well as the extension to their regions of rivalries that are foreign to them. In this regard, there has been since the 1950's a number of proposals and initiatives to turn specific regions into nuclear-weapons-free zones and zones of peace in order to prevent or reduce the above mentioned threats. Although differences exits between the concepts of nuclear-weapon-free-zones and zones of peace as well as among the various NWFZ and ZP, inter se, they do share a common feature insofar as they represent a regional approach to the question of curbing the arms race, especially the nuclear one. This study will address some of these initiatives, examine their specific characteristics and assess their role in the prevention of the geographical proliferation of nuclear weapons. Among the relevant existing initiatives, those situated in the Southern Hemisphere offer an interesting focus of attention, in view of the fact that, together, they form a sort of a contiguous geographical area encompassing virtually half of the globe. The regions covered are the Antarctic, Latin American, South Pacific, South Atlantic and Indian Oceans. The first three have been established as nuclear-weapons-free-zones and the last two are in the process of being turned into zones of peace. The aim of this study is to compare similarities and differences among them and to identify the factors that condition their efficiency. By understanding their usefulness and their weaknesses, one many eventually construct useful paradigms for further regional initiatives to curb the arms race, specially the nuclear one

  3. Controlling a human-computer interface system with a novel classification method that uses electrooculography signals.

    Science.gov (United States)

    Wu, Shang-Lin; Liao, Lun-De; Lu, Shao-Wei; Jiang, Wei-Ling; Chen, Shi-An; Lin, Chin-Teng

    2013-08-01

    Electrooculography (EOG) signals can be used to control human-computer interface (HCI) systems, if properly classified. The ability to measure and process these signals may help HCI users to overcome many of the physical limitations and inconveniences in daily life. However, there are currently no effective multidirectional classification methods for monitoring eye movements. Here, we describe a classification method used in a wireless EOG-based HCI device for detecting eye movements in eight directions. This device includes wireless EOG signal acquisition components, wet electrodes and an EOG signal classification algorithm. The EOG classification algorithm is based on extracting features from the electrical signals corresponding to eight directions of eye movement (up, down, left, right, up-left, down-left, up-right, and down-right) and blinking. The recognition and processing of these eight different features were achieved in real-life conditions, demonstrating that this device can reliably measure the features of EOG signals. This system and its classification procedure provide an effective method for identifying eye movements. Additionally, it may be applied to study eye functions in real-life conditions in the near future.

  4. Computer aided operation of complex systems

    International Nuclear Information System (INIS)

    Goodstein, L.P.

    1985-09-01

    Advanced technology is having the effect that industrial systems are becoming more highly automated and do not rely on human intervention for the control of normally planned and/or predicted situations. Thus the importance of the operator has shifted from being a manual controller to becoming more of a systems manager and supervisory controller. At the same time, the use of advanced information technology in the control room and its potential impact on human-machine capabilities places additional demands on the designer. This report deals with work carried out to describe the plant-operator relationship in order to systematize the design and evaluation of suitable information systems in the control room. This design process starts with the control requirements from the plant and transforms them into corresponding sets of decision-making tasks with appropriate allocation of responsibilities between computer and operator. To further effectivize this cooperation, appropriate information display and accession are identified. The conceptual work has been supported by experimental studies on a small-scale simulator. (author)

  5. 77 FR 59891 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Declaration and...

    Science.gov (United States)

    2012-10-01

    ... Request; Chemical Weapons Convention Declaration and Report Handbook and Forms AGENCY: Bureau of Industry.... Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons... Chemical Weapons Convention (CWC), an international arms control treaty. II. Method of Collection Submitted...

  6. Framework for generating expert systems to perform computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1985-01-01

    At Los Alamos we are developing a framework to generate knowledge-based expert systems for performing automated risk analyses upon a subject system. The expert system is a computer program that models experts' knowledge about a topic, including facts, assumptions, insights, and decision rationale. The subject system, defined as the collection of information, procedures, devices, and real property upon which the risk analysis is to be performed, is a member of the class of systems that have three identifying characteristics: a set of desirable assets (or targets), a set of adversaries (or threats) desiring to obtain or to do harm to the assets, and a set of protective mechanisms to safeguard the assets from the adversaries. Risk analysis evaluates both vulnerability to and the impact of successful threats against the targets by determining the overall effectiveness of the subject system safeguards, identifying vulnerabilities in that set of safeguards, and determining cost-effective improvements to the safeguards. As a testbed, we evaluate the inherent vulnerabilities and risks in a system of computer security safeguards. The method considers safeguards protecting four generic targets (physical plant of the computer installation, its hardware, its software, and its documents and displays) against three generic threats (natural hazards, direct human actions requiring the presence of the adversary, and indirect human actions wherein the adversary is not on the premises-perhaps using such access tools as wiretaps, dialup lines, and so forth). Our automated procedure to assess the effectiveness of computer security safeguards differs from traditional risk analysis methods

  7. Accelerator-based conversion (ABC) of reactor and weapons plutonium

    Energy Technology Data Exchange (ETDEWEB)

    Jensen, R.J.; Trapp, T.J.; Arthur, E.D.; Bowman, C.D.; Davidson, J.W.; Linford, R.K.

    1993-06-01

    An accelerator-based conversion (ABC) system is presented that is capable of rapidly burning plutonium in a low-inventory sub-critical system. The system also returns fission power to the grid and transmutes troublesome long-lived fission products to short lived or stable products. Higher actinides are totally fissioned. The system is suited not only to controlled, rapid burning of excess weapons plutonium, but to the long range application of eliminating or drastically reducing the world total inventory of plutonium. Deployment of the system will require the successful resolution of a broad range of technical issues introduced in the paper.

  8. Accelerator-based conversion (ABC) of reactor and weapons plutonium

    International Nuclear Information System (INIS)

    Jensen, R.J.; Trapp, T.J.; Arthur, E.D.; Bowman, C.D.; Davidson, J.W.; Linford, R.K.

    1993-01-01

    An accelerator-based conversion (ABC) system is presented that is capable of rapidly burning plutonium in a low-inventory sub-critical system. The system also returns fission power to the grid and transmutes troublesome long-lived fission products to short lived or stable products. Higher actinides are totally fissioned. The system is suited not only to controlled, rapid burning of excess weapons plutonium, but to the long range application of eliminating or drastically reducing the world total inventory of plutonium. Deployment of the system will require the successful resolution of a broad range of technical issues introduced in the paper

  9. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  10. Cognitive Technologies: The Design of Joint Human-Machine Cognitive Systems

    OpenAIRE

    Woods, David D.

    1985-01-01

    This article explores the implications of one type of cognitive technology, techniques and concepts to develop joint human-machine cognitive systems, for the application of computational technology by examining the joint cognitive system implicit in a hypothetical computer consultant that outputs some form of problem solution. This analysis reveals some of the problems can occur in cognitive system design-e.g., machine control of the interaction, the danger of a responsibility-authority doubl...

  11. Burning weapons-grade plutonium in reactors

    International Nuclear Information System (INIS)

    Newman, D.F.

    1993-06-01

    As a result of massive reductions in deployed nuclear warheads, and their subsequent dismantlement, large quantities of surplus weapons- grade plutonium will be stored until its ultimate disposition is achieved in both the US and Russia. Ultimate disposition has the following minimum requirements: (1) preclude return of plutonium to the US and Russian stockpiles, (2) prevent environmental damage by precluding release of plutonium contamination, and (3) prevent proliferation by precluding plutonium diversion to sub-national groups or nonweapons states. The most efficient and effective way to dispose of surplus weapons-grade plutonium is to fabricate it into fuel and use it for generation of electrical energy in commercial nuclear power plants. Weapons-grade plutonium can be used as fuel in existing commercial nuclear power plants, such as those in the US and Russia. This recovers energy and economic value from weapons-grade plutonium, which otherwise represents a large cost liability to maintain in safeguarded and secure storage. The plutonium remaining in spent MOX fuel is reactor-grade, essentially the same as that being discharged in spent UO 2 fuels. MOX fuels are well developed and are currently used in a number of LWRs in Europe. Plutonium-bearing fuels without uranium (non-fertile fuels) would require some development. However, such non-fertile fuels are attractive from a nonproliferation perspective because they avoid the insitu production of additional plutonium and enhance the annihilation of the plutonium inventory on a once-through fuel cycle

  12. Computer systems a programmer's perspective

    CERN Document Server

    Bryant, Randal E

    2016-01-01

    Computer systems: A Programmer’s Perspective explains the underlying elements common among all computer systems and how they affect general application performance. Written from the programmer’s perspective, this book strives to teach readers how understanding basic elements of computer systems and executing real practice can lead them to create better programs. Spanning across computer science themes such as hardware architecture, the operating system, and systems software, the Third Edition serves as a comprehensive introduction to programming. This book strives to create programmers who understand all elements of computer systems and will be able to engage in any application of the field--from fixing faulty software, to writing more capable programs, to avoiding common flaws. It lays the groundwork for readers to delve into more intensive topics such as computer architecture, embedded systems, and cybersecurity. This book focuses on systems that execute an x86-64 machine code, and recommends th...

  13. Choice of Human-Computer Interaction Mode in Stroke Rehabilitation.

    Science.gov (United States)

    Mousavi Hondori, Hossein; Khademi, Maryam; Dodakian, Lucy; McKenzie, Alison; Lopes, Cristina V; Cramer, Steven C

    2016-03-01

    Advances in technology are providing new forms of human-computer interaction. The current study examined one form of human-computer interaction, augmented reality (AR), whereby subjects train in the real-world workspace with virtual objects projected by the computer. Motor performances were compared with those obtained while subjects used a traditional human-computer interaction, that is, a personal computer (PC) with a mouse. Patients used goal-directed arm movements to play AR and PC versions of the Fruit Ninja video game. The 2 versions required the same arm movements to control the game but had different cognitive demands. With AR, the game was projected onto the desktop, where subjects viewed the game plus their arm movements simultaneously, in the same visual coordinate space. In the PC version, subjects used the same arm movements but viewed the game by looking up at a computer monitor. Among 18 patients with chronic hemiparesis after stroke, the AR game was associated with 21% higher game scores (P = .0001), 19% faster reaching times (P = .0001), and 15% less movement variability (P = .0068), as compared to the PC game. Correlations between game score and arm motor status were stronger with the AR version. Motor performances during the AR game were superior to those during the PC game. This result is due in part to the greater cognitive demands imposed by the PC game, a feature problematic for some patients but clinically useful for others. Mode of human-computer interface influences rehabilitation therapy demands and can be individualized for patients. © The Author(s) 2015.

  14. Males that drop a sexually selected weapon grow larger testes.

    Science.gov (United States)

    Joseph, Paul N; Emberts, Zachary; Sasson, Daniel A; Miller, Christine W

    2018-01-01

    Costly sexually selected weapons are predicted to trade off with postcopulatory traits, such as testes. Although weapons can be important for achieving access to females, individuals of some species can permanently drop (i.e. autotomize) their weapons, without regeneration, to escape danger. We capitalized on this natural behavior to experimentally address whether the loss of a sexually selected weapon leads to increased testes investment in the leaf-footed cactus bug, Narnia femorata Stål (Hemiptera: Coreidae). In a second experiment, we measured offspring production for males that lost a weapon during development. As predicted, males that dropped a hind limb during development grew significantly larger testes than the control treatments. Hind-limb autotomy did not result in the enlargement of other nearby traits. Our results are the first to experimentally demonstrate that males compensate for natural weapon loss by investing more in testes. In a second experiment we found that females paired with males that lost a hind limb had 40% lower egg hatching success than females paired with intact males, perhaps because of lower mating receptivity to males with a lost limb. Importantly, in those cases where viable offspring were produced, males missing a hind limb produced 42% more offspring than males with intact limbs. These results suggest that the loss of a hind-limb weapon can, in some cases, lead to greater fertilization success. © 2017 The Author(s). Evolution © 2017 The Society for the Study of Evolution.

  15. Prospects of a mathematical theory of human behavior in complex man-machine systems tasks. [time sharing computer analogy of automobile driving

    Science.gov (United States)

    Johannsen, G.; Rouse, W. B.

    1978-01-01

    A hierarchy of human activities is derived by analyzing automobile driving in general terms. A structural description leads to a block diagram and a time-sharing computer analogy. The range of applicability of existing mathematical models is considered with respect to the hierarchy of human activities in actual complex tasks. Other mathematical tools so far not often applied to man machine systems are also discussed. The mathematical descriptions at least briefly considered here include utility, estimation, control, queueing, and fuzzy set theory as well as artificial intelligence techniques. Some thoughts are given as to how these methods might be integrated and how further work might be pursued.

  16. Classifying threats with a 14-MeV neutron interrogation system.

    Science.gov (United States)

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  17. Computer Operating System Maintenance.

    Science.gov (United States)

    1982-06-01

    FACILITY The Computer Management Information Facility ( CMIF ) system was developed by Rapp Systems to fulfill the need at the CRF to record and report on...computer center resource usage and utilization. The foundation of the CMIF system is a System 2000 data base (CRFMGMT) which stores and permits access

  18. Laboratory directed research and development on disposal of plutonium recovered from weapons. FY1994 final report

    International Nuclear Information System (INIS)

    Pitts, J.H.; Choi, J.S.

    1994-01-01

    This research project was conceived as a multi-year plan to study the use of mixed plutonium oxide-uranium oxide (MOX) fuel in existing nuclear reactors. Four areas of investigation were originally proposed: (1) study reactor physics including evaluation of control rod worth and power distribution during normal operation and transients; (2) evaluate accidents focusing upon the reduced control rod worth and reduced physical properties of PuO 2 ; (3) assess the safeguards required during fabrication and use of plutonium bearing fuel assemblies; and (4) study public acceptance issues associated with using material recovered from weapons to fuel a nuclear reactor. First year accomplishments are described. Appendices contain 2 reports entitled: development and validation of advanced computational capability for MOX fueled ALWR assembly designs; and long-term criticality safety concerns associated with weapons plutonium disposition

  19. Criticality analysis for weapon disassembly at the Pantex-Plant part II: Staging

    International Nuclear Information System (INIS)

    Knief, R.A.

    1997-01-01

    This paper very briefly describes criticality investigations for nuclear weapon dismantlement at the Pantex Plant. The investigations performed were for pit staging, and build on previous criticality calculations for single pits. The KENO and MCNP computer models were used for pit and container combinations. Scenarios were based on administrative limits and actual or potential physical conditions in the facilities. Essentially all of the pit configurations modeled were subcritical by a substantial amount. It was concluded that a critical configuration involving pit/container combinations is not credible

  20. The impact of geophysical weapons on endangering of environment for the purposes of war

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2012-01-01

    Full Text Available The environment has considerably been damaged due to numerous destructive impacts of obsolete and dirty technologies, heavy and uncontrolled traffic, arms race, military actions, terrorist acts and other activities which are all seriously disturbing the existing balance of nature and endangering human life at the same time. There have been ominous warnings about the situation. Rapid increase in techniques of geophysical engineering and so-called geophysical weapons which their practical threats to the mere physical existence of the wild life and of human society has created a need for this exceptionally important field to be legally regulated and sanctioned by international standards. The aim of their pursuit and study is for the man to protect and improve the environment in order to save it as on integral and crucial part of human work, life and sheer existence. Over the history of human society and of scientific and technological development, implementation of learning in different fields of human activities have caused ground breaking discoveries but at the some time and aspiration to control natural processes and phenomena such as the weather, climate, earthquake, tsunami, drought, cloudiness, precipitation etc. Starting from the fact that protection of the environment is a most fundamental postulate in the best national interests of each country, a conclusion can be made that only a deep radical change in man's attitude towards natural world with its processes and with its laws can secure further development of mankind. In respect of that, understanding and adoption of the findings and the effects of so-called geophysical weapons that have been made in this field so far have must relevant part. Namely, results and findings of the research still have not provided answers to a great number of questions. This paper examines exceptionally complex interaction between changes in nature in terms of the climate, weather etc. deliberate influence on

  1. The risk of nuclear weapons proliferation

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1994-01-01

    During the later years the risks of nuclear proliferation have again become a major topic of interest. This is primarily due to the acute problems caused by Iraq, North Korea, and the 3 new states of the former USSR, Ukraine, Kazakhstan and Belarus. Analysis shows that security problems and prestige are the two most important motives, when the risks of proliferation are considered. But motives are not enough. To produce nuclear weapons a number of technological requirements must also be fulfilled. The country must be able to produce almost pure fissile material, i.e. 235 U or 239 Pu. It must also be able to solve a number of metallurgical, explosive, ignition, physics and other problems. These are in particular non-trivial, if a implosion weapon is to be designed. A review is made of the nuclear facilities in a number of the countries which have been suggested as possible future nuclear weapons countries. In particular facilities which can produce almost pure fissile materials, 235 U and 239 Pu, are considered. The possibility of nuclear terrorists have often been discussed in the media. However, it seems very unlikely that even a major terrorist or mafia organization will be able to solve all the weapons design problems, even if they could steal the fissile material. It is finally discussed what can be done to reduce the risk of further nuclear proliferation. Political pressure can be brought to bear on countries outside the NPT to join it, but it can be counter-productive, and sometimes the countries that are able to exert such pressure, are not willing to do so for other political reasons. The problem of countries which are party to the NPT, but which are believed to acquire nuclear weapons capability in violation of the treaty, can be countered by unannounced inspections of non-declared facilities. However, such inspections can only be meaningfully performed if the necessary intelligence is available. (EG)

  2. The proliferation of massive destruction weapons and ballistic missiles

    International Nuclear Information System (INIS)

    Schmitt, M.

    1996-01-01

    The author studies the actual situation of nuclear deterrence policies, the possibilities of use chemical weapons as massive destructions weapons for non nuclear governments. The situation of non proliferation of nuclear weapons took a new interest with the disintegration of the communism block, but it seems that only few nuclear matter disappeared towards proliferating countries. The denuclearization of Bielorussia, Ukraine and Kazakhstan makes progress with the START I treaty; China has signed the Non proliferation treaty in 1992, it conducts an export policy in matter of equipment and know-how, towards Iran, Pakistan, North Korea, Saudi Arabia and Syria. In a future of ten years, countries such, Iran, North Korea could catch up with Israel, India and Pakistan among non declared nuclear countries. For chemical weapon, Libya, Iran and Syria could catch up with Iraq. (N.C.)

  3. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  4. Opportunity for Realizing Ideal Computing System using Cloud Computing Model

    OpenAIRE

    Sreeramana Aithal; Vaikunth Pai T

    2017-01-01

    An ideal computing system is a computing system with ideal characteristics. The major components and their performance characteristics of such hypothetical system can be studied as a model with predicted input, output, system and environmental characteristics using the identified objectives of computing which can be used in any platform, any type of computing system, and for application automation, without making modifications in the form of structure, hardware, and software coding by an exte...

  5. The mutualistic relationship between information systems and the humanities

    OpenAIRE

    Kroeze, Jan H

    2010-01-01

    The paper explores the nature of the relationship between the study fields of Information Systems and the humanities. Although literature on Humanities Computing states in principle that there is a bidirectional, beneficial symbiotic relationship, most studies and reflections investigate only the application of information technology in the humanities. This implies that the relation is commensalistic rather that multualistic. However, studies do exist that implement theoretical constructs bor...

  6. Human Environmental Disease Network: A computational model to assess toxicology of contaminants.

    Science.gov (United States)

    Taboureau, Olivier; Audouze, Karine

    2017-01-01

    During the past decades, many epidemiological, toxicological and biological studies have been performed to assess the role of environmental chemicals as potential toxicants associated with diverse human disorders. However, the relationships between diseases based on chemical exposure rarely have been studied by computational biology. We developed a human environmental disease network (EDN) to explore and suggest novel disease-disease and chemical-disease relationships. The presented scored EDN model is built upon the integration of systems biology and chemical toxicology using information on chemical contaminants and their disease relationships reported in the TDDB database. The resulting human EDN takes into consideration the level of evidence of the toxicant-disease relationships, allowing inclusion of some degrees of significance in the disease-disease associations. Such a network can be used to identify uncharacterized connections between diseases. Examples are discussed for type 2 diabetes (T2D). Additionally, this computational model allows confirmation of already known links between chemicals and diseases (e.g., between bisphenol A and behavioral disorders) and also reveals unexpected associations between chemicals and diseases (e.g., between chlordane and olfactory alteration), thus predicting which chemicals may be risk factors to human health. The proposed human EDN model allows exploration of common biological mechanisms of diseases associated with chemical exposure, helping us to gain insight into disease etiology and comorbidity. This computational approach is an alternative to animal testing supporting the 3R concept.

  7. DOE/LLNL verification symposium on technologies for monitoring nuclear tests related to weapons proliferation

    International Nuclear Information System (INIS)

    Nakanishi, K.K.

    1993-01-01

    The rapidly changing world situation has raised concerns regarding the proliferation of nuclear weapons and the ability to monitor a possible clandestine nuclear testing program. To address these issues, Lawrence Livermore National Laboratory's (LLNL) Treaty Verification Program sponsored a symposium funded by the US Department of Energy's (DOE) Office of Arms Control, Division of Systems and Technology. The DOE/LLNL Symposium on Technologies for Monitoring Nuclear Tests Related to Weapons Proliferation was held at the DOE's Nevada Operations Office in Las Vegas, May 6--7,1992. This volume is a collection of several papers presented at the symposium. Several experts in monitoring technology presented invited talks assessing the status of monitoring technology with emphasis on the deficient areas requiring more attention in the future. In addition, several speakers discussed proliferation monitoring technologies being developed by the DOE's weapons laboratories

  8. Computational Modeling of Human Metabolism and Its Application to Systems Biomedicine.

    Science.gov (United States)

    Aurich, Maike K; Thiele, Ines

    2016-01-01

    Modern high-throughput techniques offer immense opportunities to investigate whole-systems behavior, such as those underlying human diseases. However, the complexity of the data presents challenges in interpretation, and new avenues are needed to address the complexity of both diseases and data. Constraint-based modeling is one formalism applied in systems biology. It relies on a genome-scale reconstruction that captures extensive biochemical knowledge regarding an organism. The human genome-scale metabolic reconstruction is increasingly used to understand normal cellular and disease states because metabolism is an important factor in many human diseases. The application of human genome-scale reconstruction ranges from mere querying of the model as a knowledge base to studies that take advantage of the model's topology and, most notably, to functional predictions based on cell- and condition-specific metabolic models built based on omics data.An increasing number and diversity of biomedical questions are being addressed using constraint-based modeling and metabolic models. One of the most successful biomedical applications to date is cancer metabolism, but constraint-based modeling also holds great potential for inborn errors of metabolism or obesity. In addition, it offers great prospects for individualized approaches to diagnostics and the design of disease prevention and intervention strategies. Metabolic models support this endeavor by providing easy access to complex high-throughput datasets. Personalized metabolic models have been introduced. Finally, constraint-based modeling can be used to model whole-body metabolism, which will enable the elucidation of metabolic interactions between organs and disturbances of these interactions as either causes or consequence of metabolic diseases. This chapter introduces constraint-based modeling and describes some of its contributions to systems biomedicine.

  9. Hitler's bomb: the secret story of Germans' attempts to get the nuclear weapon

    International Nuclear Information System (INIS)

    Karlsch, Rainer

    2007-01-01

    In this historical book, the author claims to have evidence concerning the development and testing of a possible 'nuclear weapon' by Nazi Germany in 1945. The 'weapon' in question is not alleged to be a standard nuclear weapon powered by nuclear fission, but something closer to either a radiological weapon (a so-called 'dirty bomb') or a hybrid-nuclear fusion weapon. Its new evidence is concerned primarily with the parts of the German nuclear energy project (an attempted clandestine scientific effort led by Germany to develop and produce atomic weapons during World War II) under Kurt Diebner, a German nuclear physicist who directed and administrated the project

  10. Symbolic representations of weapons and preparations for conflict: The nuclear arms race

    Energy Technology Data Exchange (ETDEWEB)

    Bassin, E.L.

    1991-01-01

    This study investigates the process through which actors acquire weapons in preparation for a confrontation with some rival. A theory is developed to account for those preparations rooted in two social psychological perspectives; social exchange theory and symbolic interactionism. The empirical aspect of the study deals with the nuclear arms race between the US and Soviet Union. The first portion involves a qualitative analysis to uncover the meaning system. The second portion involves a quantitative test of the theory. Data cover all 53 long range strategic missile systems ever deployed by the US or USSR. Results lend support for the idea of a meaning-based theory of preparation for conflict. By operationalizing weapons as actors perceive the objects in their environment, the results of this study provide a higher level of fit than found in earlier arms race research.

  11. Symbolic representations of weapons and preparations for conflict: The nuclear arms race

    International Nuclear Information System (INIS)

    Bassin, E.L.

    1991-01-01

    This study investigates the process through which actors acquire weapons in preparation for a confrontation with some rival. A theory is developed to account for those preparations rooted in two social psychological perspectives; social exchange theory and symbolic interactionism. The empirical aspect of the study deals with the nuclear arms race between the US and Soviet Union. The first portion involves a qualitative analysis to uncover the meaning system. The second portion involves a quantitative test of the theory. Data cover all 53 long range strategic missile systems ever deployed by the US or USSR. Results lend support for the idea of a meaning-based theory of preparation for conflict. By operationalizing weapons as actors perceive the objects in their environment, the results of this study provide a higher level of fit than found in earlier arms race research

  12. A Human/Computer Learning Network to Improve Biodiversity Conservation and Research

    OpenAIRE

    Kelling, Steve; Gerbracht, Jeff; Fink, Daniel; Lagoze, Carl; Wong, Weng-Keen; Yu, Jun; Damoulas, Theodoros; Gomes, Carla

    2012-01-01

    In this paper we describe eBird, a citizen-science project that takes advantage of the human observational capacity to identify birds to species, which is then used to accurately represent patterns of bird occurrences across broad spatial and temporal extents. eBird employs artificial intelligence techniques such as machine learning to improve data quality by taking advantage of the synergies between human computation and mechanical computation. We call this a Human-Computer Learning Network,...

  13. Advanced human-system interface design review guidelines

    International Nuclear Information System (INIS)

    O'Hara, J.M.

    1990-01-01

    Advanced, computer-based, human-system interface designs are emerging in nuclear power plant (NPP) control rooms. These developments may have significant implications for plant safety in that they will greatly affect the ways in which operators interact with systems. At present, however, the only guidance available to the US Nuclear Regulatory Commission (NRC) for the review of control room-operator interfaces, NUREG-0700, was written prior to these technological changes and is thus not designed to address them. The objective of the project reported in this paper is to develop an Advanced Control Room Design Review Guideline for use in performing human factors reviews of advanced operator interfaces. This guideline will be implemented, in part, as a portable, computer-based, interactive document for field use. The paper describes the overall guideline development methodology, the present status of the document, and the plans for further guideline testing and development. 21 refs., 3 figs

  14. Responding to chemical weapons violations in Syria: legal, health, and humanitarian recommendations.

    Science.gov (United States)

    Brooks, Julia; Erickson, Timothy B; Kayden, Stephanie; Ruiz, Raul; Wilkinson, Stephen; Burkle, Frederick M

    2018-01-01

    The repeated use of prohibited chemical weapons in the Syrian conflict poses serious health, humanitarian, and security threats to civilians, healthcare personnel, and first responders. Moreover, the use of chemical weapons constitutes a clear and egregious violation of international law-likely amounting to a war crime-for which continued impunity is setting a dangerous precedent in relation to current and future conflicts. This debate article calls upon concerned states, organizations, and individuals to respond urgently and unequivocally to this serious breach of international legal and humanitarian norms. Based on health, humanitarian, and legal findings, this article calls for concrete action to: 1) reduce the risk of chemical weapons being used in current and future conflicts; 2) review and support the preparedness equipment and antidote supplies of first responders, humanitarian organizations, and military forces operating in Syria; 3) support international mechanisms for monitoring and enforcing the prohibition on chemical weapons, including through criminal accountability; 4) support civilian victims of chemical weapons attacks, including refugees; and 5) re-commit to the complete elimination of chemical weapons in compliance with the Chemical Weapons Convention (1993), a comprehensive treaty that bans chemical weapons and requires their complete destruction. All involved states and organizations should take urgent steps to ensure the protection of the most vulnerable victims of conflict, including victims of chemical weapons attacks in Syria, and to reinforce international law in the face of such serious violations.

  15. Iran's nuclear program - for power generation or nuclear weapons?

    International Nuclear Information System (INIS)

    Kippe, Halvor

    2008-11-01

    This report addresses the development of a nuclear infrastructure in Iran, and assessments are made on the near-term potential this infrastructure might yield of either nuclear power or nuclear arms production. The most significant facilities are treated in a more elaborate fashion, as these are assumed to have key roles in either a true civilian programme, or in the prospect of weapons-grade fissile material production. The future potential capacity for the latter is calculated under certain presumptions, both in the case that Iran focuses its efforts on uranium-based nuclear weapons, and in the case that it should choose the plutonium path to nuclear weapons. All the conclusions and findings in this report are based on technological considerations. This means that social or political assessments have not prevailed, rather the picture of Iran's nuclear programme is drawn through descriptions and assessments of facilities and systems, and their role in the bigger context. Definite conclusions have not been made as to whether Iran's nuclear programme currently is aimed towards nuclear arms or nuclear power. The secrecy surrounding some of the most prominent nuclear sites together with more or less credible allegations of purely weapons-related activities in the past, make it hard not to conclude that Iran until the disclosures in 2002 made as great an effort as it could on its way on developing nuclear weapons covertly. The scope of today's nuclear programme seems, on the other hand, most likely to be in part to help relieve the ever-increasing need for energy, although considerable deficits to this strategy are identified, at the same time as the Iranian people are united in a giant, high-prestige project in defiance of massive international pressure. Adding to this is a much-feared ability to rapidly being able to redirect their nuclear efforts, and develop nuclear arms in perhaps as little as one year. This so-called break-out scenario, where Iran presumably

  16. Constraining potential nuclear-weapons proliferation from civilian reactors

    International Nuclear Information System (INIS)

    Travelli, A.; Gaines, L.L.; Minkov, V.; Olson, A.P.; Snelgrove, J.

    1993-01-01

    Cessation of the Cold War and renewed international attention to the proliferation of weapons of mass destruction are leading to national policies aimed at restraining nuclear-weapons proliferation that could occur through the nuclear-fuel cycle. Argonne, which has unique experience, technology, and capabilities, is one of the US national laboratories contributing to this nonproliferation effort

  17. Computational Complexity and Human Decision-Making.

    Science.gov (United States)

    Bossaerts, Peter; Murawski, Carsten

    2017-12-01

    The rationality principle postulates that decision-makers always choose the best action available to them. It underlies most modern theories of decision-making. The principle does not take into account the difficulty of finding the best option. Here, we propose that computational complexity theory (CCT) provides a framework for defining and quantifying the difficulty of decisions. We review evidence showing that human decision-making is affected by computational complexity. Building on this evidence, we argue that most models of decision-making, and metacognition, are intractable from a computational perspective. To be plausible, future theories of decision-making will need to take into account both the resources required for implementing the computations implied by the theory, and the resource constraints imposed on the decision-maker by biology. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Recovery of weapon plutonium as feed material for reactor fuel

    International Nuclear Information System (INIS)

    Armantrout, G.A.; Bronson, M.A.; Choi, Jor-Shan

    1994-01-01

    This report presents preliminary considerations for recovering and converting weapon plutonium from various US weapon forms into feed material for fabrication of reactor fuel elements. An ongoing DOE study addresses the disposition of excess weapon plutonium through its use as fuel for nuclear power reactors and subsequent disposal as spent fuel. The spent fuel would have characteristics similar to those of commercial power spent fuel and could be similarly disposed of in a geologic repository

  19. U.S. assistance in the destruction of Russia's chemical weapons

    OpenAIRE

    Mostoller, Eric Charles

    2000-01-01

    The thesis examines the present status of Russia's chemical weapons destruction program, which is to be implemented according to the 1993 Chemical Weapons Convention (CWC). It assesses the magnitude of the challenges in destroying the world's largest chemical weapons stockpile, which is located at seven sites in western Russia. It also evaluates the environmental and international security concerns posed by the conditions at these sites and the disastrous implications of a failure of this che...

  20. Weapon carrying and psychopathic-like features in a population-based sample of Finnish adolescents.

    Science.gov (United States)

    Saukkonen, Suvi; Laajasalo, Taina; Jokela, Markus; Kivivuori, Janne; Salmi, Venla; Aronen, Eeva T

    2016-02-01

    We investigated the prevalence of juvenile weapon carrying and psychosocial and personality-related risk factors for carrying different types of weapons in a nationally representative, population-based sample of Finnish adolescents. Specifically, we aimed to investigate psychopathic-like personality features as a risk factor for weapon carrying. The participants were 15-16-year-old adolescents from the Finnish self-report delinquency study (n = 4855). Four different groups were formed based on self-reported weapon carrying: no weapon carrying, carrying knife, gun or other weapon. The associations between psychosocial factors, psychopathic-like features and weapon carrying were examined with multinomial logistic regression analysis. 9% of the participants had carried a weapon in the past 12 months. Adolescents with a history of delinquency, victimization and antisocial friends were more likely to carry weapons in general; however, delinquency and victimization were most strongly related to gun carrying, while perceived peer delinquency (antisocial friends) was most strongly related to carrying a knife. Better academic performance was associated with a reduced likelihood of carrying a gun and knife, while feeling secure correlated with a reduced likelihood of gun carrying only. Psychopathic-like features were related to a higher likelihood of weapon carrying, even after adjusting for other risk factors. The findings of the study suggest that adolescents carrying a weapon have a large cluster of problems in their lives, which may vary based on the type of weapon carried. Furthermore, psychopathic-like features strongly relate to a higher risk of carrying a weapon.