WorldWideScience

Sample records for weapons threat levers

  1. The bioscience revolution & the biological weapons threat: levers & interventions

    Directory of Open Access Journals (Sweden)

    Martin Greg

    2009-02-01

    Full Text Available Abstract In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level.

  2. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  3. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    Evaluation and Weapon Assignment (TEWA) process with regards to Command and ... [81] TE refers to “the part of threat analysis concerned with the ...... makers are more likely to screen options with respect to cut-offs or goals when there is.

  4. Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges

    Science.gov (United States)

    Boso, Brian

    2011-03-01

    Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (<2 lbs), detect a large array of chemical warfare agents and toxic industrial chemicals, detect and warn at concentration levels and time duration to prevent acute health effects, meet military ruggedness specifications and work over a wide range of temperature and humidity, and have a very high probability of detection with a similarly low probability of false positives. The current technology of choice to meet these stringent requirements is Ion Mobility Spectrometry. Many technologies are capable of detecting chemicals at the trace levels required and have been extensively developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential

  5. China's ASAT Weapon: Capabilities and the Potential Threat

    Science.gov (United States)

    Forden, Geoffrey

    2008-04-01

    Much has been said about China's 11 January 2007 test of an anti-satellite (ASAT) weapon but few analysts have based their comments on a scientific determination of the weapons capabilities. This paper presents such an analysis derived from the observed pattern of debris, as observed by NORAD and posted on-line by NASA. It is clear that this was a direct hit-to-kill weapon (as opposed to a fragmentation-type explosive warhead), it massed about 600 kg, and was capable of accelerations of at least 6 Gs. It can be inferred with a reasonable degree of confidence that it used an on-board optical tracker, most likely operating in visible light. Furthermore, since the closing speed between the target satellite and the interceptor was 8 km/s during the test, this weapon could be used to attack satellites at higher altitude orbits, such as NAVSTAR/GPS and geostationary satellites that include communications and early warning satellites. This test produced ten times as many pieces of debris as an earlier US hit-to-kill ASAT test which, because of their higher altitudes, will last thousands of years---hundreds of times longer than the debris in the US test. China's test increased the chances of some low earth orbit satellite being hit by a piece of debris by 50%, from about 12% to 18% each year. Given this weapon's capabilities, it is possible to ``war game'' what an all-out Chinese ASAT attack would look like and what responses the US could take. (It is important to emphasize that this is a capabilities-based exercise and not based on Chinese intentions.) If China did launch such an attack, it could eliminate a large fraction of US military satellites in low earth orbit including photo-reconnaissance and electronic intelligence satellites, but not all of them, in the first 24 hours; the requirement that the target satellites be illuminated by the sun limits the attack. Furthermore, the US could maneuver its LEO satellites in the first hours of the attack and greatly

  6. Threat is in the sex of the beholder: men find weapons faster than do women.

    Science.gov (United States)

    Sulikowski, Danielle; Burke, Darren

    2014-10-29

    In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting) than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon-yet potentially threatening-object. The findings are discussed with respect to the "weapons effect" and social coercion theory.

  7. Threat is in the Sex of the Beholder: Men Find Weapons Faster than do Women

    Directory of Open Access Journals (Sweden)

    Danielle Sulikowski

    2014-04-01

    Full Text Available In visual displays, people locate potentially threatening stimuli, such as snakes, spiders, and weapons, more quickly than similar benign stimuli, such as beetles and gadgets. Such biases are likely adaptive, facilitating fast responses to potential threats. Currently, and historically, men have engaged in more weapons-related activities (fighting and hunting than women. If biases of visual attention for weapons result from selection pressures related to these activities, then we would predict such biases to be stronger in men than in women. The current study reports the results of two visual search experiments, in which men showed a stronger bias of attention toward guns and knives than did women, whether the weapons were depicted wielded or not. When the weapons were depicted wielded, both sexes searched for them with more caution than when they were not. Neither of these effects extended reliably to syringes, a non-weapon—yet potentially threatening—object. The findings are discussed with respect to the “weapons effect” and social coercion theory.

  8. Threat evaluation and weapon assignment decision support: A review of the state of the art

    Directory of Open Access Journals (Sweden)

    JN Roux

    2007-12-01

    Full Text Available In a military environment an operator is typically required to evaluate the tactical situation in real-time and protect defended assets against enemy threats by assigning available weapon systems to engage enemy craft. This environment requires rapid operational planning and decision making under severe stress conditions, and the associated responsibilities are usually divided between a number of operators and computerized decision support systems that aid these operators during the decision making processes. The aim in this paper is to review the state of the art of this kind of threat evaluation and weapon assignment decision support process as it stands within the context of a ground based air defence system (GBADS at the turn of the twenty first century. However, much of the contents of the paper may be generalized to military environments other than a GBADS one.

  9. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    Science.gov (United States)

    2016-03-01

    four incoming targets to be countered with two multi-domain capable RAM launchers, the average model solve time using Microsoft Excel VBA for pre...Microsoft Visual Basic for Applications ( VBA ) code is used to pre-process all input data and calculations required for the model , formulate the MIP and...providing the operator with recommended weapon-target pairings based on current defensive capabilities and threat profiles. The model consists of a pre

  10. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    OpenAIRE

    Naeem, Huma; Masood, Asif; Hussain, Mukhtar; Shoab A. Khan

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEW...

  11. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  12. A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques

    CERN Document Server

    Naeem, Huma; Hussain, Mukhtar; Khan, Shoab A

    2009-01-01

    Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment...

  13. Turkey’s Response to Threats of Weapons of Mass Destruction

    Science.gov (United States)

    2001-12-01

    categories of unconventional weapons and was prepared to invest enormous financial and human resources to achieve this goal. 5 Iraqi attempts to seek...butolinum toxin, afla-toxin, ricin, and trichothecene mycotoxins), an anti-crop agent, and three incapacitating viruses (hemorrhagic conjunctivitis

  14. Beyond Nunn-Lugar: Curbing the Next Wave of Weapons Proliferation Threat from Russia

    Science.gov (United States)

    2002-04-01

    Kuntsevich , former head of the Russian chemical weapons program and later adviser to Yeltsin on chemical disarmament, was caught selling chemical precursors to...tons in 1994.2 Still, Kuntsevich did not serve out his jail term. Even more disturbing are reports that Aum Shinrikio, a Japanese doomsday cult

  15. The evolution of legal approaches to controlling nuclear and radiological weapons and combating the threat of nuclear terrorism

    NARCIS (Netherlands)

    J. Herbach

    2015-01-01

    This chapter traces the evolution of international law related to the weaponization of nuclear and other radioactive materials, focusing in particular on the law pertaining to preventing acts of nuclear terrorism. International efforts to control atomic energy have evolved substantially since the on

  16. North Korea’s Military Threat: Pyongyang’s Conventional Forces, Weapons of Mass Destruction, and Ballistic Missiles

    Science.gov (United States)

    2007-04-01

    eternalize their rule. They have a large stockpile and we are to be forbidden even to think about the manufacture of nuclear weapons.321 Any modest...Chinhae.” Additionally, in light with South Korea’s Sunshine Policy (overtures that past ROK President Kim Dae Jung made to North Korea), officially

  17. A New Approach to Ballistic Missile Defense for Countering Antiaccess/Area-Denial Threats from Precision-Guided Weapons

    Science.gov (United States)

    2013-04-01

    Congress, CRS Report for Congress (Washington, DC: Congressional Research Ser- vice, 18 March 2012), 3–5. 5. Mohammad-Ali Massoumnia, Q- Guidance in Rotating...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Air Force Research Institute (AFRI),155 N. Twining...Furthermore, the MDA has dedicated nearly all of its re- cent development to the midcourse phase of flight, where the threat has the greatest freedom to

  18. 贫信息下空袭兵器威胁能力评估方法%Research on Assessment for Threat Ability of Air Raid Weapon under Lacking Information

    Institute of Scientific and Technical Information of China (English)

    赵喜; 李修和; 沈阳

    2011-01-01

    Nowadays, at aerial defense combat, the air raid weapons become more and more powerful,which bring more menace to our key target. So it is badly needed to evaluate the menace ability of air raid weapons, so as to assign aerial defense power and protect our target. This paper researches the process of assessment for threat ability of aerial raid weapon, provides the arithmetic and math model under the background of modern aerial-defense combat and lacking information. The example given in the end shows the practicability of the model.%现代防空作战中,各种空袭兵器突袭能力不断增强,对我方目标构成了极大威胁.因此,需要对空袭兵器的威胁能力进行评估,合理分配各种防空火力,以达到保护我方目标的目的.研究了现代防空作战背景下,空袭兵器威胁能力评估的全过程,给出了贫信息下,威胁能力评估的算法,建立了数学模型,最后用实例说明了该评估方法的实用性.

  19. Application of a Dynamic Programming Algorithm for Weapon Target Assignment

    Science.gov (United States)

    2016-02-01

    UNCLASSIFIED UNCLASSIFIED Application of a Dynamic Programming Algorithm for Weapon Target Assignment Lloyd Hammond Weapons and...Combat Systems Division Defence Science and Technology Group DST Group-TR-3221 ABSTRACT Threat evaluation and weapon assignment...dynamic programming algorithm for Weapon Target Assignment which, after more rigorous testing, could be used as a concept demonstrator and as an auxiliary

  20. La Lever house, New York

    OpenAIRE

    Sergio Miguel

    2012-01-01

    Resumen

    En el último siglo la mítica ciudad de Nueva York ha sido capaz de definir y transmitir las más contagiosas propuestas de  construcción del futuro.
    El edificio de la Lever House, erigido en el corazón de Manhattan al comienzo de la prodigiosa década de los cincuenta, consiguió ser la constatación de que el perseguido sue&am...

  1. La Lever house, New York

    Directory of Open Access Journals (Sweden)

    Sergio de Miguel

    2012-12-01

    Full Text Available

    Resumen

    En el último siglo la mítica ciudad de Nueva York ha sido capaz de definir y transmitir las más contagiosas propuestas de  construcción del futuro.
    El edificio de la Lever House, erigido en el corazón de Manhattan al comienzo de la prodigiosa década de los cincuenta, consiguió ser la constatación de que el perseguido sueño de la “torre de cristal” era por fin posible. La poética y secular conquista de la  levedad avanzó entonces a través de un prosaico y paradójico objeto publicitario. Un particular crisol de negocio, oportunidad y audacia hicieron de ésta sorprendente pieza un icono   fundamental de la globalizada arquitectura moderna americana.


    Nota* En la edición electrónica este artículo se ha publicado con toda documentación gráfica aportada por el autor.

    Palabras clave

    Lever house, torre, levedad, cristal, publicidad, icono

    Abstract

    In the last century, the mythical city of New York has been able to define and transmit the most contagious proposals of  innovative construction.
    The Lever House Building, erected in the heart of Manhattan at  the start of the prodigious 1950s managed to become a  statement for the possibility of finally realizing the sought‐after
    dream of building a glass tower. The poetics and secular   conquest of lightness therefore made a leap forward through a prosaic and paradoxical publicity item. A special crucible of business, opportunity and audacity made a fundamental icon of globalized modern American Architecture out of this surprising work.


    Note * In the online edition this article is published with all graphic material provided by the author.

  2. Bioterrorism: pathogens as weapons.

    Science.gov (United States)

    Anderson, Peter D; Bokor, Gyula

    2012-10-01

    Biowarfare has been used for centuries. The use of biological weapons in terrorism remains a threat. Biological weapons include infectious agents (pathogens) and toxins. The most devastating bioterrorism scenario would be the airborne dispersal of pathogens over a concentrated population area. Characteristics that make a specific pathogen a high-risk for bioterrorism include a low infective dose, ability to be aerosolized, high contagiousness, and survival in a variety of environmental conditions. The most dangerous potential bioterrorism agents include the microorganisms that produce anthrax, plague, tularemia, and smallpox. Other diseases of interest to bioterrorism include brucellosis, glanders, melioidosis, Q fever, and viral encephalitis. Food safety and water safety threats are another area of concern.

  3. Special Weapons

    Data.gov (United States)

    Federal Laboratory Consortium — Supporting Navy special weapons, the division provides an array of engineering services, technical publication support services, logistics support services, safety...

  4. Rainout assessment: the ACRA system and summaries of simulation results. [Computer systems to estimate threats from precipitation scavenging of radioactive debris clouds from nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Watson, C.W.; Barr, S.; Allenson, R.E.

    1977-09-01

    A generalized, three-dimensional, integrated computer code system was developed to estimate collateral-damage threats from precipitation-scavenging (rainout) of airborne debris-clouds from defensive tactical nuclear engagements. This code system, called ACRA for Atmospheric-Contaminant Rainout Assessment, is based on Monte Carlo statistical simulation methods that allow realistic, unbiased simulations of probabilistic storm, wind, and precipitation fields that determine actual magnitudes and probabilities of rainout threats. Detailed models (or data bases) are included for synoptic-scale storm and wind fields; debris transport and dispersal (with the roles of complex flow fields, time-dependent diffusion, and multidimensional shear effects accounted for automatically); microscopic debris-precipitation interactions and scavenging probabilities; air-to-ground debris transport; local demographic features, for assessing actual threats to populations; and nonlinear effects accumulations from multishot scenarios. We simulated several hundred representative shots for West European scenarios and climates to study single-shot and multishot sensitivities of rainout effects to variations in pertinent physical variables.

  5. [Biological weapons].

    Science.gov (United States)

    Kerwat, K; Becker, S; Wulf, H; Densow, D

    2010-08-01

    Biological weapons are weapons of mass destruction that use pathogens (bacteria, viruses) or the toxins produced by them to target living organisms or to contaminate non-living substances. In the past, biological warfare has been repeatedly used. Anthrax, plague and smallpox are regarded as the most dangerous biological weapons by various institutions. Nowadays it seems quite unlikely that biological warfare will be employed in any military campaigns. However, the possibility remains that biological weapons may be used in acts of bioterrorism. In addition all diseases caused by biological weapons may also occur naturally or as a result of a laboratory accident. Risk assessment with regard to biological danger often proves to be difficult. In this context, an early identification of a potentially dangerous situation through experts is essential to limit the degree of damage. Georg Thieme Verlag KG Stuttgart * New York.

  6. Portfolio Diversification with Commodity Futures: Properties of Levered Futures

    NARCIS (Netherlands)

    Woodard, J.D.; Egelkraut, T.M.; Garcia, P.; Pennings, J.M.E.

    2005-01-01

    Portfolio Diversification with Commodity Futures: Properties of Levered Futures This study extends previous work on the impact of commodity futures on portfolio performance by explicitly incorporating levered futures into the portfolio optimization problem. Using data on nine individual commodity

  7. Portfolio Diversification with Commodity Futures: Properties of Levered Futures

    NARCIS (Netherlands)

    Woodard, J.D.; Egelkraut, T.M.; Garcia, P.; Pennings, J.M.E.

    2005-01-01

    Portfolio Diversification with Commodity Futures: Properties of Levered Futures This study extends previous work on the impact of commodity futures on portfolio performance by explicitly incorporating levered futures into the portfolio optimization problem. Using data on nine individual commodity fu

  8. Sustainability in Healthcare: Combining Organizational and Architectural Levers

    Directory of Open Access Journals (Sweden)

    Marta Pinzone

    2012-11-01

    propositions with respect to the improvement of sustainability‐related performances in hospitals through the combination of organizational and architectural levers. Ten levers and their mutual relationships have been identified and described.

  9. Assessing the Biological Weapons and Bioterrorism Threat

    Science.gov (United States)

    2005-12-01

    unsuccessful. 66. Brad Roberts, “The Outpacing of Negotiations by Circumstance,” in K. M. Jensen and David Wurmser, eds., Is It Feasible to...Controlling Dangerous Pathogens,” www.cissm.umd.edu/documents/Patho gens%20project%20monograph_092203.pdf. 231. Personal communication, 2005. 232. Liz

  10. Biological Weapons -- Still a Relevant Threat

    Science.gov (United States)

    2012-03-22

    sunlight can weaken the effects and persistency of the chemical agents. 9 Winds can also send the agent in the wrong direction or even back onto the...and those in the area fell unconscious and were crushed to death. Then they were blown up in the air and hurled back to the ground. The roaring...include fever, coughing, headache, muscle or joint pain , sore throat, chills, fatigue, and running nose. These are not only symptoms from a potential

  11. The State of Applying Socio-Economic Levers for Ensuring the Polyvector Development of Industrial Enterprises in Ukraine

    Directory of Open Access Journals (Sweden)

    Kuzmin Oleh Ye.

    2016-05-01

    Full Text Available The aim of the article is to obtain by means of using instruments of primary research the information on the state of applying socio-economic levers for ensuring polyvector development of industrial enterprises in Ukraine as an information base for making management decisions on improving the process. There have been laid out and justified main parameters of the conducted survey to identify the state of applying socio-economic levers for ensuring polyvector development of industrial enterprises in Ukraine (choosing the method of raw information collection, forming the volume of selection totality, determining its spatial characteristic, identifying the target audience of the objects in the sample, choosing the instrument of the study, etc. On the basis of the results of the conducted study there has been diagnosed a number of parameters characterizing the state of applying socio-economic levers for ensuring polyvector development of industrial enterprises in Ukraine, namely: clarity of the system of levers in whole for employees, relation of the system to the enterprise profitability, complexity of using the existing socio-economic levers ensuring polyvector development at domestic industrial enterprises, overall evaluation of the system of such levers, changes in their effectiveness under the influence of the recent financial and economic crisis. Besides, there has been performed identification of the subjects responsible at domestic enterprises for creating socio-economic levers ensuring polyvector development of business as well as factors most contributing to these processes and threats complicatingthem in a certain way. The results obtained should become an important information base for making management decisions helping to ensure polyvector development of industrial enterprises in Ukraine. Prospects for further research in this direction should be the specifying of separate problems aimed at more efficient management of polyvector

  12. Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools.

    Science.gov (United States)

    Johnson, Robert S.

    2000-01-01

    Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…

  13. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  14. Simulation model of a lever-propelled wheelchair.

    Science.gov (United States)

    Sasaki, Makoto; Ota, Yuki; Hase, Kazunori; Stefanov, Dimitar; Yamaguchi, Masaki

    2014-01-01

    Wheelchair efficiency depends significantly on the individual adjustment of the wheelchair propulsion interface. Wheelchair prescription involves reconfiguring the wheelchair to optimize it for specific user characteristics. Wheelchair tuning procedure is a complicated task that is performed usually by experienced rehabilitation engineers. In this study, we report initial results from the development of a musculoskeletal model of the wheelchair lever propulsion. Such a model could be used for the development of new advanced wheelchair approaches that allow wheelchair designers and practitioners to explore virtually, on a computer, the effects of the intended settings of the lever-propulsion interface. To investigate the lever-propulsion process, we carried out wheelchair lever propulsion experiments where joint angle, lever angle and three-directional forces and moments applied to the lever were recorded during the execution of defined propulsion motions. Kinematic and dynamic features of lever propulsion motions were extracted from the recorded data to be used for the model development. Five healthy male adults took part in these initial experiments. The analysis of the collected kinematic and dynamic motion parameters showed that lever propulsion is realized by a cyclical three-dimensional motion of upper extremities and that joint torque for propulsion is maintained within a certain range. The synthesized propulsion model was verified by computer simulation where the measured lever-angles were compared with the angles generated by the developed model simulation. Joint torque amplitudes were used to impose the torque limitation to the model joints. The results evidenced that the developed model can simulate successfully basic lever propulsion tasks such as pushing and pulling the lever.

  15. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  16. Lever attacking and pressing as a function of conditioning and extinguishing a lever-press avoidance response in rats.

    Science.gov (United States)

    Pear, J J; Hemingway, M J; Keizer, P

    1978-03-01

    Six experimental rats were conditioned to press one of two available levers to avoid shock. The levers registered bites as well as presses. For four of these rats, shock was contingent on lever bites when a specified time period had elapsed after the previous shock. An extinction period, in which only periodic noncontingent shocks were presented, followed avoidance training. Six yoked-control rats received the same sequence of shocks as did the corresponding experimental rats in both the conditioning and extinction phases. All six experimental rats repeatedly bit the avoidance lever. Four bit it more than the nonavoidance lever during conditioning, and five bit it more during extinction. Five of the six experimental rats consistently bit the levers many more times during each session than did their respective control rats, suggesting that avoidance conditioning facilitated lever biting. Rates of lever biting and pressing by all of the experimental rats and by some of the control rats were highest immediately following shock throughout both phases. During later portions of the intervals following shock, characteristic effects of conditioning and extinction were observed. This finding suggests that extinction of avoidance behavior by unavoidable shock presentations can be demonstrated more readily when shock-elicited responding is extricated from the data.

  17. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    above, these responses included: • “The unsettled dirt,” • “ Grassy area,” and • “Weapons not held properly.” We hypothesized that training would...alternative explanation is that with training, participants narrow their choices to threat relevant cues rather than identifying all possible threats

  18. Differential Suppression by Punishment of Nonconsummatory Licking and Lever Pressing

    Science.gov (United States)

    Walters, Gary C.; Herring, Barbara

    1978-01-01

    Five experiments investigated the differential effects of shock punishment on nonconsummatory licking (dry licking) and lever pressing. Results support a motivationally based theory of punishment involving the role of incentive stimuli associated with the particular responses studied. (Editor/RK)

  19. Multiplying optical tweezers force using a micro-lever.

    Science.gov (United States)

    Lin, Chih-Lang; Lee, Yi-Hsiung; Lin, Chin-Te; Liu, Yi-Jui; Hwang, Jiann-Lih; Chung, Tien-Tung; Baldeck, Patrice L

    2011-10-10

    This study presents a photo-driven micro-lever fabricated to multiply optical forces using the two-photon polymerization 3D-microfabrication technique. The micro-lever is a second class lever comprising an optical trapping sphere, a beam, and a pivot. A micro-spring is placed between the short and long arms to characterize the induced force. This design enables precise manipulation of the micro-lever by optical tweezers at the micron scale. Under optical dragging, the sphere placed on the lever beam moves, resulting in torque that induces related force on the spring. The optical force applied at the sphere is approximately 100 to 300 pN, with a laser power of 100 to 300 mW. In this study, the optical tweezers drives the micro-lever successfully. The relationship between the optical force and the spring constant can be determined by using the principle of leverage. The arm ratio design developed in this study multiplies the applied optical force by 9. The experimental results are in good agreement with the simulation of spring property.

  20. Re-examining the 1996 ICJ Advisory Opinion: Concerning the Legality of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Jasjit Singh

    2012-10-01

    Full Text Available The primary objections raised against total elimination of nuclear weapons are built around a few arguments mostly of non-technical nature.Nuclear weapons and the strategies for their use have resulted in the establishment of a vicious circle within which the international community is trapped.The argument that the world will be unsafe without nuclear weapons is only meant to further the narrow self-interest of the nuclear weapon states and their allies.The World Court’s far-reaching 1996 advisory opinion concluded that almost any use or threat of use of nuclear weapons would violate international humanitarian law and law applicable in armed conflict, undermining most claims of nuclear weapon states regarding the legitimacy of possession, use or threat of use of nuclear weapons. The next logical step would be an initiative for a nuclear convention banning the use and threat of use of nuclear weapons in Asia and the adjoining oceans. But as long as the dominant elites in society and the nation-state believe in the utility of nuclear weapons for national security or as the currency of power, abolition of nuclear weapons will remain a mirage.

  1. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2014-01-03

    William Potter , and Nikolai Sokov, Reducing and Regulating Tactical (Nonstrategic) Nuclear Weapons in Europe, The James Martin Center For...See William C. Potter and Nikolai Sokov, “Nuclear Weapons that People Forget,” International Herald Tribune, May 31, 2000. 87 Sam Nunn, Igor...their security.97 94 Kent Harris , “NATO Allies Want U.S. Nuclear Weapons out of Europe

  2. Reconversion of nuclear weapons

    CERN Document Server

    Kapitza, Sergei P

    1993-01-01

    The nuclear predicament or nuclear option. Synopsis of three lectures : 1- The physical basis of nuclear technology. Physics of fission. Chain reaction in reactors and weapons. Fission fragments. Separration of isotopes. Radiochemistry.2- Nuclear reactors with slow and fast neutrons. Power, size, fuel and waste. Plutonium production. Dose rate, shielding and health hazard. The lessons of Chernobyl3- Nuclear weapons. Types, energy, blast and fallout. Fusion and hydrogen bombs. What to do with nuclear weapons when you cannot use them? Testing. Nonmilittary use. Can we get rid of the nuclear weapon? Nuclear proliferation. Is there a nuclear future?

  3. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  4. Myosin lever arm directs collective motion on cellular actin network.

    Science.gov (United States)

    Hariadi, Rizal F; Cale, Mario; Sivaramakrishnan, Sivaraj

    2014-03-18

    The molecular motor myosin teams up to drive muscle contraction, membrane traffic, and cell division in biological cells. Myosin function in cells emerges from the interaction of multiple motors tethered to a scaffold, with surrounding actin filaments organized into 3D networks. Despite the importance of myosin function, the influence of intermotor interactions on collective motion remains poorly understood. In this study, we used precisely engineered myosin assemblies to examine emergence in collective myosin movement. We report that tethering multiple myosin VI motors, but not myosin V motors, modifies their movement trajectories on keratocyte actin networks. Single myosin V and VI dimers display similar skewed trajectories, albeit in opposite directions, when traversing the keratocyte actin network. In contrast, tethering myosin VI motors, but not myosin V motors, progressively straightens the trajectories with increasing myosin number. Trajectory shape of multimotor scaffolds positively correlates with the stiffness of the myosin lever arm. Swapping the flexible myosin VI lever arm for the relatively rigid myosin V lever increases trajectory skewness, and vice versa. A simplified model of coupled motor movement demonstrates that the differences in flexural rigidity of the two myosin lever arms is sufficient to account for the differences in observed behavior of groups of myosin V and VI motors. In accordance with this model trajectory, shapes for scaffolds containing both myosin V and VI are dominated by the myosin with a stiffer lever arm. Our findings suggest that structural features unique to each myosin type may confer selective advantages in cellular functions.

  5. Public perspectives of nuclear weapons in the post-cold war environment

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins-Smith, H.C.; Herron, K.G. [Univ. of New Mexico, Albuquerque, NM (United States). Institute for Public Policy; Barke, R.P. [Georgia Institute of Technology, Atlanta, GA (United States). School of Public Policy

    1994-04-01

    This report summarizes the findings of a nationwide survey of public perceptions of nuclear weapons in the post-cold war environment. Participants included 1,301 members of the general public, 1,155 randomly selected members of the Union of Concerned Scientists, and 1,226 employees randomly selected from the technical staffs of four DOE national laboratories. A majority of respondents from all three samples perceived the post-cold war security environment to pose increased likelihood of nuclear war, nuclear proliferation, and nuclear terrorism. Public perceptions of nuclear weapons threats, risks, utilities, and benefits were found to systematically affect nuclear weapons policy preferences in predictable ways. Highly significant relationships were also found between public trust and nuclear weapons policy preferences. As public trust and official government information about nuclear weapons increased, perceptions of nuclear weapons management risks decreased and perceptions of nuclear weapons utilities and benefits increased. A majority of respondents favored decreasing funding for: (1) developing and testing new nuclear weapons; (2) maintaining existing nuclear weapons, and (3) maintaining the ability to develop and improve nuclear weapons. Substantial support was found among all three groups for increasing funding for: (1) enhancing nuclear weapons safety; (2) training nuclear weapons personnel; (3) preventing nuclear proliferation; and (4) preventing nuclear terrorism. Most respondents considered nuclear weapons to be a persistent feature of the post-cold war security environment.

  6. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  7. Acquisition of operant behavior in rats with delayed reinforcement: A retractable-lever procedure.

    Science.gov (United States)

    McNamara, Andrew A; Johnson, Lyndsey E; Tate, Christopher; Chiang, Thomas; Byrne, Tom

    2015-02-01

    Experimentally naïve rats acquired lever pressing with delayed reinforcement when the immediate programmed consequence for lever pressing was the simultaneous retraction of two identical levers. Presses on one lever also produced access to sweetened condensed milk after a delay of 10s following retraction. Presses on the second lever resulted in retraction only. Lever retraction prevented the possibility of adventitious reinforcement of contacting the operanda during the reinforcement delays. Several measures indicated that the delayed reinforcers strengthened behavior. The majority of responses for all rats were on the lever that initiated reinforcer delivery. Responding for seven out of eight rats decreased during a subsequent extinction phase in which retraction was the only consequence arranged for lever pressing. Responding recovered rapidly when food reinforcement was available again. Furthermore, when contingencies on the two levers were switched, rats allocated their behavior accordingly, showing control by the delayed reinforcers.

  8. Of guns and snakes: testing a modern threat superiority effect.

    Science.gov (United States)

    Subra, Baptiste; Muller, Dominique; Fourgassie, Lisa; Chauvin, Alan; Alexopoulos, Theodore

    2017-02-03

    Previous studies suggest that ancient (i.e. evolutionary-based) threats capture attention because human beings possess an inborn module shaped by evolution and dedicated to their detection. An alternative account proposes that a key feature predicting whether a stimulus will capture attention is its relevance rather than its ontology (i.e. phylogenetic or ontogenetic threat). Within this framework, the present research deals with the attentional capture by threats commonly encountered in our urban environment. In two experiments, we investigate the attentional capture by modern threats (i.e. weapons). In Experiment 1, participants responded to a target preceded by a cue, which was a weapon or a non-threatening stimulus. We found a larger cuing effect (faster reaction times to valid vs. invalid trials) with weapons as compared with non-threatening cues. In Experiment 2, modern (e.g. weapons) and ancient threats (e.g. snakes) were pitted against one another as cues to determine which ones preferentially capture attention. Crucially, participants were faster to detect a target preceded by a modern as opposed to an ancient threat, providing initial evidence for a superiority of modern threat. Overall, the present findings appear more consistent with a relevance-based explanation rather than an evolutionary-based explanation of threat detection.

  9. Mechanical radiation detection via sub-Brownian lever deflections

    Science.gov (United States)

    Hammig, Mark David

    2005-07-01

    A micromechanical lever that deflects in response to the impacts of charged particles is proposed as a means of improving upon the capabilities of existing radiation detection technology. When a particle strikes an object, momentum is transferred to the impacted body. The resulting body motion can be correlated to the energy of the incident particle. The momentum detector offers promise as a highly discriminating, high-resolution tool for ion sensing. Advances required to successfully realize a spectroscopic capability have been completed; specifically, techniques for reproducibly fabricating micromechanical structures have been optimized, and an instrument that measures miniscule deflections has been developed. Even absent substantial refinement efforts, the novel coupled-cavity optical detector can resolve lever motions on the order of 1--10 picometers. A method by which the Brownian motion of the lever can be stilled has been proven which elicits reductions sufficient to measure heavy-ion impact, the deflections from which may be several orders of magnitude below the thermal vibration amplitude. Using active forcing techniques, the Brownian vibration of the microlevers has been reduced from room temperature (288 K) to sub-Kelvin temperatures, for levers vibrating in air. The mechanical factors that limit the noise reduction magnitude are discussed and methods of surmounting those limitations are identified.

  10. The Relationship between State Policy Levers and Student Mobility

    Science.gov (United States)

    Gross, Jacob P. K.; Berry, Matthew S.

    2016-01-01

    To address conceptual and methodological shortcomings in the extant literature on student mobility, this study employs event history modeling to describe and explain how state policy levers, specifically state grant aid, relates to mobility and baccalaureate degree completion. We find that state grant aid reduces mobility, but less so than…

  11. The levers of control framework : An exploratory analysis of balance

    NARCIS (Netherlands)

    Kruis, A.; Speklé, R.F.; Widener, S.

    2015-01-01

    The impact of the Levers of Control (LOC) framework on the accounting literature is undeniably large. The framework, however, has also been criticized for being vague and ambiguous. One of the central, but unclear, concepts in the LOC framework is the notion of balance. That is, the framework holds

  12. The Relationship between State Policy Levers and Student Mobility

    Science.gov (United States)

    Gross, Jacob P. K.; Berry, Matthew S.

    2016-01-01

    To address conceptual and methodological shortcomings in the extant literature on student mobility, this study employs event history modeling to describe and explain how state policy levers, specifically state grant aid, relates to mobility and baccalaureate degree completion. We find that state grant aid reduces mobility, but less so than…

  13. Veteran Transfer Students and Concealed Weapons on Campus

    Science.gov (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal

    2014-01-01

    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  14. Changing Our Ways of Thinking: Health Professionals and Nuclear Weapons.

    Science.gov (United States)

    Neal, Mary

    1984-01-01

    Outlines the issues raised by health professionals concerned about the threat of nuclear weapons and nuclear war, including epidemics, civil defense, arms costs, psychosocial aspects, and ethical responsibility. Appendixes include lists of antinuclear organizations, medical professional associations, and 160 references. (SK)

  15. Veteran Transfer Students and Concealed Weapons on Campus

    Science.gov (United States)

    Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal

    2014-01-01

    This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…

  16. 49 CFR 236.340 - Electromechanical interlocking machine; locking between electrical and mechanical levers.

    Science.gov (United States)

    2010-10-01

    ... between electrical and mechanical levers. 236.340 Section 236.340 Transportation Other Regulations..., STANDARDS, AND INSTRUCTIONS GOVERNING THE INSTALLATION, INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND... Electromechanical interlocking machine; locking between electrical and mechanical levers. In...

  17. Virtual nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, J.F.

    1997-08-01

    The term virtual nuclear weapons proliferation and arsenals, as opposed to actual weapons and arsenals, has entered in recent years the American lexicon of nuclear strategy, arms control, and nonproliferation. While the term seems to have an intuitive appeal, largely due to its cyberspace imagery, its current use is still vague and loose. The author believes, however, that if the term is clearly delineated, it might offer a promising approach to conceptualizing certain current problems of proliferation. The first use is in a reference to an old problem that has resurfaced recently: the problem of growing availability of weapon-usable nuclear materials in civilian nuclear programs along with materials made `excess` to defense needs by current arms reduction and dismantlement. It is argued that the availability of these vast materials, either by declared nuclear-weapon states or by technologically advanced nonweapon states, makes it possible for those states to rapidly assemble and deploy nuclear weapons. The second use has quite a different set of connotations. It is derived conceptually from the imagery of computer-generated reality. In this use, one thinks of virtual proliferation and arsenals not in terms of the physical hardware required to make the bomb but rather in terms of the knowledge/experience required to design, assemble, and deploy the arsenal. Virtual weapons are a physics reality and cannot be ignored in a world where knowledge, experience, materials, and other requirements to make nuclear weapons are widespread, and where dramatic army reductions and, in some cases, disarmament are realities. These concepts are useful in defining a continuum of virtual capabilities, ranging from those at the low end that derive from general technology diffusion and the existence of nuclear energy programs to those at the high end that involve conscious decisions to develop or maintain militarily significant nuclear-weapon capabilities.

  18. Neurotoxic Weapons and Syndromes.

    Science.gov (United States)

    Carota, Antonio; Calabrese, Pasquale; Bogousslavsky, Julien

    2016-01-01

    The modern era of chemical and biological warfare began in World War I with the large-scale production and use of blistering and choking agents (chlorine, phosgene and mustard gases) in the battlefield. International treaties (the 1925 Geneva Protocol, the 1975 Biological and Toxin Weapons Convention and the 1993 Chemical Weapons Convention) banned biological and chemical weapons. However, several countries are probably still engaged in their development. Hence, there is risk of these weapons being used in the future. This chapter will focus on neurotoxic weapons (e.g. nerve agents, chemical and biological neurotoxins, psychostimulants), which act specifically or preeminently on the central nervous system and/or the neuromuscular junction. Deeply affecting the function of the nervous system, these agents either have incapacitating effects or cause clusters of casualties who manifest primary symptoms of encephalopathy, seizures, muscle paralysis and respiratory failure. The neurologist should be prepared both to notice patterns of symptoms and signs that are sufficiently consistent to raise the alarm of neurotoxic attacks and to define specific therapeutic interventions. Additionally, extensive knowledge on neurotoxic syndromes should stimulate scientific research to produce more effective antidotes and antibodies (which are still lacking for most neurotoxic weapons) for rapid administration in aerosolized forms in the case of terrorist or warfare scenarios. © 2016 S. Karger AG, Basel.

  19. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  20. Operational research in weapon system

    Directory of Open Access Journals (Sweden)

    R. S. Varma

    1958-04-01

    Full Text Available "The paper is divided into three parts: (a The first part deals with what operational research is. (bThe second part gives what we mean by Weapon Systems and discusses considerations that determine the choice of a particular weapon system from a class weapon systems. (cThe third part deals with some aspects of weapon replacement policy.The effectiveness of a weapon system is defined as E=D/C where E is weapon effectiveness (a comparative figure of merit; D is total damage inflicted or prevented and C is total cost, D and C being reduced to common dimensions. During the course of investigations, criteria regarding to choice of weapon or weapons from a set of weapon systems are established through production function and military effect curves. A procedure is described which maximizes the expectation of military utility in order to select a weapon system from the class of weapon systems. This is done under the following simplifying assumptions: (a Non- decreasing utility function; (b Constant average cost for each kind of weapons; and (c Independence of the performance of each unit of weapon. Some of the difficulties which arises when any of these restrictions is relaxed are briefly mentioned. Finally, the policy of weapon replacement and the factors governing the same are described."

  1. Stinging plants: as future bio-weapon.

    Science.gov (United States)

    Gupta, Sanjay Mohan; Kumar, Kamal

    2016-09-01

    In the present opinion paper, we have been introducing for the first time the stinging plants and/or their biological toxins as novel bio-threat agents that may be used for the development of bio-weapons for self-defence purpose. The selected studied stinging plants are having dual role as nutraceutical and ethno-pharmacological uses apart from their less explored stinging property. However, future detailed work is required for identification and characterization of the precise stinging chemical components that will be used for the formulation of novel bio-warfare agents for self-defence purpose.

  2. Wounds and weapons

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, H. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)], E-mail: Hermann.vogel@ak-stgeorg.lbk-hh.de; Dootz, B. [Asklepios Klinik St. Georg, Roentgenabteilung, Lohmuehlenstrasse 5, 20099 Hamburg (Germany)

    2007-08-15

    Purpose: X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. Material and method: The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Results: Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Conclusion: Radiographs may show, which weapon has been employed; they can be read as war reports.

  3. Wounds and weapons.

    Science.gov (United States)

    Vogel, H; Dootz, B

    2007-08-01

    X-ray findings are described, which are typical for injuries due to conventional weapons. It is intended to demonstrate that radiographs can show findings characteristic for weapons. The radiograms have been collected in Vietnam, Croatia, Serbia, Bosnia, Chad, Iran, Afghanistan, USA, Great Britain, France, Israel, Palestine, and Germany. Radiograms of injuries due to hand grenades show their content (globes) and cover fragments. The globes are localized regionally in the victim's body. Survivors of cluster bombs show singular or few globes; having been hit by many globes would have been lethal. Shotguns produce characteristic distributions of the pallets and depth of penetration different from those of hand grenades and cluster bombs; cover fragments are lacking. Gunshot wounds (GSW) can be differentiated in those to low velocity bullets, high velocity projectiles, and projectiles, which disintegrate on impact. The radiogram furnishes the information about a dangerous shock and helps to recognize the weapon. Radiograms of victims of explosion show fragments and injuries due to the blast, information valid for therapy planning and prognosis. The radiogram shows details which can be used in therapy, forensic medicine and in war propaganda - examples could be findings typical for cluster bombs and for dumdum bullets; it shows the cruelty of the employment of weapons against humans and the conflict between the goal of medical care and those of military actions. Radiographs may show, which weapon has been employed; they can be read as war reports.

  4. The US nuclear weapon infrastructure and a stable global nuclear weapon regime

    Energy Technology Data Exchange (ETDEWEB)

    Immele, John D [Los Alamos National Laboratory; Wagner, Richard L [Los Alamos National Laboratory

    2009-01-01

    US nuclear weapons capabilities -- extant force structure and nuclear weapons infrastructure as well as declared policy -- influence other nations' nuclear weapons postures, at least to some extent. This influence can be desirable or undesirable, and is, of course, a mixture of both. How strong the influence is, and its nature, are complicated, controversial, and -- in our view -- not well understood but often overstated. Divergent views about this influence and how it might shape the future global nuclear weapons regime seem to us to be the most serious impediment to reaching a national consensus on US weapons policy, force structure and supporting infrastructure. We believe that a paradigm shift to capability-based deterrence and dissuasion is not only consistent with the realities of the world and how it has changed, but also a desirable way for nuclear weapon postures and infrastructures to evolve. The US and other nuclear states could not get to zero nor even reduce nuclear arms and the nuclear profile much further without learning to manage latent capability. This paper has defined three principles for designing NW infrastructure both at the 'next plateau' and 'near zero.' The US can be a leader in reducing weapons and infrastructure and in creating an international regime in which capability gradually substitutes for weapons in being and is transparent. The current 'strategy' of not having policy or a Congressionally-approved plan for transforming the weapons complex is not leadership. If we can conform the US infrastructure to the next plateau and architect it in such a way that it is aligned with further arms reductions, it will have these benefits: The extant stockpile can be reduced in size, while the smaller stockpile still deters attack on the US and Allies. The capabilities of the infrastructure will dissuade emergence of new challenges/threats; if they emerge, nevertheless, the US will be able to deal with them in

  5. Bioterrorism: toxins as weapons.

    Science.gov (United States)

    Anderson, Peter D

    2012-04-01

    The potential for biological weapons to be used in terrorism is a real possibility. Biological weapons include infectious agents and toxins. Toxins are poisons produced by living organisms. Toxins relevant to bioterrorism include ricin, botulinum, Clostridium perfrigens epsilson toxin, conotoxins, shigatoxins, saxitoxins, tetrodotoxins, mycotoxins, and nicotine. Toxins have properties of biological and chemical weapons. Unlike pathogens, toxins do not produce an infection. Ricin causes multiorgan toxicity by blocking protein synthesis. Botulinum blocks acetylcholine in the peripheral nervous system leading to muscle paralysis. Epsilon toxin damages cell membranes. Conotoxins block potassium and sodium channels in neurons. Shigatoxins inhibit protein synthesis and induce apoptosis. Saxitoxin and tetrodotoxin inhibit sodium channels in neurons. Mycotoxins include aflatoxins and trichothecenes. Aflatoxins are carcinogens. Trichothecenes inhibit protein and nucleic acid synthesis. Nicotine produces numerous nicotinic effects in the nervous system.

  6. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    him with his own weapon come close to the myth of the beginning of time when a Lapp managed to secure his existence and defend his community against an outside threat. Without the proto-Lapp battle against evil, the community would not have had a chance to exist, the right to live in its area, as the community does nowadays.

  7. Weapon of the Weak?

    DEFF Research Database (Denmark)

    Amber, Van der Graaf; Otjes, Simon; Rasmussen, Anne

    2016-01-01

    Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand on the sp......Social media have the potential to offset existing inequalities in representation among interest groups and act as a ‘weapon of the weak’ by providing a technological infrastructure that allows even groups with limited resources to create content and interact across the globe. We expand...

  8. The Optimum Replacement of Weapon

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao; ZHANG Jin-chun

    2002-01-01

    The theory of LCC (Life Cycle Cost) is applied in this paper. The relation between the economic life of weapon and the optimum replacement is analyzed. The method to define the optimum replacement time of weapon is discussed.

  9. Multiple smart weapons employment mechanism

    Energy Technology Data Exchange (ETDEWEB)

    McGlynn, M.P.; Meiklejohn, W.D.

    1993-07-20

    A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

  10. Nuclear weapon detection categorization analysis

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-01

    This statement of work is for the Proof of Concept for nuclear weapon categories utility in Arms control. The focus of the project will be to collect, analyze and correlate Intrinsic Radiation (INRAD) calculation results for the purpose of defining measurable signatures that differentiate categories of nuclear weapons. The project will support START III negotiations by identifying categories of nuclear weapons. The categories could be used to clarify sub-limits on the total number of nuclear weapons.

  11. Weapon use increases the severity of domestic violence but neither weapon use nor firearm access increases the risk or severity of recidivism.

    Science.gov (United States)

    Folkes, Stephanie E F; Hilton, N Zoe; Harris, Grant T

    2013-04-01

    Use of weapons is a risk factor for domestic violence severity, especially lethality. It is not clear, however, whether access to firearms itself increases assault severity, or whether it is characteristic of a subgroup of offenders who are more likely to commit severe and repeated domestic assault. This reanalysis of 1,421 police reports of domestic violence by men found that 6% used a weapon during the assault and 8% had access to firearms. We expected that firearm use would be rare compared to other weapons and that actual weapon use rather than firearm access would increase the severity of domestic assaults. Firearm access was associated with assault severity, but this was mostly attributable to use of nonfirearm weapons. Weapon use was associated with older age, lower education, and relationship history as well as to assault severity. Victims were most concerned about future assaults following threats and actual injuries. Although firearm access and weapon use were related to actuarial risk of domestic violence recidivism, neither predicted the occurrence or severity of recidivism. We conclude that, consistent with previous research in the United States and Canada, firearm use in domestic violence is uncommon even among offenders with known firearm access. Weapon use is characteristic of a subgroup of offenders who commit more severe domestic violence, and seizure of weapons may be an effective intervention.

  12. Applying Agile MethodstoWeapon/Weapon-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Adams, D; Armendariz, M; Blackledge, M; Campbell, F; Cloninger, M; Cox, L; Davis, J; Elliott, M; Granger, K; Hans, S; Kuhn, C; Lackner, M; Loo, P; Matthews, S; Morrell, K; Owens, C; Peercy, D; Pope, G; Quirk, R; Schilling, D; Stewart, A; Tran, A; Ward, R; Williamson, M

    2007-05-02

    This white paper provides information and guidance to the Department of Energy (DOE) sites on Agile software development methods and the impact of their application on weapon/weapon-related software development. The purpose of this white paper is to provide an overview of Agile methods, examine the accepted interpretations/uses/practices of these methodologies, and discuss the applicability of Agile methods with respect to Nuclear Weapons Complex (NWC) Technical Business Practices (TBPs). It also provides recommendations on the application of Agile methods to the development of weapon/weapon-related software.

  13. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  14. Bioterrorism: is it a real threat?

    Science.gov (United States)

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  15. Target threat assessment using fuzzy sets theory

    Directory of Open Access Journals (Sweden)

    Ehsan Azimirad

    2015-08-01

    Full Text Available The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation system

  16. Nonstrategic Nuclear Weapons

    Science.gov (United States)

    2017-02-21

    have eased in recent years, with their nuclear tests in 1998 and continued animosity toward each other, India and Pakistan have joined the list of...could be complex, difficult, and very time- consuming . 137 Given the large disparity in the numbers of U.S. and Russian nonstrategic nuclear weapons

  17. Medicalized weapons & modern war.

    Science.gov (United States)

    Gross, Michael L

    2010-01-01

    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  18. Neutrino Counter Nuclear Weapon

    CERN Document Server

    Tang, Alfred

    2008-01-01

    Radiations produced by neutrino-antineutrino annihilation at the Z0 pole can be used to heat up the primary stage of a thermonuclear warhead and can in principle detonate the device remotely. Neutrino-antineutrino annihilation can also be used as a tactical assault weapon to target hideouts that are unreachable by conventional means.

  19. Nuclear weapons in Europe

    CERN Document Server

    Calogero, F

    1981-01-01

    Information speech given by Prof. Calogero from the university of Roma to describe the actual situation of nuclear weapons in Europe, the strategical reasons or justifications for this deployment, the prospects of negociations, and what scientists could do and do on this issue.

  20. Pakistans Nuclear Weapons

    Science.gov (United States)

    2016-02-12

    Memorandum from Air Commodore Khalid Banuri, 2011. 84 Mahmud Ali Durrani, “Pakistan’s Strategic Thinking and the Role of Nuclear Weapons...Richard P. Cronin , K. Alan Kronstadt, and Sharon Squassoni. Also see CRS Report RL33498, Pakistan-U.S. Relations, by K. Alan Kronstadt. 168 For a

  1. Toxic Industrial Chemicals: A Future Weapons of Mass Destruction Threat

    Science.gov (United States)

    2007-11-02

    dependent on factors, such as temperature , pressure, and wind speed (US Army 1990; 1994; and 1998a). In addition to CW agents’ toxicities, their chemical...expected to be at especially high risk of shigellosis, malaria, sandfly fever, and cutaneous leishmaniasis (Quin 1992). Studies conducted since the war

  2. Taming The Next Set of Strategic Weapons Threats

    Science.gov (United States)

    2006-06-01

    the United States, a foreign policy utopia fueled by President Roh Moo Hyun.27 Many members of this generation consider the United States to be “most...a potential majority of the Greens and the SPD a true spectre for Atlantic defence policy. Looking at the high popularity of ecological issues

  3. Transcendental Terrorism and Dirty Bombs: Radiological Weapons Threat Revisited

    Science.gov (United States)

    2006-02-01

    radioactive sources. This gap sets the stage for a Goiania -type disaster, where thieves in Brazil searching for scrap metal broke into an abandoned cancer...unknowingly and unwittingly spread the contamination throughout Goiania .53 The results were five deaths, 151 people who suffered internal...for obsolete radioactive materials. While the distribution of cesium-137 in Goiania was not the result of deliberate terrorist action, it certainly

  4. Non-lethal weapons and their characteristics

    OpenAIRE

    DAMJANOVIC DRAGAN Z.

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  5. NON-LETHAL WEAPONS AND THEIR CHARACTERISTICS

    OpenAIRE

    2015-01-01

    Non-lethal weapons, also called less-lethal weapons, less-than lethal weapons, non-deadly weapons, compliance weapons, or pain-inducing weapons are weapons intended to be less likely to kill a living target than conventional weapons. It is often understood that accidental, incidental, and correlative casualties are risked wherever force is applied, but non-lethal weapons try to minimise the risk as much as possible. Non-lethal weapons are used in combat situations to limit the escalation of c...

  6. Characterization and Detection of Biological Weapons with Atomic Force Microscopy

    Energy Technology Data Exchange (ETDEWEB)

    Malkin, A J; Plomp, M; Leighton, T J; McPherson, A

    2006-09-25

    Critical gaps exist in our capabilities to rapidly characterize threat agents which could be used in attacks on facilities and military forces. DNA-based PCR and immunoassay-based techniques provide unique identification of species, strains and protein signatures of pathogens. However, differentiation between naturally occurring and weaponized bioagents and the identification of formulation signatures are beyond current technologies. One of the most effective and often the only definitive means to identify a threat agent is by its direct visualization. Atomic force microscopy (AFM) is a rapid imaging technique that covers the size range of most biothreat agents (several nanometers to tens of microns), is capable of resolving pathogen morphology and structure, and could be developed into a portable device for biological weapons (BW) field characterization. AFM can detect pathogens in aerosol, liquid, surface and soil samples while concomitantly acquiring their weaponization and threat agent digital signatures. BW morphological and structural signatures, including modifications to pathogen microstructural architecture and topology that occur during formulation and weaponization, provide the means for their differentiation from crude or purified unformulated agent, processing signatures, as well as assessment of their potential for dispersion, inhalation and environmental persistence. AFM visualization of pathogen morphology and architecture often provides valuable digital signatures and allows direct detection and identification of threat agents. We have demonstrated that pathogens, spanning the size range from several nanometers for small agricultural satellite viruses to almost half micron for pox viruses, and to several microns for bacteria and bacterial spores, can be visualized by AFM under physiological conditions to a resolution of {approx}20-30 {angstrom}. We have also demonstrated that viruses from closely related families could be differentiated by AFM on

  7. Commissioner for Inland Revenue v Lever Brothers and Unilever Ltd

    African Journals Online (AJOL)

    kirstam

    case, exposing weaknesses in each. .... vision, he recognised the marketing opportunity in branding and packaging, and. Sunlight soap was ... quickly outstripped supply, and in 1887, he bought an open site at Bebington, the. Wirral .... strength and weapons. ..... this is to prevent unnecessarily artificial operation of the law.

  8. Illegal Weapons Exports?

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Amnesty International, a human rights organization, released a report on June 11 accusing China of facilitating regional conflicts and human rights violations by exporting a large quantity of weapons to Sudan, Nepal, Myanmar and the Great Lakes countries of Africa. Responding to such charges, Teng Jianqun, a researcher with the China Arms Control and Disarmament Association, told the official Xinhua News Agency that China has always put its limited arms exports under strict control and surveillance, deno...

  9. Counterproliferation of Nuclear Weapons

    Science.gov (United States)

    2010-04-01

    an occurrence. In his book, Atomic Tragedy, Sean Malloy writes that Henry Stimson, the United States Secretary of War, warned in April, 1945 that...Ibid., 380. 41 Ibid. 42 Sean L. Malloy , Atomic Tragedy: Henry L. Stimson and the Decision to use the Bomb Against Japan (Ithaca, New York...Weapons of Mass Destruction in the Middle East, 96-97. 45 Robert M. Gates, National Defense Strategy (Washington, DC: US Government Printing Office

  10. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  11. Joseph A. Burton Forum Award: Some Nuclear Weapons Dilemmas

    Science.gov (United States)

    May, Michael

    2014-03-01

    Nuclear weapons pose a combination of political and ethical dilemmas the solution to which has not been found. On one hand, in the view of both US government leaders and US allies, nuclear deterrence continues to play an essential part in the US role as the ultimate source of military strength for the alliances among the major democratic countries. It also continues to be in demand by countries that believe themselves to be isolated and threatened. On the other hand, nuclear weapons, besides being effective deterrents, can cause unprecedented loss of life and risk the demise of civilizations. No ban or technical precaution could prevent the rebuilding of nuclear weapons in a crisis. No diplomatic arrangement to date has erased the threat of invasion and war in the world. Only the abandonment of war and the threat of war as instruments of policy can make nuclear weapons obsolete. The slow, halting, risky road to that end remains the only hope for a world in which lasting solutions to the nuclear dilemmas are possible.

  12. Examination of Economic Feasibility of Nuclear Weapons in the Republic of Korea

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-05-15

    This observation implies that the popular view on nuclear weapons amongst Korean public is in part due to lack of knowledge about overall implications of possessing nuclear weapons. In this regard, pros and cons of nuclear weapons development need to be better characterized and understood by the public to support nuclear nonproliferation culture development. Noting lack of literature on characterizing the economics of nuclear weapons development, this study aims at performing economic feasibility analysis of nuclear weapons development in the ROK. For this purpose, an approach called Index technique based on the US experiences was applied to Korean historical data along with cost-benefit analysis and Multi-Criteria Decision Making Analysis. In this study, the scenario of nuclear weapons development against North Korean nuclear threat was compared with conventional weapons-based defense strategy. The comparison was based on cost benefit analysis and qualitative multi-criteria decision analysis. Results indicate that nuclear weapons development is not a desirable option. However, as this work was a rather simplistic academic exercise, further work is needed to support the outcome of the study. Outcome of these investigations would be useful for communication with the public regarding the need for nuclear weapons for national defense and to develop nuclear nonproliferation culture in the ROK.

  13. Advanced Naval Surface fire support weapon employment against mobile targets

    OpenAIRE

    Le, Hung B.

    1999-01-01

    Approved for public release; distribution is unlimited Key threat trends have identified shortfalls in Naval Surface Fire Support (NSFS), a mission area that is undergoing rapid evolution. The Navy's ability to effectively provide sea-based fire support to ground forces is profoundly challenged by mobile and reduced dwell time targets. Furthermore, longer range enemy weapon systems, which must be destroyed at greater ranges prior to their engagement of friendly forces, will make NSFS timel...

  14. The morality of weapons research.

    Science.gov (United States)

    Forge, John

    2004-07-01

    I ask whether weapons research is ever justified. Weapons research is identified as the business of the engineer. It is argued that the engineer has responsibility for the uses to which the tools that he designs can be put, and that responsibility extends to the use of weapons. It is maintained that there are no inherently defensive weapons, and hence there is no such thing as 'defensive' weapons research. The issue then is what responsibilities as a professional the engineer has in regard to such research. An account is given to ground the injunction not to provide the means to harm as a duty for the engineers. This account is not, however, absolutist, and as such it allows justifiable exceptions. The answer to my question is thus not that weapons research is never justified but there must be a strong assurance that the results will only be used as a just means in a just cause.

  15. 32 CFR 234.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...

  16. Real life identification of partially occluded weapons in video frames

    Science.gov (United States)

    Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.

    2016-05-01

    We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.

  17. Handheld ultrasound concealed weapons detector

    Science.gov (United States)

    Felber, Franklin S.; Wild, Norbert C.; Nunan, Scott C.; Breuner, Dennis; Doft, Frank

    1998-12-01

    A handheld, battery-operated prototype of a remove concealed weapons detector has been built and tested. The concealed weapons detector will enable law enforcement and security officers to detect metallic and nonmetallic weapons concealed beneath clothing remotely from beyond arm's length to about 20 feet. These detectors may be used to: (1) allow hands-off, stand-off frisking of suspects for metallic and nonmetallic weapons; and (2) search for metallic and nonmetallic weapons on cooperative subjects at courthouse entrances and other monitored security portals. We have demonstrated that we image weapons concealed under heavy clothing, not just detect them, at ranges up to 15 feet using the same ultrasound frequency (40 kHz) used by commercial rangefinders. The concealed weapons detector operates much as a rangefinder, but at higher peak fluxes and pulse repetition frequencies. The detector alerts the user to concealed weapons audibly and visibly by detecting ultrasound glints above a body/clothing baseline, and by compensating for changing range and attenuation. The detector locates concealed weapons within a 6-inch illuminated spot at 10 feet. The signal processor eliminates any signal from behind the target.

  18. Weapons Neutron Research Facility (WNR)

    Data.gov (United States)

    Federal Laboratory Consortium — The Weapons Neutron Research Facility (WNR) provides neutron and proton beams for basic, applied, and defense-related research. Neutron beams with energies ranging...

  19. Why do states build nuclear weapons? Three models in search of a bomb

    Energy Technology Data Exchange (ETDEWEB)

    Sagan, S.D.

    1996-12-31

    The central purpose of this article is to challenge conventional wisdom about nuclear proliferation. The author argues that the consensus view, focusing on national security considerations as the cause of proliferation, is dangerously inadequate because nuclear weapons programs also serve other, more parochial and less obvious objectives. Nuclear weapons, like other weapons, are more than tools of national security; they are political objects of considerable importance in domestic debates and internal bureaucratic struggles and can also serve as international normative symbols of modernity and identity. The body of this article examines three alternate theoretical frameworks - called {open_quotes}models{close_quotes} in the very informal sense of the term - about why states decide to build or refrain from developing nuclear weapons: {open_quotes}the security model,{close_quotes} according to which states build nuclear weapons to increase national security against foreign threats, especially nuclear threats; {open_quotes}the domestic politics model,{close_quotes} which envisions nuclear weapons as political tools used to advance parochial domestic and bureaucratic interests; and {open_quotes}the norms model,{close_quotes} under which nuclear weapons decisions are made because weapons acquisition, or restraint in weapons development, provides an important normative symbol of a state`s modernity and identity. Although many of the ideas underlying these models exist in the vast case-study and proliferation-policy literatures, they have not been adequately analyzed, nor placed in a comparative theoretical framework, nor properly evaluated against empirical evidence. Models are compared to their theoretical conceptions of the causes of weapons development, present alternative interpretations of the history of some major proliferation decisions, and contrast the models` implications for nonproliferation policy. 71 refs.

  20. A backbone lever-arm effect enhances polymer mechanochemistry

    Science.gov (United States)

    Klukovich, Hope M.; Kouznetsova, Tatiana B.; Kean, Zachary S.; Lenhardt, Jeremy M.; Craig, Stephen L.

    2013-02-01

    Mechanical forces along a polymer backbone can be used to bring about remarkable reactivity in embedded mechanically active functional groups, but little attention has been paid to how a given polymer backbone delivers that force to the reactant. Here, single-molecule force spectroscopy was used to directly quantify and compare the forces associated with the ring opening of gem-dibromo and gem-dichlorocyclopropanes affixed along the backbone of cis-polynorbornene and cis-polybutadiene. The critical force for isomerization drops by about one-third in the polynorbornene scaffold relative to polybutadiene. The root of the effect lies in more efficient chemomechanical coupling through the polynorbornene backbone, which acts as a phenomenological lever with greater mechanical advantage than polybutadiene. The experimental results are supported computationally and provide the foundation for a new strategy by which to engineer mechanochemical reactivity.

  1. CMB Cluster Lensing: Cosmography with the Longest Lever Arm

    CERN Document Server

    Hu, Wayne; Vale, Chris

    2007-01-01

    We discuss combining gravitational lensing of galaxies and the cosmic microwave background (CMB) by clusters to measure cosmographic distance ratios, and hence dark energy parameters. Advantages to using the CMB as the second source plane, instead of galaxies, include: a well-determined source distance, a longer lever arm for distance ratios, typically up to an order of magnitude higher sensitivity to dark energy parameters, and a decreased sensitivity to photometric redshift accuracy of the lens and galaxy sources. Disadvantages include: higher statistical errors, potential systematic errors, and the need for disparate surveys that overlap on the sky. Ongoing and planned surveys, such as the South Pol Telescope in conjunction with the Dark Energy Survey, can potentially reach the statistical sensitivity to make interesting consistency tests of the standard cosmological constant model. Future measurements that reach 1% or better precision in the convergences can provide sharp tests for future supernovae dista...

  2. Preventing the spread of nuclear weapons : The law of arms control and the international non-proliferation regime

    NARCIS (Netherlands)

    Coppen, T.

    2016-01-01

    The proliferation of nuclear weapons remains a severe threat to international peace, security and stability. In order to counter this threat, the international community has taken numerous measures, legal and otherwise, resulting in a global framework of treaties and political agreements known as th

  3. Laser lever method in the application of young’s modulus measurement

    Science.gov (United States)

    Fan, Yingyuan; Qiu, Zhaoyun; Zhao, Renhong

    2017-06-01

    Young’s modulus of solid material is usually measured by tensile test. We adopt a new laser lever to instead of the traditional optical lever in this article. Contrast experiments with two different methods are designed to measure the steel-wire’s Young’s modulus. The results show that the new method is more accurate and efficient than the old one.

  4. 29 CFR 1926.305 - Jacks-lever and ratchet, screw, and hydraulic.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Jacks-lever and ratchet, screw, and hydraulic. 1926.305... Power § 1926.305 Jacks—lever and ratchet, screw, and hydraulic. (a) General requirements. (1) The... secured at once. (ii) Hydraulic jacks exposed to freezing temperatures shall be supplied with an...

  5. Using clinical governance levers to support change in a cancer care reform.

    Science.gov (United States)

    Brault, Isabelle; Denis, Jean-Louis; Sullivan, Terrence James

    2015-01-01

    Introducing change is a difficult issue facing all health care systems. The use of various clinical governance levers can facilitate change in health care systems. The purpose of this paper is to define clinical governance levers, and to illustrate their use in a large-scale transformation. The empirical analysis deals with the in-depth study of a specific case, which is the organizational model for Ontario's cancer sector. The authors used a qualitative research strategy and drew the data from three sources: semi-structured interviews, analysis of documents, and non-participative observations. From the results, the authors identified three phases and several steps in the reform of cancer services in this province. The authors conclude that a combination of clinical governance levers was used to transform the system. These levers operated at different levels of the system to meet the targeted objectives. To exercise clinical governance, managers need to acquire new competencies. Mobilizing clinical governance levers requires in-depth understanding of the role and scope of clinical governance levers. This study provides a better understanding of clinical governance levers. Clinical governance levers are used to implement an organizational environment that is conducive to developing clinical practice, as well as to act directly on practices to improve quality of care.

  6. Linking science with design and technology in a stimulating approach to teaching about levers

    OpenAIRE

    Davenport, Carol

    2015-01-01

    The 2014 changes to the National Curriculum for England include the introduction of levers, gears and pulleys into primary science. This article highlights key ideas for understanding levers and motivating ways of teaching the topic in a cross-curricular approach.

  7. Insulin as a weapon.

    Science.gov (United States)

    Robinson, Samuel D; Safavi-Hemami, Helena

    2016-12-01

    The discovery of insulin and its use for the treatment of diabetes is undoubtedly one of the true successes of modern medicine. Injectable insulin would prove the first effective treatment for a previously incurable and usually fatal disease. Soon after however, the powerful effects of insulin overdose would be reported, and subsequently exploited for dubious medical and sometimes nefarious purposes. In this article we describe the discovery that certain venomous marine snails of the genus Conus also exploit the powerful effects of insulin overdose, employing it as a weapon for prey capture. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  9. Naval Weapons Station Earle Reassessment

    Science.gov (United States)

    2013-12-01

    surveys for their Section 110 compliance: Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger 1999...text within brackets. Berger Report 1999 Architectural Resources Survey, Naval Weapons Station Earle, Monmouth County, New Jersey (Louis Berger... architectural treatment of buildings at NWS Earle: a traditional vernacular theme with minimal decorative detailing. This so-called minimal traditional

  10. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous

  11. Proportionality and Autonomous Weapons Systems

    NARCIS (Netherlands)

    van den Boogaard, J.

    2015-01-01

    Given the swift technologic development, it may be expected that the availability of the first truly autonomous weapons systems is fast approaching. Once they are deployed, these weapons will use artificial intelligence to select and attack targets without further human intervention. Autonomous weap

  12. An Expert System For Multispectral Threat Assessment And Response

    Science.gov (United States)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  13. Musculoskeletal colloquialisms based on weapons.

    Science.gov (United States)

    Agrawal, Anuj

    2017-01-01

    Eponyms and colloquialisms are commonly used in orthopaedic literature and convey a great deal of information in a concise fashion. Several orthopaedic conditions have characteristic clinical or radiologic appearances, mimicking the appearance of certain arms or weapons. Most of these are easy to memorise and recognise, provided the orthopaedic surgeon is aware of the colloquialism and familiar with the appearance of the weapon on which it is based. Unfortunately, many such colloquialisms are based on traditional weapons no longer in current use, and their appearances are not familiar to most orthopaedists, creating confusion and difficulty in understanding them. In this paper, we have reviewed the musculoskeletal colloquialisms based on weapons, including a brief description of the weapon with illustrations, highlighting the importance of the colloquialism in diagnosis or treatment of musculoskeletal conditions.

  14. Nuclear weapon reliability evaluation methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L. [Sandia National Labs., Albuquerque, NM (United States)

    1993-06-01

    This document provides an overview of those activities that are normally performed by Sandia National Laboratories to provide nuclear weapon reliability evaluations for the Department of Energy. These reliability evaluations are first provided as a prediction of the attainable stockpile reliability of a proposed weapon design. Stockpile reliability assessments are provided for each weapon type as the weapon is fielded and are continuously updated throughout the weapon stockpile life. The reliability predictions and assessments depend heavily on data from both laboratory simulation and actual flight tests. An important part of the methodology are the opportunities for review that occur throughout the entire process that assure a consistent approach and appropriate use of the data for reliability evaluation purposes.

  15. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  16. Effects of free-food and continuous reinforcement schedule presentation on lever pressing for food by rats

    OpenAIRE

    Raul Avila; Gonzalez, Juan C.; Patricia Miranda

    2010-01-01

    Six food-deprived rats were each exposed to a procedure in which lever pressingproduced food in the presence and absence of free food. Although the highestfrequency of lever pressing was observed when each lever press was reinforcedwith food in the absence of any supplementary free food, all six rats continuedto press the lever when free food was available. The rats consumed approximatelythe same amount of food when free food was available, whether or not leverpressing was also reinforced. Wh...

  17. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  18. Wave Energy, Lever Operated Pivoting Float LOPF Study

    DEFF Research Database (Denmark)

    Margheritini, Lucia

    University in Denmark. The model size was 60cm W x 90cm L x 21cm H. The 60 cm width pointed towards the wave front. The LOPF buoy is characterized by a simple mechanical design with few moving parts and direct electrical output and it is taut moored to the sea bed, so all forces are referenced to the seabed......The fully instrumented Resen Waves Lever Operated Pivoting Float LOPF wave energy buoy model has gone through the first stage of testing in regular waves in scale 1:25 of the North Sea wave conditions, in the 3D deep wave basin at the Hydraulic and Coastal Engineering Laboratory of Aalborg...... for maximum energy output in regular as well as irregular waves. During storms the buoy pivots and streamlines itself to minimize loads on the mooring line. A conservative estimate shows that a full scale system for North Sea conditions has a float size width of 15 m that will, with 60% generator efficiency...

  19. Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?

    Science.gov (United States)

    Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles

    2009-01-01

    The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…

  20. Shipborne Laser Beam Weapon System for Defence against Cruise Missiles

    Directory of Open Access Journals (Sweden)

    J.P. Dudeja

    2000-04-01

    Full Text Available Sea-skim~ing cruise missiles pose the greatest threat to a surface ship in the present-day war scenario. The convenitional close-in-weapon-systems (CIWSs are becoming less reliable against these new challenges requiring extremely fast reaction time. Naval Forces see a high energy laser as a feasible andjeffective directed energy weapon against sea-skimming antiship cruise missiles becauseof its .ability to deliver destructive energy at the speed of light on to a distant target. The paper comparesthe technology and capability of deuterium fluoride (DF and chemical-oxygen-iodine laser (COIL in effectively performing the role of a shipborne CIWS altainst sea-skimming missiles. Out of these twolasers, it is argued that DF laser wo.uld be more effective a,s a shipborne weapon for defence against sea-skimmin,g cruise missiles. Besides the high energy laser as the primary (killing laser, othersub-systems required in the complete weapon system would be: A beacon laser to sense phase distor'ions in the primary laser, adaptive optics to compensate the atmospheric distortions, beam-directing optics, illuminating lasers, IRST sensors, surveillance and tracking radars, interfacing system, etc.

  1. An overview of the future of non-lethal weapons.

    Science.gov (United States)

    Alexander, J B

    2001-01-01

    During the past decade, vast changes have occurred in the geopolitical landscape and the nature of the types of conflicts in which technologically developed countries have been involved. While the threat of conventional war remains, forces have been more frequently deployed in situations that require great restraint. Adversaries are often likely to be elusive and commingled with noncombatants. There has been some shift in public opinion away from tolerance of collateral casualties. Therefore there is a need to be able to apply force while limiting casualties. Non-lethal weapons provide part of the solution. Among the changes that will influence the future have been studies by the US and NATO concerning the use of non-lethal weapons, coincidental with increased funding for their development and testing. New concepts and policies have recently been formalized. Surprisingly, the most strident objections to the implementation of non-lethal weapons have come from organizations that are ostensibly designed to protect non-combatants. These arguments are specious and, while technically and academically challenging, actually serve to foster an environment that will result in the deaths of many more innocent civilians. They misconstrue technology with human intent. The reasons for use of force will not abate. Alternatives to bombs, missiles, tanks and artillery must therefore be found. Non-lethal weapons are not a panacea but do offer the best hope of minimizing casualties while allowing nations or alliances the means to use force in protection of national or regional interests.

  2. Risk in the Weapons Stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Noone, Bailey C [Los Alamos National Laboratory

    2012-08-14

    When it comes to the nuclear weapons stockpile, risk must be as low as possible. Design and care to keep the stockpile healthy involves all aspects of risk management. Design diversity is a method that helps to mitigate risk.

  3. The Weaponization of Social Media

    Science.gov (United States)

    2016-06-10

    media efforts will be compared to similar Western business and civic social media centric marketing efforts from both a technical and theoretical...THE WEAPONIZATION OF SOCIAL MEDIA A thesis presented to the Faculty of the U.S. Army Command and General Staff College in...The Weaponization of Social Media 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Jack B. Irby III, MAJ 5d

  4. Wave energy, lever operated pivoting float LOPF study

    Energy Technology Data Exchange (ETDEWEB)

    Margheritini, L.

    2012-11-01

    The fully instrumented Resen Waves Lever Operated Pivoting Float LOPF wave energy buoy model has gone through the first stage of testing in regular waves in scale 1:25 of the North Sea wave conditions, in the 3D deep wave basin at the Hydraulic and Coastal Engineering Laboratory of Aalborg University in Denmark. The model size was 60cm W x 90cm L x 21cm H. The 60 cm width pointed towards the wave front. The LOPF buoy is characterized by a simple mechanical design with few moving parts and direct electrical output and it is taut moored to the sea bed, so all forces are referenced to the seabed for maximum energy output in regular as well as irregular waves. During storms the buoy pivots and streamlines itself to minimize loads on the mooring line. A conservative estimate shows that a full scale system for North Sea conditions has a float size width of 15 m that will, with 60% generator efficiency, produce 610 MWh/y (609.497 kWh/y) with an average power output of 69.6 kW, which requires a generator capacity of 700 kW. It is expected the generator efficiency can be increased to 90% in the future. More specific calculations (from EnergiNet) show that with one generator of 695 kW the expected power production is 585 MWh/y; with a generator of 250 kW and 100 kW, the expected power production is 481 MWh/y and 182 MWh/y respectively. In addition there are several areas for future improvements for increased power production. (Author)

  5. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  6. The "optical lever" intracavity readout scheme for gravitational-wave antennae

    OpenAIRE

    Khalili, F. Ya

    2002-01-01

    An improved version of the ``optical bar'' intracavity readout scheme for gravitational-wave antennae is considered. We propose to call this scheme ``optical lever'' because it can provide significant gain in the signal displacement of the local mirror similar to the gain which can be obtained using ordinary mechanical lever with unequal arms. In this scheme displacement of the local mirror can be close to the signal displacement of the end mirrors of hypothetical gravitational-wave antenna w...

  7. [Medical aspects of common non-lethal weapons].

    Science.gov (United States)

    Kunz, Sebastian Niko; Grove, Christina; Monticelli, Fabio

    2014-03-01

    The development and provision of non-lethal weapons (NLW) allow military and law enforcement personnel to exploit gradual engagement in countering potentially hazardous threats. Chemical, kinetic and electrical weapons systems are used to curb violence in civilian crowds. With inappropriate usage, these technologies can cause potentially fatal injuries that are not only of clinical, but also of legal relevance. In this context, the practicing physician is faced with treatment as well as assessment issues of new forms of injuries. In order to assure medical care and to be able to draw competent expert's conclusions, a detailed knowledge of the medical effects of these NLW is necessary. The review at hand presents today's most popular NLW and gives an overview of their possible injury potential and required treatments.

  8. OIL AS POLITICAL WEAPON

    Directory of Open Access Journals (Sweden)

    Mariana, BUICAN

    2013-12-01

    Full Text Available Oil (called by some black gold has not always been as coveted and used, but only in the last hundred years has established itself as a highly sought after as an indispensable proper functioning of modern economic activity that an important factor in international politics. International oil regime has changed in the last decades. In 1960, oil regime was a private oligopol which had links with governments main consuming countries. By then the price of a barrel of oil was two U.S. dollars and seven major transnational oil companies decided the amount of oil that will be produced. Meanwhile the world region with the largest oil exports were more strongly expressed nationalism and decolonization. Result, it was so in the late 60s in the region occur independent states. They have created an organization aim of this resource to their advantage - OPEC (Organization of Petroleum Exporting Countries. Thus since 1973 there have been changes in the international regime governing oil field, namely producing countries were fixed production rate and price. After this time the oil weapon has become increasingly important in the management of international relations. Oil influenced the great powers to Middle East conflicts that occurred in the last century, but their attitude about the emergence of new sources of oil outside OPEC. In the late 90's, Russia has become a major supplier of oil to the West.

  9. A wheelchair with lever propulsion control for climbing up and down stairs.

    Science.gov (United States)

    Sasaki, Kai; Eguchi, Yosuke; Suzuki, Kenji

    2016-08-01

    This study proposes a novel stair-climbing wheelchair based on lever propulsion control using the human upper body. Wheelchairs are widely used as supporting locomotion devices for people with acquired lower limb disabilities. However, steps and stairs are critical obstacles to locomotion, which restrict their activities when using wheelchairs. Previous research focused on power-assisted, stair-climbing wheelchairs, which were large and heavy due to its large actuators and mechanisms. In the previous research, we proposed a wheelchair with lever propulsion mechanism and presented its feasibility of climbing up the stairs. The developed stair-climbing wheelchair consists of manual wheels with casters for planar locomotion and a rotary-leg mechanism based on lever propulsion that is capable of climbing up stairs. The wheelchair also has a passive mechanism powered by gas springs for posture transition to shift the user's center of gravity between the desired positions for planar locomotion and stair-climbing. In this paper, we present an advanced study on both climbing up and going down using lever propulsion control by the user's upper body motion. For climbing down the stairs, we reassembled one-way clutches used for the rotary-leg mechanism to help a user climb down the stairs through lever operation. We also equipped the wheelchair with sufficient torque dampers. The frontal wheels were fixed while climbing down the stairs to ensure safety. Relevant experiments were then performed to investigate its performance and verify that the wheelchair users can operate the proposed lever propulsion mechanism.

  10. Mechanical efficiency of two commercial lever-propulsion mechanisms for manual wheelchair locomotion

    Directory of Open Access Journals (Sweden)

    Jordon Lui, BKin

    2014-02-01

    Full Text Available The purpose of this study was to (1 evaluate the mechanical efficiency (ME of two commercially available lever-propulsion mechanisms for wheelchairs and (2 compare the ME of lever propulsion with hand rim propulsion within the same wheelchair. Of the two mechanisms, one contained a torsion spring while the other used a roller clutch design. We hypothesized that the torsion spring mechanism would increase the ME of propulsion due to a passive recovery stroke enabled by the mechanism. Ten nondisabled male participants with no prior manual wheeling experience performed submaximal exercise tests using both lever-propulsion mechanisms and hand rim propulsion on two different wheelchairs. Cardiopulmonary parameters including oxygen uptake (VO2, heart rate (HR, and energy expenditure (En were determined. Total external power (Pext was measured using a drag test protocol. ME was determined by the ratio of Pext to En. Results indicated no significant effect of lever-propulsion mechanism for all physiological measures tested. This suggests that the torsion spring did not result in a physiological benefit compared with the roller clutch mechanism. However, both lever-propulsion mechanisms showed decreased VO2 and HR and increased ME (as a function of slope compared with hand rim propulsion (p < 0.001. This indicates that both lever-propulsion mechanisms tested are more mechanically efficient than conventional hand rim propulsion, especially when slopes are encountered.

  11. Accuracy of spring-levered and piezo-electric pedometers in primary school Japanese children.

    Science.gov (United States)

    Nakae, Satoshi; Oshima, Yoshitake; Ishii, Kojiro

    2008-09-01

    Pedometers are used in many studies because physical activities can be simply assessed using them. In addition to the spring-levered type, piezo-electric pedometers have recently been used. However, their accuracy in children has not been investigated in previous studies. In this study, we investigated the accuracy of spring-levered pedometer and piezo-electric pedometer step counts in comparison with hand-tallied step counts with children during self-paced walking. First to 6th-grade primary school children (394 subjects; 201 boys and 193 girls) walked with pedometers on an outdoor 50-m course, and the measured values were compared with actual steps at 3 speeds: normal, slow, and fast paces. The counts obtained by the spring-levered pedometer were significantly lower than the actual steps in most grades at all walking paces. In the normal- and fast-pace walking, the counts by spring-levered pedometer were significantly lower than the actual steps in all grades excluding the 5th grade. Moreover, the spring-levered pedometer underestimated by 25% or more in all grades at slow pace. In contrast, the percent error of the counts by the piezo-electric pedometers at normal pace were mostly within +/-3%, confirming their high accuracy. Based on these findings, spring-levered pedometers are not appropriate for children, whereas piezo-electric pedometers are useful for investigation of the physical activity of children.

  12. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  13. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M

    2003-06-01

    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  14. Reassessing biological threats: Implications for cooperative mitigation strategies

    Directory of Open Access Journals (Sweden)

    Catharine Grace Young

    2015-11-01

    Full Text Available Multiple factors ranging from globalization to ecosystem disruption are presenting the global community with evolving biological threats to local, national, and global security that reach beyond the realm of traditional bioweapons threats. As a result, mitigation strategies have adapted necessarily to the increased diversity of biological threats. In general, response and preparedness strategies have largely shifted from being primarily reactive to traditional biological weapons to more proactive in nature. In this review, we briefly explore biological threats through a wider aperture, to embrace a deeper appreciation of viral pathogens, antimicrobial resistance, and agricultural pathogens, and their potential to cause civil, economic, and political devastation. In addition we discuss current mitigation strategies codified by the Global Health Security Agenda and the One Health paradigm, as well as some of the available tools to assist with their sustainable implementation.

  15. Overview of the Distributed Mission Training Integrated Threat Environment project

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.

    1998-08-01

    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  16. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1964-02-01

    This book is a revision of "The Effects of Nuclear Weapons" which was issued in 1957. It was prepared by the Defense Atomic Support Agency of the Department of Defense in coordination with other cognizant governmental agencies and was published by the U.S. Atomc Energy Commission. Although the complex nature of nuclear weapons effects does not always allow exact evaluation, the conclusions reached herein represent the combined judgment of a number of the most competent scientists working the problem. There is a need for widespread public understanding of the best information available on the effects of nuclear weapons. The purpose of this book is to present as accurately as possible, within the limits of national security, a comprehensive summary of this information.

  17. Psychological casualties resulting from chemical and biological weapons.

    Science.gov (United States)

    Romano, J A; King, J M

    2001-12-01

    This symposium addresses the complications encountered by medical planners when confronted by the use or threat of the use of weapons of mass destruction. The types of chemical warfare agents (CWA), their principal target organs, and physiological effects are discussed. We have reviewed the use of CWA in 20th century warfare and otherwise with emphasis on five cases: (1) use of sulfur mustard during World War I; (2) use by Italy against Ethiopia; (3) use in the Sino-Japanese War; (4) relatively well-studied use in the Iran-Iraq conflict; and (5) the use of sarin in the Tokyo subway terrorist incident. We reviewed the additional physiological and psychological consequences of their use and threat of use. Results from training and simulation are discussed. Finally, we present our conclusions derived from the analysis of these historical situations.

  18. The Effects of Nuclear Weapons

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, Samuel

    1957-06-01

    This handbook prepared by the Armed Forces Special Weapons Project of the Department of Defense in coordination with other cognizant government agencies and published by the United States Atomic Energy Commission, is a comprehensive summary of current knowledge on the effects of nuclear weapons. The effects information contained herein is calculated for yields up to 20 megatons and the scaling laws for hypothetically extending the calculations beyond this limit are given. The figure of 20 megatons however is not be taken as an indication of capabilities or developments.

  19. Computation of Weapons Systems Effectiveness

    Science.gov (United States)

    2013-09-01

    Aircraft Dive Angle : Initial Weapon Release Velocity at x-axis VOx VOz x: x-axis z: z-axis : Initial Weapon Release Velocity at z...altitude Impact Velocity (x− axis), Vix = VOx (3.4) Impact Velocity (z− axis), Viz = VOz + (g ∗ TOF) (3.5) Impact Velocity, Vi = �Vix2 + Viz2 (3.6...compute the ballistic partials to examine the effects that varying h, VOx and VOz have on RB using the following equations: ∂RB ∂h = New RB−Old RB

  20. Design and experimental evaluation of yoked hand-clutching for a lever drive chair.

    Science.gov (United States)

    Sarigul-Klijn, Yasemin; Smith, Brendan W; Reinkensmeyer, David J

    2017-05-16

    Lever-drive wheelchairs lower physical strain but are less maneuverable than push-rim wheelchairs. Here, we study a possible solution in which the user simultaneously actuates clutches mounted between the levers and wheels each stroke via a clutch handle attached to one lever; this solution is of particular interest for user groups with only one functional hand. First, to demonstrate maneuverability, we show how this "yoked clutch" allows an experienced user to maneuver a constrained space. Then, we compared the difficulty of learning a yoked clutch chair to a conventional lever-drive transmission (i.e. a one-way bearing). Twenty-two unimpaired novice adults navigated a figure-eight track during six training sessions over two weeks. Participant mean speed improved roughly 60% for both chairs, with similar exponential improvement time constants (3 days) and final speeds. However, speed improvement mostly took place overnight rather than within the session for hand-clutching, and the physiological cost index was also about 40% higher. These results indicate that while hand-clutching is no more difficult to learn than a lever-drive, it is reliant on overnight improvement. Also, its increased maneuverability comes with decreased efficiency. We discuss how the yoked clutch may be particularly well suited for individuals with stroke during inpatient rehabilitation.

  1. Torque control in lingual orthodontics with lever arm mechanics: a case report.

    Science.gov (United States)

    Aravind, M; Shivaprakash, G; Ramesh, G C

    2013-01-01

    The aim of this report is to illustrate treatment mechanics for torque control in lingual mechanotherapy using a lever arm and transpalatal arch (TPA) tab system during en masse retraction of anterior teeth. An 18-year-old female with bimaxillary dentoalveolar proclination with crowding was treated with a lever arm-TPA tab system. The retraction tabs bent into the TPA placed across the maxillary second molars were used as anchorage. The retraction force on the maxillary anterior teeth was applied using lever arm hooks soldered between the lateral incisors and canines on a lingual mushroom archwire. By applying a retraction force to the lever arm hooks, the maxillary anterior teeth experienced greater palatal root movement as compared to the conventional retraction forces applied at the crown level. The tabs, placed high in the TPA, produced a distal tipping moment on the maxillary second molars, reinforcing their anchorage. The retraction force applied to the long lever arm hooks from the TPA tabs at the level of center of resistance (CRes) of anterior and posterior teeth is advantageous mainly in two aspects. First, it reinforces the anchorage, and second, it favors the palatal root movement of anterior teeth, thus obtaining better control over the torque during en masse retraction.

  2. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  3. 32 CFR 1903.10 - Weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Weapons. 1903.10 Section 1903.10 National... INSTALLATIONS § 1903.10 Weapons. (a) Except as provided in paragraph (c) of this section, knowingly possessing or causing to be present a weapon on an Agency installation, or attempting to do so is prohibited. (b...

  4. 48 CFR 25.301-3 - Weapons.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Weapons. 25.301-3 Section... FOREIGN ACQUISITION Contracts Performed Outside the United States 25.301-3 Weapons. The contracting officer shall follow agency procedures and the weapons policy established by the combatant commander or...

  5. Single-Lever Power Control for General Aviation Aircraft Promises Improved Efficiency and Simplified Pilot Controls

    Science.gov (United States)

    Musgrave, Jeffrey L.

    1997-01-01

    General aviation research is leading to major advances in internal combustion engine control systems for single-engine, single-pilot aircraft. These advances promise to increase engine performance and fuel efficiency while substantially reducing pilot workload and increasing flight safety. One such advance is a single-lever power control (SLPC) system, a welcome departure from older, less user-friendly, multilever engine control systems. The benefits of using single-lever power controls for general aviation aircraft are improved flight safety through advanced engine diagnostics, simplified powerplant operations, increased time between overhauls, and cost-effective technology (extends fuel burn and reduces overhaul costs). The single-lever concept has proven to be so effective in preliminary studies that general aviation manufacturers are making plans to retrofit current aircraft with the technology and are incorporating it in designs for future aircraft.

  6. Executive Stock Option, Mediation of Agency Costs and Allocation of Power in Levered Firms

    Institute of Scientific and Technical Information of China (English)

    Liu Hongyan; Kong Feng; Zhang Wei

    2005-01-01

    The relationship between options and agency costs in levered firms is studied by modeling the effect of executive stock options on the managers investment strategy in levered firms. Stock options do not necessarily aggravate agency costs in levered firms. The corporate governance affects agency costs greatly. If debt-holders were entitled to design executive stock options together with stockholders, by allocating power properly between stockholders and debt-holders, firm value could be enhanced greatly. The following way of allocating power between the two parties is proposed: the exercise price should be the weighted average of the stockholders and debt-holders suggested exercise prices. The weight allocated to debt-holders is positively related to the amount of debts that debt-holders lend to stockholders.

  7. Secretory vesicle transport velocity in living cells depends on the myosin-V lever arm length.

    Science.gov (United States)

    Schott, Daniel H; Collins, Ruth N; Bretscher, Anthony

    2002-01-01

    Myosins are molecular motors that exert force against actin filaments. One widely conserved myosin class, the myosin-Vs, recruits organelles to polarized sites in animal and fungal cells. However, it has been unclear whether myosin-Vs actively transport organelles, and whether the recently challenged lever arm model developed for muscle myosin applies to myosin-Vs. Here we demonstrate in living, intact yeast that secretory vesicles move rapidly toward their site of exocytosis. The maximal speed varies linearly over a wide range of lever arm lengths genetically engineered into the myosin-V heavy chain encoded by the MYO2 gene. Thus, secretory vesicle polarization is achieved through active transport by a myosin-V, and the motor mechanism is consistent with the lever arm model.

  8. Handheld Concealed Weapons Detector Development

    Science.gov (United States)

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  9. Detection of weapons of mass destruction

    Science.gov (United States)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  10. The simulation of laser-based guided weapon engagements

    Science.gov (United States)

    Al-Jaberi, Mubarak; Richardson, Mark; Coath, John; Jenkin, Robin

    2006-05-01

    The laser is an integrated part of many weapon systems, such as laser guided bombs, laser guided missiles and laser beam-riding missiles. These systems pose a significant threat to military assets on the modern battlefield. The lasers used in beam-riding missiles are particularly hard to detect as they typically use relatively low power lasers. Beamriders are also particularly difficult to defeat as current countermeasure systems have not been optimized against this threat. Some recent field trails conducted in the United Arab Emirates desert have demonstrated poor performance of both laser beam-riding systems and the LWRs designed to detect them. The aim of this research is to build a complete evaluation tool capable of assessing all the phases of an engagement of a main battle tank or armoured fighting vehicle with a laser based guided weapon. To this end a software model has been produced using Matlab & Simulink. This complete model has been verified using lab based experimentation and by comparison to the result of the mentioned field trials. This project will enable both the evaluation and design of any generic laser warning receiver or missile seeker and specific systems if various parameters are known. Moreover, this model will be used as a guide to the development of reliable countermeasures for laser beam-riding missiles.

  11. Seaborne Delivery Interdiction of Weapons of Mass Destruction (WMD)

    Energy Technology Data Exchange (ETDEWEB)

    Glauser, H

    2011-03-03

    Over the next 10-20 years, the probability of a terrorist attack using a weapon of mass destruction (WMD) on the United States is projected to increase. At some point over the next few decades, it may be inevitable that a terrorist group will have access to a WMD. The economic and social impact of an attack using a WMD anywhere in the world would be catastrophic. For weapons developed overseas, the routes of entry are air and sea with the maritime vector as the most porous. Providing a system to track, perform a risk assessment and inspect all inbound marine traffic before it reaches US coastal cities thereby mitigating the threat has long been a goal for our government. The challenge is to do so effectively without crippling the US economy. The Portunus Project addresses only the maritime threat and builds on a robust maritime domain awareness capability. It is a process to develop the technologies, policies and practices that will enable the US to establish a waypoint for the inspection of international marine traffic, screen 100% of containerized and bulk cargo prior to entry into the US if deemed necessary, provide a palatable economic model for transshipping, grow the US economy, and improve US environmental quality. The implementation strategy is based on security risk, and the political and economic constraints of implementation. This article is meant to provide a basic understanding of how and why this may be accomplished.

  12. Cyber terrorism and cyber-crime – threats for cyber security

    OpenAIRE

    Ackoski, Jugoslav; Dojcinovski, Metodija

    2012-01-01

    This paper has aim to give contribution in supporting efforts against cyber threats recognized as a cyber terrorism and cyber crime. Also, it has aim to show future challenges related to cyber security and their emerging threats – cyber war, cyber terrorism and cyber crime. Accelerate weapon development called ICT (Information Communication Technology) which is developed every day faster and faster, and development of human conscious on higher level about consequences of ICT enormous pene...

  13. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  14. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  15. [Modern pneumatic weapons and injuries they cause].

    Science.gov (United States)

    Kozachenko, I N

    2013-01-01

    The data on the history of development and further improvement of pneumatic weapons are presented with special reference to specific features of different types and varieties of these weapons, cartridges for them, and the sphere of their application. Investigations into peculiarities of damages caused by high-capacity pneumatic weapons to the objects of forensic medical expertise affected from different distances are reviewed. Results of forensic medical expertise and clinical studies on the structure of body injuries inflicted by gunshots from pneumatic weapons to the human body are discussed. The author emphasizes the necessity of developing up-to-date terminology and classification of gunshot injuries caused by shooting from pneumatic weapons.

  16. Why Sexually Selected Weapons Are Not Ornaments.

    Science.gov (United States)

    McCullough, Erin L; Miller, Christine W; Emlen, Douglas J

    2016-10-01

    The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  18. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  19. Hostile fire indicator threat data collection for helicopter-mounted applications

    Science.gov (United States)

    Naz, P.; Hengy, S.; De Mezzo, S.

    2013-05-01

    This paper briefly describes the set-up of the sensors and the instrumentation deployed by the French-German Research Institute of Saint-Louis (ISL) during the last NATO/ACG3/SG2 HFI Threat Data Collection (Trial PROTEUS which has been conducted during the summer 2012 in Slovenia). The main purpose of this trial was the measurements of weapon and ammunition signatures for threat warning and hostile fire indicator (HFI) system development. The used weapons vary from small caliber rifles to anti-tank rockets in ground-to-ground shooting configurations. For the ISL team, the objectives consisted in measuring the acoustic signals for detection and localization of weapon firing events. Experimental results of sound localization obtained by using ground based sensors are presented and analyzed under various conditions.

  20. Improving the quality and longevity of the valve-gear lever of VAZ automobiles

    Science.gov (United States)

    Tikhonov, A. K.; Bogdanova, N. V.; Krishtal, M. A.

    1990-12-01

    The basic causes of the scouring of the nitrided layer are its increased brittleness as a result of supersaturation with nitrogen, the presence of stress raisers on the effective surface of the lever (increased roughness), and the insufficient extent to which the surface layers of the components of the camshaft couple are worn in.

  1. Haptic Feedback and Students' Learning about Levers: Unraveling the Effect of Simulated Touch

    Science.gov (United States)

    Wiebe, Eric N.; Minogue, James; Jones, M. Gail; Cowley, Jennifer; Krebs, Denise

    2009-01-01

    While there has been extensive experimental research on haptics, less has been conducted on cross-modal interactions between visual and haptic perception and even less still on cross-modal applications in instructional settings. This study looks at a simulation on the principles of levers using both visual and haptic feedback: one group received…

  2. Aanwijzingen voor oorzaken voor de toename van het aandeel afgekeurde levers bij vleesvarkens

    NARCIS (Netherlands)

    Huiskes, J.H.; Zonderland, J.J.

    2000-01-01

    In het kader van de verzekering van slachtdieren tegen gehele of gedeeltelijke afkeuring van karkassen en/of organen constateert het Centraal Bureau Slachtveediensten (CBS) vanaf 1990 een toename van het percentage afgekeurde levers van varkens. De aanleiding tot afkeuring van varkenslevers is doorg

  3. The effects of the Levers of Control Framework on Creativity and Empowerment

    NARCIS (Netherlands)

    Speklé, R.F.; van Elten, Hilco; Widener, Sally

    2014-01-01

    Both control and creativity are important drivers of organizational success. However, often they are regarded as conflicting organizational aspects with differing aims. We use the Levers of Control (LoC) framework to examine the relationships between a system of controls, empowerment, and creativity

  4. Creativity and Control : A Paradox: Evidence from the Levers of Control Framework

    NARCIS (Netherlands)

    Speklé, R.F.; Elten, van H.J.; Widener, S.

    2017-01-01

    Both control and creativity are important drivers of organizational success (Gilson, Mathieu, Shally, and Ruddy 2005; Hirst, Van Knippenberg, Chen, and Sacramento 2011). However, they are often regarded as conflicting. We use the Levers of Control (LoC) framework to examine the relationships between

  5. Creativity and Control: A Paradox : Evidence from the Levers of Control Framework

    NARCIS (Netherlands)

    Speklé, R.F.; van Elten, Hilco; Widener, Sally

    2017-01-01

    Both control and creativity are important drivers of organizational success (Gilson, Mathieu, Shally, and Ruddy 2005; Hirst, Van Knippenberg, Chen, and Sacramento 2011). However, they are often regarded as conflicting. We use the Levers of Control (LoC) framework to examine the relationships between

  6. The effects of the Levers of Control Framework on Creativity and Empowerment

    NARCIS (Netherlands)

    Speklé, R.F.; van Elten, Hilco; Widener, Sally

    2014-01-01

    Both control and creativity are important drivers of organizational success. However, often they are regarded as conflicting organizational aspects with differing aims. We use the Levers of Control (LoC) framework to examine the relationships between a system of controls, empowerment, and

  7. Mechanical advantage in wheelchair lever propulsion : effect on physical strain and efficiency

    NARCIS (Netherlands)

    van der Woude, L H; Botden, E; Vriend, I; Veeger, DirkJan (H. E. J.)

    1997-01-01

    In this experimental study on a prototype lever-propelled wheelchair, the effect of a range of mechanical advantages (MA) on physical strain, oxygen uptake, energy cost, mechanical efficiency, stroke frequency and perceived exertion was examined. Nine out of 10 male nonwheelchair users successfully

  8. Mechanical advantage in wheelchair lever propulsion : effect on physical strain and efficiency

    NARCIS (Netherlands)

    van der Woude, L H; Botden, E; Vriend, I; Veeger, DirkJan (H. E. J.)

    1997-01-01

    In this experimental study on a prototype lever-propelled wheelchair, the effect of a range of mechanical advantages (MA) on physical strain, oxygen uptake, energy cost, mechanical efficiency, stroke frequency and perceived exertion was examined. Nine out of 10 male nonwheelchair users successfully

  9. Mechanical advantage in wheelchair lever propulsion : effect on physical strain and efficiency

    NARCIS (Netherlands)

    van der Woude, L H; Botden, E; Vriend, I; Veeger, DirkJan (H. E. J.)

    In this experimental study on a prototype lever-propelled wheelchair, the effect of a range of mechanical advantages (MA) on physical strain, oxygen uptake, energy cost, mechanical efficiency, stroke frequency and perceived exertion was examined. Nine out of 10 male nonwheelchair users successfully

  10. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  11. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges

    2015-01-01

    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  12. History of Laser Weapon Research

    Science.gov (United States)

    2012-01-01

    surgery/medicine, hair re- moval, presentation pointers, law enforcement, ranging and sighting devices, welding applications, and much more. Using...other laser technology develop- ments. The first chemical laser, hydrogen fluoride ( HF ), was built in 1965, producing 1 kW. It was then that DoD became...energy laser (HEL) weapons. In industry, the more powerful CO2 lasers are used for weld - ing, drilling, and cutting. There are many different types

  13. Deterrence and Cyber-Weapons

    Science.gov (United States)

    2013-03-01

    67, no. 4 (2012): 41. 4 Scott Shackelford , “Estonia Three Years Later,” Journal of Internet Law 8, no. 13 (2010): 25. 3 weapons were employed...effects of 134 Scott Shackelford , “From Nuclear War to Net War: Analogizing Cyber-Attacks in...International Law,” (unpublished paper, Stanford University), 5-6. 135 Shackelford , unpublished paper, 76. 136 Ibid., 73. 137 Mary Ellen O’Connell, “Cyber

  14. An ergonomic study of the operating levers on timber loaders of farm tractor. Maataloustraktorin puutavarakuormainten hallintavipujen ergonomiaa

    Energy Technology Data Exchange (ETDEWEB)

    Castren, M. (Work Efficiency Institute, Helsinki (Finland))

    1991-01-01

    The operating levers of timber loaders of farm tractor are mechanical and employing 6-,4-,3- or 2-lever and 2-lever partly electrical solutions. These levers are used to cause the boom structure to turn, fold and lift and the grapple to rotate. The extension boom and grapple grip movements are activated via additional levers or by means of a branching solution, except in the case of the so-called ergo-controlled lever solution in which these functions are executed by tilting the handle. In the case of electrical control, these functions are executed by means of push-buttons. The number of levers, the shape of the handle, and the path of motions all have bearing on the load imposed upon the upper limbs. The other characteristics of the cab (e. g. the seat and draught from the outside) are also involved. The two partly electrically controlled 2-lever systems on display at the Farma Agricultural Show in Turku, Finland, in the spring of 1991 were included along with five mechanical solutions in a Work Efficiency Institute's questionnaire directed at the public. The electrically controlled units came out clearly the winners. The questionnaire required the participants to assess the operating levers, general ergonomics, the shape of the handles, and the motion paths of the levers. Of the 196 respondents to the questionnaire, 82 per cent had used an agricultural loader and 53 per cent owned one. This questionnaire was part of the NSR project called Measures towards preventing stress injuries to forestry machine operators.

  15. The vulnerability of laser warning systems against guided weapons based on low power lasers

    OpenAIRE

    Al-Jaberi, Mubarak

    2006-01-01

    Laser assisted weapons, such as laser guided bombs, laser guided missiles and laser beam-riding missiles pose a significant threat to military assets in the modern battlefield. Laser beam-riding missiles are particularly hard to detect because they use low power lasers. Most laser warning systems produced so far can not detect laser beam-riding missiles because of their weak emissions which have signals less than 1% of laser range finder power . They are even harder to defeat because current ...

  16. Maritime Terrorism and the Small Boat Threat to the United States: A Proposed Response

    Science.gov (United States)

    2009-03-01

    vessel, including a vessel that is below 300 gross tons.161 Concern over the threat of the import of WMDs via the supply chain , i.e., including...they obtain one. Since Terrorists lack a missile delivery capability for such weapons, our concern is their use of the supply chain to deliver a device...www.maritimeterrorism.com/2007/04/15/al-qaeda%E2%80%99s-maritime-threat. 44 Catherine Zara Raymond, “How Real is the Threat from Maritime Terrorism?” Power and

  17. 36 CFR 2.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...

  18. Optimization of Aimpoints for Coordinate Seeking Weapons

    Science.gov (United States)

    2015-09-01

    process. The program works by first taking in the number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the...MATLAB program is used as the coding tool for the development of this algorithm and the optimization process. The program works by first taking in the...number of weapons used and arranging them in a fixed uniform spacing on a circle centered on the assumed target location. Then, the weapon

  19. New weapons and the arms race

    Energy Technology Data Exchange (ETDEWEB)

    Tsipis, K.

    1983-01-01

    In speaking about technologies that could further animate the weapons competition between the US and the USSR, it is useful to distinguish between technologies that have already been incorporated into specific weapons systems, and new technologies that are of a generic nature, can be used in a variety of applications, and can best be described by the tasks that they can perform rather than any specific weapons' application. The author discusses these in reverse order.

  20. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness

    OpenAIRE

    Taylor, J. Eric T.; Witt, Jessica K.; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools – and specifically weapons – can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and ...

  1. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux

    2008-06-01

    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  2. 76 FR 6087 - Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and...

    Science.gov (United States)

    2011-02-03

    ... Draft Weapons Safety Assessment on the Use of Enhanced Weapons; Notice of Availability and Request for... ``Weapons Safety Assessment'' (WSA). This guidance would be used by licensees and certificate holders applying to the NRC to obtain enhanced weapons under the NRC's proposed rule titled ``Enhanced Weapons...

  3. Combatting Insider Threats

    Science.gov (United States)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  4. Coupling of lever arm swing and biased Brownian motion in actomyosin.

    Directory of Open Access Journals (Sweden)

    Qing-Miao Nie

    2014-04-01

    Full Text Available An important unresolved problem associated with actomyosin motors is the role of Brownian motion in the process of force generation. On the basis of structural observations of myosins and actins, the widely held lever-arm hypothesis has been proposed, in which proteins are assumed to show sequential structural changes among observed and hypothesized structures to exert mechanical force. An alternative hypothesis, the Brownian motion hypothesis, has been supported by single-molecule experiments and emphasizes more on the roles of fluctuating protein movement. In this study, we address the long-standing controversy between the lever-arm hypothesis and the Brownian motion hypothesis through in silico observations of an actomyosin system. We study a system composed of myosin II and actin filament by calculating free-energy landscapes of actin-myosin interactions using the molecular dynamics method and by simulating transitions among dynamically changing free-energy landscapes using the Monte Carlo method. The results obtained by this combined multi-scale calculation show that myosin with inorganic phosphate (Pi and ADP weakly binds to actin and that after releasing Pi and ADP, myosin moves along the actin filament toward the strong-binding site by exhibiting the biased Brownian motion, a behavior consistent with the observed single-molecular behavior of myosin. Conformational flexibility of loops at the actin-interface of myosin and the N-terminus of actin subunit is necessary for the distinct bias in the Brownian motion. Both the 5.5-11 nm displacement due to the biased Brownian motion and the 3-5 nm displacement due to lever-arm swing contribute to the net displacement of myosin. The calculated results further suggest that the recovery stroke of the lever arm plays an important role in enhancing the displacement of myosin through multiple cycles of ATP hydrolysis, suggesting a unified movement mechanism for various members of the myosin family.

  5. Refurbishing apartments and houses in Latvia and Bulgaria: levers and brakes

    OpenAIRE

    Gosselain, Véronique; Ozoliņa , Līga; Garā, Evita; Vassileva, Dobrina; Stamova, Grozdanka; Bartiaux, Françoise

    2011-01-01

    This paper investigates levers and brakes for carrying out energy effective retrofits in private dwellings in Latvia and in Bulgaria. In both countries, 24 home owners occupying either their apartment or their single family house, were interviewed in 2009-10 about their energy-saving renovation works and their justifications, both in cities and in the countryside. The paper begins with a description of the building stock in the two countries. Both have a large proportion of apartments (46 % o...

  6. Coercive Levers in Chinese Economic Statecraft: Attributed Across Earth, Rarely Apparent

    Science.gov (United States)

    2012-06-01

    Clinton, Hillary R., “Joint Press Availability with Japanese Foreign Minister Seiji Maehara,” Kahala Hotel and Resort: Honolulu, HI, October 27, 2010...impose dumping duties on imports of U.S. chicken parts.341 Though a profitable product, this explicit lever lacked the magnitude of REEs in Japan...Availability with Japanese Foreign Minister Seiji Maehara.” Kahala Hotel and Resort: Honolulu, HI, October 27, 2010. Cohen. Cohen, Jerome A

  7. [Myocardial infarction after conduction electrical weapon shock].

    Science.gov (United States)

    Ben Ahmed, H; Bouzouita, K; Selmi, K; Chelli, M; Mokaddem, A; Ben Ameur, Y; Boujnah, M R

    2013-04-01

    Controversy persists over the safety of conducted electrical weapons, which are increasingly used by law enforcement agencies around the world. We report a case of 33-year-old man who had an acute inferior myocardial infarction after he was shot in the chest with an electrical weapon. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  8. Radioactive Fallout From Nuclear Weapons Testing ...

    Science.gov (United States)

    2017-08-07

    Detonating nuclear weapons above ground sends radioactive materials into the atmosphere from the ground level up to very high elevations. Overtime, these materials settle out of the atmosphere and fall to the ground. Fallout typically contains hundreds of different radionuclides. Since the end of aboveground nuclear weapons testing, radionuclides have largely decayed away.

  9. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  10. Weapons Acquisition. Processes of Selected Foreign Government.

    Science.gov (United States)

    1986-02-01

    period from 1977 to 1985: (1) 5.56mm calibre assault rifle. (2) Milan and Hot antitank weapon systems. (3) Roland ground-to-air weapon system. (4) AMX 30...and standardization edicts . Awards and penalties are laid on accordingly. (7/17, 13/20) The ministries stand apart from one another in the same way

  11. Nuclear weapons, nuclear effects, nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Bing, G.F.

    1991-08-20

    This paper provides a brief and mostly non-technical description of the militarily important features of nuclear weapons, of the physical phenomena associated with individual explosions, and of the expected or possible results of the use of many weapons in a nuclear war. Most emphasis is on the effects of so-called ``strategic exchanges.``

  12. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  13. Overview of surplus weapons plutonium disposition

    Energy Technology Data Exchange (ETDEWEB)

    Rudy, G.

    1996-05-01

    The safe disposition of surplus weapons useable plutonium is a very important and urgent task. While the functions of long term storage and disposition directly relate to the Department`s weapons program and the environmental management program, the focus of this effort is particularly national security and nonproliferation.

  14. Susceptibility and hardening of electronic systems to fast transient threats: new challenges ahead

    Directory of Open Access Journals (Sweden)

    F. Sabath

    2004-01-01

    Full Text Available The field of susceptibility and hardening of electronic systems to transient threats has experienced a significant growth during the past ten years. Driven by the development in the area of non-lethal electromagnetic weapons it has become necessary to extend the classical set of transient threats, consisting of LEMP, ESD and NEMP, by a fast transient threat with an extreme bandwidth. The investigation of the susceptibility to those UWB threats, characterized by a bandwidth of more than a quarter of the center frequency, rise times of less than 200 ps and pulse durations in the ns regime, is of special interest. This paper presents an overview of current challenges of the hardening against UWB threats. It discusses recent research trends in transient susceptibility measurements, protection concepts and methods of analysis.

  15. Nonlethal weapons as force options for the Army

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, J.B.

    1994-04-01

    This paper suggests that future challenges to US national security will be very different from those previously experienced. In a number of foreseeable circumstances, conventional military force will be inappropriate. The National Command Authority, and other appropriate levels of command, need expanded options available to meet threats for which the application of massive lethal force is counterproductive or inadvisable. It is proposed that nonlethal concepts be developed that provide additional options for military leaders and politicians. Included in this initiative should be exploration of policy, strategy, doctrine, and training issues as well as the development of selected technologies and weapons. In addition, civilian law enforcement agencies have similar requirements for less-than-lethal systems. This may be an excellent example for a joint technology development venture.

  16. Nonlethal weapons as force options for the Army

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, J.B.

    1994-04-01

    This paper suggests that future challenges to US national security will be very different from those previously experienced. In a number of foreseeable circumstances, conventional military force will be inappropriate. The National Command Authority, and other appropriate levels of command, need expanded options available to meet threats for which the application of massive lethal force is counterproductive or inadvisable. It is proposed that nonlethal concepts be developed that provide additional options for military leaders and politicians. Included in this initiative should be exploration of policy, strategy, doctrine, and training issues as well as the development of selected technologies and weapons. In addition, civilian law enforcement agencies have similar requirements for less-than-lethal systems. This may be an excellent example for a joint technology development venture.

  17. Advances in neuroscience and the biological and toxin weapons convention.

    Science.gov (United States)

    Dando, Malcolm

    2011-01-01

    This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  18. North Korea, Nuclear Weapons, and No Good Options?

    DEFF Research Database (Denmark)

    Cohen, Michael David

    2013-01-01

    How would Pyongyang’s development of the capability to target the United States with nuclear weapons influence North Korea’s foreign policy? I argue that it would cause more dangerous crises than those of the last decade, and predict that these crises would eventually cause Kim Jong Un and his...... senior military associates to experience fear of imminent nuclear war or conventional regime change. I show that the effect of such fear would depend on whether or not Kim believes that he has control over the occurrence of these events. I argue that if he experiences fear and believes that he has some...... control over whether these extreme events actually happen, he will moderate his nuclear threats and behave more like other experienced nuclear powers. But if he experiences fear and believes that he has no control, he will likely pursue policies that could cause nuclear war. I use this insight...

  19. Advances in Neuroscience and the Biological and Toxin Weapons Convention

    Directory of Open Access Journals (Sweden)

    Malcolm Dando

    2011-01-01

    Full Text Available This paper investigates the potential threat to the prohibition of the hostile misuse of the life sciences embodied in the Biological and Toxin Weapons Convention from the rapid advances in the field of neuroscience. The paper describes how the implications of advances in science and technology are considered at the Five Year Review Conferences of the Convention and how State Parties have developed their appreciations since the First Review Conference in 1980. The ongoing advances in neurosciences are then assessed and their implications for the Convention examined. It is concluded that State Parties should consider a much more regular and systematic review system for such relevant advances in science and technology when they meet at the Seventh Review Conference in late 2011, and that neuroscientists should be much more informed and engaged in these processes of protecting their work from malign misuse.

  20. Weapon Control System for Airborne Application.

    Directory of Open Access Journals (Sweden)

    M. Sankar Kishore

    2000-07-01

    Full Text Available The integrated fire' control system (IFCS plays an important role in the present-day fighter aircraft and helicopters. Wecapons, such as missiles (active/passive, rockets and guns may be present on thelfighter aircraft or helicopter .IFCS monitors the status of the weapons present on the vehicle and passes the information to pilot/co-pilot. Depending upon the health/availability of the weapons, IFCS selects/fires the weapons. An attempt has been made to bring out the details of one such IFCS. As a I stepping stone, smaller version is developed and same philosophy can be used for integrating ftlore and I more weapons. Here, emphasis has been made on design and development of weapon control unit which is the heart f IFCS, both in hardware and software. The system has been developed using a 486 DX2 processor, and an elaborate software has been developed in PL/M.

  1. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity.

  2. Aspects of Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter;

    2010-01-01

    The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the ins...

  3. Cyber Intelligence Threat Prioritization

    Science.gov (United States)

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding ) Extrinsic (receive...external reward or avoid punishment) Software Engineering Institute I Cm·nt·git• .\\lellon Lnin·r·sity Targeted Data Understanding what a threat

  4. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection...

  5. [Consequences learned from the use of chemical weapons during the First World War for the modern military medicine].

    Science.gov (United States)

    Belskikh, A N; Basharin, V A; Chepur, S V; Khalimov, Yu Sh; Markizova, N F

    2015-08-01

    The article describes the way medical service dealed with problems resulted from the use of chemical weapons during the First World War (1914-1918). It was revealed that many of the abovementioned problems remain unsolved up to the present moment. It is stated the existence of the threat of use of chemical weapons in modem military conflicts, which expands the area of responsibility for medical chemical protection. The authors proved necessity and algorithm of the training system, considered as a part of medical protection in case of adverse factors of chemical nature.

  6. Proliferation of massive destruction weapons: fantasy or reality?; La proliferation des armes de destruction massive: fantasme ou realite?

    Energy Technology Data Exchange (ETDEWEB)

    Duval, M

    2001-09-01

    This article evaluates the threat of massive destruction weapons (nuclear, chemical, biological) for Europe and recalls the existing safeguards against the different forms of nuclear proliferation: legal (non-proliferation treaty (NPT), comprehensive nuclear test ban treaty (CTBT), fissile material cut off treaty (FMCT) etc..), technical (fabrication of fissile materials, delays). However, all these safeguards can be overcome as proven by the activities of some countries. The situation of proliferation for the other type of massive destruction weapons is presented too. (J.S.)

  7. Weapon Involvement in the Victimization of Children.

    Science.gov (United States)

    Mitchell, Kimberly J; Hamby, Sherry L; Turner, Heather A; Shattuck, Anne; Jones, Lisa M

    2015-07-01

    To report the prevalence of weapons involved in the victimization of youth with particular emphasis on weapons with a "high lethality risk" and how such exposure fits into the broader victimization and life experiences of children and adolescents. Data were collected as part of the Second National Survey of Children's Exposure to Violence, a nationally representative telephone survey of youth ages 2 to 17 years and caregivers (N = 4114) conducted in 2011. Estimates from the Second National Survey of Children's Exposure to Violence indicate that almost 14 million youth, ages 2–17, in the United States have been exposed to violence involving a weapon in their lifetimes as witnesses or victims,or .1 in 5 children in this age group [corrected]. More than 2 million youth in the United States (1 in 33) have been directly assaulted in incidents where the high lethality risk weapons of guns and knives were used. Differences were noted between victimizations involving higher and lower lethality risk weapons as well as between any weapon involvement versus none. Poly-victims, youth with 7 or more victimization types, were particularly likely to experience victimization with any weapon, as well as victimization with a highly lethal weapon compared with nonpoly-victims. Findings add to the field's broadening conceptualization of youth victimization highlighting the potentially highly consequential risk factor of weapon exposure as a component of victimization experiences on the mental health of youth. Further work on improving gun safety practices and taking steps to reduce children's exposure to weapon-involved violence is warranted to reduce this problem. Copyright © 2015 by the American Academy of Pediatrics.

  8. Sea-dumped chemical weapons: environmental risk, occupational hazard.

    Science.gov (United States)

    Greenberg, M I; Sexton, K J; Vearrier, D

    2016-01-01

    for decades. Rates of solubility and hydrolysis and levels of innate toxicity of a chemical agent are used to predict the risk to the marine environments. The organoarsenicals eventually breakdown into arsenic, and thus present an indefinite timeline for contamination. Generally, studies assaying sediment and water levels of parent chemical agents and breakdown products at dumpsites have found minimal amounts of relevant chemicals, although arsenic levels are typically higher in dumpsites than reference areas. Studies of marine organisms have not shown concerning amounts of chemical agents or breakdown products in tissue, but have shown evidence of chronic toxicity. There is believed to be minimal risk posed by seafood consumption. Microbiota assays of dumpsites are significantly altered in species composition compared to reference sites, which may imply unseen but significant changes to ecosystems of dumpsites. Human health concerns: The major human health risk at this time appears to arise from acute exposure to an agent by either accidental recovery of a chemical weapon on a fishing vessel, or by munitions washed ashore onto beaches. Improving technology continues to make the deep sea more accessible, thus increasing the risk of disturbing munitions lying on or buried in the seabed. Pipe laying, cable burying, drilling, scuba diving, trawling, and undersea scientific research are the activities posing the most risk. The long-term threat to the benthic habitat via increased arsenic concentrations, shifts in microbiota speciation, and chronic toxicity to vertebrates and invertebrates is not currently understood. The risk to the environment of massive release via disturbance remains a distinct possibility. Terrorist recovery and re-weaponization of chemical agents is a remote possibility.

  9. Weapons barrel life cycle determination

    Directory of Open Access Journals (Sweden)

    Nebojša Pene Hristov

    2013-10-01

    Full Text Available This article describes the dynamic processes within the gun barrel during the firing process in exploitation. It generally defines the basic principles of constructing tube elements, and shows the distortion of the basic geometry of the tube interior due to wear as well as the impact it causes during exploitation. The article also defines basic empirical models as well as a model based on fracture mechanics for the calculation of a use-life of the barrel, and other elements essential for the safe use of the barrel as the basic weapon element. Erosion causes are analysed in order to control and reduce wear and prolong the lifetime of the gun barrel. It gives directions for the reparation of barrels with wasted resources. In conclusion, the most influential elements of tube wear are given as well as possible modifications of existing systems, primarily propellant charges, with a purpose of prolonging lifetime of gun barrels. The guidelines for a proper determination of the lifetime based on the barrel condition assessment are given as well. INTRODUCTION The barrel as the basic element of each weapon is described as well as the processes occurring during the firing that have impulsive character and are accompanied by large amounts of energy. The basic elements of barrel and itheir constructive characteristics are descibed. The relation between Internal ballistics, ie calculation of the propellant gas pressure in the firing process, and structural elements defined by the barrel material resistance is shown. In general, this part of the study explains the methodology of the gun barrel structural elements calculation, ie. barrel geometry, taking into account the degrees of safety in accordance with Military Standards.   TUBE WEAR AND DEFORMATIONS The weapon barrel gradually wears out during exploitation due to which it no longer satisfies the set requirements. It is considered that the barrel has experienced a lifetime when it fails to fulfill the

  10. Taser and Conducted Energy Weapons.

    Science.gov (United States)

    LeClair, Thomas G; Meriano, Tony

    2015-01-01

    It is clear that CEWs are an increasingly prevalent law enforcement tool, adopted to address a complex and challenging problem. The potential for serious injury from a single deployment of a CEW is extremely low. The debate regarding the link between these electrical weapons and sudden in-custody death is likely to continue because their use is often in complex and volatile situations. Any consideration of injuries has to be put into that context. One must also consider what injuries to a subject would result if an alternative force method was used. Furthermore, the potential benefits of CEWs, including reduction in injuries to the public and law-enforcement officers, need to be considered.

  11. Air guns: toys or weapons?

    Science.gov (United States)

    Aslan, Sahin; Uzkeser, Mustafa; Katirci, Yavuz; Cakir, Zeynep; Bilir, Ozlem; Bilge, Fatih; Cakir, Murtaza

    2006-09-01

    Air guns and blank guns may appear relatively harmless at first glance, but they are, in fact, potentially destructive, even lethal, weapons. Approximately 2 to 2.5 million nonpowder firearms are sold annually, and again approximately 12.9 per 100,000 population are treated for such injuries in hospital emergency departments each year in the United States. Unfortunately, these guns are considered to be a toy for children. Therefore, incidents of air gun injuries are gradually increasing. Although such injuries may initially be considered trivial, it may signify severe internal tissue pathologies. These apparently trivial injuries may have catastrophic consequences if unnoticed. In this study, we report 4 cases with head injury due to a shot by these guns. The cases indicate that these people had used the guns belonging to their parents for the purpose of suicide. The cases also show that these machines are not innocent.

  12. Electronic eyebox for weapon sights

    Science.gov (United States)

    Szapiel, Stan; Greenhalgh, Catherine; Wagner, Kevin; Nobes, Ryan

    2016-05-01

    We expand the effective size of the eyebox of a magnified telescopic weapon sight by following the movements of the operator's eye to create a larger, `electronic eyebox'. The original eyebox of the telescope is dynamically relocated in space so that proper overlap between the pupil of the eye and the exit pupil of the device is maintained. Therefore, the operator will perceive the entire field of view of the instrument in a much bigger spatial region than the one defined by the original eyebox. Proof-of-the-concept results are presented with a more than 3.5X enlargement of the eyebox volume along with recommendations for the next phase of development.

  13. Ordene lever

    DEFF Research Database (Denmark)

    Davidsen-Nielsen, Niels

    2016-01-01

    Eftertanken. Shakespeare er så stor, at han til næsten enhver lejlighed er leveringsdygtig med en tankevækkende formulering.......Eftertanken. Shakespeare er så stor, at han til næsten enhver lejlighed er leveringsdygtig med en tankevækkende formulering....

  14. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  15. [Toxins as a biological weapon].

    Science.gov (United States)

    Płusa, Tadeusz

    2015-09-01

    The criteria for recognizing a chemical compound for the toxin are vague and gave it the possibility of inclusion in this group a number of biological agents. Toxins list is extensive, but the interest is focused on bacterial toxins, poisons derived from snake venoms, algae and plant proteins, and small molecules. Particular attention is focused on the so-called "sea" toxins, which include tetrodotoxin, brevetoxin and saxitoxin. This indicates the search for a new hitherto unknown potential bioterrorist threats. © 2015 MEDPRESS.

  16. Toward a nuclear weapons free world?

    Energy Technology Data Exchange (ETDEWEB)

    Maaranen, S.A. [Los Alamos National Lab., NM (United States). Center for International Security Affairs

    1996-09-01

    Doubts about the wisdom of relying on nuclear weapons are as old as nuclear weapons themselves. But despite this questioning, nuclear weapons came to be seen as the indispensable element of American (indeed Western) security during the Cold War. By the 1970s and 1980s, however, discontent was growing about the intense US-Soviet nuclear arms competition, as it failed to provide any enduring improvement in security; rather, it was seen as creating ever greater risks and dangers. Arms control negotiations and limitations, adopted as a means to regulate the technical competition, may also have relieved some of the political pressures and dangers. But the balance of terror, and the fears of it, continued. The Strategic Defense Initiative (SDI) under President Reagan was a very different approach to escaping from the precarious protection of nuclear weapons, in that it sought a way to continue to defend the US and the West, but without the catastrophic risks of mutual deterrence. As such, SDI connoted unhappiness with the precarious nuclear balance and, for many, with nuclear weapons in general. The disappearance of the Warsaw Pact, the disintegration of the Soviet Union, and the sudden end of the Cold War seemed to offer a unique opportunity to fashion a new, more peaceful world order that might allow for fading away of nuclear weapons. Scholars have foreseen two different paths to a nuclear free world. The first is a fundamental improvement in the relationships between states such that nuclear weapons are no longer needed. The second path is through technological development, e.g., missile defenses which could provide effective protection against nuclear attacks. The paper discusses nuclear weapon policy in the US, views of other nuclear states, the future of nuclear weapons, and issues in a less-nuclear world.

  17. Threat in dreams: an adaptation?

    Science.gov (United States)

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, pdreams (chi([1,N=287])(2)=6.11, pdream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  18. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  19. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  20. Bluetooth Threat Taxonomy

    OpenAIRE

    Dunning, John Paul

    2010-01-01

    Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides ...

  1. Weapon container catalog. Volumes 1 & 2

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L.A.; Higuera, M.C.

    1998-02-01

    The Weapon Container Catalog describes H-gear (shipping and storage containers, bomb hand trucks and the ancillary equipment required for loading) used for weapon programs and for special use containers. When completed, the catalog will contain five volumes. Volume 1 for enduring stockpile programs (B53, B61, B83, W62, W76, W78, W80, W84, W87, and W88) and Volume 2, Special Use Containers, are being released. The catalog is intended as a source of information for weapon program engineers and also provides historical information. The catalog also will be published on the SNL Internal Web and will undergo periodic updates.

  2. [New challenges in the biological weapons convention].

    Science.gov (United States)

    Sissonen, Susanna; Raijas, Tiina; Haikala, Olli; Hietala, Heikki; Virri, Markku; Nikkari, Simo

    2012-01-01

    Microbes and their toxins are biological weapons that can cause disease in humans, animals or plants, and which can be used with hostile intent in warfare and terrorism. Biological agents can be used as weapons of mass destruction and therefore, immense human and social and major economical damage can be caused. Rapid development of life sciences and technologies during the recent decades has posed new challenges to the Biological Weapons Convention. The Convention states that the States Parties to the BWC strive to ensure that the Convention remains relevant and effective, despite changes in science, technology or politics.

  3. The Spear: An Effective Weapon Since Antiquity

    OpenAIRE

    Robert E. Dohrenwend

    2012-01-01

    The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. ...

  4. The Importance of Designating Cyberspace Weapon Systems

    Science.gov (United States)

    2013-10-01

    PerspectiveSpace Focus Cyberspace Vulnerability Assessment / Hunter Weapon System The Air Force Cyberspace Vulnerability Assessment ( CVA ) / Hunter  weapon...system can perform defensive sorties worldwide via remote or on-site access. The  CVA /Hunter weapon sys- tem is operated by one active duty unit, the...support all of the mission crews. Developed by the for- mer Air Force Information Operations Center, the  CVA /Hunter  weapon system was fielded to the 688th

  5. The nuclear terrorist, radiological, biological, chemical threat. Medical approach; Menace terroriste nucleaire, radiologique, biologique, chimique. Approche medicale

    Energy Technology Data Exchange (ETDEWEB)

    Gourmelon, P.; Vidal, D.; Renaudeau, C

    2005-07-01

    This book illustrates the cooperation of the civil and the military experts in the domain of the NBRC (nuclear, biological, radiological and chemical threat). The different aspects bond to the use of nuclear, biological and chemical weapons, are discussed. Al topics of each domains (NRBC) are presented: historical and fundamental aspects, diagnostic, therapeutic and prevention. (A.L.B.)

  6. 48 CFR 217.173 - Multiyear contracts for weapon systems.

    Science.gov (United States)

    2010-10-01

    ... weapon systems. 217.173 Section 217.173 Federal Acquisition Regulations System DEFENSE ACQUISITION... Mulityear Contracting 217.173 Multiyear contracts for weapon systems. As authorized by 10 U.S.C. 2306b(h... contract for— (a) A weapon system and associated items, services, and logistics support for a weapon system...

  7. 36 CFR 1002.4 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or...

  8. 43 CFR 15.11 - Explosives and dangerous weapons.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond the...

  9. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness.

    Science.gov (United States)

    Taylor, J Eric T; Witt, Jessica K; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.

  10. Review of weapon noise measurement and damage risk criteria: considerations for auditory protection and performance.

    Science.gov (United States)

    Nakashima, Ann; Farinaccio, Rocco

    2015-04-01

    Noise-induced hearing loss resulting from weapon noise exposure has been studied for decades. A summary of recent work in weapon noise signal analysis, current knowledge of hearing damage risk criteria, and auditory performance in impulse noise is presented. Most of the currently used damage risk criteria are based on data that cannot be replicated or verified. There is a need to address the effects of combined noise exposures, from similar or different weapons and continuous background noise, in future noise exposure regulations. Advancements in hearing protection technology have expanded the options available to soldiers. Individual selection of hearing protection devices that are best suited to the type of exposure, the auditory task requirements, and hearing status of the user could help to facilitate their use. However, hearing protection devices affect auditory performance, which in turn affects situational awareness in the field. This includes communication capability and the localization and identification of threats. Laboratory training using high-fidelity weapon noise recordings has the potential to improve the auditory performance of soldiers in the field, providing a low-cost tool to enhance readiness for combat.

  11. Security in the Mediterranean basin: terrorism and weapons of mass destruction; La securite dans le bassin mediterraneen: terrorisme et armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Benoit, L. [Tours Univ., 37 (France); Groupe d' Etudes et de Recherches sur la Cooperation Internationale et Europeenne (GERCIE), 37 - Tours (France)

    2006-08-15

    The european union has appreciated the gravity of the threat from terrorism and weapons of mass destruction, and has adopted a strategy for keeping up its guard, particularly in the Mediterranean basin. The author reviews what is being done to meet these scourges. (author)

  12. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......In this paper, Iran’s nuclear aspiration to destabilise power in the Middle East is analysed. Iran is attempting to develop a nuclear energy program, and perhaps even a nuclear weapons program, despite assurances of the opposite. An Iranian nuclear weapon would be a game changer in the region......, and domestic challenges, caused in part by United Nations’ sanctions, lack of development and internal political power struggles. Iran balances cleverly on the edge of either further international isolation or becoming a significant local power. It uses the threat of developing nuclear weapons, in com...

  13. Distalization of maxillary molars using a lever arm and mini-implant.

    Science.gov (United States)

    Gurgel, Júlio de Araújo; Pinzan-Vercelino, Célia Regina Maio; Bramante, Fausto Silva; Rivera, Alan Poy

    2013-01-01

    This article describes the orthodontic treatment of a young woman with a Class II malocclusion and maxillomandibular prognathism. One orthodontic mini- implant was placed in the posterior area of the palate to provide anchorage for?a transpalatal arch. The force for molar distalization was applied using an elastic chain from the lever arm inserted on the transpalatal arch to the mini-implant. Two sliding jigs were applied buccally as a complement for Class II malocclusion correction. This system created an efficient mechanotherapy for maxillary molar distalization. The active treatment period was 19 months. Normal overjet and reduction of maxillomandibular prognathism were obtained, and labial balance was improved.

  14. Controlling Weapons-Grade Fissile Material

    Science.gov (United States)

    Rotblat, J.

    1977-01-01

    Discusses the problems of controlling weapons-grade fissionable material. Projections of the growth of fission nuclear reactors indicates sufficient materials will be available to construct 300,000 atomic bombs each containing 10 kilograms of plutonium by 1990. (SL)

  15. Weapons dismantlement issues in independent Ukraine

    Energy Technology Data Exchange (ETDEWEB)

    Zack, N.R. [Los Alamos National Lab., NM (United States); Kirk, E.J. [American Association for the Advancement of Science, Washington, DC (United States)

    1994-07-01

    The American Association for the Advancement of Science sponsored a seminar during September 1993, in Kiev, Ukraine, entitled ``Toward a Nuclear Free Future -- Barriers and Problems.`` It brought together Ukrainians, Belarusians, and Americans to discuss the legal, political, safeguards and security, economic, and technical dimensions of nuclear weapons dismantlement and destruction. US representatives initiated discussions on legal and treaty requirements and constraints, safeguards and security issues surrounding dismantlement, storage and disposition of nuclear materials, warhead transportation, and economic considerations. Ukrainians gave presentations on arguments for and against the Ukraine keeping nuclear weapons, Ukrainian Parliament non-approval of START I, alternative strategies for dismantling silos and launchers, and economic and security implications of nuclear weapons removal from the Ukraine. Participants from Belarus discussed proliferation and control regime issues, This paper will highlight and detail the issues, concerns, and possible impacts of the Ukraine`s dismantlement of its nuclear weapons.

  16. Computational Challenges in Nuclear Weapons Simulation

    Energy Technology Data Exchange (ETDEWEB)

    McMillain, C F; Adams, T F; McCoy, M G; Christensen, R B; Pudliner, B S; Zika, M R; Brantley, P S; Vetter, J S; May, J M

    2003-08-29

    After a decade of experience, the Stockpile Stewardship Program continues to ensure the safety, security and reliability of the nation's nuclear weapons. The Advanced Simulation and Computing (ASCI) program was established to provide leading edge, high-end simulation capabilities needed to meet the program's assessment and certification requirements. The great challenge of this program lies in developing the tools and resources necessary for the complex, highly coupled, multi-physics calculations required to simulate nuclear weapons. This paper describes the hardware and software environment we have applied to fulfill our nuclear weapons responsibilities. It also presents the characteristics of our algorithms and codes, especially as they relate to supercomputing resource capabilities and requirements. It then addresses impediments to the development and application of nuclear weapon simulation software and hardware and concludes with a summary of observations and recommendations on an approach for working with industry and government agencies to address these impediments.

  17. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  18. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...... of europium-155 from weapons was estimated at 1400 atoms per 10$^{6}$ fissions, which is close to the yield of europium-155 from fast fission of uranium-238....

  19. Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, L.

    2016-01-01

    A comprehensive study of the smart grid threat landscape is important for designing resilient urban grids of the future. To this end, an analysis could first cross reference threat categorizations and interrelate treat events on the basis of threat lists that complement each other. This paper show

  20. Energy security and renewable electricity trade-Will Desertec make Europe vulnerable to the 'energy weapon'?

    Energy Technology Data Exchange (ETDEWEB)

    Lilliestam, Johan, E-mail: johan@pik-potsdam.de [Potsdam Institute for Climate Impact Research (PIK), Telegrafenberg A31, 14473 Potsdam (Germany); International Institute for Applied Systems Analysis (IIASA), Schlossplatz 1, 2361 Laxenburg (Austria); Ellenbeck, Saskia [Potsdam Institute for Climate Impact Research (PIK), Telegrafenberg A31, 14473 Potsdam (Germany)

    2011-06-15

    Solar power imports to Europe from the deserts of North Africa, as foreseen in the Desertec concept, is one possible way to help decarbonising the European power sector by 2050. However, this approach raises questions of threats to European energy security in such an import scenario, particularly in the light of increasing import dependency and Russia's use of the 'energy weapon' in recent years. In this paper we investigate the threat of North African countries using the Desertec electricity exports as an 'energy weapon'. We develop and use a new model to assess the interdependence - the bargaining power symmetry, operationalised as costs - of a disruption in a future renewable electricity trade between North Africa and Europe. If Europe maintains current capacity buffers, some demand-response capability and does not import much more than what is described in the Desertec scenario, it is susceptible to extortion and political pressure only if all five exporter countries unite in using the energy weapon. Europe is not vulnerable to extortion by an export cut from only one country, as the European capacity buffers are sufficient to restore the power supply: no single exporter country would have sustained bargaining power over Europe. - Highlights: > European vulnerability to energy weapon extortion in a Desertec-style electricity future is assessed. > The vulnerability to the energy weapon is conceptualised as the direct disruption costs on both sides. > The paper shows that Europe is not vulnerable to single-country export disruptions. > If all exporters cut supplies simultaneously, Europe may be vulnerable to the energy weapon.

  1. Overall View of Chemical and Biochemical Weapons

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-01-01

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist. PMID:24902078

  2. Overall view of chemical and biochemical weapons.

    Science.gov (United States)

    Pitschmann, Vladimír

    2014-06-04

    This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  3. Overall View of Chemical and Biochemical Weapons

    Directory of Open Access Journals (Sweden)

    Vladimír Pitschmann

    2014-06-01

    Full Text Available This article describes a brief history of chemical warfare, which culminated in the signing of the Chemical Weapons Convention. It describes the current level of chemical weapons and the risk of using them. Furthermore, some traditional technology for the development of chemical weapons, such as increasing toxicity, methods of overcoming chemical protection, research on natural toxins or the introduction of binary technology, has been described. In accordance with many parameters, chemical weapons based on traditional technologies have achieved the limit of their development. There is, however, a big potential of their further development based on the most recent knowledge of modern scientific and technical disciplines, particularly at the boundary of chemistry and biology. The risk is even higher due to the fact that already, today, there is a general acceptance of the development of non-lethal chemical weapons at a technologically higher level. In the future, the chemical arsenal will be based on the accumulation of important information from the fields of chemical, biological and toxin weapons. Data banks obtained in this way will be hardly accessible and the risk of their materialization will persist.

  4. Weapon target assignment problem satisfying expected damage probabilities based on ant colony algorithm

    Institute of Scientific and Technical Information of China (English)

    Wang Yanxia; Qian Longjun; Guo Zhi; Ma Lifeng

    2008-01-01

    A weapon target assignment (WTA) model satisfying expected damage probabilities with an ant colony algorithm is proposed.In order to save armament resource and attack the targets effectively,the strategy of the weapon assignment is that the target with greater threat degree has higher priority to be intercepted.The effect of this WTA model is not maximizing the damage probability but satisfying the whole assignment result.Ant colony algorithm has been successfully used in many fields,especially in combination optimization.The ant colony algorithm for this WTA problem is described by analyzing path selection,pheromone update,and tabu table update.The effectiveness of the model and the algorithm is demonstrated with an example.

  5. World War I chemical weapons bunker engineering evaluation and cost analysis

    Energy Technology Data Exchange (ETDEWEB)

    Craig, C.A.; Crotteau, A.

    1995-12-31

    This paper provides a review of the US Army Corps of Engineers development and execution of a CERCLA chemical weapons and soil removal from two World War 1 underground test bunkers. The non-time critical removal action was completed from October 1994 to January 1995 in conjunction with Operation Safe Removal, Spring Valley, Washington, D.C. On January 5, 1993, a startled backhoe operator unearthed three 75mm artillery shells, exposing the legacy of a World War 1 (WWI) chemical weapons test facility in the midst of the nation`s capitol. That discovery, made in an exclusive residential neighborhood, prompted an intensive two year environmental cleanup. The Army immediately responded to the chemical ordnance threat, initiating Operation Safe Removal, a $20 million emergency response action and remedial investigation.

  6. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  7. Otters Increasing - Threats Increasing

    Directory of Open Access Journals (Sweden)

    Andreas Kranz

    1994-10-01

    Full Text Available In some parts of Central Europe populations of otters are apparently increasing. Until recently, no research was being conducted on the ecology of otters in mainly artificial habitats like fish farms. Otters are not only a new source of conflict requiring species management, but appear once again threatened by illegal hunting. Austria is dealing with this problem using compensation for otter damage, electric fencing and translocation of problem otters. Despite a rise in illegal killing, Austria does not formally recognise this as a threat.

  8. ENVIRONMENTAL CONTAMINATION FROM WEAPON TESTS

    Energy Technology Data Exchange (ETDEWEB)

    none

    1958-10-01

    The program of the Atomic Energy Commission on environmental contamination from weapons tests is designed for the overall evaluation of the hazard to humans from test operations. It is limited to studies of the deposition of activity at long range rather than the problems associated with immediate, close-in fallout. The program has largely been a study of Sr{sup 90}, since considerations based on experience and measurement indicate that it is the isotope of greatest potential hazard. Data are presented pertinent to the monitoring of long-range fallout, particularly Sr{sup 90} and Cs{sup 137}. Values are tabulated for the fallout deposition, air concentrations, water concentrations, and the amounts in foods and human bone. In addition, results are given for some experimental investigations. The report of these results is not interpretative although certain papers that do attempt to interpret the present situation with respect to Sr{sup 90} in particular are reprinted. Bibliographies are presented covering the period since the 1957 hearings before the Joint Committee on Atomic Energy concerning the nature of radioactive fallout and its effects on man. A document list of submissions to the United Nations Scientific Committee on the Effects of Atomic Radiation is given to illustrate the work done in other countries. Several papers on the subject, which have not been generally available, are reprinted.

  9. Visualizing Key Hinges and a Potential Major Source of Compliance in the Lever Arm of Myosin

    Energy Technology Data Exchange (ETDEWEB)

    J Brown; V Senthil Kumar; E ONeall-Hennessey; L Reshetnikova; H Robinson; M Nguyen-McCarty; A Szent-Gyorgyi; C Cohen

    2011-12-31

    We have determined the 2.3-{angstrom}-resolution crystal structure of a myosin light chain domain, corresponding to one type found in sea scallop catch ('smooth') muscle. This structure reveals hinges that may function in the 'on' and 'off' states of myosin. The molecule adopts two different conformations about the heavy chain 'hook' and regulatory light chain (RLC) helix D. This conformational change results in extended and compressed forms of the lever arm whose lengths differ by 10 {angstrom}. The heavy chain hook and RLC helix D hinges could thus serve as a potential major and localized source of cross-bridge compliance during the contractile cycle. In addition, in one of the molecules of the crystal, part of the RLC N-terminal extension is seen in atomic detail and forms a one-turn alpha-helix that interacts with RLC helix D. This extension, whose sequence is highly variable in different myosins, may thus modulate the flexibility of the lever arm. Moreover, the relative proximity of the phosphorylation site to the helix D hinge suggests a potential role for conformational changes about this hinge in the transition between the on and off states of regulated myosins.

  10. [Levers in Primary Health Care - Identifying Strategic Success Factors for Improved Primary Care in Upper Austria].

    Science.gov (United States)

    Kriegel, J; Rebhandl, E; Reckwitz, N; Hockl, W

    2016-12-01

    Current and projected general practitioner (GP) and primary care in Austria shows structural and process inadequacies in the quality as well as assurance of healthcare supply. The aim is therefore to develop solution- and patient-oriented measures that take patient-related requirements and medical perspectives into account. Using an effect matrix, subjective expert and user priorities were ascertained, cause and effect relationships were examined, and an expanded circle of success for the optimization of GP and primary care in Upper Austria was developed. Through this, the relevant levers for target-oriented development and optimization of the complex system of GP and primary care in Upper Austria were identified; these are training to become general practitioners, entrepreneurs as well as management and coordination. It is necessary to further adapt the identified levers conceptually and operationally in a targeted approach. This is to be achieved by means of the primary health care (PHC) concept as well as management tools and information and communication technologies (ICT) associated with it. © Georg Thieme Verlag KG Stuttgart · New York.

  11. The Role of Control System in Increasing Corporate social Performance: The Use of Levers of Control

    Directory of Open Access Journals (Sweden)

    Hasan Fauzi

    2008-06-01

    Full Text Available One important instrument to be used in the control system design is strategic behaviors that can lead to the expected organization performance.  Referring to the extended definition of strategic behavior using stakeholder-based strategic behavior, corporate social performance is kind of strategic behavior to be influenced by using control system. This paper discusses how control system, using Simons‟ levers of control can play important role in increasing the corporate social performance. The interaction between control system, including belief system, boundary system, diagnostic control system, and interactive control system, as well as the corporate financial performance (CFP can affect the corporate social performance (CSP due to fact that increase in CFP resulting from the appropriate use of control system components enables the company has more chance to do the CSP. The levers of control are deemed to form an integral part of employee socialization and support the development of an organization‟s culture, the system of shared beliefs, values, norms, and mores of organizational members which are deemed to be a primary determinant of the direction of employee behavior.

  12. Implementing a university e-learning strategy: levers for change within academic schools

    Directory of Open Access Journals (Sweden)

    Rhona Sharpe

    2006-12-01

    Full Text Available This paper describes the implementation of an e-learning strategy at a single higher education institution in terms of the levers used to promote effective uptake and ensure sustainable embedding. The focus of this work was at the level of the academic school using a range of change practices including the appointment of school-based learning technologists and e-learning champions, supporting schools to write their own strategies, a pedagogical framework of engaging with e-learning, and curriculum development and evaluation of school-supported projects. It is clear that the implementation of the e-learning strategy has led to a large and increasing proportion of our students experiencing blended learning. In addition, there are initial indications that this has enhanced some learning and teaching processes. Where there has been sustainable embedding of effective e-learning, the following levers were identified as particularly important: flexibility in practices that allow schools to contextualise their plans for change, the facilitation of communities of key staff and creating opportunities for staff to voice and challenge their beliefs about e-learning.

  13. Visualizing key hinges and a potential major source of compliance in the lever arm of myosin

    Energy Technology Data Exchange (ETDEWEB)

    Brown, J.H.; Robinson, H.; Senthil Kumar, V. S.; O' Neall-Hennessey, E.; Reshetnikova, L.; Nguyen-McCarty, M.; Szent-Gyorgyi, A. G.; Cohen, C.

    2011-01-04

    We have determined the 2.3-{angstrom}-resolution crystal structure of a myosin light chain domain, corresponding to one type found in sea scallop catch ('smooth') muscle. This structure reveals hinges that may function in the 'on' and 'off' states of myosin. The molecule adopts two different conformations about the heavy chain 'hook' and regulatory light chain (RLC) helix D. This conformational change results in extended and compressed forms of the lever arm whose lengths differ by 10 {angstrom}. The heavy chain hook and RLC helix D hinges could thus serve as a potential major and localized source of cross-bridge compliance during the contractile cycle. In addition, in one of the molecules of the crystal, part of the RLC N-terminal extension is seen in atomic detail and forms a one-turn alpha-helix that interacts with RLC helix D. This extension, whose sequence is highly variable in different myosins, may thus modulate the flexibility of the lever arm. Moreover, the relative proximity of the phosphorylation site to the helix D hinge suggests a potential role for conformational changes about this hinge in the transition between the on and off states of regulated myosins.

  14. The Bioterrorism Threat by Non-State Actors: Hype or Horror?

    Science.gov (United States)

    2006-12-01

    Outbreak of Salmonellosis Caused by Intentional Contamination of Restaurant Salad Bars,” in Biological Weapons: Limiting the Threat, ed. Joshua...cult succeeded with tactically employing the S. typhimurium bioweapon as clearly shown by the outbreak of salmonellosis infecting at least 751...Birkness, M. R. Skeels, J. M. Horan, and L. R. Foster. “A Large Community Outbreak of Salmonellosis Caused by Intentional Contamination of Restaurant

  15. The Threat of the Premium Tank: The Product and Process of the Soviet Experience

    Science.gov (United States)

    1992-06-05

    he’p drive the U.S. Army’s current push for new and more effective antiarmor weapon systems. CONCLUSION The historic appearance of the Russian T-34...Army 100 post-war generation of tank development. The PT-5 will go into limited production in 1993, with the push to full scale production between 1994...Anti-armor. Orlando, FL: Tecnology Training Corporation, 1989. 122 INITIAL DISTRIBUTION LIST 1. LTC John K. Boles III USACAC Threats Directorate Ft

  16. 对抗高超声速武器的机载激光武器发展研究%Research on the Development of Airborne Laser Weapons Against Hypersonic Weapons

    Institute of Scientific and Technical Information of China (English)

    张同鑫; 李权

    2016-01-01

    The military threat of hypersonic weapon to current air defense system, and the potential military value of airborne laser weapon confronted to the hypersonic weapon were illustrated. Detailed introduction was made on the technical barriers of airborne laser weapon and the state of the art research progress. It is emphasized that now to research airborne laser weapon, its weight and size must be decreased, beam control system and aiming and tracking system in dynamic environments must be researched, special aerodynamic layout must be designed and smart energy sources management must be established.%介绍了高超声速武器对现有军事防御系统的威胁,机载激光武器对抗高超声速武器的军事价值。详细描述了国外机载激光武器的研究进展以及研究机载激光武器的技术难点,指出当前研究机载激光武器必须进一步降低激光武器的重量和体积,研发动态环境的光束控制与瞄准跟踪系统,开展特殊气动布局设计研究,建立周密的能源管理系统。

  17. Modern weapons and military equipment for issue no. 3-2015

    OpenAIRE

    ЙЕВТИЧ МИЛОШ М.

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  18. MODERN WEAPONS AND MILITARY EQUIPMENT FOR ISSUE NO. 3-2015

    OpenAIRE

    2015-01-01

    Optimal features for concealed carry weapons. The specificity of jobs and tasks that require concealed carrying of weapons by officials require specific criteria when choosing personal weapons specialist.

  19. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Color image fusion for concealed weapon detection

    Science.gov (United States)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  1. IS MASTICATORY FORCE AT MOLAR REGION ANALOGICAL TO STAPLING MECHANICS AND BOTH BELONGING TO AN UNIDENTIFIED LEVER SYSTEM?

    Directory of Open Access Journals (Sweden)

    R.Vinodh Rajkumar

    2014-11-01

    Full Text Available For easy and clear understanding of biomechanics, the inter-relationships of simple machines and musculoskeletal functions have always been attempted and established. The masticatory biomechanics is still under research because there is wide range of findings on masticatory muscles including the lack of complete clarity on their line of actions and lever arms too. As a prospective contribution to advanced research on mastication and management of Temporomandibular joint, there are two innovative concepts discussed in this article; (1 Strong correlation between stapling mechanics and Temporomandibular joint at molar region (2 Scope for a new unidentified lever system named as fourth class lever. The principal intent of this article is to share these two innovative concepts to be explored further for practical applications in the field of Physical therapy, Dentistry and Engineering.

  2. Implications of a North Korean Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, R.F. II

    1993-07-01

    The Democratic People`s Republic of Korea (DPRK) is one of the Cold War`s last remaining totalitarian regimes. Rarely has any society been as closed to outside influences and so distant from political, economic, and military developments around the globe. In 1991 and in 1992, however, this dictatorship took a number of political steps which increased Pyongyang`s interaction with the outside world. Although North Korea`s style of engagement with the broader international community involved frequent pauses and numerous steps backward, many observers believed that North Korea was finally moving to end its isolated, outlaw status. As the end of 1992 approached, however, delay and obstruction by Pyongyang became intense as accumulating evidence suggested that the DPRK, in violation of the nuclear Non-Proliferation Treaty (NPT), was seeking to develop nuclear weapons. On March 12, 1993, North Korea announced that it would not accept additional inspections proposed by the International Atomic Energy Agency (IAEA) to resolve concerns about possible violations and instead would withdraw from the Treaty. Pyongyang`s action raised the specter that, instead of a last act of the Cold War, North Korea`s diplomatic maneuvering would unravel the international norms that were to be the basis of stability and peace in the post-Cold War era. Indeed, the discovery that North Korea was approaching the capability to produce nuclear weapons suggested that the nuclear threat, which had been successfully managed throughout the Cold War era, could increase in the post-Cold War era.

  3. Detecting necessary and sufficient parts for assembling a functional weapon

    Science.gov (United States)

    Hempelmann, Christian F.; Solomon, Divya; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Adkins, Tracy; Sirakov, Nikolay M.

    2017-05-01

    Continuing our previous research to visually extract and visually and conceptually match weapons, this study develops a method to determine whether a set of weapon parts visually extracted from images taken from different scenes can be assembled as a firing weapon. This new approach identifies potential weapons in the ontology via tracing detected necessary and sufficient parts through their meronymic relation to the whole weapon. A fast algorithm for identifying potential weapons that can be assembled from a given set of detected parts is presented.

  4. Magnetohydrodynamic (MHD) nuclear weapons effects on submarine cable systems. Volume 1. Experiments and analysis. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1987-06-01

    This report presents a study of the nuclear weapons magnetohydrodynamic (MHD) effects on submarine communications cables. The study consisted of the analysis and interpretation of currently available data on submarine cable systems TAT-4, TAT-6, and TAT-7. The primary result of the study is that decrease of the effective resistivity with frequency over the available experimental range, coupled with the model results, leads to quite small effective resistivities at the MHD characteristic frequencies, and hence small earth potential differences. Thus, it appears that submarine cable systems are less susceptible to an MHD threat than their land-based counter-parts.

  5. Armies of pestilence: CNS infections as potential weapons of mass destruction.

    Science.gov (United States)

    Hart, B L; Ketai, L

    2015-06-01

    Infectious agents have been investigated, developed, and used by both governments and terrorist groups as weapons of mass destruction. CNS infections, though traditionally considered less often than respiratory diseases in this scenario, may be very important. Viruses responsible for encephalitides can be highly infectious in aerosol form. CNS involvement in anthrax is ominous but should change treatment. Brucellosis, plague, Q fever, and other bacteria can uncommonly manifest with meningoencephalitis and other findings. Emerging diseases may also pose threats. We review infectious agents of particular concern for purposes of biowarfare with respect to CNS manifestations and imaging features. © 2015 by American Journal of Neuroradiology.

  6. Moving threat : Attention and distance change interact in threat responding

    NARCIS (Netherlands)

    Arnaudova, I.; Krypotos, A.-M.; Effting, M.; Kindt, M.; Beckers, T.

    2017-01-01

    Defensive reactions need to be quick and appropriate to ensure survival. Thus, it is crucial that threats trigger immediate action upon detection, even in the absence of awareness. In addition, the form of such action should be appropriate to the imminence of the threat. Thus, attention should be

  7. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  8. Levers and linkages: mechanical trade-offs in a power-amplified system.

    Science.gov (United States)

    Anderson, Philip S L; Claverie, Thomas; Patek, S N

    2014-07-01

    Mechanical redundancy within a biomechanical system (e.g., many-to-one mapping) allows morphologically divergent organisms to maintain equivalent mechanical outputs. However, most organisms depend on the integration of more than one biomechanical system. Here, we test whether coupled mechanical systems follow a pattern of amplification (mechanical changes are congruent and evolve toward the same functional extreme) or independence (mechanisms evolve independently). We examined the correlated evolution and evolutionary pathways of the coupled four-bar linkage and lever systems in mantis shrimp (Stomatopoda) ultrafast raptorial appendages. We examined models of character evolution in the framework of two divergent groups of stomatopods-"smashers" (hammer-shaped appendages) and "spearers" (bladed appendages). Smashers tended to evolve toward force amplification, whereas spearers evolved toward displacement amplification. These findings show that coupled biomechanical systems can evolve synergistically, thereby resulting in functional amplification rather than mechanical redundancy. © 2014 The Author(s). Evolution © 2014 The Society for the Study of Evolution.

  9. Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking

    Directory of Open Access Journals (Sweden)

    Licheng Wang

    2017-01-01

    Full Text Available As a kind of unwelcome, unavoidable, and malicious behavior, distributed denial of service (DDoS is an ongoing issue in today’s Internet as well as in some newly conceived future Internet architectures. Recently, a first step was made towards assessing DDoS attacks in Named Data Networking (NDN—one of the promising Internet architectures in the upcoming big data era. Among them, interest flooding attack (IFA becomes one of the main serious problems. Enlightened by the extensive study on the possibility of mitigating DDoS in today’s Internet by employing micropayments, in this paper we address the possibility of introducing economic levers, say, dynamic pricing mechanism, and so forth, for regulating IFA in NDN.

  10. Scaffolds, levers, rods and springs: diverse cellular functions of long coiled-coil proteins.

    Science.gov (United States)

    Rose, A; Meier, I

    2004-08-01

    Long alpha-helical coiled-coil proteins are involved in a variety of organizational and regulatory processes in eukaryotic cells. They provide cables and networks in the cyto- and nucleoskeleton, molecular scaffolds that organize membrane systems, motors, levers, rotating arms and possibly springs. A growing number of human diseases are found to be caused by mutations in long coiled-coil proteins. This review summarizes our current understanding of the multifaceted group of long coiled-coil proteins in the cytoskeleton, nucleus, Golgi and cell division apparatus. The biophysical features of coiled-coil domains provide first clues toward their contribution to the diverse protein functions and promise potential future applications in the area of nanotechnology. Combining the power of fully sequenced genomes and structure prediction algorithms, it is now possible to comprehensively summarize and compare the complete inventory of coiled-coil proteins of different organisms.

  11. Task Analyses of Three Selected Weapons Systems.

    Science.gov (United States)

    1976-10-01

    using weapons is a joint function of the specific weapon system, the goals (missions) of the system, and the environment in which it is used. The first...Identification of fire mission profiles which state general job functions for each type of typical mission. Documentary sources such as Field Manuals...nd Arin,,, Ui, Guni i A,!i" tant uuPnrr No. I Can; n , r Grup - ( nile. .rs and Prir Diff,-ront S, tm: -inch L,,t.’r _, Fort Hood l::t Cavall, I

  12. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...

  13. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  14. Communication issues during bomb threats.

    Science.gov (United States)

    Kuebler, S A

    How should healthcare security professionals handle a bomb threat? How can a large complex best be searched? The author discusses why he believes the judicial use of radios and cellular phones during emergencies can enhance security's ability to handle bomb threat situations, and offers guidelines to follow.

  15. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  16. Biological Weapons and Bioterorism Threats: The Role of Vaccines in Protecting the Military and Civilian Sectors

    Science.gov (United States)

    2013-05-16

    lowest risk, most effective protection – More effective with fewer adverse effects than antibiotics or other treatments – Enable force projection by...Plague • Anthrax Vaccine Adsorbed • Botulinum Toxoids* • Tularemia Vaccine* • Smallpox vaccine (Vaccinia Virus, Cell Culture-derived)* • Equine

  17. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  18. Low and Increasing Trajectories of Perpetration of Physical Dating Violence: 7-Year Associations with Suicidal Ideation, Weapons, and Substance Use.

    Science.gov (United States)

    Orpinas, Pamela; Nahapetyan, Lusine; Truszczynski, Natalia

    2017-05-01

    Understanding the interrelation among problem behaviors and their change over time is fundamental for prevention research. The Healthy Teens Longitudinal Study followed a cohort of adolescents from Grades 6-12. Prior research identified two distinct trajectories of perpetration of physical dating violence: Low and Increasing. The purpose of this study was to examine whether adolescents in these two trajectories differed longitudinally on other problem behaviors: (1) suicidal ideation and attempts, (2) weapon-carrying and threats with a weapon, and (3) substance use, particularly alcohol and marijuana. The sample consisted of 588 randomly-selected students (52% males; 49% White, 36% Black, 12% Latino). Students completed a self-reported, computer-based survey each spring from Grades 6-12. To examine significant differences by perpetration of physical dating violence trajectory, we used Chi-square test and generalized estimating equations modeling. Across most grades, significantly more students in Increasing than in the Low trajectory reported suicidal ideation and attempts, carried a weapon, and threatened someone with a weapon. Adolescents in the Increasing trajectory also had higher trajectories of alcohol use, being drunk, and marijuana use than those in the Low trajectory. All differences were already significant in Grade 6. The difference in the rate of change between groups was not significant. This longitudinal study highlights that problem behaviors-physical dating violence, suicidal ideation and attempts, weapon carrying and threats, marijuana and alcohol use-cluster together as early as sixth grade and the clustering persists over time. The combination of these behaviors poses a great public health concern and highlight the need for early interventions.

  19. The influence of refractive index change and initial bending of cantilevers on the optical lever readout method

    DEFF Research Database (Denmark)

    Dohn, Søren; Greve, Anders; Svendsen, Winnie Edith

    2010-01-01

    lever technique is used to monitor a cantilever with initial bending during changes in the refractive index of the surrounding media. We find that for changes in refractive index as small as 10−4 the detector signal is highly dependent on the initial bending of the cantilever. The findings are validated...

  20. Implementing the chemical weapons convention

    Energy Technology Data Exchange (ETDEWEB)

    Kellman, B.; Tanzman, E. A.

    1999-12-07

    In 1993, as the CWC ratification process was beginning, concerns arose that the complexity of integrating the CWC with national law could cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States as to how the CWC would be carried out. As a result, the author's colleagues and the author prepared the Manual for National Implementation of the Chemical Weapons Convention and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Committee of CWC Legal Experts, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Central Europe, reviewed the Manual. In February 1998, they finished the second edition of the Manual in order to update it in light of developments since the CWC entered into force on 29 April 1997. The Manual tries to increase understanding of the Convention by identifying its obligations and suggesting methods of meeting them. Education about CWC obligations and available alternatives to comply with these requirements can facilitate national response that are consistent among States Parties. Thus, the Manual offers options that can strengthen international realization of the Convention's goals if States Parties act compatibly in implementing them. Equally important, it is intended to build confidence that the legal issues raised by the Convention are finite and addressable. They are now nearing competition of an internet version of this document so that interested persons can access it electronically and can view the full text of all of the national implementing legislation it cites. The internet address, or URL, for the internet version of the Manual is http: //www.cwc.ard.gov. This paper draws from the Manual. It comparatively addresses approximately thirty

  1. 10 CFR Appendix H to Part 73 - Weapons Qualification Criteria

    Science.gov (United States)

    2010-01-01

    ... position, then fire 2 rounds and reholster 2 15 yards 2 5 seconds Standing, draw weapon, move to kneeling...) Standing, draw weapon, fire 2 rounds, move to kneeling position and fire 2 rounds, reload and reholster Minimum qualifying = 70%. 4 15 yards 2 5 seconds Draw weapon and fire 2 rounds standing, come to low...

  2. 25 CFR 11.444 - Carrying concealed weapons.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  3. Someone at School Has a Weapon. What Should I Do?

    Science.gov (United States)

    ... for You Shyness Someone at School Has a Weapon. What Should I Do? KidsHealth > For Teens > Someone at School Has a Weapon. What Should I Do? Print A A A ... Why do students bring guns, knives, or other weapons to school? Some are just showing off, others ...

  4. 76 FR 1136 - Electroshock Weapons Test and Measurement Workshop

    Science.gov (United States)

    2011-01-07

    ... National Institute of Standards and Technology Electroshock Weapons Test and Measurement Workshop AGENCY..., academia, military, test instrument manufacturers, etc.) of electroshock weapons that provide stand-off... requirements for electroshock weapons, the Law Enforcement Standards Office (OLES) at NIST has developed...

  5. 46 CFR 386.23 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Weapons and explosives. 386.23 Section 386.23 Shipping... AND GROUNDS AT THE UNITED STATES MERCHANT MARINE ACADEMY § 386.23 Weapons and explosives. No person shall carry or possess firearms, other dangerous or deadly weapons or parts thereof, explosives or items...

  6. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    43 Figure 14: Simulation Study Methodology for the Weapon System Analysis Metrics Definition and Data Collection The analysis plan calls for...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Casey D. Connors, Major, USA...AGENT-BASED MODELING METHODOLOGY FOR ANALYZING WEAPONS SYSTEMS THESIS Presented to the Faculty Department of Operational Sciences

  7. 36 CFR 702.7 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 702.7... Weapons and explosives. Except where duly authorized by law, and in the performance of law enforcement functions, no person shall carry firearms, other dangerous or deadly weapons, or explosives, either openly...

  8. 7 CFR 501.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...

  9. 31 CFR 407.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Weapons and explosives. 407.13... TREASURY ANNEX § 407.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...

  10. 49 CFR 1544.219 - Carriage of accessible weapons.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Carriage of accessible weapons. 1544.219 Section...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.219 Carriage of accessible weapons. (a... weapons, do not apply to a law enforcement officer (LEO) aboard a flight for which screening is required...

  11. 31 CFR 91.13 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Weapons and explosives. 91.13 Section... CONDUCT IN OR ON THE BUREAU OF THE MINT BUILDINGS AND GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either...

  12. 44 CFR 15.15 - Weapons and explosives.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Weapons and explosives. 15.15... EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the NETC will carry or possess firearms, other dangerous or deadly weapons, explosives or items intended to...

  13. 7 CFR 502.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...

  14. 32 CFR 552.125 - Disposition of confiscated weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated weapons. 552.125..., Ammunition, and Explosives-Fort Lewis, Washington § 552.125 Disposition of confiscated weapons. Commanders will maintain confiscated weapons in the unit arms room pending final disposition. They will provide...

  15. 36 CFR 504.14 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 504... GOVERNING SMITHSONIAN INSTITUTION BUILDINGS AND GROUNDS § 504.14 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or...

  16. 31 CFR 0.215 - Possession of weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Possession of weapons and explosives... OF THE TREASURY EMPLOYEE RULES OF CONDUCT Rules of Conduct § 0.215 Possession of weapons and explosives. (a) Employees shall not possess firearms, explosives, or other dangerous or deadly weapons...

  17. 7 CFR 500.12 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...

  18. 7 CFR 503.13 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 503.13 Section 503.13... OF AGRICULTURE CONDUCT ON PLUM ISLAND ANIMAL DISEASE CENTER § 503.13 Weapons and explosives. No person while in or on the PIADC shall carry firearms or other dangerous or deadly weapons or explosives...

  19. 36 CFR 13.30 - Weapons, traps and nets.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 13... INTERIOR NATIONAL PARK SYSTEM UNITS IN ALASKA General Provisions § 13.30 Weapons, traps and nets. (a... of this chapter, the following are prohibited— (1) Possessing a weapon, trap, or net; (2) Carrying a...

  20. 14 CFR 135.119 - Prohibition against carriage of weapons.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Prohibition against carriage of weapons... Flight Operations § 135.119 Prohibition against carriage of weapons. No person may, while on board an aircraft being operated by a certificate holder, carry on or about that person a deadly or dangerous weapon...

  1. 32 CFR 228.7 - Prohibition on weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Prohibition on weapons and explosives. 228.7... (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.7 Prohibition on weapons and explosives. No persons... illegal or legally controlled weapon (e.g., throwing stars, switchblades), explosives, or items intended...

  2. 4 CFR 25.14 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Weapons and explosives. 25.14 Section 25.14 Accounts... AND ON ITS GROUNDS § 25.14 Weapons and explosives. No person while entering or in the GAO Building or on its grounds shall carry or possess firearms, other dangerous or deadly weapons, explosives or...

  3. 31 CFR 700.11 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Weapons and explosives. 700.11... FEDERAL LAW ENFORCEMENT TRAINING CENTER (FLETC) BUILDINGS AND GROUNDS § 700.11 Weapons and explosives. No person, while on the property, shall carry firearms, other dangerous or deadly weapons, or explosives...

  4. 50 CFR 27.43 - Weapons other than firearms.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Weapons other than firearms. 27.43 Section... (CONTINUED) THE NATIONAL WILDLIFE REFUGE SYSTEM PROHIBITED ACTS Disturbing Violations: With Weapons § 27.43 Weapons other than firearms. The use or possession of cross bows, bows and arrows, air guns, spears, gigs...

  5. 43 CFR 423.30 - Weapons, firearms, explosives, and fireworks.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Weapons, firearms, explosives, and... WATERBODIES Rules of Conduct § 423.30 Weapons, firearms, explosives, and fireworks. (a) You may possess... exceptions: (1) You must not have a weapon in your possession when at or in a Reclamation facility. (2) You...

  6. 36 CFR 520.15 - Weapons and explosives.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...

  7. 15 CFR 265.39 - Weapons and explosives.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...

  8. Demand Analysis of Informational Shipboard Gun Weapon System Interface Design

    Directory of Open Access Journals (Sweden)

    WANG Hui-chuan

    2013-04-01

    Full Text Available According to development demand of informational shipboard gun weapon system, design concept of shipboard gun weapon system interface is proposed. System composition is put forward and function demand of interface is analyzed from combat, training and detection aspects. General principle need to be followed in design process. A new concept is provided for development of shipboard gun weapon system interface.

  9. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Science.gov (United States)

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  10. Electron microscopic evidence for the myosin head lever arm mechanism in hydrated myosin filaments using the gas environmental chamber

    Energy Technology Data Exchange (ETDEWEB)

    Minoda, Hiroki [Department of Applied Physics, Tokyo University of Agriculture and Technology, Koganeishi, Tokyo184-8588 (Japan); CREST, Japan Science and Technology Agency, Kawaguchi, Saitama 332-0012 (Japan); Okabe, Tatsuhiro; Inayoshi, Yuhri [Department of Applied Physics, Tokyo University of Agriculture and Technology, Koganeishi, Tokyo184-8588 (Japan); Miyakawa, Takuya; Miyauchi, Yumiko; Tanokura, Masaru [Department of Applied Biological Chemistry, Graduate School of Agricultural and Life Sciences, University of Tokyo, Bunkyo-ku, Tokyo 113-0032 (Japan); Katayama, Eisaku [Graduate School of Medicine, Institute of Medical Science, University of Tokyo, Minato-ku, Tokyo 108-8639 (Japan); Wakabayashi, Takeyuki [Department of Biosciences, School of Science and Engineering, Teikyo University, Utsunomiya, Tochigiken 320-8551 (Japan); Akimoto, Tsuyoshi [Department of Physiology, School of Medicine, Teikyo University, Itabashi-ku, Tokyo 173-8605 (Japan); Sugi, Haruo, E-mail: sugi@kyf.biglobe.ne.jp [Department of Physiology, School of Medicine, Teikyo University, Itabashi-ku, Tokyo 173-8605 (Japan)

    2011-02-25

    Research highlights: {yields} We succeeded in recording structural changes of hydrated myosin cross-bridges. {yields} We succeeded in position-marking the cross-bridges with site-directed antibodies. {yields} We recorded cross-bridge movement at different regions in individual cross-bridge. {yields} The movement was smallest at the cross-bridge-subfragment two boundary. {yields} The results provide evidence for the cross-bridge lever arm mechanism. -- Abstract: Muscle contraction results from an attachment-detachment cycle between the myosin heads extending from myosin filaments and the sites on actin filaments. The myosin head first attaches to actin together with the products of ATP hydrolysis, performs a power stroke associated with release of hydrolysis products, and detaches from actin upon binding with new ATP. The detached myosin head then hydrolyses ATP, and performs a recovery stroke to restore its initial position. The strokes have been suggested to result from rotation of the lever arm domain around the converter domain, while the catalytic domain remains rigid. To ascertain the validity of the lever arm hypothesis in muscle, we recorded ATP-induced movement at different regions within individual myosin heads in hydrated myosin filaments, using the gas environmental chamber attached to the electron microscope. The myosin head were position-marked with gold particles using three different site-directed antibodies. The amplitude of ATP-induced movement at the actin binding site in the catalytic domain was similar to that at the boundary between the catalytic and converter domains, but was definitely larger than that at the regulatory light chain in the lever arm domain. These results are consistent with the myosin head lever arm mechanism in muscle contraction if some assumptions are made.

  11. Managing nuclear weapons in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Miller, G.

    1993-03-16

    This report discusses the management and security of nuclear weapons in the post-cold war United States. The definition of what constitutes security is clearly changing in the US. It is now a much more integrated view that includes defense and the economy. The author tries to bring some semblance of order to these themes in this brief adaptation of a presentation.

  12. Optical countermeasures against CLOS weapon systems

    NARCIS (Netherlands)

    Toet, A.; Benoist, K.W.; Lingen, J.N.J. van; Schleijpen, H.M.A.

    2013-01-01

    There are many weapon systems in which a human operator acquires a target, tracks it and designates it. Optical countermeasures against this type of systems deny the operator the possibility to fulfill this visual task. We describe the different effects that result from stimulation of the human

  13. Europium-155 in Debris from Nuclear Weapons

    DEFF Research Database (Denmark)

    Aarkrog, Asker; Lippert, Jørgen Emil

    1967-01-01

    The lithium-drifted germanium detector enables determination of europium-155 on a routine basis in environmental samples contaminated with debris from nuclear weapons. From measurements of europium-155, cesium-144, and strontium-90 in air filters collected between 1961 and 1966, the yield...

  14. The Politics of Weapons Standardization in NATO.

    Science.gov (United States)

    1981-07-01

    does raise new and useful perspectives on the problem. And, as he notes, it raises the spectre that instead of attacking the causes of NATO’s malaise...construct- ing his Utopia . 1 58 Two articles, which focus on the weapons procurement process within the United States alone, note the unnecessary

  15. Nuclear Weapon Testing Limitations and International Security

    Science.gov (United States)

    Corden, Pierce S.

    2017-01-01

    For over 50 years stopping nuclear weapon tests has been sought to support achieving international security without nuclear weapons. Testing is the critical path beyond primitive fission devices, e.g. to develop thermonuclear weapons, reduce weight and volume and increase yield. The 1958 Geneva Conference of Experts considered ways to verify a test ban. With then-limitations on seismology, and lack of in-country monitoring and on-site inspections, the 1963 Limited Test Ban Treaty prohibits testing only in the atmosphere, outer space and under water, and is verified by National Technical Means. The US and USSR agreed to a limit of 150 kilotons on underground explosions in the 1970s-80s. The 1996 Comprehensive Nuclear-Test-Ban Treaty bans all nuclear explosions. Its International Monitoring System - seismic, hydroacoustic, infrasound and radionuclide sensors - is being used, and has easily detected testing by the DPRK. On-site inspections will be available under an in-force Treaty. A 2012 National Academy report concludes that cheating attempts would not undermine U.S. security, and the program for monitoring and extending the life of US weapons has succeeded since US testing ceased in 1992.

  16. Principles of Guided Missiles and Nuclear Weapons.

    Science.gov (United States)

    Naval Personnel Program Support Activity, Washington, DC.

    Fundamentals of missile and nuclear weapons systems are presented in this book which is primarily prepared as the second text of a three-volume series for students of the Navy Reserve Officers' Training Corps and the Officer Candidate School. Following an introduction to guided missiles and nuclear physics, basic principles and theories are…

  17. The Spear: An Effective Weapon Since Antiquity

    Directory of Open Access Journals (Sweden)

    Robert E. Dohrenwend

    2012-07-01

    Full Text Available The spear is perhaps man’s oldest weapon, and may even be his oldest tool. Over the hundreds of thousands of years of the weapon’s existence, it evolved from a pointed stick into an efficient hunting missile, and then became the most effective hand-held bladed weapon humans ever devised. The spear and its use is the only martial art originally devised for use against species other than our own, and more than any other weapon, the spear emphasizes the relationship between hunting and warfare. Virtually without exception, the spear is present wherever there are humans. The spear may claim to be the senior martial art, and the weapon is still in use today. Early techniques are preserved by the small number of Japanese sojutsu schools, and modern Chinese martial artists have developed elegant and impressive gymnastic routines for the spear. The javelin throw is a modern Olympic track and field event, and there are people who have resurrected the Aztec atlatl for sporting competition. Today, the spear is still used in Europe for hunting wild boar, and the continued issue of the obsolete bayonet to modern soldiers testifies to a deep, almost instinctive respect still possessed by the military for the spear.

  18. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  19. Modelling ultraviolet threats

    Science.gov (United States)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  20. Global Threats to Child Safety.

    Science.gov (United States)

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children.

  1. Public health and bioterrorism: renewed threat of anthrax and smallpox.

    Science.gov (United States)

    Wallin, Arūne; Luksiene, Zivile; Zagminas, Kestutis; Surkiene, Gene

    2007-01-01

    Bioterrorism is one of the main public health categorical domains. According to sociological analytics, in postmodern society terrorism is one of the real threats of the 21st century. While rare, the use of biological weapons has a long history. Recently, anthrax has been evaluated as one of the most dangerous biological weapons. Naturally occurring anthrax in humans is a disease acquired from contact with anthrax-infected animals or anthrax-contaminated animal products. Usually anthrax infection occurs in humans by three major routes: inhalational, cutaneous, and gastrointestinal. Inhalational anthrax is expected to account for most serious morbidity and most mortality. The clinical presentation of inhalation anthrax has been described as a two-stage illness. Many factors contribute to the pathogenesis of Bacillus anthracis. Antibiotics, anthrax globulin, corticosteroids, mechanical ventilation, vaccine are possible tools of therapy. Smallpox existed in two forms: variola major, which accounted for most morbidity and mortality, and a milder form, variola minor. Smallpox spreads from person to person primarily by droplet nuclei or aerosols expelled from the oropharynx of infected persons and by direct contact. In the event of limited outbreak with few cases, patients should be admitted to the hospital and confined to rooms that are under negative pressure and equipped with high-efficiency particulate air filtration. In larger outbreaks, home isolation and care should be the objective for most patients. Progress in detection, suitable vaccines, postexposure prophylaxis, infection control, and decontamination might be serious tools in fight against the most powerful biological weapon. To assure that the public health and healthcare system can respond to emergencies, the government should direct resources to strengthen the emergency-response system, create medication stockpiles, and improve the public health infrastructure.

  2. Air gun wounding and current UK laws controlling air weapons.

    Science.gov (United States)

    Bruce-Chwatt, Robert Michael

    2010-04-01

    Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.

  3. Origins of the Tactical Nuclear Weapons Modernization Program: 1969-1979

    Science.gov (United States)

    Yaffe, Michael David

    On December 12, 1979, the North Atlantic Treaty Organization decided to deploy new long-range theater nuclear forces, Pershing II and Ground-Launched Cruise Missiles. This marked the first major change in NATO's nuclear stockpile since the adoption of the flexible response strategy in 1967. The decision was controversial inasmuch as the Allies disagreed on the fundamental role of nuclear weapons in this strategy and, thereby, the types and number of weapons required for an effective deterrent posture. Europeans generally preferred long-range weapons capable of striking the Soviet Union and small conventional forces while Americans preferred shorter-range nuclear weapons and a stalwart conventional defense. Thus, the December decision is often described as purely politically motivated, in which the Americans reluctantly acquiesced to a European initiative for long-range weapons, prominently expressed by West German Chancellor Helmut Schmidt in 1977. Recently declassified US government documents reveal, however, that long-range missiles were part of a long-term comprehensive nuclear modernization program conceived in the Pentagon under Defense Secretary James Schlesinger during the period of 1973 through 1975, and presented to skeptical European elites who favored arms control negotiations over costly new deployments. This program was motivated as much by changes in the American national security culture as by an increase in the Soviet military threat to Europe. It was grounded on a clear military rationale: "that a feasible and affordable conventional defense is only possible if NATO has modern nuclear forces" that can effectively hold at risk Warsaw Pact ground and air forces throughout the depth of their employment from the inner-German border to the western military districts of the Soviet Union. When the new US administration in 1977 disagreed with the modernization plan and its rationale, opting instead for more conventional forces, the Allies in a reversal of

  4. A Concept of a Probable Autoinjector for Bio-threat Agents

    Directory of Open Access Journals (Sweden)

    R.V. Geetha

    2016-09-01

    Full Text Available Chemical and biological weapons can be used during conflicts and by terrorists to injure or kill humans and animals. Chemical weapons contain toxic chemicals and biological weapons contain pathogenic organisms. With proper protective equipments and training, the lethal effects of chemical and biological warfare agents can be minimised. First aid kit is available that contain detection, decontamination and medical protection for chemical warfare agents including autoinjectors, for rapid administration and faster absorption of drugs. The autoinjectors are safe and available for life saving drugs like atropine sulphate and pralidoxime chloride (nerve agent poisoning, epinephrine (anaphylaxis, diazepam (seizures and sumatriptan (migraine. For bio-threat agents doxycycline alone is available as a broad spectrum antibiotic in the first aid kit. Majority of the bacterial agents are gram negative and hence amikacin drug cartridge was developed for the existing autoinjector. The advantage of amikacin is its safety, stability, can be given prophylactically and supplemented with other antibiotics when medical attention arrives. The usability and tolerability of amikacin administered repeatedly through autoinjector was studied using various haematological, biochemical and oxidative stress parameters in animal models. The results are promising and as there is no antibiotic autoinjector available, amikacin autoinjector can be considered for bio-threat agents.

  5. STEM-based workbook: Enhancing students' STEM competencies on lever system

    Science.gov (United States)

    Sejati, Binar Kasih; Firman, Harry; Kaniawati, Ida

    2017-05-01

    Twenty-first century is a century of technology, a rapid development of scientific studies and technology make them relied heavily on each other. This research investigated about the effect of STEM-based workbook in enhancing students' STEM competencies in terms of knowledge understanding, problem solving skill, innovative abilities, and responsibility. The workbook was tried on 24 students that applied engineering design processes together with mathematics and science knowledge to design and create an egg cracker. The result showed that the implementation of STEM-based workbook on lever system in human body is effective to improve students' STEM competencies, it can be proven by students' result on their knowledge understanding improvement which can be seen from normalized gain () score is 0.41 and categorized as medium improvement, students' problem solving skill is also improving where it obtained a medium improvement with normalized gain as much as 0.45. Innovative abilities also encountered an the improvement, the workbook analysis obtained a higher score which means students can be more innovative after finishing their workbook. Last, students' responsibility is keep improving day by day, students' effort gain the highest score it means that the students become more responsible after implementation of STEM-based workbook. All of the results are supported with the response of students towards STEM-based workbook implementation which showed positive response in all indicators.

  6. A Study on Precision Stage with Displacement Magnification Mechanism Using Flexure-Based Levers

    Directory of Open Access Journals (Sweden)

    Gyu-Hyun Bae

    2014-03-01

    Full Text Available This study presents a precision stage driven by a piezoelectric actuator and equipped with a displacement magnification mechanism for the purpose of easy displacement measurement. The displacement magnification mechanism consists of flexible hinges and lever mechanisms. The developed stage is able to provide accurate measurement by virtue of the displacement magnification mechanism, but it is exposed to severe residual vibration. In order to overcome the drawback, this study develops a method for reducing residual vibration by using a simulation model for the stage system that takes into account the dynamics of the system and the hysteretic characteristics of the piezoelectric actuator. The Bouc-Wen model is employed to represent the hysteretic characteristics of the actuator. A comparison between simulation and experiment is made to find the best simulation model for the developed system. Input shaping is applied to eliminate the residual vibration from the stage. An improved input shaper is designed to overcome the ineffectiveness of input shaping due to the hysteresis by using the proposed simulation model. Simulations and experiments prove that the proposed simulation model is very useful to investigate the system and that the proposed stage can provide accurate positioning with small residual vibration.

  7. Five Policy Levers To Meet The Value Challenge In Cancer Care.

    Science.gov (United States)

    Callahan, Ryan; Darzi, Ara

    2015-09-01

    The burden of cancer on public finances is a serious concern for policy makers. More people are developing cancer, and as standards of care have risen, more are surviving and requiring longer-term care. Precision medicine promises better outcomes but demands commensurately higher payments for care. As both incidence and per case costs rise, we suggest that the task of expanding access to high-quality cancer care poses a "value challenge" that policies in many countries are inadequate to meet. Policy makers should respond with a new approach. We explore questions that policy makers will need to consider regarding objectives, barriers, and levers for policy development. We use transparency and accountability as cornerstones of a new approach to promote value-based decision making. Although barriers to advancing this agenda are formidable, we recommend that governments define common standards for value-based accounting; serve as information brokers for evidence development; pioneer value-based procurement of goods and services; engage in deliberative democracy in cancer care; and educate communities to facilitate knowledge sharing between communities of patients, their caretakers, and researchers.

  8. Establishing Networks to Lever Investments in Developing Capacity for Agricultural Monitoring: A GEOGLAM Perspective

    Science.gov (United States)

    Whitcraft, A. K.; Becker-Reshef, I.

    2016-12-01

    Since 2011, the Group on Earth Observations Global Agricultural Monitoring (GEOGLAM) Initiative has been working to strengthen the international community's capacity to use Earth observation (EO) data to derive timely, accurate, and transparent information on agriculture. A key component of GEOGLAM is the development of individual and institutional capacity for EO-based agricultural monitoring at multiple scales, from national to regional to global, in low-, middle-, and high-income countries. Despite the fact that the need for enhancing capacity is frequently acknowledged, there is little formal or informal literature documenting best practices for developing and implementing comprehensive capacity development strategies around Earth observations knowledge sharing. As a result, many projects and activities develop knowledge-sharing strategies on an ad hoc basis, and may be missing out on levering lessons, techniques, and toolsets already developed. In the past year, GEOGLAM has aimed to spur relationships and collaborations with capacity development initiatives and networks, toward sharing and documenting strategies and tactical experiences in this domain. This presentation will provide some perspective on challenges and opportunities encountered so far, from the GEOGLAM perspective, with the goal of continued dialogue and coordination with other session participants.

  9. Military and diplomatic roles and options for managing and responding to the proliferation of ballistic missiles and weapons of mass destruction. Final report: Program on Stability and the Offense/Defense Relationship

    Energy Technology Data Exchange (ETDEWEB)

    Hallenbeck, R.A.; Gill, J.M.; Murray, B.L.

    1993-05-26

    The March seminar, ``Military and Diplomatic Roles and Options`` for managing and responding to proliferation, featured three presentations: the military and diplomatic implications of preemptive force as a counterproliferation option; an in-depth assessment of the threat posed by biological weapons; and, a new proposed US counterproliferation policy.

  10. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  11. Audit Report on "Management Controls over the Department's Excess Weapons Inventories and Selected Sensitive Equipment used by Protective Forces"

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-01-01

    Since September 11, 2001, the Department of Energy has, on several occasions, revised its security posture based on identified threats and adversaries. These revisions in security posture have driven Departmental sites to upgrade their defensive and tactical equipment. Subsequent changes in the perceived threats have, in some cases, led to a reduction in the need for certain types of weapons, thus creating a pool of surplus equipment. These surplus weapons could potentially be used by other Department sites and Federal law enforcement agencies. Recent Office of Inspector General reports have raised concerns with the adequacy of controls related to defensive and tactical equipment. For example, our report on Management Controls Over Defense Related High Risk Property (OAS-M-08-06, April 2008) found that administrative controls over certain defense related high risk property were not sufficient for providing accountability over these items. Because of prior reported weaknesses in controls over defensive and tactical equipment, we initiated this audit to determine whether the Department and its contractors were properly managing excess weapons inventories and selected sensitive equipment used by protective forces. Our review disclosed that the Department was not always properly managing its inventories of excess weapons and selected sensitive equipment. We identified issues with the retention of unneeded weapons at many locations and with the identification and tracking of sensitive items. More specifically: Sites maintained large inventories of weapons that were no longer needed but had not been made available for use by either other Departmental sites or other Federal law enforcement agencies. For instance, at six of the locations included in our review we identified a total of 2,635 unneeded weapons with a total acquisition value of over $2.8 million that had not been officially declared as excess - an action that would have made them available for others to use

  12. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  13. Emergency management of chemical weapons injuries.

    Science.gov (United States)

    Anderson, Peter D

    2012-02-01

    The potential for chemical weapons to be used in terrorism is a real possibility. Classes of chemical weapons include nerve agents, vesicants (blister agents), choking agents, incapacitating agents, riot control agents, blood agents, and toxic industrial chemicals. The nerve agents work by blocking the actions of acetylcholinesterase leading to a cholinergic syndrome. Nerve agents include sarin, tabun, VX, cyclosarin, and soman. The vesicants include sulfur mustard and lewisite. The vesicants produce blisters and also damage the upper airways. Choking agents include phosgene and chlorine gas. Choking agents cause pulmonary edema. Incapacitating agents include fentanyl and its derivatives and adamsite. Riot control agents include Mace and pepper spray. Blood agents include cyanide. The mechanism of toxicity for cyanide is blocking oxidative phosphorylation. Toxic industrial chemicals include agents such as formaldehyde, hydrofluoric acid, and ammonia.

  14. Making Weapons for the Terracotta Army

    Directory of Open Access Journals (Sweden)

    Marcos Martinón-Torres

    2011-10-01

    Full Text Available The Terracotta Army of the First Emperor of China is one of the most emblematic archaeological sites in the world. Many questions remain about the logistics of technology, standardisation and labour organisation behind the creation of such a colossal construction in just a few decades over 2,000 years ago. An ongoing research project co-ordinated between the UCL Institute of Archaeology and the Emperor Qin Shihang's Terracotta Army Museum is beginning to address some of these questions. This paper outlines some results of the typological, metric, microscopic, chemical and spatial analyses of the 40,000 bronze weapons recovered with the Terracotta Warriors. Thanks to a holistic approach developed specifically for this project, it is possible to reveal remarkable aspects of the organisation of the Qin workforce in production cells, of the standardisation, efficiency and quality-control procedures employed, and of the sophisticated technical knowledge of the weapon-makers.

  15. Ending the scourge of chemical weapons

    Energy Technology Data Exchange (ETDEWEB)

    Brin, J.

    1993-04-01

    After more than 20 years of arduous negotiations, representatives from 131 countries gathered in Paris in January to sign a treaty banning the development, production, and transfer to other countries of chemical-warfare agents and their means of delivery. The treaty - called the Chemical Weapons Convention, or CWC - complements the more limited Geneva Protocol of 1925, which bans the use of toxic chemicals in warfare. When the CWC enters into force in about two years, it will prohibit the manufacture for military purposes of lethal chemicals such as sulfur mustard, which causes painful skin blistering and lung damage, and nerve agents, which cause rapid death by interfering with the transmission of nerve impulses. The goal is to eliminate from the earth this particularly inhumane form of warfare. The paper discusses facets of the treaty, especially the verification challenge with its inspection on demand features. Short accompanying pieces discuss classifying chemicals and the destruction of chemical weapons under the CWC.

  16. Effects of nuclear weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S.; Dolan, P.J.

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  17. The Effects of Nuclear Weapons. Third edition

    Energy Technology Data Exchange (ETDEWEB)

    Glasstone, S; Dolan, P J

    1977-01-01

    Since the last edition of ''The Effects of Nuclear Weapons'' in 1962 much new information has become available concerning nuclear weapon effects. This has come in part from the series of atmospheric tests, including several at very high altitudes, conducted in the Pacific Ocean area in 1962. In addition, laboratory studies, theoretical calculations, and computer simulations have provided a better understanding of the various effects. A new chapter has been added on the electromagnetic pulse. The chapter titles are as follows: general principles of nuclear explosions; descriptions of nuclear explosions; air blast phenomena in air and surface bursts; air blast loading; structural damage from air blast; shock effects of surface and subsurface bursts; thermal radiation and its effects; initial nuclear radiation; residual nuclear radiation and fallout; radio and radar effects; the electromagnetic pulse and its effects; and biological effects. (LTN)

  18. Switching of myosin-V motion between the lever-arm swing and brownian search-and-catch.

    Science.gov (United States)

    Fujita, Keisuke; Iwaki, Mitsuhiro; Iwane, Atsuko H; Marcucci, Lorenzo; Yanagida, Toshio

    2012-07-17

    Motor proteins are force-generating nanomachines that are highly adaptable to their ever-changing biological environments and have a high energy conversion efficiency. Here we constructed an imaging system that uses optical tweezers and a DNA handle to visualize elementary mechanical processes of a nanomachine under load. We apply our system to myosin-V, a well-known motor protein that takes 72 nm 'hand-over-hand' steps composed of a 'lever-arm swing' and a 'brownian search-and-catch'. We find that the lever-arm swing generates a large proportion of the force at low load (high load (1.9 pN), however, the contribution of the brownian search-and-catch increases to dominate, reaching 13 k(B)T of work. We believe the ability to switch between these two force-generation modes facilitates myosin-V function at high efficiency while operating in a dynamic intracellular environment.

  19. Adversarial Use of Weapons of Mass Destruction

    Science.gov (United States)

    2000-01-01

    had weaponized 10,000 liters of concentrated botu- linum toxin, 6,500 liters of concentrated anthrax, and 1,580 liters of concentrated aflatoxin .2 The...might cost only $30–50 million, according to the Research Institute for the Study of Conflict and Terrorism. That could be cut in half if safety ...10 Most nations pursuing NBC capabilities today are also consider- ing long-range delivery means. On the strategic level adversaries are likely to use

  20. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2016-03-01

    of contractors delivering the 10 costliest programs have performed well relative to broad-based market indices, indicating that investors expect...16-329SP Assessments of Major Weapon Programs Two programs—the B-2 Extremely High Frequency Satellite Communications and Computer...expected. The B-2 Extremely High Frequency Satellite Communications and Computer Increment 1 date was revised to reflect the actual delivery of

  1. The Aerodynamics of High Speed Aerial Weapons

    OpenAIRE

    Prince, Simon A.

    1999-01-01

    The focus of this work is the investigation of the complex compressible flow phenomena associated with high speed aerial weapons. A three dimen- sional multiblock finite volume flow solver was developed with the aim of studying the aerodynamics of missile configurations and their component structures. The first component of the study involved the aerodynamic investigation of the isolated components used in the design of conventional missile config- urations. The computati...

  2. Imprecise Probability Methods for Weapons UQ

    Energy Technology Data Exchange (ETDEWEB)

    Picard, Richard Roy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Vander Wiel, Scott Alan [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-13

    Building on recent work in uncertainty quanti cation, we examine the use of imprecise probability methods to better characterize expert knowledge and to improve on misleading aspects of Bayesian analysis with informative prior distributions. Quantitative approaches to incorporate uncertainties in weapons certi cation are subject to rigorous external peer review, and in this regard, certain imprecise probability methods are well established in the literature and attractive. These methods are illustrated using experimental data from LANL detonator impact testing.

  3. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Assessment 56 Figure 13: Examples of Knowledge Scorecards 58 Contents Page v GAO-15-342SP Assessments of Selected Weapon Programs Abbreviations...efficiencies realized through contract negotiations (13 programs), • design trades to balance affordability and capability (10 programs), • changed...at the time of our review with a scorecard and narrative summary at the bottom of the first page of each assessment. As illustrated in figure 12

  4. Conventional Weapons Effects on Reinforced Soil Walls.

    Science.gov (United States)

    1995-03-01

    of the reinforced soil wall. 14. SUBJECT TERMS 15. NUMBER OF PAGES Reinforced soil, conventional weapons, protective structures, 388 geosynthetics ...high tensile strength materials such as steel strips or geosynthetics . A single face of a reinforced soil berm can be constructed to approximately...yards of geosynthetics representing $3.1 billion have been used in a wide range of civil engineering applications (Koerner, 1990). Between 1991 and 1992

  5. RESTRICTIONS BY THE USE OF WEAPONS OF RUSSIAN CITIZENS

    Directory of Open Access Journals (Sweden)

    Lyatsa A. Kodzokova

    2016-01-01

    Full Text Available Abstract: The article considers the restrictions imposed on the circulation of civilian and service weapons. The author analyzes the restrictions on the circulation of weapons, the procedure for their implementation in practice. Federal Law "On weapons" only in paragraph 6 p. 1, art. 6 "Restrictions imposed on the circulation of civilian and service weapons" refers to the prohibition of 'turnover as a civilian and service weapons and other items affecting the action is based on the use of radiation and biological factors; weapons and other items affecting the action is based on the use of electromagnetic, light, thermal, subsonic or ultrasonic radiation and which have output parameters that exceed the value set by state standards of the Russian Federation and the relevant regulations of the federal executive authority in the field of public health, as well as these weapons and items produced outside the Russian territory " How to regard this provision of the law? As the transfer of new weapons, not specific item. 25 of the Federal Law "On weapons", or items prohibited for circulation in the territory of our state? This inconsistency decreases the effectiveness of the legal regulation of arms trafficking. Unification of definitions in this area will allow applying the law correctly and reasonably, including criminal. But for this it is necessary taking into account the experience and the modern needs of the various branches of law provide a clearer definition of "weapon" and its species. The author's conclusions may be used in law enforcement. 

  6. Why are sexually selected weapons almost absent in females?

    Institute of Scientific and Technical Information of China (English)

    Anders BERGLUND

    2013-01-01

    In sex role reversed species,predominantly females evolve sexually selected traits,such as ornaments and/or weapons.Female ornaments are common and their function well documented in many species,whether sex role reversed or not.However,sexually selected female weapons seem totally absent except for small wing spurs in three jacana species,present in both males and females.This poor female weaponry is in sharp contrast to the situation in species with conventional sex roles:males commonly have evolved sexually selected weapons as well as ornaments.At the same time,females in many taxa have naturally selected weapons,used in competition over resources or in predator defence.Why are sexually selected weapons then so rare,almost absent,in females? Here I briefly review weaponry in females and the function of these weapons,conclude that the near absence of sexually selected weapons begs an explanation,and suggest that costs of sexually selected weapons may exceed costs of ornaments.Females are more constrained when evolving sexually selected traits compared to males,at least compared to those males that do not provide direct benefits,as trait costs reduce a female's fecundity.I suggest that this constraining trade-off between trait and fecundity restricts females to evolve ornaments but rarely weapons.The same may apply to paternally investing males.Whether sexually selected weapons actually are more costly than sexually selected ornaments remains to be investigated.

  7. IS MASTICATORY FORCE AT MOLAR REGION ANALOGICAL TO STAPLING MECHANICS AND BOTH BELONGING TO AN UNIDENTIFIED LEVER SYSTEM?

    OpenAIRE

    R.Vinodh Rajkumar

    2014-01-01

    For easy and clear understanding of biomechanics, the inter-relationships of simple machines and musculoskeletal functions have always been attempted and established. The masticatory biomechanics is still under research because there is wide range of findings on masticatory muscles including the lack of complete clarity on their line of actions and lever arms too. As a prospective contribution to advanced research on mastication and management of Temporomandibular joint, there are two innovat...

  8. Low pumping energy mode of the "optical bars''/"optical lever" topologies of gravitational-wave antennae

    OpenAIRE

    Khalili, F. Ya

    2003-01-01

    The ``optical bars''/``optical lever'' topologies of gravitational-wave antennae allow to obtain sensitivity better that the Standard Quantum Limit while keeping the optical pumping energy in the antenna relatively low. Element of the crucial importance in these schemes is the local meter which monitors the local test mirror position. Using cross-correlation of this meter back-action noise and its measurement noise it is possible to further decrease the optical pumping energy. In this case th...

  9. Estimation of Lifetime Duration for a Lever Pin of Runner Blade Operating Mechanism using a Graphic – analytic Method

    Directory of Open Access Journals (Sweden)

    Ana-Maria Budai

    2015-09-01

    Full Text Available In this paper are presented a graphic - analytic method that can be used to estimate the fatigue lifetime duration for an operating mechanism lever pin to a Kaplan turbine. The presented calculus algorithm is adapted from the one used by Fuji Electric to made strength calculus in order to refurbish a Romanian hydropower plant, equipped with a Kaplan turbine. The graphic part includes a 3D fatigue diagram for rotating bending stress designed by Fuji Electric specialists.

  10. Nuclear weapons and NATO-Russia relations

    Energy Technology Data Exchange (ETDEWEB)

    Cornwell, G.C.

    1998-12-01

    Despite the development of positive institutional arrangements such as Russian participation in the NATO-led peacekeeping force in Bosnia and the NATO- Russia Permanent Joint Council, the strategic culture of Russia has not changed in any fundamental sense. Russian strategic culture has not evolved in ways that would make Russian policies compatible with those of NATO countries in the necessary economic, social, technological, and military spheres. On the domestic side, Russia has yet to establish a stable democracy and the necessary legal, judicial, and regulatory institutions for a free-market economy. Russia evidently lacks the necessary cultural traditions, including concepts of accountability and transparency, to make these adaptations in the short-term. Owing in part to its institutional shortcomings, severe socioeconomic setbacks have afflicted Russia. Russian conventional military strength has been weakened, and a concomitant reliance by the Russians on nuclear weapons as their ultimate line of defense has increased. The breakdown in the infrastructure that supports Russian early warning and surveillance systems and nuclear weapons stewardship defense, coupled with a tendency towards has exacerbated Russian anxiety and distrust toward NATO. Russia`s reliance on nuclear weapons as the ultimate line of defense, coupled with a tendency toward suspicion and distrust toward NATO, could lead to dangerous strategic miscalculation and nuclear catastrophe.

  11. The Chemical Weapons Convention -- Legal issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-08-01

    The Chemical Weapons Convention (CWC) offers a unique challenge to the US system of constitutional law. Its promise of eliminating what is the most purely genocidal type of weapon from the world`s arsenals as well as of destroying the facilities for producing these weapons, brings with it a set of novel legal issues. The reservations about the CWC expressed by US business people are rooted in concern about safeguarding confidential business information and protecting the constitutional right to privacy. The chief worry is that international verification inspectors will misuse their power to enter commercial property and that trade secrets or other private information will be compromised as a result. It has been charged that the Convention is probably unconstitutional. The author categorically disagrees with that view and is aware of no scholarly writing that supports it. The purpose of this presentation is to show that CWC verification activities can be implemented in the US consistently with the traditional constitutional regard for commercial and individual privacy. First, he very briefly reviews the types of verification inspections that the CWC permits, as well as some of its specific privacy protections. Second, he explains how the Fourth Amendment right to privacy works in the context of CWC verification inspections. Finally, he reviews how verification inspections can be integrated into these constitutional requirements in the SU through a federal implementing statute.

  12. North Korea's nuclear weapons development. Implications for future policy

    Energy Technology Data Exchange (ETDEWEB)

    Pollack, J.D.

    2010-07-01

    This essay assesses North Korea's long-standing quest for nuclear weapons; alternative strategies for inhibiting Pyongyang's weapons development; and the potential implications for regional security and nonproliferation should the Democratic People's Republic of Korea (DPRK) retain and enhance its weapons programs. North Korea's pursuit of a nuclear weapons capability has long provoked heated debate among policy makers and research analysts about the purposes of engagement with the North, reflecting the repeated frustrations in efforts to negotiate Korean denuclearization. These debates reflect widely divergent views of the North Korean regime; its sustainability as an autonomous political, economic, and military system; and the potential consequences of continued nuclear development in this isolated, highly idiosyncratic state. These questions assume additional salience as North Korea approaches a leadership succession for only the second time in its six-decade history. The effort to inhibit North Korea's pursuit of nuclear weapons is among the longest running and least successful sagas in international security and non-proliferation policy of the past quarter century. In early 2010, Pyongyang claims a rudimentary nuclear capability by possession of weaponized plutonium, the conduct of two nuclear tests, and advances in the production of enriched uranium as an alternative means of fissile material production, though the latter step is nominally justified as a source for reactor fuel. North Korea defends its pursuit of a nuclear deterrent to counter what Pyongyang deems existential threats posed by the United States.Despite the resumption of high-level diplomatic contact between Washington and Pyongyang in late 2009, realization of a non-nuclear Korean Peninsula remains a very remote prospect. The DPRK insists that a peace agreement between the U.S. and North Korea and hence the cessation of 'hostile DPRK-U.S. relations' are

  13. Effects of prenatal stress on lever-press acquisition with delayed reinforcement in male and female rats.

    Science.gov (United States)

    Bruner, Natalie R; Salm, A K; Anderson, Karen G

    2012-03-01

    The prenatally stressed (PS) rat shows enhanced conditioned fear and increased behavioral inhibition in response to footshock compared to control (CON) rats. It is unclear whether this facilitated learning will occur only with aversive stimulation, or if it will also be observed in the context of positive reinforcement. There are limited and inconsistent data regarding sex differences and the impact of prenatal stress on learning. The present study was designed to examine lever-press acquisition with a 10-s delay to food reinforcement in male and female PS and CON rats. Overall, twice as many PS male rats acquired the lever-press response than the PS female rats, CON male rats, and CON female rats. PS male rats also earned significantly more reinforcers and responded on the operative lever at a significantly greater rate than the other three rat groups. These findings suggest that PS rats exhibit altered learning with a task involving positive reinforcement, and this effect of PS is sex specific for male rats.

  14. Differential activation of accumbens shell and core dopamine by sucrose reinforcement with nose poking and with lever pressing.

    Science.gov (United States)

    Bassareo, V; Cucca, F; Frau, R; Di Chiara, G

    2015-11-01

    In order to investigate the role of modus operandi in the changes of nucleus accumbens (NAc) dopamine (DA) transmission in sucrose reinforcement, extracellular DA was monitored by microdialysis in the NAc shell and core of rats trained on a fixed-ratio 1 schedule to respond for sucrose pellets by nose poking and lever pressing respectively. After training, rats were tested on three different sessions: sucrose reinforcement, extinction and passive sucrose presentation. In rats responding by nose poking dialysate DA increased in the shell but not in the core under reinforced as well as under extinction sessions. In contrast, in rats responding by lever pressing dialysate DA increased both in the accumbens shell and core under reinforced and extinction sessions. Response non-contingent sucrose presentation increased dialysate DA in the shell and core of rats trained to respond for sucrose by nose poking as well as in those trained by lever pressing. In rats trained to respond for sucrose by nose poking on a FR5 schedule dialysate DA also increased selectively in the NAc shell during reinforced responding and in both the shell and core under passive sucrose presentation. These findings, while provide an explanation for the discrepancies existing in the literature over the responsiveness of shell and core DA in rats responding for food, are consistent with the notion that NAc shell and core DA encode different aspects of reinforcement.

  15. Hybrid Kalman and unscented Kalman filters for INS/GPS integrated system considering constant lever arm effect

    Institute of Scientific and Technical Information of China (English)

    常国宾; 柳明

    2015-01-01

    In inertial navigation system (INS) and global positioning system (GPS) integrated system, GPS antennas are usually not located at the same location as the inertial measurement unit (IMU) of the INS, so the lever arm effect exists, which makes the observation equation highly nonlinear. The INS/GPS integration with constant lever arm effect is studied. The position relation of IMU and GPS’s antenna is represented in the earth centered earth fixed frame, while the velocity relation of these two systems is represented in local horizontal frame. Due to the small integration time interval of INS, i.e. 0.1 s in this work, the nonlinearity in the INS error equation is trivial, so the linear INS error model is constructed and addressed by Kalman filter’s prediction step. On the other hand, the high nonlinearity in the observation equation due to lever arm effect is addressed by unscented Kalman filter’s update step to attain higher accuracy and better applicability. Simulation is designed and the performance of the hybrid filter is validated.

  16. Myosin VI Must Dimerize and Deploy Its Unusual Lever Arm in Order to Perform Its Cellular Roles

    Directory of Open Access Journals (Sweden)

    Monalisa Mukherjea

    2014-09-01

    Full Text Available It is unclear whether the reverse-direction myosin (myosin VI functions as a monomer or dimer in cells and how it generates large movements on actin. We deleted a stable, single-α-helix (SAH domain that has been proposed to function as part of a lever arm to amplify movements without impact on in vitro movement or in vivo functions. A myosin VI construct that used this SAH domain as part of its lever arm was able to take large steps in vitro but did not rescue in vivo functions. It was necessary for myosin VI to internally dimerize, triggering unfolding of a three-helix bundle and calmodulin binding in order to step normally in vitro and rescue endocytosis and Golgi morphology in myosin VI-null fibroblasts. A model for myosin VI emerges in which cargo binding triggers dimerization and unfolds the three-helix bundle to create a lever arm essential for in vivo functions.

  17. Threat image projection in CCTV

    Science.gov (United States)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  18. Pass Em’ Right: Assessing the Threat of WMD Terrorism from America’s Christian Patriots

    Directory of Open Access Journals (Sweden)

    Paul D. Brister

    2011-05-01

    Full Text Available Within the field of terrorism studies, great effort has been devoted to the topic of weapons of mass destruction (WMD and their potential usage in the hands of terrorist organisations. This article deepens the discussion of WMD terrorism by focusing upon an oft-overlooked movement that resides within American borders. The Christian Patriot Movement – which rightfully claims the likes of Timothy McVeigh – is a phenomenon that has gone largely unnoticed as American counterterrorism efforts focus largely upon Islamist terrorist organizations. Here we aim to bring the Patriots back into discussions of terrorist threats by assessing their potential to use WMD. We conclude that, although the Patriots have demonstrated intent to employ such weapons, they lack the overall capability to design, acquire, or employ a WMD of significant lethality. We end by looking at the pathways which the Patriots are currently exploring to narrow the divide between intent and capability.       

  19. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  20. Measures to implement the Chemical Weapons Convention

    Energy Technology Data Exchange (ETDEWEB)

    Tanzman, E.; Kellman, B.

    1999-11-05

    This seminar is another excellent opportunity for those involved in preventing chemical weapons production and use to learn from each other about how the Chemical Weapons Convention (CWC) can become a foundation of arms control in Africa and around the world. The author is grateful to the staff of the Organization for the Prohibition of Chemical Weapons (OPCW) for inviting him to address this distinguished seminar. The views expressed in this paper are those of the authors alone, and do not represent the position of the government of the US nor or of any other institution. In 1993, as the process of CWC ratification was beginning, concerns arose that the complexity of integrating the treaty with national law would cause each nation to implement the Convention without regard to what other nations were doing, thereby causing inconsistencies among States Parties in how the Convention would be carried out. As a result the Manual for National Implementation of the Chemical Weapons Convention was prepared and presented it to each national delegation at the December 1993 meeting of the Preparatory Commission in The Hague. During its preparation, the Manual was reviewed by the Committee of Legal Experts on National Implementation of the Chemical Weapons Convention, a group of distinguished international jurists, law professors, legally-trained diplomats, government officials, and Parliamentarians from every region of the world, including Mica. In February 1998, the second edition of the Manual was published in order to update it in light of developments since the CWC entered into force on 29 April 1997. The second edition 1998 clarified the national implementation options to reflect post-entry-into-force thinking, added extensive references to national implementing measures that had been enacted by various States Parties, and included a prototype national implementing statute developed by the authors to provide a starting point for those whose national implementing

  1. Levers for Language Growth: Characteristics and Predictors of Language Trajectories between 4 and 7 Years.

    Directory of Open Access Journals (Sweden)

    Cristina McKean

    Full Text Available Evidence is required as to when and where to focus resources to achieve the greatest gains for children's language development. Key to these decisions is the understanding of individual differences in children's language trajectories and the predictors of those differences. To determine optimal timing we must understand if and when children's relative language abilities become fixed. To determine where to focus effort we must identify mutable factors, that is those with the potential to be changed through interventions, which are associated with significant differences in children's language scores and rate of progress.Uniquely this study examined individual differences in language growth trajectories in a population sample of children between 4 and 7 years using the multilevel model for change. The influence of predictors, grouped with respect to their mutability and their proximity to the child (least-mutable, mutable-distal, mutable-proximal, were estimated.A significant degree of variability in rate of progress between 4 and 7 years was evident, much of which was systematically associated with mutable-proximal factors, that is, those factors with evidence that they are modifiable through interventions with the child or family, such as shared book reading, TV viewing and number of books in the home. Mutable-distal factors, such as family income, family literacy and neighbourhood disadvantage, hypothesised to be modifiable through social policy, were important predictors of language abilities at 4 years.Potential levers for language interventions lie in the child's home learning environment from birth to age 4. However, the role of a family's material and cultural capital must not be ignored, nor should the potential for growth into the school years. Early Years services should acknowledge the effects of multiple, cascading and cumulative risks and seek to promote child language development through the aggregation of marginal gains in the pre

  2. The N terminus of monoamine transporters is a lever required for the action of amphetamines.

    Science.gov (United States)

    Sucic, Sonja; Dallinger, Stefan; Zdrazil, Barbara; Weissensteiner, René; Jørgensen, Trine N; Holy, Marion; Kudlacek, Oliver; Seidel, Stefan; Cha, Joo Hwan; Gether, Ulrik; Newman, Amy H; Ecker, Gerhard F; Freissmuth, Michael; Sitte, Harald H

    2010-04-02

    The serotonin transporter (SERT) terminates neurotransmission by removing serotonin from the synaptic cleft. In addition, it is the site of action of antidepressants (which block the transporter) and of amphetamines (which induce substrate efflux). We explored the functional importance of the N terminus in mediating the action of amphetamines by focusing initially on the highly conserved threonine residue at position 81, a candidate site for phosphorylation by protein kinase C. Molecular dynamics simulations of the wild type SERT, compared with its mutations SERT(T81A) and SERT(T81D), suggested structural changes in the inner vestibule indicative of an opening of the inner vestibule. Predictions from this model (e.g. the preferential accumulation of SERT(T81A) in the inward conformation, its reduced turnover number, and a larger distance between its N and C termini) were verified. Most importantly, SERT(T81A) (and the homologous mutations in noradrenaline and dopamine) failed to support amphetamine-induced efflux, and this was not remedied by aspartate at this position. Amphetamine-induced currents through SERT(T81A) were comparable with those through the wild type transporter. Both abundant Na(+) entry and accumulation of SERT(T81A) in the inward facing conformation ought to favor amphetamine-induced efflux. Thus, we surmised that the N terminus must play a direct role in driving the transporter into a state that supports amphetamine-induced efflux. This hypothesis was verified by truncating the first 64 amino acids and by tethering the N terminus to an additional transmembrane helix. Either modification abolished amphetamine-induced efflux. We therefore conclude that the N terminus of monoamine transporters acts as a lever that sustains reverse transport.

  3. Program realization of mathematical model of kinetostatical calculation of flat lever mechanisms

    Directory of Open Access Journals (Sweden)

    M. A. Vasechkin

    2016-01-01

    Full Text Available Global computerization determined the dominant position of the analytical methods for the study of mechanisms. As a result, kinetostatics analysis of mechanisms using software packages is an important part of scientific and practical activities of engineers and designers. Therefore, software implementation of mathematical models kinetostatical calculating mechanisms is of practical interest. The mathematical model obtained in [1]. In the language of Turbo Pascal developed a computer procedure that calculates the forces in kinematic pairs in groups Assur (GA and a balancing force at the primary level. Before use appropriate computational procedures it is necessary to know all external forces and moments acting on the GA and to determine the inertial forces and moments of inertia forces. The process of calculations and constructions of the provisions of the mechanism can be summarized as follows. Organized cycle in which to calculate the position of an initial link of the mechanism. Calculate the position of the remaining links of the mechanism by referring to relevant procedures module DIADA in GA [2,3]. Using the graphics mode of the computer displaying on the display the position of the mechanism. The computed inertial forces and moments of inertia forces. Turning to the corresponding procedures of the module, calculated all the forces in kinematic pairs and the balancing force at the primary level. In each kinematic pair build forces and their direction with the help of simple graphical procedures. The magnitude of these forces and their direction are displayed in a special window with text mode. This work contains listings of the test programs MyTеst, is an example of using computing capabilities of the developed module. As a check on the calculation procedures of module in the program is reproduced an example of calculating the balancing forces according to the method of Zhukovsky (Zhukovsky lever.

  4. Levers for Language Growth: Characteristics and Predictors of Language Trajectories between 4 and 7 Years.

    Science.gov (United States)

    McKean, Cristina; Mensah, Fiona K; Eadie, Patricia; Bavin, Edith L; Bretherton, Lesley; Cini, Eileen; Reilly, Sheena

    2015-01-01

    Evidence is required as to when and where to focus resources to achieve the greatest gains for children's language development. Key to these decisions is the understanding of individual differences in children's language trajectories and the predictors of those differences. To determine optimal timing we must understand if and when children's relative language abilities become fixed. To determine where to focus effort we must identify mutable factors, that is those with the potential to be changed through interventions, which are associated with significant differences in children's language scores and rate of progress. Uniquely this study examined individual differences in language growth trajectories in a population sample of children between 4 and 7 years using the multilevel model for change. The influence of predictors, grouped with respect to their mutability and their proximity to the child (least-mutable, mutable-distal, mutable-proximal), were estimated. A significant degree of variability in rate of progress between 4 and 7 years was evident, much of which was systematically associated with mutable-proximal factors, that is, those factors with evidence that they are modifiable through interventions with the child or family, such as shared book reading, TV viewing and number of books in the home. Mutable-distal factors, such as family income, family literacy and neighbourhood disadvantage, hypothesised to be modifiable through social policy, were important predictors of language abilities at 4 years. Potential levers for language interventions lie in the child's home learning environment from birth to age 4. However, the role of a family's material and cultural capital must not be ignored, nor should the potential for growth into the school years. Early Years services should acknowledge the effects of multiple, cascading and cumulative risks and seek to promote child language development through the aggregation of marginal gains in the pre-school years and

  5. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  6. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  7. Systems engineering analysis of kinetic energy weapon concepts

    Energy Technology Data Exchange (ETDEWEB)

    Senglaub, M.

    1996-06-01

    This study examines, from a systems engineering design perspective, the potential of kinetic energy weapons being used in the role of a conventional strategic weapon. Within the Department of Energy (DOE) complex, strategic weapon experience falls predominantly in the nuclear weapons arena. The techniques developed over the years may not be the most suitable methodologies for use in a new design/development arena. For this reason a more fundamental approach was pursued with the objective of developing an information base from which design decisions might be made concerning the conventional strategic weapon system concepts. The study examined (1) a number of generic missions, (2) the effects of a number of damage mechanisms from a physics perspective, (3) measures of effectiveness (MOE`s), and (4) a design envelope for kinetic energy weapon concepts. With the base of information a cut at developing a set of high-level system requirements was made, and a number of concepts were assessed against these requirements.

  8. 76 FR 70317 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2011-11-10

    ... With Respect to Weapons of Mass Destruction #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal... Weapons of Mass Destruction On November 14, 1994, by Executive Order 12938, the President declared a... weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the...

  9. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, J. W.; Jobstvogt, N.; Böhnke-Henrichs, A.;

    2016-01-01

    environmental awareness. Threats include resistance to change, and difficulty with interdisciplinary collaboration. Consideration of SWOT themes suggested five strategic areas for developing and implementing ES.The ES concept could improve decision-making related to natural resource use, and interpretation...... facilitate interdisciplinary research, ensuring decision-making that supports sustainable development........ Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management.The Young Ecosystem Services Specialists (YESS) completed a Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis of ES through YESS member surveys. Strengths include the approach...

  10. Small sample Bayesian analyses in assessment of weapon performance

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Abundant test data are required in assessment of weapon performance.When weapon test data are insufficient,Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations.The several Bayesian approaches are discussed and some limitations are founded.An improvement is put forward after limitations of Bayesian approaches available are analyzed and t he improved approach is applied to assessment of some new weapon performance.

  11. Strategies for denaturing the weapons-grade plutonium stockpile

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, M.R.; Parks, P.B.

    1992-10-01

    In the next few years, approximately 50 metric tons of weapons-grade plutonium and 150 metric tons of highly-enriched uranium (HEU) may be removed from nuclear weapons in the US and declared excess. These materials represent a significant energy resource that could substantially contribute to our national energy requirements. HEU can be used as fuel in naval reactors, or diluted with depleted uranium for use as fuel in commercial reactors. This paper proposes to use the weapons-grade plutonium as fuel in light water reactors. The first such reactor would demonstrate the dual objectives of producing electrical power and denaturing the plutonium to prevent use in nuclear weapons.

  12. DOE Nuclear Weapon Reliability Definition: History, Description, and Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Wright, D.L.; Cashen, J.J.; Sjulin, J.M.; Bierbaum, R.L.; Kerschen, T.J.

    1999-04-01

    The overarching goal of the Department of Energy (DOE) nuclear weapon reliability assessment process is to provide a quantitative metric that reflects the ability of the weapons to perform their intended function successfully. This white paper is intended to provide insight into the current and long-standing DOE definition of nuclear weapon reliability, which can be summarized as: The probability of achieving the specified yield, at the target, across the Stockpile-To-Target Sequence of environments, throughout the weapon's lifetime, assuming proper inputs.

  13. Granular analyzing of weapon SoS demand description

    Institute of Scientific and Technical Information of China (English)

    Zhao Qingsong; Yang Kewei; Chen Yingwu; Li Mengjun

    2009-01-01

    The systematism of weapon combat is the typical characteristic of a modern battlefield. The process of combat is complex and the demand description of weapon system of systems (SOS) is difficult. Granular analyzing is an important method for solving the complex problem in the world. Granular thinking is introduced into the demand description of weapon SoS. Granular computing and granular combination based on a relation of compatibility is proposed. Based on the level of degree and degree of detail, the granular resolution of weapon SoS is defined and an example is illustrated at the end.

  14. ON THE OFFENSE: USING CYBER WEAPONS TO INFLUENCE COGNITIVE BEHAVIOR

    Directory of Open Access Journals (Sweden)

    Mary Fendley

    2012-12-01

    Full Text Available There is an increasing recognition that cyber warfare is an important area of development for targeting and weaponeering, with far-reaching effects in national defense and economic security. The ability to conduct effective operations in cyberspace relies on a robust situational awareness of events occurring in both the physical and information domains, with an understanding of how they affect the cognitive domain of friendly, neutral, and adversary population sets. The dynamic nature of the battlefield complicates efforts to understand shifting adversary motivations and intentions. There are very few approaches, to date, that systematically evaluate the effects of the repertoire of cyber weapons on the cognitive, perceptual, and behavioral characteristics of the adversary. In this paper, we describe a software environment called Cognitive Cyber Weapon Selection Tool (CCWST that simulates a scenario involving cyber weaponry.This tool provides the capabilities to test weapons which may induce behavioral state changes in the adversaries. CCWST provides the required situational awareness to the Cyber Information Operations (IO planner to conduct intelligent weapon selection during weapon activation in order to induce the desired behavioral change in the perception of the adversary. Weapons designed to induce the cognitive state changes of deception, distraction, distrust and confusion were then tested empirically to evaluate the capabilities and expected cognitive state changes induced by these weapons. The results demonstrated that CCWST is a powerful environment within which to test and evaluate the impact of cyber weapons on influencing cognitive behavioral states during information processing.

  15. Approach and Significance of Biochemical Threats Event for Children and Pregnant Women

    Directory of Open Access Journals (Sweden)

    Dilek Yildiz

    2010-12-01

    Full Text Available Chemical and biologcal emergencies increasingly threaten the health and safety of people worldwide and are designed to create fear and cause harm to the general population. By the increase of biological and chemical agents and by becoming more aware of effects of its, nurses should be more informed to provide better healthcare to the affected patients during a threat and after a threat and to translate, to react quickly in all levels of threat situations. Children and pregnant women are particularly vulnerable to the effects of these agents because of their specific physiologic, immunologic and physiological characteristics. Because of these unique vulnerabilities of children and pregnant women, it is vital that their special needs are addressed in every stage of disaster planning-prevention, preparation, response and recovery. Nurses have multiple roles in dealing the threat of biochemical. It is essential that nurses who care for children and pregnant women know how to recognize the effects of this type of weapon and how to alleviate or mitigate their impact. Therefore, it is important that nurses should be informed about biochemical threats and do exercises, also during school education. [TAF Prev Med Bull 2010; 9(6.000: 677-688

  16. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  17. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevanc

  18. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and th

  19. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  20. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  1. Cardiac fibrillation risk of Taser weapons.

    Science.gov (United States)

    Leitgeb, Norbert

    2014-06-01

    The debate on potential health hazards associated with delivering electric discharges to incapacitated subjects, in particular on whether electric discharge weapons are lethal, less lethal or non-lethal, is still controversial. The cardiac fibrillation risks of Taser weapons X26 and X3 have been investigated by measuring the delivered high-tension pulses in dependence on load impedance. Excitation thresholds and sinus-to-Taser conversion factors have been determined by numerical modeling of endocardial, myocardial, and epicardial cells. Detailed quantitative assessment of cardiac electric exposure has been performed by numerical simulation at the normal-weighted anatomical model NORMAN. The impact of anatomical variation has been quantified at an overweight model (Visible Man), both with a spatial resolution of 2 × 2 × 2 mm voxels. Spacing and location of dart electrodes were systematically varied and the worst-case position determined. Based on volume-weighted cardiac exposure assessment, the fibrillation probability of the worst-case hit was determined to 30% (Taser X26) and 9% (Taser X3). The overall risk assessment of Taser application accounting for realistic spatial hit distributions was derived from training sessions of police officers under realistic scenarios and by accounting for the influence of body (over-)weight as well as gender. The analysis of the results showed that the overall fibrillation risk of Taser use is not negligible. It is higher at Taser X26 than at Taser X3 and amounts to about 1% for Europeans with an about 20% higher risk for Asians. Results demonstrate that enhancement as well as further reduction of fibrillation risk depends on responsible use or abuse of Taser weapons.

  2. The Regulation of the Possession of Weapons at Gatherings

    Directory of Open Access Journals (Sweden)

    Pieter du Toit

    2013-12-01

    Full Text Available The Dangerous Weapons Act 15 of 2013 provides for certain prohibitions and restrictions in respect of the possession of a dangerous weapon and it repeals the Dangerous Weapons Act 71 of 1968 as well as the different Dangerous Weapons Acts in operation in the erstwhile TBVC States. The Act also amends the Regulation of Gatherings Act 205 of 1993 to prohibit the possession of any dangerous weapon at a gathering or demonstration. The Dangerous Weapons Act provides for a uniform system of law governing the use of dangerous weapons for the whole of South Africa and it furthermore no longer places the onus on the individual charged with the offence of the possession of a dangerous weapon to show that he or she did not have any intention of using the firearm for an unlawful purpose. The Act also defines the meaning of a dangerous weapon. According to our court’s interpretation of the Dangerous Weapons Act 71 of 1968 a dangerous weapon was regarded as an object used or intended to be used as a weapon even if it had not been designed for use as a weapon. The Act, however, requires the object to be capable of causing death or inflicting serious bodily harm if it were used for an unlawful purpose. The possession of a dangerous weapon, in circumstances which may raise a reasonable suspicion that the person intends to use it for an unlawful purpose, attracts criminal liability. The Act also provides a useful set of guidelines to assist courts to determine if a person charged with the offence of the possession of a dangerous weapon had indeed intended to use the weapon for an unlawful purpose. It seems, however, that the Act prohibits the possession of a dangerous weapon at gatherings, even if the person carrying the weapon does not intend to use it for an unlawful purpose. The state will, however, have to prove that the accused had the necessary control over the object and the intention to exercise such control, as well as that the object is capable of

  3. 某型通用机枪大杠杆曲线参数优化研究%Parameter Optimization of Big-lever Curve of a Dual-purpose Machine Gun

    Institute of Scientific and Technical Information of China (English)

    王瑞林; 张本军; 李永建; 郝刚

    2012-01-01

    为解决某型通用机枪首发装填困难的故障,利用线位移传感器进行了首发装填试验,得到了影响首发装填的重要因素,即拨弹滑板在向外和向里2个阶段所受阻力传递到装填拉柄运动方向上的最大值;在大杠杆的两段曲线上各取5个点,利用三次样条曲线对这两条曲线进行拟合,求出了2个最大值与插值点之间的函数关系;分别以这2个最大值为目标函数,以各插值点的Y向坐标为待优化参数,利用遗传算法对大杠杆曲线进行了优化,使得2个目标函数分别减少了47.24%和39.3%,达到了优化的目的.为该枪的改进工作提供指导,所使用的方法为同类型武器的设计和改进提供参考.%To solve the problem in first-round loading of a dual-purpose machine gun, the loading test was carried out by using a linear displacement sensor, and the importance factors which affect the first-round loading were revealed, i. e. two maximum values of resistances transferred from feed slide to the loading handle. Five points were taken in two segments of big-lever curve respectively, and the relationship between two maximum values and interpolation points were found out by using cubic spline curve fitting. Taken these two values as objective functions and the Y coordinates of interpolation points as the optimized parameters, the big-lever curves were optimized by using genetic algorithm, and the objective functions were reduced by 47. 24% and 39. 3% . The method can provide reference for the design and improvement of the similar weapons.

  4. Postulated accident scenarios in weapons disassembly

    Energy Technology Data Exchange (ETDEWEB)

    Payne, S.S. [Dept. of Energy, Albuquerque, NM (United States)

    1997-06-01

    A very brief summary of three postulated accident scenarios for weapons disassembly is provided in the paper. The first deals with a tetrahedral configuration of four generic pits; the second, an infinite planar array of generic pits with varying interstitial water density; and the third, a spherical shell with internal mass suspension in water varying the size and mass of the shell. Calculations were performed using the Monte Carlo Neutron Photon transport code MCNP4A. Preliminary calculations pointed to a need for higher resolution of small pit separation regimes and snapshots of hydrodynamic processes of water/plutonium mixtures.

  5. Millimeter Wave Radar Applications to Weapons Systems

    Science.gov (United States)

    1976-06-01

    ocity, and azimuth and elevation arRles ; assignment of target to L weapon for engagement; and assessment of the damage by the indication of cessa- tion...paper. 29 D.E. Gray, American institute of Physics Handbook ," McGraw-Hill, New S~York, 1957. --. . - - . .A • -•• =_ . . . . •,,- - - The complex...B-13) is the target-to-clutter power ratio. I. 41I 7 Handbook of Mathematical Functions, U.S. Department of Commerce, National Bureau of Standards

  6. Environmental Detection of Clandestine Nuclear Weapon Programs

    Science.gov (United States)

    Kemp, R. Scott

    2016-06-01

    Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.

  7. DOE battery program for weapon applications

    Science.gov (United States)

    Clark, R. P.; Baldwin, A. R.

    This report discusses the Department of Energy (DOE) Weapons Battery program which originates from Sandia National Laboratories (SNL) and involves activities ranging from research, design and development to testing, consulting, and production support. The primary customer is the DOE/Office of Defense Programs, although work is also done for various Department of Defense agencies and their contractors. The majority of the SNL activities involve thermal battery (TB) and lithium ambient temperature battery (LAMB)technologies. Smaller efforts are underway in the areas of silver oxide/zinc and nickel oxide/cadmium batteries as well as double layer capacitors.

  8. Recoil Considerations for Shoulder-Fired Weapons

    Science.gov (United States)

    2012-05-01

    2012) Steyr 15.2 mm 35 g 1450 m/s 39.6 lb 11.4 Burns (2012) Type 97 (Japanese) 20 mm 162 g 790 m/s 130 lb 28.7 Burns (2012) 12HB00 ( Remington ...shotgun 0.727 in 807 gr (12 × 00) 1225 ft/s 7.0 lb 4.37 Remington (2011) Remington Express 12B0 shotgun 0.727 in 580 gr (12 × 0) 1275 ft/s...7.0 lb 3.28 Remington 5 Table 3. Recoil-related characteristics of selected shoulder-fired weapons cited in table 1. Nomenclature

  9. [Botulinum toxin as a biological weapon].

    Science.gov (United States)

    Rossow, Heidi; Kinnunen, Paula M; Nikkari, Simo

    2012-01-01

    Botulism is caused by botulinum neurotoxin produced by the bacterium Clostridium botulinum. It is a flaccid paralysis in which consciousness and nociception are preserved. Natural botulism typically results from ingestion of inadequately heated or unheated vacuum-packed foods. In addition, botulinum toxin is one of the most feared biological weapons. In the diagnosis and treatment of botulism early suspicion is essential. Several coinciding or local clusters without a typical connecting source, or an uncommon type of toxin may indicate an intentionally caused epidemic.

  10. 76 FR 6199 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    Science.gov (United States)

    2011-02-03

    ... Regulatory Commission 10 CFR Part 73 Enhanced Weapons, Firearms Background Checks, and Security Event... Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY: Nuclear Regulatory... revisions in these implementing regulations that address the voluntary application for enhanced weapons and...

  11. 77 FR 59891 - Proposed Information Collection; Comment Request; Chemical Weapons Convention Declaration and...

    Science.gov (United States)

    2012-10-01

    ... Bureau of Industry and Security Proposed Information Collection; Comment Request; Chemical Weapons...@bis.doc.gov . SUPPLEMENTARY INFORMATION: ] I. Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons Convention Regulations (CWCR) specify the rights...

  12. The emphasis given to evolution in state science standards: A lever for change in evolution education?

    Science.gov (United States)

    Skoog, Gerald; Bilica, Kimberly

    2002-07-01

    This study analyzed the science frameworks of 49 states and the District of Colombia to determine the emphasis given to evolution in these documents at the middle and secondary levels. These concepts were species evolve over time, speciation, diversity of life, descent with modification from common ancestry, evidence of evolution, natural selection, pace and direction of evolution, and human evolution. Collectively, the 50 science frameworks emphasized evolution in a manner that suggests that if the public's support for standards-based curricula is a reality, the study of evolution will be emphasized in an unprecedented manner in the nation's schools in the near future. However, all concepts were not emphasized equally in these documents. For example, human evolution was included in only seven documents. The word evolution is absent from some standards. Despite these negatives, recent actions to improve existing standards or to adopt new standards that emphasize evolution have occurred. The metaphor lever of change is often used in the context of school reform. This metaphor suggests a simple system where one change can result in a desired outcome. However, in classrooms where curriculum decisions evolve constantly, multiple factors interact and reinforce one another in response to both internal and external contingencies that emerge. Educational change can not be reduced to a simple linear cause/effect situation. The change process involved is nonlinear where what goes in is not proportional to what comes out because of feedback loops and other factors that complicate results. This nonlinearity is reflected in the varied responses of teachers to specific contingencies. Yet, systems can be changed and nudged towards a structure where desired outcomes will emerge. Judicial rulings indicating that the teaching of evolution cannot be prohibited or equal time for creationism mandated, improved coverage of evolution in secondary school biology textbooks, the negative

  13. Stress-induced cortisol secretion impairs detection performance in x-ray baggage screening for hidden weapons by screening novices.

    Science.gov (United States)

    Thomas, Livia; Schwaninger, Adrian; Heimgartner, Nadja; Hedinger, Patrik; Hofer, Franziska; Ehlert, Ulrike; Wirtz, Petra H

    2014-09-01

    Aviation security strongly depends on screeners' performance in the detection of threat objects in x-ray images of passenger bags. We examined for the first time the effects of stress and stress-induced cortisol increases on detection performance of hidden weapons in an x-ray baggage screening task. We randomly assigned 48 participants either to a stress or a nonstress group. The stress group was exposed to a standardized psychosocial stress test (TSST). Before and after stress/nonstress, participants had to detect threat objects in a computer-based object recognition test (X-ray ORT). We repeatedly measured salivary cortisol and X-ray ORT performance before and after stress/nonstress. Cortisol increases in reaction to psychosocial stress induction but not to nonstress independently impaired x-ray detection performance. Our results suggest that stress-induced cortisol increases at peak reactivity impair x-ray screening performance. Copyright © 2014 Society for Psychophysiological Research.

  14. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    Science.gov (United States)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  15. The Relationship between Social Capital and Weapon Possession on Campus

    Science.gov (United States)

    Messer, Rachel H.; Bradley, Kristopher I.; Calvi, Jessica L.; Kennison, Shelia M.

    2012-01-01

    The present research focused on the problem of how college officials might be able to predict weapon possession on college campuses. We hypothesized that measures of social capital (i.e., trust and participation in society) may be useful in identifying individuals who are likely to possess weapons on campuses. Prior research has shown that those…

  16. Victimization and Health Risk Factors among Weapon-Carrying Youth

    Science.gov (United States)

    Stayton, Catherine; McVeigh, Katharine H.; Olson, E. Carolyn; Perkins, Krystal; Kerker, Bonnie D.

    2011-01-01

    Objective: To compare health risks of 2 subgroups of weapon carriers: victimized and nonvictimized youth. Methods: 2003-2007 NYC Youth Risk Behavior Surveys were analyzed using bivariate analyses and multinomial logistic regression. Results: Among NYC teens, 7.5% reported weapon carrying without victimization; 6.9% reported it with victimization.…

  17. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  18. 32 CFR 552.116 - Privately owned weapons-security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition but...

  19. Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons

    Science.gov (United States)

    2007-07-01

    Mycotoxins as Biological Weapons PRINCIPAL INVESTIGATOR: Marta Feldmesser, M.D. CONTRACTING ORGANIZATION: Albert Einstein College of...Monoclonal Antibodies to Prevent Use of Mycotoxins as Biological Weapons 5b. GRANT NUMBER W81XWH-06-1-0085 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR

  20. Adapting the Law of Armed Conflict to Autonomous Weapon Systems

    Science.gov (United States)

    2014-01-01

    remains in the realm of theory . Still, several modern highly- automated—and some would call them autonomous—weapon systems already exist. These are...CROSS, 483, 507 (2012). 58. Backstrom & Henderson, supra note 57, at 401. 59. Justin McClelland , The Review of Weapons in Accordance with Article 36

  1. Civilian preparedness and counter-terrorism: conventional weapons.

    Science.gov (United States)

    Lucci, Edward B

    2006-06-01

    Most terrorist attacks involve conventional weapons. These explosive devices produce injury patterns that are sometimes predict-able. The chaos produced from these weapons can be greatly reduced with prior planning, response practice, and realization by the entire medical community of the need to participate in preparation for these devastating events.

  2. Willingness to pay for defense against weapons of mass destruction.

    Science.gov (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M

    2001-12-01

    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  3. Rethinking the Development of Weapons and Their Impact

    Science.gov (United States)

    Katsioloudis, Petros J.; Jones, Mildred V.

    2011-01-01

    As one reads about the history of humans, he/she sees very early on that humans are naturally "tool users." More specifically, humans used tools as a means of subsistence and survival. Even today humans use tools to extend their capabilities beyond imagination. These tools are even used as weapons. However primitive, these early weapons would soon…

  4. HFE (Human Factors Engineering) Technology for Navy Weapon System Acquisition.

    Science.gov (United States)

    1979-07-01

    uncovering of improved propulsion systems, sensors , weapons, etc., by industry or governr-ient agencies, may in.tiate the development of a new weapon system...needs. (No. A-109) _L a f. Tailor an acquisition stratagy for each program, as soon as the agency decides to solict alternative system design concepto

  5. Beyond the bomb: Living without nuclear weapons

    Energy Technology Data Exchange (ETDEWEB)

    Sommer, M.

    1985-01-01

    This book is a guide to alternative strategies for building a stable peace. It provides a survey of proposals for peace. Topics covered include: alternative defense: protection without threat; nonviolence: strengths of the weak; economic conversion: swords into services; game theory: nice guys last longest; and alternative futurism: toward more practical utopias.

  6. PSP toxins from Aphanizomenon flos-aquae (cyanobacteria) collected in the Crestuma-Lever reservoir (Douro river, northern Portugal).

    Science.gov (United States)

    Ferreira, F M; Franco Soler, J M; Fidalgo, M L; Fernández-Vila, P

    2001-06-01

    The presence of paralytic shellfish poisoning (PSP) toxins in cultures of Aphanizomenon flos-aquae, isolated from the Crestuma-Lever reservoir, was found by reversed phase high performance liquid chromatography employing two isocratic elution systems for the separation of PSP toxins. With the first isocratic elution protocol, the presence of apolar toxins as saxitoxin, decarbamoyl saxitoxin and neosaxitoxin not detected. On the other hand, GTX4, GTX1 and GTX3 as well as Cs toxins were present either in the Aphanizomenon flos-aquae cells collected directly from the bloom or in the other toxic isolates priorly cultivated in laboratory conditions.

  7. Diseño de mecanismos de palancas asistido por computadora. // Computer Aided Design of lever mechanisms.

    Directory of Open Access Journals (Sweden)

    J. L. Betancourt Herrera

    2001-07-01

    Full Text Available En la práctica del diseño industrial hay múltiples problemas que requieren de la creación de un mecanismo concaracterísticas de movimiento peculiares. La elección de un método que permita la síntesis estructural, el planteamiento ysolución de las ecuaciones correspondientes, requeridas para el análisis cinemático de los mecanismos de palancas, en unaforma clara y simple, es un problema muy complejo de resolver en sentido general.Tomando como referencia la teoría para la formación de los grupos de Assur, el autor desarrolló el método de los gruposestructurales y sobre esta base el software DSM (Diseño y Simulación de Mecanismos, que es la herramienta de cómputopropuesta para apoyar al diseñador en el proceso de Diseño Cualitativo de Mecanismos de Palancas Asistido porComputadora, que consiste en un proceso iterativo entre síntesis y análisis con el que se pueden obtener los resultados de lavariación de la estructura de un mecanismo y de sus parámetros fundamentales, prácticamente en tiempo real.En el presente trabajo se definen y ejemplifican los conceptos y elementos principales relacionados con el diseñocualitativo de mecanismos de palancas asistido por computadora.Palabras claves: CAD, mecanismos de palancas, diseño industrial, análisis cinemático, síntesis estructural.___________________________________________________________________________AbstractThere are series of problems in industrial design practice that require a mechanism with specific characteristic movement.Selecting a method for achieving a clear and simple structural synthesis and cinematic analysis of lever mechanisms isgenerally understood as a hard-solving problem. Based on Assur´s Group Forming Theory, the author developed theStructural Groups Method and the DSM software (Design and Simulation of Mechanisms. This software is a tool intendedto help designers in the process of Computer Assisted Qualitative Design of Lever Mechanisms. It consists

  8. Nuclear weapons, proliferation, and terrorism: U.S. response in the twenty-first century

    Energy Technology Data Exchange (ETDEWEB)

    DeLawter, D.A.

    1998-11-01

    As the remaining superpower in the post-Cold War world, the US needs to re-evaluate its policy toward the growing threat to US national interests and the effects of weapons of mass destruction (WMD), specifically nuclear devices, and their use by terrorist groups against US interests abroad. As the world reacts to the implosion of the former Soviet Union, there are increased numbers of nations and possibly terrorist groups trying to become players in the international arena. This study describes the ease of obtaining the scientific knowledge, plans, and materials to enable a terrorist`s construction of a nuclear device. It also analyzes motivation of terrorist groups, concluding that a nuclear weapon, capable of inflicting violence in the extreme, fulfills the terrorist`s goal of violence in support of a political agenda or to inspire radical change. Given the guidance from the national level, this study proposes a series of policy options available to the NCA for application in an aggressive counterproliferation policy. Finally, the US must rapidly reorganize its counterproliferation structure and methods to streamline a more aggressive approach that is recognized and feared by potential nuclear terrorists; augment current political efforts with a clearly defined counterproliferation military mission and associated doctrine.

  9. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  10. Zika Still a Threat During Winter Months

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  11. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  12. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  13. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  14. Antigovernment Groups. A Growing Threat to US Security

    Energy Technology Data Exchange (ETDEWEB)

    Swift, Alicia L. [Los Alamos National Laboratory

    2016-04-25

    Domestic terrorism is a growing threat in the United States, particularly from the 998 right-wing antigovernment (AG) groups in existence in 2015. In the years since the September 11, 2001 attacks in New York City, right-wing anti-government acts have oc- curred more often and killed more people in the United States than Muslim extremists. Such AG group members are often in uenced by racist, anti-Semitic, or anti-Islamic views, believe conspiracy theories about the government, and often refuse to pay taxes or participate in frivolous lawsuits in order to intentionally waste the government's time. There is, however, a violent element to these groups which participates in events ranging from the armed take-over of federal land in Oregon, to an armed stand-o with federal agents in Nevada, to the bombing of the Oklahoma City building which killed 168 people. Such acts may be conducted by a few individuals, as is the case of the Oklahoma City bombing, or an entire group. Such groups have a wide range of capabilities, with typical weapons including legal and illegal rearms, with a focus on purchasing fully automatic weapons; hand grenades, with some homemade; deadly tox- ins, like ricin (in multiple cases) and sodium cyanide (in one case); transportation, such as all-terrain vehicles (ATVs); arson, with the intent of destroying federal property; and explosives, often in large numbers and including pipe bombs, truck bombs, IEDs, and other homemade explosives. The growing acceptance of these violent methods by Republican congressmen and governors, however, only increases visibility of such groups and encourages their behavior. Coupled with the removal of the Department of Homeland Security's division responsible for monitoring such groups, the result could prove disastrous for the safety of United States citizens.

  15. Weapons Retrieved After the Implementation of Emergency Department Metal Detection.

    Science.gov (United States)

    Malka, S Terez; Chisholm, Robin; Doehring, Marla; Chisholm, Carey

    2015-09-01

    Several high-profile violent incidents have occurred within emergency departments (EDs). There are no recent studies reporting the effectiveness of ED metal detection. Our aim was to assess the effect of metal detection on ED weapons retrieval. In September 2011, a metal detector was installed at the entrance of an urban, high-volume teaching hospital ED. The security company recorded retrieved firearms, knives, chemical sprays, and other weapons. We performed qualitative analysis of weapons retrieval data for a 26-month period. A total of 5877 weapons were retrieved, an average of 218 per month: 268 firearms, 4842 knives, 512 chemical sprays, and 275 other weapons, such as brass knuckles, stun guns, and box cutters. The number of retrieved guns decreased from 2012 to 2013 (from 182 to 47), despite an increase in metal detection hours from 8 h per day to 16 h per day. The number of retrieved knives, chemical sprays, and other weapons increased. Recovered knives increased from 2062 in 2012 to 2222 in 2013, chemical sprays increased from 170 to 305, and other weapons increased from 51 to 201. A large number of weapons were retrieved after the initiation of metal detection in the ED entrance. Increasing hours of metal detection increased the number of retrieved knives, chemical sprays, and other weapons. Retrieved firearms decreased after increasing metal detection hours. Metal detection in the ED entrance is effective in reducing entrance of weapons into the ED. Metal detectors may offer additional benefit in reducing attempts to enter with firearms. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Distinguishing among weapons offenders, drug offenders, and weapons and drug offenders based on childhood predictors and adolescent correlates.

    Science.gov (United States)

    Stephens, Skye; Day, David M

    2013-07-01

    Weapons and drug offences incur a large cost to society and tend to be strongly associated. Improved understanding of their antecedents could inform targeted early intervention and prevention programmes. This study aimed to examine differences in criminal careers, childhood predictors and adolescent correlates among weapons-only offenders, drugs-only offenders and a versatile group of weapons + drugs offenders. We conducted a longitudinal records study of 455 young Canadians charged with drug and/or weapons offences who started their offending in late childhood/early adolescence. Consistent with expectation, differences emerged in their criminal careers as the versatile group had a longer criminal career and desisted from offending at a later age than weapons-only offenders. Against prediction, weapons-only offenders experienced the greatest number of childhood predictors and adolescent correlates. The three offending groups could be differentiated on offending trajectories and developmental factors.In making links between past events and later behaviour, life-course criminology may inform development of effective early intervention and prevention strategies.As weapons-only offenders experience the greatest level of adversity in childhood and adolescence, they may benefit most (of these three groups) from early intervention and prevention programmes.A reduction in weapon carrying and use might be achieved by early identification of children risk factors (e.g. family adversity) and appropriate intervention. Copyright © 2013 John Wiley & Sons, Ltd.

  17. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  18. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  19. Proportionality, just war theory and weapons innovation.

    Science.gov (United States)

    Forge, John

    2009-03-01

    Just wars are supposed to be proportional responses to aggression: the costs of war must not greatly exceed the benefits. This proportionality principle raises a corresponding 'interpretation problem': what are the costs and benefits of war, how are they to be determined, and a 'measurement problem': how are costs and benefits to be balanced? And it raises a problem about scope: how far into the future do the states of affairs to be measured stretch? It is argued here that weapons innovation always introduces costs, and that these costs cannot be determined in advance of going to war. Three examples, the atomic bomb, the AK-47 and the ancient Greek catapult, are given as examples. It is therefore argued that the proportionality principle is inapplicable prospectively. Some replies to the argument are discussed and rejected. Some more general defences of the proportionality principle are considered and also rejected. Finally, the significance of the argument for Just War Theory as a whole is discussed.

  20. Nuclear weapons issues in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N.

    1993-07-02

    This report discusses how the US can play a productive mediating role in South Asia by engaging India and Pakistan in an international forum to manage nuclear weapons, as Edward Teller advocated. India and Pakistan have developed their nuclear capabilities because they fear their neighbors, not because they want to threaten fear their neighbors, not because they want to threaten the US. The appropriate response for the US, therefore, is diplomatic engagement and negotiations. In addition to the international approach, encouragement and facilitation of regional and bilateral interactions will also be important. Formal arms control agreements have been reached, but less formal confidence-building measures, and unilateral security pledges may well be combined to form a more secure strategic environment in South Asia than a nuclear armed confrontation across the porous South Asian border.

  1. When and how to dismantle nuclear weapons

    OpenAIRE

    Lu, Jingfeng

    2006-01-01

    This paper first derives revenue-maximizing auctions with identity-specific externalities among all players (seller and buyers). Our main findings are as follows. Firstly, a modified second-price sealed-bid auction with appropriate entry fees and reserve price is revenue-maximizing. Secondly, seller may physically destroy the auctioned item if the item is unsold or use destroying the item as nonparticipation threat. Thirdly, the revenue-maximizing auction induces full participation of buyers....

  2. Review of Radioisotopes as Radiological Weapons

    Science.gov (United States)

    2016-06-01

    Device (RED)  The simplest radiological threat would be the placement of unshielded radio- active material in a heavily trafficked area as an RED...10 U.S. Department of Health and Human Services, “Radiological Dispersal Device Playbook: Introduc- tion,” last updated July 2, 2015, http...contaminated and will not require decontamination. 12 U.S. Department of Health and Human Services

  3. Screening adolescents in the emergency department for weapon carriage.

    Science.gov (United States)

    Cunningham, Rebecca M; Resko, Stella M; Harrison, Stephanie Roahen; Zimmerman, Marc; Stanley, Rachel; Chermack, Stephen T; Walton, Maureen A

    2010-02-01

    The objective was to describe the prevalence and correlates of past-year weapon involvement among adolescents seeking care in an inner-city emergency department (ED). This cross-sectional study administered a computerized survey to all eligible adolescents (age 14-18 years), 7 days a week, who were seeking care over an 18-month period at an inner-city Level 1 ED. Validated measures were administered, including measures of demographics, sexual activity, substance use, injury, violent behavior, weapon carriage, and/or weapon use. Zero-inflated Poisson (ZIP) regression models were used to identify correlates of the occurrence and past-year frequency of these weapons variables. Adolescents (n = 2069, 86% response rate) completed the computerized survey. Fifty-five percent were female; 56.5% were African American. In the past year, 20% of adolescents reported knife or razor carriage, 7% reported gun carriage, and 6% pulled a knife or gun on someone. Although gun carriage was more frequent among males, females were as likely to carry a knife or pull a weapon in the past year. One-fifth of all adolescents seeking care in this inner-city ED have carried a weapon. Understanding weapon carriage among teens seeking ED care is a critical first step to future ED-based injury prevention initiatives. (c) 2010 by the Society for Academic Emergency Medicine.

  4. Arms Control without Arms Control: The Failure of the Biological Weapons Convention Protocol and a New Paradigm for Fighting the Threat of Biological Weapons

    Science.gov (United States)

    2003-03-01

    and in 1990, soon-to-be-retired President F.W. de Klerk ordered all work halted on lethal agents.53 Arguably the most disconcerting and dangerous...anything that provides for a level of assurance exceeding 50 percent makes sense.” 93 Frederick Aandahl et al., eds., “Formulation of a United States

  5. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  6. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  7. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  8. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  9. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  10. Toward Armageddon: The proliferation of unconventional weapons and ballistic missiles in the Middle East. Occasional Paper No. 36

    Energy Technology Data Exchange (ETDEWEB)

    Miller, A.J.

    1989-12-01

    The author concludes that it is probable that unconventional weapons and their associated delivery systems will form a permanent part of future political and strategic calculations in the Middle East. Some possible consequences of this situation can be divided into three classes: intra-regional, inter-regional and extra-regional. There is no doubt that Israel, driven by the need for security,precipitated the proliferation of unconventional weapons and of surface-to-surface missiles in the Middle East. It will now be driven to secure itself from the new threat to its security posed by its regional opponents. The most significant extra-regional consequence of developments in the Middle East may be further complication of great power arms control negotiations. To the re-discovery by the United States and the Soviet Union of their obligations under the Non-Proliferation Treaty to reduce the level of their nuclear weapons must now be added the desire to reduce, if not entirely eliminate, their chemical weapons stockpiles in advance of a global ban. It is possible that lesser powers will learn from the evidence of the great powers behavior, although that contradicts much of what we know of the psychology of decision making in international politics. What is necessary, though not necessarily sufficient, is that the U.S. and the USSR as the two external powers with potentially the greatest leverage, work together toward the resolution of the underlying causes of conflict in a region marked by more than a generation of competition between them.

  11. 32 CFR 552.130 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...

  12. 32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.

    Science.gov (United States)

    2010-07-01

    ... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...

  13. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...

  14. 77 FR 66513 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2012-11-05

    ... Documents#0;#0; ] Notice of November 1, 2012 Continuation of the National Emergency With Respect to Weapons... economy of the United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President...

  15. 3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...

  16. 32 CFR 552.104 - Disposition of confiscated/seized weapons.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...

  17. 75 FR 68671 - Continuation of Emergency With Respect to Weapons of Mass Destruction

    Science.gov (United States)

    2010-11-08

    ... Notice of November 4, 2010--Continuation of Emergency With Respect to Weapons of Mass Destruction #0; #0... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...

  18. Correlates of weapon carrying in school among adolescents in three countries.

    Science.gov (United States)

    Stickley, Andrew; Koyanagi, Ai; Koposov, Roman; Blatný, Marek; Hrdlička, Michal; Schwab-Stone, Mary; Ruchkin, Vladislav

    2015-01-01

    To determine the factors associated with weapon carrying in school among Czech, Russian, and US adolescents. Logistic regression was used to analyze data drawn from the Social and Health Assessment (SAHA). Violent behavior (perpetration / victimization) was linked to adolescent weapon carrying in all countries. Substance use was associated with weapon carrying among boys in all countries. Greater parental warmth reduced the odds for weapon carrying among Czech and Russian adolescents. Associating with delinquent peers was important for weapon carrying only among US adolescents. Factors associated with weapon carrying in school vary among countries although violent behavior and substance use may be associated with weapon carrying across countries.

  19. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  20. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  1. The use of neutron scattering in nuclear weapons research

    Energy Technology Data Exchange (ETDEWEB)

    Juzaitis, R.J. [Los Alamos National Lab., NM (United States)

    1995-10-01

    We had a weapons science breakout session last week. Although it would have been better to hold it closer in time to this workshop, I think that it was very valuable. it may have been less of a {open_quotes}short-sleeve{close_quotes} workshop environment than we would have liked, but as the first time two communities-the weapons community and the neutron scattering community- got together, it was a wonderful opportunity to transfer information during the 24 presentations that were made. This report contains discussions on the fundamental analysis of documentation of the enduring stockpile; LANSCE`s contribution to weapons; spallation is critical to understanding; weapons safety assessments; applied nuclear physics requires cross section information; fission models need refinement; and establishing teams on collaborative projects.

  2. Perfection and the Bomb: Nuclear Weapons, Teleology, and Motives.

    Science.gov (United States)

    Brummett, Barry

    1989-01-01

    Uses Kenneth Burke's theory of perfection to explore the vocabularies of nuclear weapons in United States public discourse and how "the Bomb" as a God term has gained imbalanced ascendancy in centers of power. (MS)

  3. the international politics of nuclear weapons: a constructivist analysis

    African Journals Online (AJOL)

    JK

    interest including India, Pakistan, China, North Korea and the US; and .... and conventions against the development, stockpiling and use of nuclear weapons. ...... process, the Agency discovered illicit nuclear procurement networks (UN News.

  4. Cargo/Weapons Elevator Land Based Engineering Site

    Data.gov (United States)

    Federal Laboratory Consortium — The Cargo and Weapons Facility consists of a suite of full scale and component test facilities contiguously located in building 77H. The site was constructed in 1987...

  5. Hamburgian weapon delivery technology: a quantitative comparative approach

    DEFF Research Database (Denmark)

    Riede, Felix

    2010-01-01

    The pioneer human re-colonisation of Southern Scandinavia after the Last Ice Age began some time around 12,700 calendar years BC and is associated with the Hamburgian techno-complex. These groups were reindeer hunters whose hunting weapons were tipped with the eponymous shouldered points (pointes á...... cran). Numerous studies have addressed the question of whether these points tipped arrows fired from bows, darts launched with the help of spear-throwers, or some other projectile delivery weapon. This paper approaches the question of Hamburgian weapon delivery technology from a quantitative...... comparative angle. Lithic metric data as well as information on presumed Hamburgian projectile shafts are used to demonstrate that the bow-and-arrow was the most likely weapon delivery method. This is reflected in the shape similarity with both later prehistoric arrow-points and shafts of the Ahrensburgian...

  6. Los Alamos National Laboratory JOWOG 31 Weapons Engineering Education & Training

    Energy Technology Data Exchange (ETDEWEB)

    Domzalski, Mark W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-03

    The objectives of this report are to recruit talented staff, invest in new and early/mid career staff, retain trained and talented staff and future leaders, and shorten the ~5-10 year time line to realize new Weaponeers.

  7. Revolution in military affairs, missile defence and weapons in space ...

    African Journals Online (AJOL)

    Revolution in military affairs, missile defence and weapons in space: the US ... 1991 Gulf War that captured the imagination of military planners and policy makers, ... Firstly, very few countries have the financial and technological capability to ...

  8. Application of inertial confinement fusion to weapon technology

    Energy Technology Data Exchange (ETDEWEB)

    Toepfer, A.J.; Posey, L.D.

    1978-12-01

    This report reviews aspects of the military applications of the inertial confinement fusion (ICF) program at Sandia Laboratories. These applications exist in the areas of: (1) weapon physics research, and (2) weapon effects simulation. In the area of weapon physics research, ICF source technology can be used to study: (1) equations-of-state at high energy densities, (2) implosion dynamics, and (3) laboratory simulation of exoatmospheric burst phenomena. In the area of weapon effects simulation, ICF technology and facilities have direct near, intermediate, and far term applications. In the near term, short pulse x-ray simulation capabilities exist for electronic component effects testing. In the intermediate term, capabilities can be developed for high energy neutron exposures and bremsstrahlung x-ray exposures of components. In the far term, system level exposures of full reentry vehicles will be possible if sufficiently high pellet gains are achieved.

  9. Arms Control: US and International efforts to ban biological weapons

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    The Bacteriological (Biological) and Toxin Weapons Convention, the treaty that bans the development, production, and stockpiling and acquisition of biological weapons was opened for signature in 1972 and came into force in 1975 after being ratified by 22 governments, including the depository nations of the USA, the United Kingdom, and the former Soviet Union. In support of the Convention, the USA later established export controls on items used to make biological weapons. Further, in accordance with the 1990 President`s Enhanced Proliferation Control Initiative, actions were taken to redefine and expand US export controls, as well as to encourage multilateral controls through the Australia Group. Thus far, the Convention has not been effective in stopping the development of biological weapons. The principal findings as to the reasons of the failures of the Convention are found to be: the Convention lacks universality, compliance measures are effective, advantage of verification may outweigh disadvantages. Recommendations for mitigating these failures are outlined in this report.

  10. Excess Weapons Plutonium Immobilization in Russia

    Energy Technology Data Exchange (ETDEWEB)

    Jardine, L.; Borisov, G.B.

    2000-04-15

    The joint goal of the Russian work is to establish a full-scale plutonium immobilization facility at a Russian industrial site by 2005. To achieve this requires that the necessary engineering and technical basis be developed in these Russian projects and the needed Russian approvals be obtained to conduct industrial-scale immobilization of plutonium-containing materials at a Russian industrial site by the 2005 date. This meeting and future work will provide the basis for joint decisions. Supporting R&D projects are being carried out at Russian Institutes that directly support the technical needs of Russian industrial sites to immobilize plutonium-containing materials. Special R&D on plutonium materials is also being carried out to support excess weapons disposition in Russia and the US, including nonproliferation studies of plutonium recovery from immobilization forms and accelerated radiation damage studies of the US-specified plutonium ceramic for immobilizing plutonium. This intriguing and extraordinary cooperation on certain aspects of the weapons plutonium problem is now progressing well and much work with plutonium has been completed in the past two years. Because much excellent and unique scientific and engineering technical work has now been completed in Russia in many aspects of plutonium immobilization, this meeting in St. Petersburg was both timely and necessary to summarize, review, and discuss these efforts among those who performed the actual work. The results of this meeting will help the US and Russia jointly define the future direction of the Russian plutonium immobilization program, and make it an even stronger and more integrated Russian program. The two objectives for the meeting were to: (1) Bring together the Russian organizations, experts, and managers performing the work into one place for four days to review and discuss their work with each other; and (2) Publish a meeting summary and a proceedings to compile reports of all the excellent

  11. Bacteriophages and Their Immunological Applications against Infectious Threats

    Directory of Open Access Journals (Sweden)

    Elena Criscuolo

    2017-01-01

    Full Text Available Bacteriophage therapy dates back almost a century, but the discovery of antibiotics led to a rapid decline in the interests and investments within this field of research. Recently, the novel threat of multidrug-resistant bacteria highlighted the alarming drop in research and development of new antibiotics: 16 molecules were discovered during 1983–87, 10 new therapeutics during the nineties, and only 5 between 2003 and 2007. Phages are therefore being reconsidered as alternative therapeutics. Phage display technique has proved to be extremely promising for the identification of effective antibodies directed against pathogens, as well as for vaccine development. At the same time, conventional phage therapy uses lytic bacteriophages for treatment of infections and recent clinical trials have shown great potential. Moreover, several other approaches have been developed in vitro and in vivo using phage-derived proteins as antibacterial agents. Finally, their use has also been widely considered for public health surveillance, as biosensor phages can be used to detect food and water contaminations and prevent bacterial epidemics. These novel approaches strongly promote the idea that phages and their proteins can be exploited as an effective weapon in the near future, especially in a world which is on the brink of a “postantibiotic era.”

  12. Pakistan’s Nuclear Weapons: Proliferation and Security Issues

    Science.gov (United States)

    2010-10-07

    on Fissile Materials http://www.fissilematerials.org/ipfm/ site_down/gfmr07.pdf; SIPRI Yearbook 2007. The International Panel on Fissile Materials...State for Foreign and Commonwealth Affairs David Miliband told the Charlie Rose Show December 15, 2008, that Islamabad’s nuclear weapons “are under...Weapons in Pakistan,” Pakistan Security Research Unit Brief Number 22, University of Bradford, November 18, 2007. Available at http://spaces.brad.ac.uk

  13. Historical fencing and scientific research medieval weapons: common ground

    Directory of Open Access Journals (Sweden)

    B. V. Hrynchyshyn

    2015-07-01

    We considered various approaches to the reconstruction of the historical fencing. It is proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods The various approaches to the reconstruction of the historical fencing. Proved that the activities of such societies has a positive effect on the process research of features of medieval weapons, fighting tactics of different periods.

  14. Syria’s Chemical Weapons: Issues for Congress

    Science.gov (United States)

    2013-09-12

    regime of President Bashar al Asad possesses stocks of nerve (sarin, VX ) and blister (mustard gas) agents , possibly weaponized into bombs, shells...largest in the world” during a June 2012 interview.16 Damascus possesses mustard blister agent , sarin nerve agent , and VX nerve agent , according to...chemical weapons stockpile. Syria also has several hundred metric tons of mustard agent in ready-to-use form and several tens of metric tons of VX . The

  15. Torque and power characteristics of a helium charged Stirling engine with a lever controlled displacer driving mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Karabulut, H.; Cinar, C.; Oztuerk, E.; Yuecesu, H.S. [Department of Mechanical Technology, Faculty of Technical Education, Gazi University, 06500 Teknikokullar, Ankara (Turkey)

    2010-01-15

    This study presents test results of a Stirling engine with a lever controlled displacer driving mechanism. Tests were conducted with helium and the working fluid was charged into the engine block. The engine was loaded by means of a prony type micro dynamometer. The heat was supplied by a liquefied petroleum gas (LPG) burner. The engine started to run at 118 C hot end temperature and the systematic tests of the engine were conducted at 180 C, 220 C and 260 C hot end external surface temperatures. During the test, cold end temperature was kept at 27 C by means of water circulation. Variation of the shaft torque and power with respect to the charge pressure and hot end temperature were examined. The maximum torque and power were measured as 3.99 Nm and 183 W at 4 bars charge pressure and 260 C hot end temperature. Maximum power corresponded to 600 rpm speed. (author)

  16. Subject competency of teachers and level of dependence on resource packs to teach levers, gears and pulleys

    Science.gov (United States)

    Jarvis, Tina; Cavendish, Sue

    1994-12-01

    This pilot study set out to ascertain whether the level of dependence on resource material is related to teaching experience, existing understanding in mechanics, and perceived self confidence in science and technology. Details of teaching experience and qualifications were obtained from 11 experienced teachers and 10 initial teacher trainees, and understanding of mechanics was assessed by a written test. Each teacher worked through one commercially produced inservice pack about levers, pulleys or gears, and then prepared a 30 minute session for 4 ten year old children. Videos of the sessions were analysed with respect to the extent to which the pack was the sole focus; the amount of integration with other teaching aids and approaches; and the extent individual children's needs were satisfied. Although science qualifications influenced teacher confidence, they were not accurate predictors of relevant knowledge and teaching competence. As the majority of teachers followed pack instructions closely, the children's needs were not always well matched.

  17. [Effects of variable-interval punishment on lever pressing maintained by variable-ratio reinforcement in the rat].

    Science.gov (United States)

    Iida, Naritoshi; Kimura, Hiroshi

    2007-12-01

    The effects of reinforcement and punishment on response suppression under variable-ratio reinforcement and variable-interval punishment schedules were investigated. In the baseline period, lever pressing in rats was maintained by a variable-ratio food reinforcement schedule. In the punishment condition, responding was punished by a grid shock under a variable-interval schedule. Baseline and punishment conditions alternated, and were continued until the response stabilized. Three rats were given five or six punishment rates with a fixed reinforcement rate and another three rats were given four or five reinforcement rates with a fixed punishment rate. The results indicated that the responses were either completely suppressed or not suppressed at all. When the punishment rate increased or the reinforcement rate decreased, the response was suppressed completely. Whereas when the punishment rate decreased or the reinforcement rate increased, the responses were not suppressed. These results agree with the predictions of the molar theory.

  18. Effects of Weapons on Aggressive Thoughts, Angry Feelings, Hostile Appraisals, and Aggressive Behavior: A Meta-Analytic Review of the Weapons Effect Literature.

    Science.gov (United States)

    Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J

    2017-09-01

    Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).

  19. Automated Navigation System based on Weapon-Target Assignment

    Directory of Open Access Journals (Sweden)

    Mohammad Khairudin

    2011-12-01

    Full Text Available Operating of weapon on the tank is mostly by manually. It is not desired performance for a critical operation. An automatic control system is required to operate the weapon with the target while maintaining the accuracy. In this paper has designed an automatic weapon control system using object image proccessing. Various an image processing methods used to improve the weapon accuracy to obtain the intended target. The method used in digital image processing is the Camshift motion tracking method. This method is compared with the Lucas Canade motion tracking method. This comparison is conducted to found more precise results between the two methods. Results of object image processing are used to control the direction of the weapon that towards the desired goal. The results show that the implementation of the Lucas Canade motion tracking method using fire simulation tools have been successful. The performance of the Lucas Canade motion tracking methods is better than the CamShift method. Using Lucas Canade method for weapon controller is accordance with the purposes.

  20. Effects of psychotropic agents on extinction of lever-press avoidance in a rat model of anxiety vulnerability

    Directory of Open Access Journals (Sweden)

    Xilu eJiao

    2014-09-01

    Full Text Available Avoidance and its perseveration represent key features of anxiety disorders. Both pharmacological and behavioral approaches (i.e. anxiolytics and extinction therapy have been utilized to modulate avoidance behavior in patients. However, the outcome has not always been desirable. Part of the reason is attributed to the diverse neuropathology of anxiety disorders. Here, we investigated the effect of psychotropic drugs that target various monoamine systems on extinction of avoidance behavior using lever-press avoidance task. Here we used the Wistar-Kyoto (WKY rat, a unique rat model that exhibits facilitated avoidance and extinction resistance along with malfunction of the dopamine (DA system. Sprague Dawley (SD and WKY rats were trained to acquire lever-press avoidance. WKY rats acquired avoidance faster and to a higher level compared to SD rats. During pharmacological treatment, bupropion, and desipramine significantly reduced avoidance response selectively in WKY rats. However, after the discontinuation of drug treatment, only those WKY rats that were previously treated with desipramine exhibited lower avoidance response compared to the control group. In contrast, none of the psychotropic drugs facilitated avoidance extinction in SD rats. Instead, desipramine impaired avoidance extinction and increased non-reinforced response in SD rats. Interestingly, paroxetine, a widely used antidepressant and anxiolytic, exhibited the weakest effect in WKY rats and no effects at all in SD rats. Thus, our data suggest that malfunctions in brain catecholamine system could be one of the underlying etiologies of anxiety-like behavior, particularly avoidance perseveration. Pharmacological manipulation targeting DA and norepinephrine is more effective to facilitate extinction learning in this strain. The data from the present study may shed light on new pharmacological approaches to treat patients with anxiety disorders who are not responding to serotonin re

  1. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  2. World's soils are under threat

    Science.gov (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  3. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election......, are important determinants of the use and effectiveness of dissolution threats in policymaking. Analyzing an original time-series data set from a multiparty parliamentary democracy, we find evidence in line with key empirical implications of the model....

  4. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger

    2008-04-01

    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  5. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  6. Weapon Simulator Test Methodology Investigation: Comparison of Live Fire and Weapon Simulator Test Methodologies and the Effects of Clothing and Individual Equipment on Marksmanship

    Science.gov (United States)

    2016-09-15

    marksmanship performance) mirror those which would be captured in a live fire evaluation . 1 WEAPON SIMULATOR TEST METHODOLOGY INVESTIGATION ...METHODOLOGY INVESTIGATION : COMPARISON OF LIVE FIRE AND WEAPON SIMULATOR TEST METHODOLOGIES AND THE EFFECTS OF CLOTHING AND INDIVIDUAL EQUIPMENT ON...2. REPORT TYPE Final 3. DATES COVERED (From - To) October 2014 – August 2015 4. TITLE AND SUBTITLE WEAPON SIMULATOR TEST METHODOLOGY INVESTIGATION

  7. A novel easy-driving and easy-signal-processing electrostatic field sensor based on a piezoresistance and polyethylene terephthalate lever

    Science.gov (United States)

    Bai, Minyu; Zhao, Yulong; Jiao, Binbin; Zhai, Xiaoshe; Geng, Yingsan

    2017-03-01

    A novel electrostatic field sensor with compact structure and a simple signal processing circuit is proposed in this paper. The sensor is based on a piezoresistive force meter and a lathy polyethylene terephthalate (PET) lever for electrostatic force generation and transformation. The force meter with a rectangular membrane supported by four beams was fabricated and one end of the PET lever was attached to the center of the membrane surface. The other end of the lever was free for electrostatic force generation. Only a low voltage DC source was required for the whole sensor, rather than sophisticated driving circuits. The lever magnified the electrostatic force effecting upon the force meter, and thus the output of the sensor was large enough for a simple processing circuit to be sufficient, rather than requiring complicated instruments. Characteristics of the sensor formation make it appropriate to adopt this sensor in various applications, in particular in high voltage power systems monitoring and meteorology measurements. The experiment results showed agreement with simulation results of the sensor. Sensitivity of the prototype of this sensor was 0.06  √mV (kV · m-1)-1 which can be greatly promoted by design optimization and fabrication improvement.

  8. Threat by association: do distant intergroup threats carry-over into local intolerance?

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  9. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  10. Is There Future Utility in Nuclear Weapons Nuclear Weapons Save Lives

    Science.gov (United States)

    2014-02-13

    February 2014 DISTRIBUTION A. Approved for public release: distribution unlimited DISCLAIMER The views expressed in this academic research...the capability of other states and the potential threat, not in perceived intent. Intent can change. It would equate to military malpractice to

  11. Parrotfish grazing ability: interspecific differences in relation to jaw-lever mechanics and relative weight of adductor mandibulae on an Okinawan coral reef.

    Science.gov (United States)

    Nanami, Atsushi

    2016-01-01

    Parrotfishes (family Labridae: Scarini) are regarded to have important roles for maintaining the ecosystem balance in coral reefs due to their removal of organic matter and calcic substrates by grazing. The purpose of the present study was to clarify the interspecific differences in grazing ability of five parrotfish species (Chlorurus sordidus, C. bowersi, Scarus rivulatus, S. niger and S. forsteni) in relation to interspecific differences in jaw-lever mechanics and the relative weight of the adductor mandibulae (muscles operating jaw closing). The grazing ability was calculated by using stomach contents (CaCO3 weight/organic matter weight) defined as the grazing ability index (GAI). There were significant interspecific differences in GAI (C. sordidus = C. bowersi > S. rivulatus > S. niger = S. forsteni). Teeth of C. sordidus and C. bowersi were protrusive-shape whereas teeth of S. rivulatus, S. niger and S. forsteni were flat-shape. C. sordidus and C. bowersihave jaw-lever mechanics producing a greater biting force and have a larger weight of adductor mandibulae. S. rivulatus has jaw-lever mechanics producing a greater biting force but a smaller weight of adductor mandibulae that produce an intermediate biting force. In contrast, S. niger and S. forsteni have jaw-lever mechanics producing a lesser biting force and have a smaller weight of adductor mandibulae. Feeding rates and foray size of S. rivulatus, S. niger and S. forsteni were greater than C. sordidus and C. bowersi. The degree in bioerosion (GAI × feeding rate) was the largest for S. rivulatusand the smallest for S. forsteni. The degree in bioerosion for C. sordidus was larger than S. niger whereas relatively equal between C. bowersi and S. niger. These results suggest that interspecific difference in GAI was explained by interspecific differences in teeth shape, jaw-lever mechanics and relative weight of adductor mandibulae. The interspecific difference in the degree of bioerosion suggests the

  12. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat

  13. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat cuein

  14. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-01-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  15. Reducing weapon-carrying among urban American Indian young people.

    Science.gov (United States)

    Bearinger, Linda H; Pettingell, Sandra L; Resnick, Michael D; Potthoff, Sandra J

    2010-07-01

    To examine the likelihood of weapon-carrying among urban American Indian young people, given the presence of salient risk and protective factors. The study used data from a confidential, self-report Urban Indian Youth Health Survey with 200 forced-choice items examining risk and protective factors and social, contextual, and demographic information. Between 1995 and 1998, 569 American Indian youths, aged 9-15 years, completed surveys administered in public schools and an after-school program. Using logistic regression, probability profiles compared the likelihood of weapon-carrying, given the combinations of salient risk and protective factors. In the final models, weapon-carrying was associated significantly with one risk factor (substance use) and two protective factors (school connectedness, perceiving peers as having prosocial behavior attitudes/norms). With one risk factor and two protective factors, in various combinations in the models, the likelihood of weapon carrying ranged from 4% (with two protective factors and no risk factor in the model) to 80% of youth (with the risk factor and no protective factors in the model). Even in the presence of the risk factor, the two protective factors decreased the likelihood of weapon-carrying to 25%. This analysis highlights the importance of protective factors in comprehensive assessments and interventions for vulnerable youth. In that the risk factor and two protective factors significantly related to weapon-carrying are amenable to intervention at both individual and population-focused levels, study findings offer a guide for prioritizing strategies for decreasing weapon-carrying among urban American Indian young people. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  16. Bullying and weapon carrying: a meta-analysis.

    Science.gov (United States)

    van Geel, Mitch; Vedder, Paul; Tanilon, Jenny

    2014-08-01

    Studies suggest that adolescents involved in bullying are more likely to carry weapons than their uninvolved peers. To use meta-analyses to determine whether victims, bullies, and bully-victims are more likely to carry weapons than uninvolved peers. PsycINFO, ERIC, MEDLINE, LILACS, EMBASE, and Dissertation Abstracts International were searched for relevant publications (1950 through January 2014). The reference list of a review article and reference lists of retrieved articles were checked for further relevant studies. Studies were included if they provided an effect size comparing the weapon carrying of adolescent victims, bullies, or bully-victims with that of uninvolved peers. Studies that included individuals older than 21 years were excluded, as were studies that focused on incarcerated youth or youth diagnosed as having a psychopathologic condition. Studies were coded independently by 2 of us. The agreement rate was 93%. Effect sizes were coded that compared victims, bullies, or bully-victims with uninvolved peers. Meta-analyses were based on 22 studies for victims (n = 257 179), 15 studies for bullies (n = 236 145), and 8 studies for bully-victims (n = 199 563). This study focused on weapon carrying among adolescents. Hypotheses were formulated before the study. Victims (odds ratio, 1.97; 95% CI, 1.62-2.39), bullies (3.25; 2.72-3.89), and bully-victims (4.95; 3.77-6.50) were more likely to carry weapons than uninvolved peers. Analyses provided no indication of publication bias. Studies conducted in the United States found stronger relations between being a bully-victim and weapon carrying (odds ratio, 7.84; 95% CI, 6.02-10.21) than studies from other countries (3.62; 2.30-5.68; Q1 = 8.401; P = .004). Involvement in bullying as a victim, bully, or bully-victim is related to weapon carrying.

  17. Why are U.S. nuclear weapon modernization efforts controversial?

    Science.gov (United States)

    Acton, James

    2016-03-01

    U.S. nuclear weapon modernization programs are focused on extending the lives of existing warheads and developing new delivery vehicles to replace ageing bombers, intercontinental ballistic missiles, and ballistic missile submarines. These efforts are contested and controversial. Some critics argue that they are largely unnecessary, financially wasteful and potentially destabilizing. Other critics posit that they do not go far enough and that nuclear weapons with new military capabilities are required. At its core, this debate centers on three strategic questions. First, what roles should nuclear weapons be assigned? Second, what military capabilities do nuclear weapons need to fulfill these roles? Third, how severe are the unintended escalation risks associated with particular systems? Proponents of scaled-down modernization efforts generally argue for reducing the role of nuclear weapons but also that, even under existing policy, new military capabilities are not required. They also tend to stress the escalation risks of new--and even some existing--capabilities. Proponents of enhanced modernization efforts tend to advocate for a more expansive role for nuclear weapons in national security strategy. They also often argue that nuclear deterrence would be enhanced by lower yield weapons and/or so called bunker busters able to destroy more deeply buried targets. The debate is further fueled by technical disagreements over many aspects of ongoing and proposed modernization efforts. Some of these disagreements--such as the need for warhead life extension programs and their necessary scope--are essentially impossible to resolve at the unclassified level. By contrast, unclassified analysis can help elucidate--though not answer--other questions, such as the potential value of bunker busters.

  18. Study on Interference Effect of Warship Close-in Defense Dazzling Weapon%舰载近区防卫眩目武器干扰效果研究

    Institute of Scientific and Technical Information of China (English)

    佘博; 李进军; 汪德虎

    2015-01-01

    眩目武器是水面舰艇防卫近区非对称威胁目标的新型武器,其作战效果分析和作战运用研究是新的课题。分析眩目武器的作用机理,建立了眩目武器干扰效果分析模型,并在仿真计算结果分析的基础上提出了眩目武器运用的一般原则和方法,可以为相关的指挥决策提供一定的借鉴和指导。%Dazzling weapon is a new weapon for Surface ships to defense the targets of asymmetric threats,operational effectiveness analysis and operational application of Dazzling weapon are also the new subject.Due to this purpose,analyzing mechanism of dazzling weapon,and the models of interference effect are also established.Based on the simulation results,putting forward the general principles and methods of using the dazzling weapon,which can provide some reference and guidance for the associated command and decision-making.

  19. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  20. Perception of the Threat of Terrorism.

    Science.gov (United States)

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat. © The Author(s) 2016.

  1. Sociocultural perspectives on threats, risks, and health

    Science.gov (United States)

    Patricia L. Winter; Jonathan W. Long; Frank K. Lake

    2014-01-01

    Sociocultural perspectives on threats, risks, and health are explored in this chapter. The authors begin with a discussion of the linkages between well-being in the Sierra Nevada ecosystem and public health and well-being to set the context of socioecological resilience. This is followed by a summary of how trust and confidence influence the management of threats and...

  2. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  3. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. Cosmic Impacts: The DoomsDay Threat

    Science.gov (United States)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  6. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  7. Security threats categories in healthcare information systems.

    Science.gov (United States)

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  8. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    Science.gov (United States)

    Bell, William C; Dallas, Cham E

    2007-01-01

    Background The threat posed by the use of weapons of mass destruction (WMD) within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this outcome would be the probable loss

  9. Vulnerability of populations and the urban health care systems to nuclear weapon attack – examples from four American cities

    Directory of Open Access Journals (Sweden)

    Dallas Cham E

    2007-02-01

    Full Text Available Abstract Background The threat posed by the use of weapons of mass destruction (WMD within the United States has grown significantly in recent years, focusing attention on the medical and public health disaster capabilities of the nation in a large scale crisis. While the hundreds of thousands or millions of casualties resulting from a nuclear weapon would, in and of itself, overwhelm our current medical response capabilities, the response dilemma is further exacerbated in that these resources themselves would be significantly at risk. There are many limitations on the resources needed for mass casualty management, such as access to sufficient hospital beds including specialized beds for burn victims, respiration and supportive therapy, pharmaceutical intervention, and mass decontamination. Results The effects of 20 kiloton and 550 kiloton nuclear detonations on high priority target cities are presented for New York City, Chicago, Washington D.C. and Atlanta. Thermal, blast and radiation effects are described, and affected populations are calculated using 2000 block level census data. Weapons of 100 Kts and up are primarily incendiary or radiation weapons, able to cause burns and start fires at distances greater than they can significantly damage buildings, and to poison populations through radiation injuries well downwind in the case of surface detonations. With weapons below 100 Kts, blast effects tend to be stronger than primary thermal effects from surface bursts. From the point of view of medical casualty treatment and administrative response, there is an ominous pattern where these fatalities and casualties geographically fall in relation to the location of hospital and administrative facilities. It is demonstrated that a staggering number of the main hospitals, trauma centers, and other medical assets are likely to be in the fatality plume, rendering them essentially inoperable in a crisis. Conclusion Among the consequences of this

  10. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  11. Stereotype threat prevents perceptual learning.

    Science.gov (United States)

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  12. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  13. Challenges in the application of modular open system architecture to weapons

    Science.gov (United States)

    Shaver, Jonathan; Rose, Leo; Young, Quinn; Christensen, Jacob

    2016-05-01

    The overarching objective for Flexible Weapons is to replace current inventory weapons that will not fully utilize the increased capabilities of 6th generation platforms, with a single weapons kit made up of flexible, open architecture components. Flexible Weapon will develop a common architecture to enable modular subsystems to achieve flexible weapons capability while allowing technology refresh at the pace of technology discovery in an affordable and sustainable design. The various combinations of weapons to address multiple missions must be 100% compatible with 6th generation delivery platforms (fighters, bombers, RPAs) and backwards compatible with 4th and 5th generation platforms.

  14. FEATURES ADMINISTRATIVE VIOLATIONS IN THE WEAPONS CIRCULATION SPHERE

    Directory of Open Access Journals (Sweden)

    Lyatsa A. KODZOKOVA

    2016-01-01

    Full Text Available Any offense in the area of arms trafficking is the increased danger. On the one hand, the guilty person through weapons reinforces the illegality or even facilitates the commission of their illegal actions, on the other hand, these activities cause significant harm to individuals and society. Offences related to illicit trafficking in arms (activity without the necessary licenses and permits, for the most part involve criminal responsibility (Article 222 -..225 of the Criminal Code, etc., but some violations in this area is not covered by criminlaw. In these cases, the violators shall apply administrative sanctions (for example, when sending weapons, the illicit manufacture of pneumatic weapons, etc.. Specificity of weapons is that it is endowed with certain peculiar features of quality, depending on which branch of law regulates its turnover. Currently, the legal regime of weapons is regulated by several branches of law (civil, administrative, military, criminal, etc., Each of which considers it based on the specifics of its subject and method, and has its own legal framework, regulating the circulation of arms.

  15. Chemical and biological weapons in the 'new wars'.

    Science.gov (United States)

    Ilchmann, Kai; Revill, James

    2014-09-01

    The strategic use of disease and poison in warfare has been subject to a longstanding and cross-cultural taboo that condemns the hostile exploitation of poisons and disease as the act of a pariah. In short, biological and chemical weapons are simply not fair game. The normative opprobrium is, however, not fixed, but context dependent and, as a social phenomenon, remains subject to erosion by social (or more specifically, antisocial) actors. The cross cultural understanding that fighting with poisons and disease is reprehensible, that they are taboo, is codified through a web of interconnected measures, principal amongst these are the 1925 Geneva Protocol; the Biological Weapons Convention; and the Chemical Weapons Convention. Whilst these treaties have weathered the storm of international events reasonably well, their continued health is premised on their being 'tended to' in the face of contextual changes, particularly facing changes in science and technology, as well as the changed nature and character of conflict. This article looks at the potential for normative erosion of the norm against chemical and biological weapons in the face of these contextual changes and the creeping legitimization of chemical and biological weapons.

  16. Biophysics and medical effects of enhanced radiation weapons.

    Science.gov (United States)

    Reeves, Glen I

    2012-08-01

    Enhanced radiation weapons (ERW) are fission-fusion devices where the massive numbers of neutrons generated during the fusion process are intentionally allowed to escape rather than be confined to increase yield (and fallout products). As a result, the energy partition of the weapon output shifts from blast and thermal energies toward prompt radiation. The neutron/gamma output ratio is also increased. Neutrons emitted from ERW are of higher energy than the Eave of neutrons from fission weapons. These factors affect the patterns of injury distribution; delay wound healing in combined injuries; reduce the therapeutic efficacy of medical countermeasures; and increase the dose to radiation-only casualties, thus potentiating the likelihood of encountering radiation-induced incapacitation. The risk of radiation-induced carcinogenesis is also increased. Radiation exposure to first responders from activation products is increased over that expected from a fission weapon of similar yield. However, the zone of dangerous fallout is significantly reduced in area. At least four nations have developed the potential to produce such weapons. Although the probability of detonation of an ERW in the near future is very small, it is nonzero, and clinicians and medical planners should be aware of the medical effects of ERW.

  17. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  18. USAF Weapons Of Mass Destruction (WMD) Threat Planning And Response Handbook - Air Force Handbook 10-2502

    Science.gov (United States)

    2006-05-31

    Yes V IR U S Lassa fever Aerosol Low to moder- ate 10-14 days Unknown No No Yes Omsk hemor- rhagic fever Sabotage (water) aerosol Negligi...S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES The original document...Develop- ment Yes Yes Tularemia Aerosol No 2-10 days Moderate if untreated Yes (IND*) Yes Yes B A C T E R IA Typhoid fever Sabotage food/water

  19. Applications of Quantum Cascade Laser Scanners for Remote Detection of Chemical and Biological Threats and Weapons of Mass Destruction

    Science.gov (United States)

    2014-07-09

    tested were detected in the field with a minimum of 500 ng∕cm2 [20]. OPUS 6.0™ software package for data acquisition and analysis (Bruker Optics...residuals versus Hotelling’s T2 plot on PLS Toolbox™ software for MATLAB®. According to the plot, the data with both high-residual variance and high...will recruit students at Universidad Metropolitana, a Hispanic Serving Institution in San Juan, Puerto Rico and offer a program during the academic

  20. Pyro-Terrorism -- The Threat of Arson Induced Forest Fires as a Future Terrorist Weapon of Mass Destruction

    Science.gov (United States)

    2005-01-01

    During World War II, There was concern that further [Japanese] attacks could bring disastrous loss of life and destruction of property. There was...Goebel, Greg, The Fire Balloons. V 1.0.2. 01 Jun 04 available at http://www.vectorsite.net/avfusen.html . 29 Goleta Montessori School website on Goleta