Sample records for tactical nuclear warfare

  1. War gaming for strategic and tactical nuclear warfare. January 1970-January 1988 (citations from the NTIS data base). Report for January 1970-January 1988

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1988-01-01

    This bibliography contains citations concerning non-quick war gaming for strategic and tactical nuclear warfare. Analyses and comparative evaluations, based upon computerized simulations, are considered as are manuals and specification for the various computer programs employed. Stage 64 and Satan II and III are covered prominently. (This updated bibliography contains 356 citations, 36 of which are new entries to the previous edition.)

  2. Soviet Tactical Doctrine for Urban Warfare

    DTIC Science & Technology

    1975-12-01

    for Chemical and Radiation Specialists . . . 0 a . a. . . . . &. . . . .&. 120 5. Soviet Guidelines for the Logistician . . . . . . 122 6. Soviet...conducted with or without the employment of nuclear or chemical weapons although the Soviets emphasize the integrity, flexibility and duality of tactical...concepts and that future wars will entail nuclear, chemical and con- ventional operations. " From the materials reviewed in this study, Soviet treatment

  3. National policy and military doctrine: development of a nuclear concept of land warfare, 1949-1964

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bockar, D.

    In the thirty years that battle field nuclear weapons have been available, no one has originated an idea of how they might be used as an entirely new weapon. New weapons are routinely introduced into existing combat organizations before an appropriate tactical concept has been invented. But never before in history has a new weapon been deployed on so massive a scale without a tactical concept that exploited the radical implications of its novel technology for traditional warfare. This study is an attempt to understand the problem of developing a persuasive tactical concept for nuclear weapons. The process of assimilationmore » by which military organizations integrate new weapons with existing weapons in novel tactical and organizational concepts has an intellectual, and institutional, and a political dimension. The principle of civilian control, however, makes the process by which weapons are assimilated part of the process by which national security policies are made. In peacetime the military's formulation of doctrine is almost entirely consequent upon the world view, the methodological and managerial assumptions, and the domestic policy concerns of political authority.« less

  4. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    PubMed

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  5. Postural Stability of Special Warfare Combatant-Craft Crewmen With Tactical Gear.

    PubMed

    Morgan, Paul M; Williams, Valerie J; Sell, Timothy C

    The US Naval Special Warfare's Special Warfare Combatant-Craft Crewmen (SWCC) operate on small, high-speed boats while wearing tactical gear (TG). The TG increases mission safety and success but may affect postural stability, potentially increasing risk for musculoskeletal injury. Therefore, the purpose of this study was to examine the effects of TG on postural stability during the Sensory Organization Test (SOT). Eight SWCC performed the SOT on NeuroCom's Balance Manager with TG and with no tactical gear (NTG). The status of gear was performed in randomized order. The SOT consisted of six different conditions that challenge sensory systems responsible for postural stability. Each condition was performed for three trials, resulting in a total of 18 trials. Overall performance, each individual condition, and sensory system analysis (somatosensory, visual, vestibular, preference) were scored. Data were not normally distributed therefore Wilcoxon signed-rank tests were used to compare each variable (ρ = .05). No significant differences were found between NTG and TG tests. No statistically significant differences were detected under the two TG conditions. This may be due to low statistical power, or potentially insensitivity of the assessment. Also, the amount and distribution of weight worn during the TG conditions, and the SWCC's unstable occupational platform, may have contributed to the findings. The data from this sample will be used in future research to better understand how TG affects SWCC. The data show that the addition of TG used in our study did not affect postural stability of SWCC during the SOT. Although no statistically significant differences were observed, there are clinical reasons for continued study of the effect of increased load on postural stability, using more challenging conditions, greater surface perturbations, dynamic tasks, and heavier loads. 2016.

  6. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  7. Tactical Nuclear Weapons: Their Purpose and Placement

    DTIC Science & Technology

    2015-06-01

    War II, nuclear scientists argued against the development of fusion weapons .3 In the 1970s, politicians debated the use of neutron bombs, weapons ...Tactical Nuclear Weapons : Their Purpose and Placement BY EDWARD G. FERGUSON A THESIS SUBMITTED TO THE FACULTY OF THE...This study answers the question -- Why does America have tactical nuclear weapons (TNWs) in Europe today? – treating America and the North

  8. Evolution of United States and NATO tactical nuclear doctrine and limited nuclear war options, 1949-1964. Master's thesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiorano, A.G.

    The debate over nuclear weapons in Europe and their utility as part of NATO's forward defense strategy persisted since the mid-1950s. Existing tactical nuclear employment doctrine and strategies are based on obsolete criteria and defense concepts established when the U.S. possessed superiority in nearly all nuclear categories. NATO has allowed its tactical nuclear doctrine and arsenal of battlefield nuclear weapons to deteriorate, choosing instead to rely on the American strategic nuclear umbrella for all but the most localized of conflicts. This thesis examines the development, stagnation and decline of NATO tactical nuclear doctrine and strategy from 1949 to 1984. Itmore » analyzes four tactical nuclear postures, drawing from each to recommend a viable tactical nuclear strategy for NATO today. The presence and potential employment of tactical nuclear weapons make it imperative that NATO devise an effective limited nuclear war strategy.« less

  9. Chemical warfare, past and future. Study project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tzihor, A.

    1992-05-15

    World War I was arena for the first use of chemical warfare. The enormous tactical success brought about by this first time use of chemical weapons caused the continued development of more sophisticated tactics and weapons in this category of unconventional warfare. This phenomenon has carried through to today. However, at present, because of technological developments, the global economic situation, and political factors, coupled with the inability of the western world to control the proliferation of chemical weapons, a situation weapon of mass destruction. Recent use by Iraq against Kurdish civilian indicates that chemical warfare is no longer limited tomore » the battlefield. The western nations have a need to understand the risk. This paper conducts an analysis of past lessons and the factors which will affect the use of chemical warfare in the future. From this analysis, the paper reaches conclusions concerning the significant threat chemical weapons pose for the entire world in the not too distant future.« less

  10. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  11. Towards a tactical nuclear weapons treaty? Is There a Role of IAEA Tools of Safeguards?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saunders, Emily C.; Rowberry, Ariana N.; Fearey, Bryan L.

    2012-07-12

    In recent years, there is growing interest in formal negotiations on non-strategic or tactical nuclear weapons. With the negotiations of New START, there has been much speculation that a tactical nuclear weapons treaty should be included in the follow on to New START. This paper examines the current policy environment related to tactical weapons and some of the issues surrounding the definition of tactical nuclear weapons. We then map out the steps that would need to be taken in order to begin discussions on a tactical nuclear weapons treaty. These steps will review the potential role of the IAEA inmore » verification of a tactical nuclear weapons treaty. Specifically, does IAEA involvement in various arms control treaties serve as a useful roadmap on how to overcome some of the issues pertaining to a tactical nuclear weapons treaty?« less

  12. Soldiers’ Psychological Responses to Tactical Nuclear Warfare

    DTIC Science & Technology

    1992-02-01

    530. Greene , T.L. (1987). Description of a nuclear battlefield. In R.H. Young & B.H. Drum (Edo.), Proceedings of the Defense Nuclear Agency Symposium...ATTN: DEPT OF BEHAVOR SCI & LEADERSHIP ATTN: PMS/PMA-423 ATTN: DEPT OF PHYSICS COL J G CAMPBELL ATTN: SCIENCE RESEARCH LAB OPERATIONAL TEST & EVALUATION

  13. Public Discussion of Nuclear Warfare: A Time for Hope.

    ERIC Educational Resources Information Center

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  14. Naval Warfare

    DTIC Science & Technology

    2010-03-01

    Naval Doctrine Publication 1 Naval Warfare March 2010 Doctrine The only satisfactory method of ensuring unity of effort lies in due...LCDR Dudley W. Knox, USN “The Role of Doctrine in Naval Warfare” U.S. Naval Institute Proceedings, 1915 01 March 2010 FOREWORD United States (US...naval doctrine is the foundation upon which our tactics, techniques, and procedures are built. It articulates operational concepts that govern the

  15. Computer-Assisted Performance Evaluation for Navy Anti-Air Warfare Training: Concepts, Methods, and Constraints.

    ERIC Educational Resources Information Center

    Chesler, David J.

    An improved general methodological approach for the development of computer-assisted evaluation of trainee performance in the computer-based simulation environment is formulated in this report. The report focuses on the Tactical Advanced Combat Direction and Electronic Warfare system (TACDEW) at the Fleet Anti-Air Warfare Training Center at San…

  16. Nuclear-effects model embedded stochastically in simulation (NEMESIS) summary report. Technical paper

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youngren, M.A.

    1989-11-01

    An analytic probability model of tactical nuclear warfare in the theater is presented in this paper. The model addresses major problems associated with representing nuclear warfare in the theater. Current theater representations of a potential nuclear battlefield are developed in context of low-resolution, theater-level models or scenarios. These models or scenarios provide insufficient resolution in time and space for modeling a nuclear exchange. The model presented in this paper handles the spatial uncertainty in potentially targeted unit locations by proposing two-dimensional multivariate probability models for the actual and perceived locations of units subordinate to the major (division-level) units represented inmore » theater scenarios. The temporal uncertainty in the activities of interest represented in our theater-level Force Evaluation Model (FORCEM) is handled through probability models of the acquisition and movement of potential nuclear target units.« less

  17. Nuclear Weapons Effects on Army Tactical Systems. Volume 1. Overview

    DTIC Science & Technology

    1979-04-01

    UNCLASSI I I E >D ICV.RI , CLAISGFICAIO04 or TRIS v f, I t’,, *I tn, ) REPORT DOCUMENTATION PAGE ..... ro"..,T.UV IOR REP041 UM"ER . oOVI ACCESSION NO...Effects on Archimy. e ~ Tactical System!p- e . -,- o 0. CON . on GRANT NUMBER(., Joseph J. Halpin (also ed.) John P. Swirczynski (also ed.) D 212 112...THIS PAGE(7h"n Va0m Ent..’. E ) FOREWORD This document describes the general insights and the key issues for the nuclear survivability of tactical

  18. Small Ships Revival: From Cold War Anti-Invasion and Guerrilla Warfare Tactics to Highly Capable Force Multiplier in Littoral and Expeditionary Warfare

    DTIC Science & Technology

    2010-05-03

    this gap might be filled. It will focus on the surface warfare aspect of sea control, though it touches on antiair warfare, mine warfare and...Sea As the flotilla acquired battle power […] the vital, most difficult, and most absorbing problem has become not how to increase the power of a...proving that their performance is absolutely necessary to these operations. Com Fr Amphib TG of the NATO Reaction Force-8 after Exercise Brilliant Midas

  19. Design and implementation of intelligent electronic warfare decision making algorithm

    NASA Astrophysics Data System (ADS)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  20. War-Gaming Network-Centric Warfare

    DTIC Science & Technology

    2001-01-01

    games as well. 6 2 N A V A L W A R C O L L E G E R E V I E W War games are also classified...traditional gaming . All war games , whether they involve fighting sail R U B E L 6 3 Until a tactical network of units, each of them exercising a great degree... gaming and simulation. R U B E L 6 5 The principal requirements for achieving network-centric warfare are a network and shared awareness. By a

  1. Electronic warfare microwave components

    NASA Astrophysics Data System (ADS)

    Cosby, L. A.

    1984-09-01

    The current and projected state-of-the-art for electronic warfare (EW) microwave components is reviewed, with attention given to microwave components used extensively in EW systems for reconnaissance, threat warning, direction finding, and repeater jamming. It is emphasized that distributed EW systems must be able to operate from manned tactical and strategic platforms, with requirements including remote aerospace and space elements, as well as the need for expandable devices for detection, location, and denial/deception functions. EW coordination, or battle management, across a distributed system is a rapidly emerging requirement that must be integrated into current and projected command-and-control programs.

  2. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  3. Asymmetric Warfare in the Simulation and Training Environment: Comprehensive Approach Wanted!

    DTIC Science & Technology

    2009-10-01

    Covering Support to Operations, Human Behaviour Representation, Irregular Warfare, Defence against Terrorism and Coalition Tactical Force Integration...learned behaviours arising from shared knowledge and it is passed on from one generation to the next. The behaviours that have become embedded as part of...symbols and behaviours . While culture changes, the change is usually slow, particularly in terms of military operations timeframes. Urban environments

  4. Chemical warfare agents

    PubMed Central

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  5. Genetically modified plants for tactical systems applications

    NASA Astrophysics Data System (ADS)

    Stewart, C. Neal, Jr.

    2002-08-01

    Plants are ubiquitous in the environment and have the ability to respond to their environment physiologically and through altered gene expression profiles (they cannot walk away). In addition, plant genetic transformation techniques and genomic information in plants are becoming increasingly advanced. We have been performing research to express the jellyfish green fluorescent protein (GFP) in plants. GFP emits green light when excited by blue or UV light. In addition, my group and collaborators have developed methods to detect GFP in plants by contact instruments and at a standoff. There are several tactical uses for this technology. Some obvious applications are using plants as sentinels for detecting biological and chemical warfare agents or their derivatives from a remote platform, as well as detecting explosives. Another tactical application is covert monitoring using individual plants. Different methods to detect GFP in transgenic plants will be discussed.

  6. A Concurrent Distributed System for Aircraft Tactical Decision Generation

    NASA Technical Reports Server (NTRS)

    McManus, John W.

    1990-01-01

    A research program investigating the use of artificial intelligence (AI) techniques to aid in the development of a Tactical Decision Generator (TDG) for Within Visual Range (WVR) air combat engagements is discussed. The application of AI programming and problem solving methods in the development and implementation of a concurrent version of the Computerized Logic For Air-to-Air Warfare Simulations (CLAWS) program, a second generation TDG, is presented. Concurrent computing environments and programming approaches are discussed and the design and performance of a prototype concurrent TDG system are presented.

  7. A comparison of lightning and nuclear electromagnetic pulse response of tactical shelters

    NASA Technical Reports Server (NTRS)

    Perala, R. A.; Rudolph, T. H.; Mckenna, P. M.

    1984-01-01

    The internal response (electromagnetic fields and cable responses) of tactical shelters is addressed. Tactical shelters are usually well-shielded systems. Apart from penetrations by signal and power lines, the main leakage paths to the interior are via seams and the environment control unit (ECU) honeycomb filter. The time domain in three-dimensional finite-difference technique is employed to determine the external and internal coupling to a shelter excited by nuclear electromagnetic pulses (NEMP) and attached lightning. The responses of interest are the internal electromagnetic fields and the voltage, current, power, and energy coupled to internal cables. Leakage through the seams and ECU filter is accomplished by their transfer impedances which relate internal electric fields to external current densities. Transfer impedances which were experimentally measured are used in the analysis. The internal numerical results are favorably compared to actual shelter test data under simulated NEMP illumination.

  8. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    DTIC Science & Technology

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  9. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  10. APSTNG: neutron interrogation for detection of explosives, drugs, and nuclear and chemical warfare materials

    NASA Astrophysics Data System (ADS)

    Rhodes, Edgar A.; Peters, Charles W.

    1993-02-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14- MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma-rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators.

  11. Artificial intelligence (AI) based tactical guidance for fighter aircraft

    NASA Technical Reports Server (NTRS)

    Mcmanus, John W.; Goodrich, Kenneth H.

    1990-01-01

    A research program investigating the use of artificial intelligence (AI) techniques to aid in the development of a Tactical Decision Generator (TDG) for Within Visual Range air combat engagements is discussed. The application of AI programming and problem solving methods in the development and implementation of the Computerized Logic For Air-to-Air Warfare Simulations (CLAWS), a second generation TDG, is presented. The knowledge-based systems used by CLAWS to aid in the tactical decision-making process are outlined in detail, and the results of tests to evaluate the performance of CLAWS versus a baseline TDG developed in FORTRAN to run in real time in the Langley Differential Maneuvering Simulator, are presented. To date, these test results have shown significant performance gains with respect to the TDG baseline in one-versus-one air combat engagements, and the AI-based TDG software has proven to be much easier to modify and maintain than the baseline FORTRAN TDG programs.

  12. Fluorescent sensors for the detection of chemical warfare agents.

    PubMed

    Burnworth, Mark; Rowan, Stuart J; Weder, Christoph

    2007-01-01

    Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.

  13. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  14. USN/USMC Antiair Warfare and Command, Control and Communications for Amphibious Operations

    DTIC Science & Technology

    1992-03-01

    NUMBERS W’Vf~ * ic0"W O plows k; to., W..ia 0;41 40A.YWfI 11 TITLE (Inclucle Securily CiaSsifkcaticin) U8N/U8SUC Antiuar Warflire and4 CommaskC~Ual...the CWC to be a manager of all the warfare areas and frees him from becoming entangled in one tactical problem while another grows undetected elsewhere...hostile enemy actions (i.e., jamming) the potential begins to decrease rapidly . [Ref. 19:pp. 185-194] F. MARINE CORPS PRINCIPLES OF AAW There are three

  15. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  16. Mammalian Toxicology Testing: Problem Definition Study, Global Army Toxicology Requirements.

    DTIC Science & Technology

    1981-03-01

    Electronic Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation...Fighting Portable Weapon (for IFV) Smoke Grenade Launcher Staff Smart, Target-Activated Fire-and-Forget Tactical ECK System (63755A) Protective Electronic...Warfare Equipment (D251) Tactical ECK System (64750A) Protective Electronic Warfare Equipment (D540) High Energy Electromagnetic Radiation Weapons (e.g

  17. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  18. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    DTIC Science & Technology

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  19. The Handicap Principle, Strategic Information Warfare and the Paradox of Asymmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma, Zhanshan; Sheldon, Frederick T; Krings, Axel

    2010-01-01

    The term asymmetric threat (or warfare) often refers to tactics utilized by countries, terrorist groups, or individuals to carry out attacks on a superior opponent while trying to avoid direct confrontation. Information warfare is sometimes also referred to as a type of asymmetric warfare perhaps due to its asymmetry in terms of cost and efficacy. Obviously, there are differences and commonalities between two types of asymmetric warfare. One major difference lies in the goal to avoid confrontation and one commonality is the asymmetry. Regardless, the unique properties surrounding asymmetric warfare warrant a strategic-level study. Despite enormous studies conducted in themore » last decade, a consensus on the strategy a nation state should take to deal with asymmetric threat seems still intriguing. In this article, we try to shed some light on the issue from the handicap principle in the context of information warfare. The Handicap principle was first proposed by Zahavi (1975) to explain the honesty or reliability of animal communication signals. He argued that in a signaling system such as one used in mate selection, a superior male is able to signal with a highly developed "handicap" to demonstrate its quality, and the handicap serves "as a kind of (quality) test imposed on the individual" (Zahavi 1975, Searcy and Nowicki 2005). The underlying thread that inspires us for the attempt to establish a connection between the two apparently unrelated areas is the observation that competition, communication and cooperation (3C), which are three fundamental processes in nature and against which natural selection optimize living things, may also make sense in human society. Furthermore, any communication networks, whether it is biological networks (such as animal communication networks) or computer networks (such as the Internet) must be reasonably reliable (honest in the case of animal signaling) to fulfill its missions for transmitting and receiving messages. The

  20. Toxic Warfare

    DTIC Science & Technology

    2002-02-01

    Prepared for the United States Air Force Approved for public release; distribution unlimited Theodore Karasik Project AIR FORCE R TOXIC WARFARE...Report Documentation Page Report Date 000002002 Report Type N/A Dates Covered (from... to) - Title and Subtitle Toxic Warfare Contract Number Grant...310) 451-6915; Email: order@rand.org Library of Congress Cataloging-in-Publication Data Karasik, Theodore William. Toxic warfare / Theodore Karasik

  1. Artificial Intelligence (AI) Based Tactical Guidance for Fighter Aircraft

    NASA Technical Reports Server (NTRS)

    McManus, John W.; Goodrich, Kenneth H.

    1990-01-01

    A research program investigating the use of Artificial Intelligence (AI) techniques to aid in the development of a Tactical Decision Generator (TDG) for Within Visual Range (WVR) air combat engagements is discussed. The application of AI programming and problem solving methods in the development and implementation of the Computerized Logic For Air-to-Air Warfare Simulations (CLAWS), a second generation TDG, is presented. The Knowledge-Based Systems used by CLAWS to aid in the tactical decision-making process are outlined in detail, and the results of tests to evaluate the performance of CLAWS versus a baseline TDG developed in FORTRAN to run in real-time in the Langley Differential Maneuvering Simulator (DMS), are presented. To date, these test results have shown significant performance gains with respect to the TDG baseline in one-versus-one air combat engagements, and the AI-based TDG software has proven to be much easier to modify and maintain than the baseline FORTRAN TDG programs. Alternate computing environments and programming approaches, including the use of parallel algorithms and heterogeneous computer networks are discussed, and the design and performance of a prototype concurrent TDG system are presented.

  2. German Views of Irregular Warfare

    DTIC Science & Technology

    2015-06-01

    closely observed much of the Napoleonic Wars (1803–1815). His military experiences occurred during the end of the Age of Absolutism10 in Europe when...10 The Age of Absolutism refers to a period when absolute monarchs controlled much of Europe and is commonly considered to...concluded with a chapter related to irregular warfare and the nuclear age and an appendix dedicated to the training notes of the famed English

  3. Hybrid Warfare: the 21st Century Russian Way of Warfare

    DTIC Science & Technology

    2017-05-25

    in Ukraine, can be best understood by examining it in relation to the ideas and theories of such preeminent theorists as Sun Tzu and Carl von...theories of warfare, of which Russia’s hybrid warfare is one of the most recent. Writing over two thousand years ago, Sun Tzu stated, “The art of...warfare is deceit.”17 Sun Tzu continued, stating that the “highest excellence” in war was not in winning every battle, but in subduing the enemy’s

  4. Does the Economy or Surface Warfare Officer Career Pay Affect Surface Warfare Officer Retention?

    DTIC Science & Technology

    2014-12-01

    be a career SWO (Surface Warfare Enterprise, 2013). 6 Military pay was more important to men than women ...OR SURFACE WARFARE OFFICER CAREER PAY AFFECT SURFACE WARFARE OFFICER RETENTION? by Meagan B. Makarenko December 2014 Thesis Advisor...2014 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE DOES THE ECONOMY OR SURFACE WARFARE OFFICER CAREER PAY AFFECT

  5. Biological warfare agents

    PubMed Central

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  6. Forecasting the ocean optical environment in support of Navy mine warfare operations

    NASA Astrophysics Data System (ADS)

    Ladner, S. D.; Arnone, R.; Jolliff, J.; Casey, B.; Matulewski, K.

    2012-06-01

    A 3D ocean optical forecast system called TODS (Tactical Ocean Data System) has been developed to determine the performance of underwater LIDAR detection/identification systems. TODS fuses optical measurements from gliders, surface satellite optical properties, and 3D ocean forecast circulation models to extend the 2-dimensional surface satellite optics into a 3-dimensional optical volume including subsurface optical layers of beam attenuation coefficient (c) and diver visibility. Optical 3D nowcast and forecasts are combined with electro-optical identification (EOID) models to determine the underwater LIDAR imaging performance field used to identify subsurface mine threats in rapidly changing coastal regions. TODS was validated during a recent mine warfare exercise with Helicopter Mine Countermeasures Squadron (HM-14). Results include the uncertainties in the optical forecast and lidar performance and sensor tow height predictions that are based on visual detection and identification metrics using actual mine target images from the EOID system. TODS is a new capability of coupling the 3D optical environment and EOID system performance and is proving important for the MIW community as both a tactical decision aid and for use in operational planning, improving timeliness and efficiency in clearance operations.

  7. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  8. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  9. Pirates of the Nuclear Age: The Role of U.S. Submarines in Modern Trade Warfare

    DTIC Science & Technology

    2016-07-14

    have sought to influence the outcome of the conflict by targeting enemy commerce . This influence historically called for the use of privateers...submarines took the position of privateers as the ideal force for conducting commerce warfare. Throughout World War Two (WWII) commerce warfare using... commerce ) remains. From the time of Greek city-states, to the privateers of the age of sail, to the submarines of WWI and WWII, targeting the

  10. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  11. Chemical warfare agents.

    PubMed

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  12. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  13. Tactical Infrasound

    DTIC Science & Technology

    2005-05-01

    received briefings on a variety of infra - sonic sensor systenis. Materials were also received from the 2001 and 2002 Infrasonic Technology Workshops and...Systems to Tactical Acoustic Sys- tems One issue to be considered in the evaluation of a p)otential tactical infra - sonic system is the ability to...Communication range Fixed Fixed 5 km 7.4 A Design Approach for a Future Tactical Infra - sonic Sensor System This section describes a procedure used to

  14. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  15. From the laboratory to the soldier: providing tactical behaviors for Army robots

    NASA Astrophysics Data System (ADS)

    Knichel, David G.; Bruemmer, David J.

    2008-04-01

    The Army Future Combat System (FCS) Operational Requirement Document has identified a number of advanced robot tactical behavior requirements to enable the Future Brigade Combat Team (FBCT). The FBCT advanced tactical behaviors include Sentinel Behavior, Obstacle Avoidance Behavior, and Scaled Levels of Human-Machine control Behavior. The U.S. Army Training and Doctrine Command, (TRADOC) Maneuver Support Center (MANSCEN) has also documented a number of robotic behavior requirements for the Army non FCS forces such as the Infantry Brigade Combat Team (IBCT), Stryker Brigade Combat Team (SBCT), and Heavy Brigade Combat Team (HBCT). The general categories of useful robot tactical behaviors include Ground/Air Mobility behaviors, Tactical Mission behaviors, Manned-Unmanned Teaming behaviors, and Soldier-Robot Interface behaviors. Many DoD research and development centers are achieving the necessary components necessary for artificial tactical behaviors for ground and air robots to include the Army Research Laboratory (ARL), U.S. Army Research, Development and Engineering Command (RDECOM), Space and Naval Warfare (SPAWAR) Systems Center, US Army Tank-Automotive Research, Development and Engineering Center (TARDEC) and non DoD labs such as Department of Energy (DOL). With the support of the Joint Ground Robotics Enterprise (JGRE) through DoD and non DoD labs the Army Maneuver Support Center has recently concluded successful field trails of ground and air robots with specialized tactical behaviors and sensors to enable semi autonomous detection, reporting, and marking of explosive hazards to include Improvised Explosive Devices (IED) and landmines. A specific goal of this effort was to assess how collaborative behaviors for multiple unmanned air and ground vehicles can reduce risks to Soldiers and increase efficiency for on and off route explosive hazard detection, reporting, and marking. This paper discusses experimental results achieved with a robotic countermine system

  16. A concurrent distributed system for aircraft tactical decision generation

    NASA Technical Reports Server (NTRS)

    Mcmanus, John W.

    1990-01-01

    A research program investigating the use of AI techniques to aid in the development of a tactical decision generator (TDG) for within visual range (WVR) air combat engagements is discussed. The application of AI programming and problem-solving methods in the development and implementation of a concurrent version of the computerized logic for air-to-air warfare simulations (CLAWS) program, a second-generation TDG, is presented. Concurrent computing environments and programming approaches are discussed, and the design and performance of prototype concurrent TDG system (Cube CLAWS) are presented. It is concluded that the Cube CLAWS has provided a useful testbed to evaluate the development of a distributed blackboard system. The project has shown that the complexity of developing specialized software on a distributed, message-passing architecture such as the Hypercube is not overwhelming, and that reasonable speedups and processor efficiency can be achieved by a distributed blackboard system. The project has also highlighted some of the costs of using a distributed approach to designing a blackboard system.

  17. Maneuver Warfare in Cyberspace

    DTIC Science & Technology

    1997-01-01

    government departments and agencies; (2) National security and military strategies must outline a response to the threats and opportunities of cyber ... warfare ; and (3) the Department of Defense’s offensive and defensive responsibilities, parameters, and capabilities for strategic information warfare need

  18. Difficult Decisions: Chemical Warfare.

    ERIC Educational Resources Information Center

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  19. Detecting Biological Warfare Agents

    PubMed Central

    Song, Linan; Ahn, Soohyoun

    2005-01-01

    We developed a fiber-optic, microsphere-based, high-density array composed of 18 species-specific probe microsensors to identify biological warfare agents. We simultaneously identified multiple biological warfare agents in environmental samples by looking at specific probe responses after hybridization and response patterns of the multiplexed array. PMID:16318712

  20. Civil Affairs in Unconventional Warfare

    DTIC Science & Technology

    2013-05-23

    goals as Mao Tse -tung states, “Military action is a method used to attain a political goal. While military affairs and political affairs are not...OSS to Green Beret: The Birth at Special Forces (Novato, CA: Presidio Press, 1986), 149-51. 25Mao Tse -tung, On Guerrilla Warfare (New York: Classic...House Books, 2009), 39. 26David Galula, Counterinsurgency Warfare, 4; and Mao Tse -tung, On Guerrilla Warfare, 3-4. 27Ibid., 12-13. 28Ibid

  1. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  2. Tactical visualization module

    NASA Astrophysics Data System (ADS)

    Kachejian, Kerry C.; Vujcic, Doug

    1999-07-01

    The Tactical Visualization Module (TVM) research effort will develop and demonstrate a portable, tactical information system to enhance the situational awareness of individual warfighters and small military units by providing real-time access to manned and unmanned aircraft, tactically mobile robots, and unattended sensors. TVM consists of a family of portable and hand-held devices being advanced into a next- generation, embedded capability. It enables warfighters to visualize the tactical situation by providing real-time video, imagery, maps, floor plans, and 'fly-through' video on demand. When combined with unattended ground sensors, such as Combat- Q, TVM permits warfighters to validate and verify tactical targets. The use of TVM results in faster target engagement times, increased survivability, and reduction of the potential for fratricide. TVM technology can support both mounted and dismounted tactical forces involved in land, sea, and air warfighting operations. As a PCMCIA card, TVM can be embedded in portable, hand-held, and wearable PCs. Thus, it leverages emerging tactical displays including flat-panel, head-mounted displays. The end result of the program will be the demonstration of the system with U.S. Army and USMC personnel in an operational environment. Raytheon Systems Company, the U.S. Army Soldier Systems Command -- Natick RDE Center (SSCOM- NRDEC) and the Defense Advanced Research Projects Agency (DARPA) are partners in developing and demonstrating the TVM technology.

  3. The Art of Aerial Warfare

    DTIC Science & Technology

    2005-03-01

    14 3 THE POLITICAL DIMENSIONS OF AERIAL WARFARE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 How Political Effects in...Aerial Warfare . . . . . . Outweigh Military Effects . . . . . . . . . . . . . . . 19 Political Targets Versus Military Targets . . . . . 22...34 4 MILITARY AND POLITICAL EFFECTS OF STRATEGIC ATTACK . . . . . . . . . . . . . . . . . . 35 The Premise of

  4. Intrafamily and intragenomic conflicts in human warfare

    PubMed Central

    2017-01-01

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression—i.e. ‘genomic imprinting’—in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. PMID:28228515

  5. Intrafamily and intragenomic conflicts in human warfare.

    PubMed

    Micheletti, Alberto J C; Ruxton, Graeme D; Gardner, Andy

    2017-02-22

    Recent years have seen an explosion of multidisciplinary interest in ancient human warfare. Theory has emphasized a key role for kin-selected cooperation, modulated by sex-specific demography, in explaining intergroup violence. However, conflicts of interest remain a relatively underexplored factor in the evolutionary-ecological study of warfare, with little consideration given to which parties influence the decision to go to war and how their motivations may differ. We develop a mathematical model to investigate the interplay between sex-specific demography and human warfare, showing that: the ecology of warfare drives the evolution of sex-biased dispersal; sex-biased dispersal modulates intrafamily and intragenomic conflicts in relation to warfare; intragenomic conflict drives parent-of-origin-specific patterns of gene expression-i.e. 'genomic imprinting'-in relation to warfare phenotypes; and an ecological perspective of conflicts at the levels of the gene, individual, and social group yields novel predictions as to pathologies associated with mutations and epimutations at loci underpinning human violence. © 2017 The Authors.

  6. Soviet campaign against INF (intermediate-range nuclear forces): strategy, tactics, means. Interim report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexiev, A.R.

    1985-02-01

    Beginning in 1979, the Soviet Union mounted a major effort to prevent the deployment of NATO's INF (intermediate-range nuclear forces), which was scheduled to begin in 1983. The campaign failed to achieve its main objective, but it remains an instructive example of the Soviet effort to manipulate domestic trends in Western countries. This Note attempts to provide some insight into Soviet tactics and operational style. It places the INF issue within the framework of Soviet security concepts, reviews Soviet efforts to influence decision-making elites in West Germany against INF and to exacerbate U.S.-European friction within NATO, and analyzes the methodsmore » used by the Soviets in their campaign to co-opt the West German peace movement. The author finds that the campaign waged by the Soviets demonstrated a remarkable organizational and political capability that enabled them and their allies to exploit large numbers of noncommunists in West Germany, and contribute to the growing polarization of West German politics.« less

  7. Replication Does Survive Information Warfare Attacks

    DTIC Science & Technology

    1997-01-01

    warfare, storage jamming, unauthorized modification, Trojan horse 1 INTRODUCTION Ammann, Jajodia, McCollum, and Blaustein define information warfare as the...information warfare, and we adopt the latter term. To provide context, Amman et al. specifically do not consider Trojan horses within the database system...called internal jammers (McDermott and Goldschalg, 1996b)), but instead consider a wide range of attacks other than Trojan horses . Both groups agree that

  8. 14th Annual Expeditionary Warfare Conference

    DTIC Science & Technology

    2009-11-19

    Untitled Document 2009expedition.html[5/12/2016 8:33:22 AM] 14th ANNUAL EXPEDITIONARY WARFARE CONFERENCE “Expeditionary Warfare in a Complex Joint...WWW.NDIA.ORG/MEETINGS/0700 “Expeditionary Warfare in a Complex Joint Operating Environment” BAY POINT MARRIOTT HOTEL, PANAMA CITY, FL...Focus: The purpose of the Quadrennial Defense Review (QDR) is to determine the nation’s defense strategy and establish a defense program for

  9. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  10. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  11. The evolution of human warfare.

    PubMed

    Pitman, George R

    2011-01-01

    Here we propose a new theory for the origins and evolution of human warfare as a complex social phenomenon involving several behavioral traits, including aggression, risk taking, male bonding, ingroup altruism, outgroup xenophobia, dominance and subordination, and territoriality, all of which are encoded in the human genome. Among the family of great apes only chimpanzees and humans engage in war; consequently, warfare emerged in their immediate common ancestor that lived in patrilocal groups who fought one another for females. The reasons for warfare changed when the common ancestor females began to immigrate into the groups of their choice, and again, during the agricultural revolution.

  12. Teaching Nuclear History.

    ERIC Educational Resources Information Center

    Holl, Jack M.; Convis, Sheila C.

    1991-01-01

    Presents results of a survey of the teaching about nuclear history at U.S. colleges and universities. Reports the existence of a well-established and extensive literature, a focus on nuclear weapons or warfare, and a concentration on nuclear citizenship, therapy, or eschatology for courses outside of history departments. Discusses individual…

  13. Review of the tactical evaluation tools for youth players, assessing the tactics in team sports: football.

    PubMed

    González-Víllora, Sixto; Serra-Olivares, Jaime; Pastor-Vicedo, Juan Carlos; da Costa, Israel Teoldo

    2015-01-01

    For sports assessment to be comprehensive, it must address all variables of sports development, such as psychological, social-emotional, physical and physiological, technical and tactical. Tactical assessment has been a neglected variable until the 1980s or 1990s. In the last two decades (1995-2015), the evolution of tactical assessment has grown considerably, given its importance in game performance. The aim of this paper is to compile and analyze different tactical measuring tools in team sports, particularly in soccer, through a bibliographical review. Six tools have been selected on five different criteria: (1) Instruments which assess tactics, (2) The studies have an evolution approach related to the tactical principles, (3) With a valid and reliable method, (4) The existence of publications mentioning the tool in the method, v. Applicable in different sports contexts. All six tools are structured around seven headings: introduction, objective(s), tactical principles, materials, procedures, instructions/rules of the game and published studies. In conclusion, the teaching-learning processes more tactical oriented have useful tactical assessment instrument in the literature. The selection of one or another depends some context information, like age and level of expertise of the players.

  14. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  15. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  16. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  17. The Art and Science of Tactics

    DTIC Science & Technology

    1977-01-01

    THE ART AND SCIENCE OF TACTICS by MAJOR ROBERT A. DOUGHTY, US ARMY E stablishing the nature of tactics has been a pastime of professional...tactics in the US Army have implicitly begun to assume that tactics is more an exact science than an " art and science ." As one recent military writer...and 19th centuries generally agreed that tactics was more an art than it was a science . Many agreed with the terse definition given by Antoine

  18. Airborne exposure limits for chemical and biological warfare agents: is everything set and clear?

    PubMed

    Sabelnikov, Alex; Zhukov, Vladimir; Kempf, C Ruth

    2006-08-01

    Emergency response strategies (guidelines) for biological, chemical, nuclear, or radiological terrorist events should be based on scientifically established exposure limits for all the agents or materials involved. In the case of a radiological terrorist event, emergency response guidelines (ERG) have been worked out. In the case of a terrorist event with the use of chemical warfare (CW) agents the situation is not that clear, though the new guidelines and clean-up values are being generated based on re-evaluation of toxicological and risk data. For biological warfare (BW) agents, such guidelines do not yet exist. In this paper the current status of airborne exposure limits (AELs) for chemical and biological warfare (CBW) agents are reviewed. Particular emphasis is put on BW agents that lack such data. An efficient, temporary solution to bridge the gap in experimental infectious data and to set provisional AELs for BW agents is suggested. It is based on mathematically generated risks of infection for BW agents grouped by their alleged ID50 values in three categories: with low, intermediate and high ID50 values.

  19. The Theory of Unconventional Warfare: Win, Lose, and Draw

    DTIC Science & Technology

    2008-12-01

    UNCONVENTIONAL WARFARE MODEL ...................................12 1. Planning Phase...Superiority over Time........................................................................11  Figure 3.  Unconventional Warfare Model ...superiority through the six principles of UW illustrated below in the UW model . . B. THE UNCONVENTIONAL WARFARE MODEL Figure 3. Unconventional

  20. Employing U.S. Information Operations Against Hybrid Warfare Threats

    DTIC Science & Technology

    2013-03-01

    Article 51.24 Cyber warfare is unique in that vulnerabilities that a network target may have could be discovered by software developers who then... cyber warfare rather than physical combat, a future subject to air strikes or ground-forces raids would likely be a powerful deterrent. Some in the U.S...Manwaring, The Complexity of Modern Asymmetric Warfare, (Norman, OK: Univ. of Oklahoma Press, 2012), 126-129. 23 Arie J. Schaap, “ Cyber Warfare Operations

  1. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  2. Exploring the Human Fabric through an Analyst's Eyes

    NASA Astrophysics Data System (ADS)

    Belov, Nadya; Patti, Jeff; Wilcox, Saki; Almanzar, Rafael; Kim, Janet; Kellogg, Jennifer; Dang, Steven

    The nature and type of conflicts drastically changed in the last half of the twentieth century. Wars are no longer limited to the field; they are supplemented with guerrilla warfare and other asymmetric warfare tactics including domestic terrorism. Domestic terrorism has demonstrated a need for improved homeland security capabilities. Establishing and maintaining the understanding of the key players and the underlying social networks is essential to combating asynchronous warfare tactics. Herein, we identify the key challenges addressed by our Collection/Exploitation Decision System (CEDS) that assist analysts in maintaining an up-to-date understanding of dynamic human networks.

  3. The Impacts of Modern Warfare on Freshwater Ecosystems

    NASA Astrophysics Data System (ADS)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  4. Chemical Warfare: Many Unanswered Questions.

    DTIC Science & Technology

    1983-04-29

    of Defense DSB Defense Science Board GAO U.S. General Accounting Office IDA Institute for Defense Analyses JCS Joint Chiefs of Staff SIPRI Stockholm...Defense Science Board in 1980, DOD specifically asked it to review intelligence data on chemical warfare, and DSB’s 1981 report accordingly presents its...Defense Science Board report suggests, however, that its com- - ments are based on a composite of intelligence information on Soviet chemical warfare

  5. Examining U.S. Irregular Warfare Doctrine

    DTIC Science & Technology

    2008-06-01

    48 Future Theories ...Questions, and Hypotheses The classic warfare theories (i.e. Sun Tzu, Clausewitz, and so forth) directly apply to this research since they form the...Tzu, their theories on the conduct of warfare, and its close tie to politics, form the basis for examining the content of the manuals. The Marine

  6. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  7. Maneuver Warfare revisited: a plea for balance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamilton, M,R.

    1986-04-01

    This paper is a plea for balance in the current pursuit of understanding of the concept and the teaching of Maneuver Warfare. It specifically addresses the need for a more-complete analysis of some of the more-common historical examples commonly offered as examples of the supremecy of Maneuver Warfare. The paper in no way disagrees with the desirability of conducting the kinds of operations associated with the ill-defined concepts offered by advocates of Maneuver Warfare but suggests that the desirable results of historical battles may be too readily ascribed to the dynamic, offensive actions of the victorious side. Secondly, the papermore » points out the lack of utility and applicability of some common buzzwords being used in today's Army. Specifically assailed is the concept of turning within a decision cycle. The paper describes the reasons that this commonly used phrase has little applicability to ground warfare. Finally, the paper mentions the tendency for the Maneuver Warfare camp to cloud discussion of doctrine in a kind of intellectualism and elitism that has no use in forming the necessary consensus demanded by doctrine.« less

  8. The role of rewards in motivating participation in simple warfare.

    PubMed

    Glowacki, Luke; Wrangham, Richard W

    2013-12-01

    In the absence of explicit punitive sanctions, why do individuals voluntarily participate in intergroup warfare when doing so incurs a mortality risk? Here we consider the motivation of individuals for participating in warfare. We hypothesize that in addition to other considerations, individuals are incentivized by the possibility of rewards. We test a prediction of this "cultural rewards war-risk hypothesis" with ethnographic literature on warfare in small-scale societies. We find that a greater number of benefits from warfare is associated with a higher rate of death from conflict. This provides preliminary support for the relationship between rewards and participation in warfare.

  9. Beyond-the-Box Thinking on Future War: The Art and Science of Unrestricted Warfare

    DTIC Science & Technology

    2009-04-01

    Studies Institute, US Army War College, 2008. Mattis , James N., and Frank Hoffman. “Future Warfare: The Rise of Hybrid Warfare.” Proceedings...nanotechnologies will augment the current bio -chemical capabilities, moving the battlefield into a microscopic arena. As seen before, the traditional American way...Military Trans-military Non-military Atomic Warfare Diplomatic Warfare Financial Warfare Conventional Warfare Network Warfare Trade Warfare Bio

  10. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  11. Communication networks for the tactical edge

    NASA Astrophysics Data System (ADS)

    Evans, Joseph B.; Pennington, Steven G.; Ewy, Benjamin J.

    2017-04-01

    Information at the tactical level is increasingly critical in today's conflicts. The proliferation of commercial tablets and smart phones has created the ability for extensive information sharing at the tactical edge, beyond the traditional tactical voice communications and location information. This is particularly the case in Gray Zone conflicts, in which tactical decision making and actions are intertwined with information sharing and exploitation. Networking of tactical devices is the key to this information sharing. In this work, we detail and analyze two network models at different parts of the Gray Zone spectrum, and explore a number of networking options including Named Data Networking. We also compare networking approaches in a variety of realistic operating environments. Our results show that Named Data Networking is a good match for the disrupted networking environments found in many tactical situations

  12. Smart Climatology Applications for Undersea Warfare

    DTIC Science & Technology

    2008-09-01

    Comparisons of these climatologies with existing Navy climatologies based on the Generalized Digital Environmental Model ( GDEM ) reveal differences in sonic...undersea warfare. 15. NUMBER OF PAGES 117 14. SUBJECT TERMS antisubmarine warfare, climate variations, climatology, GDEM , ocean, re...climatologies based on the Generalized Digital Environmental Model ( GDEM ) to our smart ocean climatologies reveal a number of differences. The

  13. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  14. Adapting Unconventional Warfare Doctrine to Cyberspace Operations: An Examination of Hacktivist Based Insurgencies

    DTIC Science & Technology

    2015-06-12

    Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a

  15. Transitioning mine warfare to network-centric sensor analysis: future PMA technologies & capabilities

    NASA Astrophysics Data System (ADS)

    Stack, J. R.; Guthrie, R. S.; Cramer, M. A.

    2009-05-01

    The purpose of this paper is to outline the requisite technologies and enabling capabilities for network-centric sensor data analysis within the mine warfare community. The focus includes both automated processing and the traditional humancentric post-mission analysis (PMA) of tactical and environmental sensor data. This is motivated by first examining the high-level network-centric guidance and noting the breakdown in the process of distilling actionable requirements from this guidance. Examples are provided that illustrate the intuitive and substantial capability improvement resulting from processing sensor data jointly in a network-centric fashion. Several candidate technologies are introduced including the ability to fully process multi-sensor data given only partial overlap in sensor coverage and the ability to incorporate target identification information in stride. Finally the critical enabling capabilities are outlined including open architecture, open business, and a concept of operations. This ability to process multi-sensor data in a network-centric fashion is a core enabler of the Navy's vision and will become a necessity with the increasing number of manned and unmanned sensor systems and the requirement for their simultaneous use.

  16. Anxiety, depression, and posttraumatic stress in Iranian survivors of chemical warfare.

    PubMed

    Hashemian, Farnoosh; Khoshnood, Kaveh; Desai, Mayur M; Falahati, Farahnaz; Kasl, Stanislav; Southwick, Steven

    2006-08-02

    In the 1980-1988 Iran-Iraq War, extensive use of chemical weapons resulted in high rates of morbidity and mortality. While much is known about the physical consequences of chemical warfare, there is a paucity of information about the long-term effects of chemical attacks on mental health. To assess the long-term psychological impact of chemical warfare on a civilian population. Cross-sectional randomized survey conducted in July 2004 of 153 civilians in 3 towns exposed to warfare in northwestern Iran: Oshnaviyeh (low-intensity conventional warfare), Rabat (high-intensity conventional warfare), and Sardasht (both high-intensity conventional warfare and chemical weapons). Full or partial posttraumatic stress disorder (PTSD) diagnosis, anxiety symptoms, and depressive symptoms were assessed using Farsi versions of the Clinician-Administered PTSD Scale, Hamilton Scale for Anxiety, and Beck Depression Inventory, respectively. Overall participation rate was 93%. Respondents had a mean age of 45 years and were all of Kurdish ethnicity. Among individuals exposed to both high-intensity warfare and chemical weapons, prevalence rates for lifetime PTSD, current PTSD, major anxiety symptoms, and severe depressive symptoms were 59%, 33%, 65%, and 41%, respectively. Among the low-intensity warfare group, the corresponding rates were 8%, 2%, 18%, and 6%, respectively, while intermediate rates were found among those exposed to high-intensity warfare but not to chemical weapons (31%, 8%, 26%, and 12%, respectively). Compared with individuals exposed to low-intensity warfare, those exposed to both high-intensity warfare and chemical weapons were at higher risk for lifetime PTSD (odds ratio [OR], 18.6; 95% confidence interval [CI], 5.8-59.4), current PTSD (OR, 27.4; 95% CI, 3.4-218.2), increased anxiety symptoms (OR, 14.6; 95% CI, 6.0-35.6), and increased depressive symptoms (OR, 7.2; 95% CI, 3.3-15.9). Exposure to high-intensity warfare but not to chemical weapons was also

  17. Environmental Warfare

    ERIC Educational Resources Information Center

    Barnaby, Frank

    1976-01-01

    Recent discussions at the Conference of the Committee on Disarmament have focused on the use of artificial changes in the environment as a method of warfare. A far more urgent task is development of a specific ban on already available techniques of environmental damage and a general and complete disarmament. (BT)

  18. What Good Are Warfare Models?

    DTIC Science & Technology

    1981-05-01

    PROFESSIONAL PAPER 306 / May 1981 WHAT GOOD ARE WARFARE MODELS? Thomas E. Anger DTICS E LECTE ,JUN 2198 1 j CENTER FOR NAVAL ANALYSES 81 6 19 025 V...WHAT GOOD ARE WARFARE MODELS? Thomas E. /Anger J Accession For !ETIS GRA&I DTIC TAB thonnounceldŕ 5 By-C Availability Codes iAva il aand/or Di1st...least flows from a life-or-death incenLive to make good guesses when choosing weapons, forces, or strategies. It is not surprising, however, that

  19. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  20. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  1. Warfare or partnership: which way for health care?

    PubMed

    MacStravic, R S

    1990-01-01

    There are many voices urging health care organizations to adopt aggressive competitive warfare, but a careful look at the dynamics affecting health care suggests that partnership may be at least as promising a strategy as warfare to promote mission and survival.

  2. Airborne Tactical Crossload Planner

    DTIC Science & Technology

    2017-12-01

    set out in the Airborne Standard Operating Procedure (ASOP). 14. SUBJECT TERMS crossload, airborne, optimization, integer linear programming ...they land to their respective sub-mission locations. In this thesis, we formulate and implement an integer linear program called the Tactical...to meet any desired crossload objectives. xiv We demonstrate TCP with two real-world tactical problems from recent airborne operations: one by the

  3. Adaptive Army: Embracing the Concept of Operational Manoeuvre from the Sea

    DTIC Science & Technology

    2010-05-05

    PEACE Source: Headquarters Training Command- Army. Land Warfare Doctrine LWD 3-01: Formation Tactics. Australian Army, November 27, 2003. 27...Amphibious Capability Implementation Team, June 15, 2009. Headquarters Training Comrriand- Army. Land Warfare Doctrine LWD 3-0: Operations. Australian Army

  4. The Fate of Chemical Warfare Agents in the Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Talmage, Sylvia Smith; Munro, Nancy B; Watson, Annetta Paule

    2007-01-01

    Chemical Warfare Agents, Second Edition has been totally revised since the successful first edition and expanded to about three times the length, with many new chapters and much more in-depth consideration of all the topics. The chapters have been written by distinguished international experts in various aspects of chemical warfare agents and edited by an experienced team to produce a clear review of the field. The book now contains a wealth of material on the mechanisms of action of the major chemical warfare agents, including the nerve agent cyclosarin, formally considered to be of secondary importance, as well as ricinmore » and abrin. Chemical Warfare Agents, Second Edition discusses the physico-chemical properties of chemical warfare agents, their dispersion and fate in the environment, their toxicology and management of their effects on humans, decontamination and protective equipment. New chapters cover the experience gained after the use of sarin to attack travelers on the Tokyo subway and how to deal with the outcome of the deployment of riot control agents such as CS gas. This book provides a comprehensive review of chemical warfare agents, assessing all available evidence regarding the medical, technical and legal aspects of their use. It is an invaluable reference work for physicians, public health planners, regulators and any other professionals involved in this field.« less

  5. Remote sensing of chemical warfare agent by CO2 -lidar

    NASA Astrophysics Data System (ADS)

    Geiko, Pavel P.; Smirnov, Sergey S.

    2014-11-01

    The possibilities of remote sensing of chemical warfare agent by differential absorption method were analyzed. The CO2 - laser emission lines suitable for sounding of chemical warfare agent with provision for disturbing absorptions by water vapor were choose. The detection range of chemical warfare agents was estimated for a lidar based on CO2 - laser The other factors influencing upon echolocation range were analyzed.

  6. Surface Warfare Officers Initial Training For Future Success

    DTIC Science & Technology

    2018-03-01

    updating and creating learning modules and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for...and Surface Warfare Officer School (SWOS) staffing as well as weaknesses in the methodologies used for training. We conclude that the Basic Division... METHODOLOGY ....................................................................................9 1. Staff Interviews

  7. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  8. Nuclear Weapons and the Future: An "Unthinkable" Proposal.

    ERIC Educational Resources Information Center

    Tyler, Robert L.

    1982-01-01

    The author looks ahead 30 or 40 years to see what might come of the nuclear weapons predicament. As a minimal first step in the campaign against nuclear warfare, he suggests a unilateral and complete disarmament by the United States. (AM)

  9. The Future of Warfare and Impact of Space Operations

    DTIC Science & Technology

    2011-01-01

    cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend

  10. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    DTIC Science & Technology

    1947-11-01

    of proteins and other substances of high molecular weight derived from bacteria, or from natural products with antibacterial activity Proteins and...WARFARE RESEARCH IS THE UNITED r STATES, is one of a series of historical monographs on the research and development activities of the Chemical...TSC Committee 16 War Research Service 13 A5C Committee •• 21 CWS Activities Under TSRS 22 Transfer of Biological Warfare Program to TTar

  11. The Soldier-Cyborg Transformation: A Framework for Analysis of Social and Ethical Issues of Future Warfare

    DTIC Science & Technology

    1998-05-26

    attitude about the use of chemical and biologic weapons , one must question the deterrent value of WMD. With perhaps the 19 exception of nuclear...ENHANCING, TRANSFORMING AND TRANSCENDING 1 TRENDS AND PREDICTIONS ABOUT FUTURE WARFARE 3 CHANGING DEMOGRAPHICS 8 THE BIOLOGIC SHIFT 10 STRATEGIC...without widespread loss of life. Thus, low lethality weapons and distant applications of precisely- applied force are mandatory to make future

  12. Training and Tactical Operationally Responsive Space Operations

    NASA Astrophysics Data System (ADS)

    Sorensen, B.; Strunce, R., Jr.

    Current space assets managed by traditional space system control resources provide communication, navigation, intelligence, surveillance, and reconnaissance (ISR) capabilities using satellites that are designed for long life and high reliability. The next generation Operationally Responsive Space (ORS) systems are aimed at providing operational space capabilities which will provide flexibility and responsiveness to the tactical battlefield commander. These capabilities do not exist today. The ORS communication, navigation, and ISR satellites are being designed to replace or supplement existing systems in order to enhance the current space force. These systems are expected to rapidly meet near term space needs of the tactical forces. The ORS concept includes new tactical satellites specifically designed to support contingency operations such as increased communication bandwidth and ISR imagery over the theater for a limited period to support air, ground, and naval force mission. The Concept of Operations (CONOPS) that exists today specifies that in addition to operational control of the satellite, the tasking and scheduling of the ORS tactical satellite for mission data collection in support of the tactical warfighter will be accomplished within the Virtual Mission Operations Center (VMOC). This is very similar to what is currently being accomplished in a fixed Mission Operations Center on existing traditional ISR satellites. The VMOC is merely a distributed environment and the CONOPS remain virtually the same. As a result, there is a significant drawback to the current ORS CONOPS that does not account for the full potential of the ORS paradigm for supporting tactical forces. Although the CONOPS approach may be appropriate for experimental Tactical Satellites (TacSat), it ignores the issues associated with the In-Theater Commander's need to own and operate his dedicated TacSat for most effective warfighting as well as the Warfighter specific CONOPS. What is needed

  13. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  14. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  15. Alternative reproductive tactics and the propensity of hybridization.

    PubMed

    Tynkkynen, K; Raatikainen, K J; Häkkilä, M; Haukilehto, E; Kotiaho, J S

    2009-12-01

    One explanation for hybridization between species is the fitness benefits it occasionally confers to the hybridizing individuals. This explanation is possible in species that have evolved alternative male reproductive tactics: individuals with inferior tactics might be more prone to hybridization provided it increases their reproductive success and fitness. Here we experimentally tested whether the propensity of hybridization in the wild depends on male reproductive tactic in Calopteryx splendens damselflies. Counter to our expectation, it was males adopting the superior reproductive tactic (territoriality) that had greatest propensity to hybridize than males adopting the inferior tactics (sneakers and floaters). Moreover, among the territorial males, the most ornamented males had greatest propensity to hybridize whereas the pattern was reversed in the sneaker males. Our results suggest that there is fluctuating selection on male mate discrimination against heterospecific females depending on both ornament size and the male's reproductive tactic.

  16. Joint Tactical Networks (JTN)

    DTIC Science & Technology

    2013-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-284 Joint Tactical Networks (JTN) As of FY 2015 President’s Budget... Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection...to 00-00-2013 4. TITLE AND SUBTITLE Joint Tactical Networks (JTN) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S

  17. The nuclear dilemma and the just war tradition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Brien, W.V.; Langan, J.

    This book presents papers on the ethical aspects of nuclear weapons. Topics considered include the concept of a ''just'' war, national defense, political aspects, religion and politics, the failure of deterrence, conventional warfare, nuclear deterrence and democratic politics, the future of the nuclear debate, non-proliferation policy, arms control, national security, and government policies.

  18. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    DTIC Science & Technology

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  19. Biodegradation of Organophosphate Chemical Warfare Agents by Activated Sludge

    DTIC Science & Technology

    2012-03-01

    Holmstedt, B. (1963). Structure- activity relationships of the organophosphorus anticholinesterase agents. In: Koelle, G.B. (ed.), Handbuch...BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE Steven J. Schuldt...AFIT/GES/ENV/12-M04 BIODEGRADATION OF ORGANOPHOSPHATE CHEMICAL WARFARE AGENTS BY ACTIVATED SLUDGE THESIS Presented to the

  20. 75 FR 6642 - Notice of Proposed Information Collection; Naval Special Warfare Recruiting Directorate

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-10

    ... Information Collection; Naval Special Warfare Recruiting Directorate AGENCY: Department of the Navy, DoD. ACTION: Notice. SUMMARY: The Naval Special Warfare (NSW) Recruiting Directorate announces the submission... the proposal and associated collection instruments, write to the Director, Naval Special Warfare...

  1. Tactical expertise assessment in youth football using representative tasks.

    PubMed

    Serra-Olivares, Jaime; Clemente, Filipe Manuel; González-Víllora, Sixto

    2016-01-01

    Specific football drills improve the development of technical/tactical and physical variables in players. Based on this principle, in recent years it has been possible to observe in daily training a growing volume of small-sided and conditioned games. These games are smaller and modified forms of formal games that augment players' perception of specific tactics. Despite this approach, the assessment of players' knowledge and tactical execution has not been well documented, due mainly to the difficulty in measuring tactical behavior. For that reason, this study aims to provide a narrative review about the tactical assessment of football training by using representative tasks to measure the tactical expertise of youth football players during small-sided and conditioned games. This study gives an overview of the ecological approach to training and the principles used for representative task design, providing relevant contribution and direction for future research into the assessment of tactical expertise in youth football.

  2. Behavioural Thermoregulatory Tactics in Lacustrine Brook Charr, Salvelinus fontinalis

    PubMed Central

    Bertolo, Andrea; Pépino, Marc; Adams, Julie; Magnan, Pierre

    2011-01-01

    The need to vary body temperature to optimize physiological processes can lead to thermoregulatory behaviours, particularly in ectotherms. Despite some evidence of within-population phenotypic variation in thermal behaviour, the occurrence of alternative tactics of this behaviour is rarely explicitly considered when studying natural populations. The main objective of this study was to determine whether different thermal tactics exist among individuals of the same population. We studied the behavioural thermoregulation of 33 adult brook charr in a stratified lake using thermo-sensitive radio transmitters that measured hourly individual temperature over one month. The observed behavioural thermoregulatory patterns were consistent between years and suggest the existence of four tactics: two “warm” tactics with both crepuscular and finer periodicities, with or without a diel periodicity, and two “cool” tactics, with or without a diel periodicity. Telemetry data support the above findings by showing that the different tactics are associated with different patterns of diel horizontal movements. Taken together, our results show a clear spatio-temporal segregation of individuals displaying different tactics, suggesting a reduction of niche overlap. To our knowledge, this is the first study showing the presence of behavioural thermoregulatory tactics in a vertebrate. PMID:21490935

  3. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  4. Certification of tactics and strategies in aviation

    NASA Technical Reports Server (NTRS)

    Koelman, Hartmut

    1994-01-01

    The paper suggests that the 'tactics and strategies' notion is a highly suitable paradigm to describe the cognitive involvement of human operators in advanced aviation systems (far more suitable than classical functional analysis), and that the workload and situational awareness of operators are intimately associated with the planning and execution of their tactics and strategies. If system designers have muddled views about the collective tactics and strategies to be used during operation, they will produce sub-optimum designs. If operators use unproven and/or inappropriate tactics and strategies, the system may fail. The author wants to make a point that, beyond certification of people or system designs, there may be a need to go into more detail and examine (certify?) the set of tactics and strategies (i.e., the Operational Concept) which makes the people and systems perform as expected. The collective tactics and strategies determine the information flows and situational awareness which exists in organizations and composite human-machine systems. The available infrastructure and equipment (automation) enable these information flows and situational awareness, but are at the same time the constraining factor. Frequently, the tactics and strategies are driven by technology, whereas we would rather like to see a system designed to support an optimized Operational Concept, i.e., to support a sufficiently coherent, cooperative and modular set of anticipation and planning mechanisms. Again, in line with the view of MacLeod and Taylor (1993), this technology driven situation may be caused by the system designer's and operator job designer's over-emphasis on functional analysis (a mechanistic engineering concept), at the expense of a subject which does not seem to be well understood today: the role of the (human cognitive and/or automated) tactics and strategies which are embedded in composite human-machine systems. Research would be needed to arrive at a generally

  5. Organizational Commitment through Organizational Socialization Tactics

    ERIC Educational Resources Information Center

    Filstad, Cathrine

    2011-01-01

    Purpose: The aim of this paper is to investigate how organizational socialization tactics affect newcomers' organizational commitment and learning processes. Design/methodology/approach: A survey was conducted using a measurement tool based on Van Maanen and Schein's theory on organizational socialization tactics and Kuvaas' measurement tools of…

  6. Counterinsurgency Principles for Contemporary Internal Conflict

    DTIC Science & Technology

    2012-03-01

    avoided usual irregular warfare tactics and workout training on special operations and small group tactics, which helped military forces to counter the...to the police that patrol the streets . Sri Lanka’s Directorate of Internal Intelligence (DII) and the police’s Special Branch, two units tasked with

  7. Operational Art and Risk: Why Doctrine Does Not Help

    DTIC Science & Technology

    2013-05-23

    across all levels of warfare towards a single immutable strategic end state. 19 The critical factor for the operational artists is the arrangement of...of tactical actions to strategic objectives happens from tactical to strategic levels of war. 20 Operational art is the mental gymnastics that creates

  8. Tactical AI in Real Time Strategy Games

    DTIC Science & Technology

    2015-03-26

    TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Donald A. Gruber, Capt, USAF AFIT-ENG-MS-15-M-021 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE...protection in the United States. AFIT-ENG-MS-15-M-021 TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Presented to the Faculty Department of Electrical...DISTRIBUTION STATEMENT A APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENG-MS-15-M-021 TACTICAL AI IN REAL TIME STRATEGY GAMES THESIS Donald A

  9. Surprise and Deception in Joint Warfare

    DTIC Science & Technology

    1994-02-08

    Cass & Co., Limited, 1989), p. 310. 121bid., p. 362. 1 3 Sun Tzu, p. 84. 1 4 Simon Goodenough, Tactical Genius in Battle. (London: Phaidon Press Limited...3rd ed. New York, NY: MacMillan Publishing Co., Inc., 1976. Goodenough, Simon. Tactical Genius in Battle. London: Phaidon Press Limited, 1979. Griess

  10. Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development

    DTIC Science & Technology

    2016-09-01

    ARL-TN-0779 ● SEP 2016 US Army Research Laboratory Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and...Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development by Neal Tesny Sensors and Electron Devices Directorate...TITLE AND SUBTITLE Electronic Warfare Closed Loop Laboratory (EWCLL) Antenna Motor Software and Hardware Development 5a. CONTRACT NUMBER 5b

  11. Cyber threat model for tactical radio networks

    NASA Astrophysics Data System (ADS)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  12. Tactics for Improving Parenting Skills (TIPS).

    ERIC Educational Resources Information Center

    Algozzine, Bob, Ed.; Ysseldyke, Jim, Ed.

    This manual presents 99 one-sheet informational brochures designed to improve parenting skills. Each brochure is in a format suitable for duplicating, folding, and distributing. Each parenting "tactic" offers references to related brochures. Tactics are grouped under the following broad areas: (1) home/family involvement (e.g., accepting "The…

  13. Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW

    DTIC Science & Technology

    2017-12-01

    31 Tactical Information Operations...seeks to understand the current state of hybrid warfare in Ukraine with a particular emphasis on the use of Information Operations (IO), Electronic...understanding of the conditions that enabled this style of warfare and how Russia has exploited those conditions in Ukraine will serve to inform

  14. Soft-assembled Multilevel Dynamics of Tactical Behaviors in Soccer

    PubMed Central

    Ric, Angel; Torrents, Carlota; Gonçalves, Bruno; Sampaio, Jaime; Hristovski, Robert

    2016-01-01

    This study aimed to identify the tactical patterns and the timescales of variables during a soccer match, allowing understanding the multilevel organization of tactical behaviors, and to determine the similarity of patterns performed by different groups of teammates during the first and second halves. Positional data from 20 professional male soccer players from the same team were collected using high frequency global positioning systems (5 Hz). Twenty-nine categories of tactical behaviors were determined from eight positioning-derived variables creating multivariate binary (Boolean) time-series matrices. Hierarchical principal component analysis (PCA) was used to identify the multilevel structure of tactical behaviors. The sequential reduction of each set level of principal components revealed a sole principal component as the slowest collective variable, forming the global basin of attraction of tactical patterns during each half of the match. In addition, the mean dwell time of each positioning-derived variable helped to understand the multilevel organization of collective tactical behavior during a soccer match. This approach warrants further investigations to analyze the influence of task constraints on the emergence of tactical behavior. Furthermore, PCA can help coaches to design representative training tasks according to those tactical patterns captured during match competitions and to compare them depending on situational variables. PMID:27761120

  15. Departure Queue Prediction for Strategic and Tactical Surface Scheduler Integration

    NASA Technical Reports Server (NTRS)

    Zelinski, Shannon; Windhorst, Robert

    2016-01-01

    A departure metering concept to be demonstrated at Charlotte Douglas International Airport (CLT) will integrate strategic and tactical surface scheduling components to enable the respective collaborative decision making and improved efficiency benefits these two methods of scheduling provide. This study analyzes the effect of tactical scheduling on strategic scheduler predictability. Strategic queue predictions and target gate pushback times to achieve a desired queue length are compared between fast time simulations of CLT surface operations with and without tactical scheduling. The use of variable departure rates as a strategic scheduler input was shown to substantially improve queue predictions over static departure rates. With target queue length calibration, the strategic scheduler can be tuned to produce average delays within one minute of the tactical scheduler. However, root mean square differences between strategic and tactical delays were between 12 and 15 minutes due to the different methods the strategic and tactical schedulers use to predict takeoff times and generate gate pushback clearances. This demonstrates how difficult it is for the strategic scheduler to predict tactical scheduler assigned gate delays on an individual flight basis as the tactical scheduler adjusts departure sequence to accommodate arrival interactions. Strategic/tactical scheduler compatibility may be improved by providing more arrival information to the strategic scheduler and stabilizing tactical scheduler changes to runway sequence in response to arrivals.

  16. Enabling information management systems in tactical network environments

    NASA Astrophysics Data System (ADS)

    Carvalho, Marco; Uszok, Andrzej; Suri, Niranjan; Bradshaw, Jeffrey M.; Ceccio, Philip J.; Hanna, James P.; Sinclair, Asher

    2009-05-01

    Net-Centric Information Management (IM) and sharing in tactical environments promises to revolutionize forward command and control capabilities by providing ubiquitous shared situational awareness to the warfighter. This vision can be realized by leveraging the tactical and Mobile Ad hoc Networks (MANET) which provide the underlying communications infrastructure, but, significant technical challenges remain. Enabling information management in these highly dynamic environments will require multiple support services and protocols which are affected by, and highly dependent on, the underlying capabilities and dynamics of the tactical network infrastructure. In this paper we investigate, discuss, and evaluate the effects of realistic tactical and mobile communications network environments on mission-critical information management systems. We motivate our discussion by introducing the Advanced Information Management System (AIMS) which is targeted for deployment in tactical sensor systems. We present some operational requirements for AIMS and highlight how critical IM support services such as discovery, transport, federation, and Quality of Service (QoS) management are necessary to meet these requirements. Our goal is to provide a qualitative analysis of the impact of underlying assumptions of availability and performance of some of the critical services supporting tactical information management. We will also propose and describe a number of technologies and capabilities that have been developed to address these challenges, providing alternative approaches for transport, service discovery, and federation services for tactical networks.

  17. Homeland Biological Warfare Consequence Management: Capabilities and Needs Assessment

    DTIC Science & Technology

    2001-04-01

    AU/ACSC/105/2001-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY HOMELAND BIOLOGICAL WARFARE CONSEQUENCE MANAGEMENT: CAPABILITIES AND NEEDS...Dates Covered (from... to) - Title and Subtitle Homeland biological Warfare Consequence Management: Capabilities and Needs Assessment Contract...FEMA, DoJ, DoD, HHS, etc.) make a comprehensive, organized solution to the problem difficult. Focusing on the consequence management functions

  18. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  19. Femoral vessel injuries in modern warfare since Vietnam.

    PubMed

    Pearl, Jonathan P; McNally, Michael P; Perdue, Philip W

    2003-09-01

    The incidence of lower extremity injuries is high in modern warfare; however the mortality rate from these injuries is low. Despite the overall low mortality of lower extremity injuries, many deaths in modern conflicts are due to femoral vessel injury. The modern warfare literature was reviewed. In Somalia, 1 of the 14 reported deaths was due to a laceration of the superficial femoral artery. In the Persian Gulf, three deaths were reported in an Army field hospital, one resulted from uncontrolled hemorrhage from a profunda femoris artery wound and two others resulted from traumatic amputations with consequent major arterial injury. Despite the advances in modern body armor, the groin is left unprotected. A strategy to help minimize U.S. casualties in modern warfare may be a method of field hemostasis specifically designed for femoral vessel injury.

  20. The Physics of Warfare

    NASA Astrophysics Data System (ADS)

    Giordano, Gerardo

    2015-03-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics isn't always abstract. It is true that the examples and applications in this warfare class practically wrote themselves, but I wanted more for my students. I wanted them to embrace the iterative nature of scientific understanding. I wanted them to yearn for the breakthroughs that lead to paradigm shifts. I wanted them to demand experimental verification of each novel idea. This paper discusses the formation and implementation of a conceptual physics course, full of in-class demonstrations and solidly rooted in the context of humankind's ever-evolving methods of waging war.

  1. Information Warfare and the Principles of War.

    DTIC Science & Technology

    1997-02-07

    information dominance , control of ’cyberspace’ or the ’Infosphere’ and Information Warfare. Some argue that Information Warfare (IW) is just a repackaging of old concepts and current practices, while others contend it is the next Revolution in Military Affairs (RMA). The question that needs to be addressed is; can IW achieve strategic and operational military objectives on its on merit? A way to answer this questions is to analyze IW against our current doctrine. Using the principles of war as a framework, does IW fit (or can it be employed) in the

  2. Definitions of Tactical and Strategic: An Informal Study

    NASA Technical Reports Server (NTRS)

    Schutte, Paul C.

    2004-01-01

    Seventeen subject matter experts defined tactical and strategic within the aviation domain. They provided five verbs and a sentence describing both behaviors. The verbs for strategic behavior were Plan, Think, Arrange, Formulate, Intend, Devise, Anticipate, and Order. The verbs for tactical behavior were Act, Fly, Respond, Do, Avoid, Control, React, and Move. Verbs that were common to both were Get Information, Navigate, Know, Execute, Manage, Perceive, Understand, Direct, Concentrate, and Point. The responses highlight the difference between planning (strategic) and carrying out those plans (tactical). Tactical verbs are more action-oriented that change the state of the world after they have been accomplished. Strategic verbs are more prescriptive in that they do not change the state of the world but offer a procedure or program for changing the world. The pilot is in a tactical mode when actually moving the aircraft and in a strategic mode when thinking about moving it.

  3. U.S. Unmanned Aerial Vehicles (UAVs) and Network Centric Warfare (NCW): Impacts on Combat Aviation Tactics from Gulf War I Through 2007 Iraq

    DTIC Science & Technology

    2008-03-01

    early warning AIM Air-intercept missile AJCN Adaptive, joint, C4ISR node AOR Area of responsibility ARM Anti-radiation missile ATARS Advanced...Tactical Airborne Reconnaissance System ( ATARS ) on F-16 and F/A-18 aircraft, and satellites. Manned platforms were adapted to multiple mission scenarios... Psychological Ops X Tern/Leaflet Dispensing, 2004 All Weather/ Night Strike X DASH/Vietnam, 1960s Predator/Afghanistan/Iraq, 2001 36

  4. Biomaterials for mediation of chemical and biological warfare agents.

    PubMed

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  5. Evaluating the Special Needs of the Military for Radiation Biodosimetry for Tactical Warfare against Deployed Troops: Comparing Military to Civilian Needs for Biodosimetry Methods

    PubMed Central

    Flood, Ann Barry; Ali, Arif N.; Boyle, Holly K.; Du, Gaixin; Satinsky, Victoria A.; Swarts, Steven G.; Williams, Benjamin B.; Demidenko, Eugene; Schreiber, Wilson; Swartz, Harold M.

    2016-01-01

    Objectives The aim of this paper is to delineate characteristics of biodosimetry most suitable for assessing individuals who have potentially been exposed to significant radiation from a nuclear device explosion, when the primary population targeted by the explosion and needing rapid assessment for triage is civilians vs. deployed military personnel. Methods We first carry out a systematic analysis of the requirements for biodosimetry to meet the military's needs to assess deployed troops in a warfare situation, which include accomplishing the military mission. We then systematically compare and contrast the military's special capabilities to respond and carry out biodosimetry for deployed troops in warfare, in contrast to those available to respond and conduct biodosimetry for civilians who have been targeted, e.g., by terrorists. We then compare the effectiveness of different biodosimetry methods to address military vs. civilian needs and capabilities in these scenarios and, using five representative types of biodosimetry with sufficient published data to be useful for the simulations, we estimate the number of individuals who could be assessed by military vs. civilian responders within the timeframe needed for triage decisions. Conclusions Analyses based on these scenarios indicate that, in comparison to responses for a civilian population, a wartime military response for deployed troops has both more complex requirements for and greater capabilities to utilize different types of biodosimetry to evaluate radiation exposure in a very short timeframe after the exposure occurs. Greater complexity for the deployed military is based on factors such as a greater likelihood of partial or whole body exposure, conditions that include exposure to neutrons, and a greater likelihood of combined injury. Our simulations showed, for both the military and civilian response, that a very fast rate of initiating the processing (24,000 per day) is needed to have at least some

  6. The Nuclear Arsenals of the US and USSR.

    ERIC Educational Resources Information Center

    Levi, Barbara G.

    1983-01-01

    Compares United States and Soviet nuclear arsenals, surveying strategic and tactical weapons the two countries have (includes chart detailing strategic nuclear arsenals). Also summarizes trends in nuclear weapons, including use of electronics in surveillance and in command, communication, and control structures. (JN)

  7. Protection of Shipping: A Forgotten Mission with Many New Challenges

    DTIC Science & Technology

    2006-10-10

    changed the name of the mission (and the NTTP manual) from “Naval Control and Protection of Shipping ( NCAPS ),” to “Naval Cooperation and Guidance for...level. For tactical tasks updated for new NCAGS (vice NCAPS ) doctrine, see Naval Warfare Development Command, Naval Tactical Task List (NTTL) 3.0

  8. Chemical warfare agents. Classes and targets.

    PubMed

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Tactical Nuclear Weapons and NATO

    DTIC Science & Technology

    2012-04-01

    and timing of TNW use . France’s withdrawal from NATO’s integrated military structure , the estab- lishment of the Nuclear Planning Group (NPG), and...political and cultural meanings, depending on time and historical context. This has been true even with little change in the design, pro - duction...officially endorsed strategies at- tempting to impose rational order on their use . Such doctrines have over time been forced to accept that control

  10. Counter-Unmanned Aerial Vehicle Warfare: Kill Authorizations for the Carrier Strike Group

    DTIC Science & Technology

    2016-06-10

    COUNTER-UNMANNED AERIAL VEHICLE WARFARE: KILL AUTHORIZATIONS FOR THE CARRIER STRIKE GROUP A thesis presented to the Faculty...the Carrier Strike Group 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) LCDR Joshua C. Mattingly, U.S...including armed UAVs in an offensive role, but counter- UAV warfare is a new warfare area within the larger realm of air defense. Small Group 1 and 2

  11. Analysis of interference performance of tactical radio network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  12. Distributed tactical reasoning framework for intelligent vehicles

    NASA Astrophysics Data System (ADS)

    Sukthankar, Rahul; Pomerleau, Dean A.; Thorpe, Chuck E.

    1998-01-01

    In independent vehicle concepts for the Automated Highway System (AHS), the ability to make competent tactical-level decisions in real-time is crucial. Traditional approaches to tactical reasoning typically involve the implementation of large monolithic systems, such as decision trees or finite state machines. However, as the complexity of the environment grows, the unforeseen interactions between components can make modifications to such systems very challenging. For example, changing an overtaking behavior may require several, non-local changes to car-following, lane changing and gap acceptance rules. This paper presents a distributed solution to the problem. PolySAPIENT consists of a collection of autonomous modules, each specializing in a particular aspect of the driving task - classified by traffic entities rather than tactical behavior. Thus, the influence of the vehicle ahead on the available actions is managed by one reasoning object, while the implications of an approaching exit are managed by another. The independent recommendations form these reasoning objects are expressed in the form of votes and vetos over a 'tactical action space', and are resolved by a voting arbiter. This local independence enables PolySAPIENT reasoning objects to be developed independently, using a heterogenous implementation. PolySAPIENT vehicles are implemented in the SHIVA tactical highway simulator, whose vehicles are based on the Carnegie Mellon Navlab robots.

  13. Changing nature of Chinese nuclear strategy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Markov, D.R.; Huill, A.W.

    Traditionally, analysts have believed that China was only interested in pursuing a minimalist, counter-value nuclear strategy that aimed at achieving strategic deterrence. This paper examines the possibility that Chinese nuclear strategy is changing in several ways: (1) it is moving to embrace a nuclear warfighting approach that encompasses tactical, theater, and strategic nuclear weapons, and (2) it is moving from a counter-value to a counter-force strategic nuclear posture.

  14. 15th Annual Expeditionary Warfare Conference - Expeditionary Operations - What’s Next

    DTIC Science & Technology

    2010-10-07

    00 PM - 5:00 PM Mine Warfare Capabilities Essential for Expeditionary Warfare Salon 1 (limited to first 120 registrants) Session Focus...have priority – Requires additional conceptual development, gaming & exercises Questions? 23

  15. Advocates and critics for tactical behaviors in UGV navigation

    NASA Astrophysics Data System (ADS)

    Hussain, Talib S.; Vidaver, Gordon; Berliner, Jeffrey

    2005-05-01

    Critical to the development of unmanned ground vehicle platforms is the incorporation of adaptive tactical behaviors for the planning of high-level navigation and tactical actions. BBN Technologies recently completed a simulation-based project for the Army Research Lab (ARL) in which we applied an evolutionary computation approach to navigating through a terrain to capture flag objectives while faced with one or more mobile enemies. Our Advocates and Critics for Tactical Behaviors (ACTB) system evolves plans for the vehicle that control its movement goals (in the form of waypoints), and its future actions (e.g., pointing cameras). We apply domain-specific, state-dependent genetic operators called advocates that promote specific tactical behaviors (e.g., adapt a plan to stay closer to walls). We define the fitness function as a weighted sum of a number of independent, domain-specific, state-dependent evaluation components called critics. Critics reward plans based upon specific tactical criteria, such as minimizing risk of exposure or time to the flags. Additionally, the ACTB system provides the capability for a human commander to specify the "rules of engagement" under which the vehicle will operate. The rules of engagement determine the planning emphasis required under different tactical situations (e.g., discovery of an enemy), and provide a mechanism for automatically adapting the relative selection probabilities of the advocates, the weights of the critics, and the depth of planning in response to tactical events. The ACTB system demonstrated highly effective performance in a head-to-head testing event, held by ARL, against two competing tactical behavior systems.

  16. The effect of deliberate play on tactical performance in basketball.

    PubMed

    Greco, Pablo; Memmert, Daniel; Morales, Juan C P

    2010-06-01

    This field-based study analyzed effects of a deliberate-play training program in basketball on tactical game intelligence and tactical creativity. 22 youth basketball players, ages 10 to 12 years, completed basketball training in one of two equal-sized groups. The deliberate-play training program contained unstructured game forms in basketball. The placebo group played in traditional structured basketball game forms. Tactical intelligence and creativity was assessed before and after an 18-lesson intervention. Analysis showed significant training improvement only for the deliberate-play group. In addition, this outperformance of the placebo group was not only observed for tactical creativity but also for tactical intelligence.

  17. Corrugated QWIP for Tactical Army Applications

    DTIC Science & Technology

    2008-12-01

    1 CORRUGATED QWIP FOR TACTICAL ARMY APPLICATIONS David. P. Forrai, Darrel W. Endres L-3 Communications Cincinnati Electronics Mason, OH 45040...Directorate (NVESD) have been developing the corrugated quantum well infrared photodetector (C- QWIP ) technology for applications in tactical LWIR...imaging. The C- QWIP was invented at ARL and shows promise to overcome some of the limitations in commercially available QWIPs . The C- QWIP uses micro

  18. Cognitive representations and cognitive processing of team-specific tactics in soccer.

    PubMed

    Lex, Heiko; Essig, Kai; Knoblauch, Andreas; Schack, Thomas

    2015-01-01

    Two core elements for the coordination of different actions in sport are tactical information and knowledge about tactical situations. The current study describes two experiments to learn about the memory structure and the cognitive processing of tactical information. Experiment 1 investigated the storage and structuring of team-specific tactics in humans' long-term memory with regard to different expertise levels. Experiment 2 investigated tactical decision-making skills and the corresponding gaze behavior, in presenting participants the identical match situations in a reaction time task. The results showed that more experienced soccer players, in contrast to less experienced soccer players, possess a functionally organized cognitive representation of team-specific tactics in soccer. Moreover, the more experienced soccer players reacted faster in tactical decisions, because they needed less fixations of similar duration as compared to less experienced soccer players. Combined, these experiments offer evidence that a functionally organized memory structure leads to a reaction time and a perceptual advantage in tactical decision-making in soccer. The discussion emphasizes theoretical and applied implications of the current results of the study.

  19. Cognitive Representations and Cognitive Processing of Team-Specific Tactics in Soccer

    PubMed Central

    Lex, Heiko; Essig, Kai; Knoblauch, Andreas; Schack, Thomas

    2015-01-01

    Two core elements for the coordination of different actions in sport are tactical information and knowledge about tactical situations. The current study describes two experiments to learn about the memory structure and the cognitive processing of tactical information. Experiment 1 investigated the storage and structuring of team-specific tactics in humans’ long-term memory with regard to different expertise levels. Experiment 2 investigated tactical decision-making skills and the corresponding gaze behavior, in presenting participants the identical match situations in a reaction time task. The results showed that more experienced soccer players, in contrast to less experienced soccer players, possess a functionally organized cognitive representation of team-specific tactics in soccer. Moreover, the more experienced soccer players reacted faster in tactical decisions, because they needed less fixations of similar duration as compared to less experienced soccer players. Combined, these experiments offer evidence that a functionally organized memory structure leads to a reaction time and a perceptual advantage in tactical decision-making in soccer. The discussion emphasizes theoretical and applied implications of the current results of the study. PMID:25714486

  20. Testing of Tactical Performance in Youth Elite Soccer

    PubMed Central

    2010-01-01

    This is a twofold study with the goals of evaluating tactical oriented game test situations for 12-13-year old highly-talented soccer players and to analyze dynamic, intra-individual developments of the players. A cross-sectional design was carried in study 1, using game test situations to measure specific tactics and creative performance for 195 expert players. The results from five evaluation criteria show that both diagnostic instruments can be used for recording football-specific creativity and game intelligence in talented young players. They produced tactical indicators that can be described as objective and valid, exhibit a sufficient degree of differentiation and are easy to record. Study 2 uses a longitudinal design to present a dynamic performance diagnostic tool for analyzing intra-individual improvements of German Soccer Foundation talents according to football-specific creativity and game intelligence. The results with respect to divergent tactical thinking clearly show that very different change processes were observed in the German Soccer Foundation players. Finally, the practical implications for the training process are discussed on the basis of both studies. Key points With game test situations it is possible to assess tactical performance as game intelligence and creativity objective, valid, with a sufficient degree of differentiation, and economically. The results with respect to game intelligence and creativity show that very different change processes were observed in the German Soccer Foundation players dependend on the bases (trainers). Current literature on tactics for school sports as well as for children’s, youth and high performance soccer at the club level should place much more emphasis on individual and group-tactical requirements in soccer. PMID:24149686

  1. Testing of tactical performance in youth elite soccer.

    PubMed

    Memmert, Daniel

    2010-01-01

    This is a twofold study with the goals of evaluating tactical oriented game test situations for 12-13-year old highly-talented soccer players and to analyze dynamic, intra-individual developments of the players. A cross-sectional design was carried in study 1, using game test situations to measure specific tactics and creative performance for 195 expert players. The results from five evaluation criteria show that both diagnostic instruments can be used for recording football-specific creativity and game intelligence in talented young players. They produced tactical indicators that can be described as objective and valid, exhibit a sufficient degree of differentiation and are easy to record. Study 2 uses a longitudinal design to present a dynamic performance diagnostic tool for analyzing intra-individual improvements of German Soccer Foundation talents according to football-specific creativity and game intelligence. The results with respect to divergent tactical thinking clearly show that very different change processes were observed in the German Soccer Foundation players. Finally, the practical implications for the training process are discussed on the basis of both studies. Key pointsWith game test situations it is possible to assess tactical performance as game intelligence and creativity objective, valid, with a sufficient degree of differentiation, and economically.The results with respect to game intelligence and creativity show that very different change processes were observed in the German Soccer Foundation players dependend on the bases (trainers).Current literature on tactics for school sports as well as for children's, youth and high performance soccer at the club level should place much more emphasis on individual and group-tactical requirements in soccer.

  2. A Method for Evaluation of Microcomputers for Tactical Applications.

    DTIC Science & Technology

    1980-06-01

    application. The computational requirements of a tactical application are specified in terms of performance parameters. The presently marketed microcomputer...computational requirements of a tactical application are specified in terms of performance parameters. The presently marketed microcomputer and multi...also to provide a method to evaluate microcomputer systems for tactical applications, i.e., Command Control Communications (C 3), weapon systems, etc

  3. Status of dental health in chemical warfare victims: the case of Isfahan, Iran.

    PubMed

    Mottaghi, Ahmad; Hoseinzade, Abolfath; Zamani, Elham; Araghizade, Habib Allah

    2012-01-01

    Little evidence is available regarding the dental health of victims of chemical warfare in Iran. Therefore, in this study, we examined the decayed, missing, and filled teeth index (DMFT), community periodontal index of treatment needs (CPITN), and saliva secretion rate of chemical warfare victims living in the province of Isfahan in Iran. This case-control study was conducted with 300 chemical warfare victims as the treatment group and 300 age-matched individuals without exposure to chemical warfare as the control group. DMFT and CPITN indices and saliva secretion rate were measured and compared between the two groups. Chemical warfare victims had significantly higher scores than the control group for decayed teeth (4.25 ± 3.88 vs 3.52 ± 2.81; P=0.009), missing teeth (8.79 ± 9.3 vs 6.15 ± 8.43; P<0.001), total DMFT index (17.00 ± 6.72 vs 13.20 ± 6.89; P<0.001), and CPTIN (2.81 ± 0.81 vs 1.71 ± 1.04; P<0.001). However, no significant difference was observed between the two groups in filled teeth (4.00 ± 4.2 vs 3.59 ± 2.48; P=0.148). The level of saliva secretion in warfare victims was significantly lower than that in the control group (1.71 ± 0.05 vs 3.85 ± 1.95 cc/5 min; P<0.001). Chemical warfare victims have relatively poor dental/oral health. Chemical injury might cause a dysfunction in saliva secretion, with decrease in saliva secretion increasing the risk for tooth decay and periodontal disorders. Further research is required to find out the exact underlying mechanisms and the factors associated with poor dental/oral health in chemical warfare victims.

  4. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  5. Tactical Synthesis Of Efficient Global Search Algorithms

    NASA Technical Reports Server (NTRS)

    Nedunuri, Srinivas; Smith, Douglas R.; Cook, William R.

    2009-01-01

    Algorithm synthesis transforms a formal specification into an efficient algorithm to solve a problem. Algorithm synthesis in Specware combines the formal specification of a problem with a high-level algorithm strategy. To derive an efficient algorithm, a developer must define operators that refine the algorithm by combining the generic operators in the algorithm with the details of the problem specification. This derivation requires skill and a deep understanding of the problem and the algorithmic strategy. In this paper we introduce two tactics to ease this process. The tactics serve a similar purpose to tactics used for determining indefinite integrals in calculus, that is suggesting possible ways to attack the problem.

  6. The implicit rules of combat.

    PubMed

    Romero, Gorge A; Pham, Michael N; Goetz, Aaron T

    2014-12-01

    Conspecific violence has been pervasive throughout evolutionary history. The current research tested the hypotheses that individuals implicitly categorize combative contexts (i.e., play fighting, status contests, warfare, and anti-exploitative violence) and use the associated contextual information to guide expectations of combative tactics. Using U.S. and non-U.S. samples, Study 1 demonstrated consistent classification of combative contexts from scenarios for which little information was given and predictable shifts in the acceptability of combative tactics across contexts. Whereas severe tactics (e.g., eye-gouging) were acceptable in warfare and anti-exploitative violence, they were unacceptable in status contests and play fights. These results suggest the existence of implicit rules governing the contexts of combat. In Study 2, we explored the reputational consequences of violating these implicit rules. Results suggest that rule violators (e.g., those who use severe tactics in a status contest) are given less respect. These are the first studies to implicate specialized mechanisms for aggression that use contextual cues of violence to guide expectations and behavior.

  7. Photogrammetric point cloud compression for tactical networks

    NASA Astrophysics Data System (ADS)

    Madison, Andrew C.; Massaro, Richard D.; Wayant, Clayton D.; Anderson, John E.; Smith, Clint B.

    2017-05-01

    We report progress toward the development of a compression schema suitable for use in the Army's Common Operating Environment (COE) tactical network. The COE facilitates the dissemination of information across all Warfighter echelons through the establishment of data standards and networking methods that coordinate the readout and control of a multitude of sensors in a common operating environment. When integrated with a robust geospatial mapping functionality, the COE enables force tracking, remote surveillance, and heightened situational awareness to Soldiers at the tactical level. Our work establishes a point cloud compression algorithm through image-based deconstruction and photogrammetric reconstruction of three-dimensional (3D) data that is suitable for dissimination within the COE. An open source visualization toolkit was used to deconstruct 3D point cloud models based on ground mobile light detection and ranging (LiDAR) into a series of images and associated metadata that can be easily transmitted on a tactical network. Stereo photogrammetric reconstruction is then conducted on the received image stream to reveal the transmitted 3D model. The reported method boasts nominal compression ratios typically on the order of 250 while retaining tactical information and accurate georegistration. Our work advances the scope of persistent intelligence, surveillance, and reconnaissance through the development of 3D visualization and data compression techniques relevant to the tactical operations environment.

  8. Air Force Cyber Warfare: Now and the Future

    DTIC Science & Technology

    2013-10-01

    cyber warfare in popular culture. Most of them focus on the individual s uncanny grasp of technology the ability to exploit any system with a dizzying flurry of keystrokes or to fend off adversaries with a smartphone, a paper clip, and an ingenious plan. These socially awkward heroes and heroines fill the silver screen with visions of a new kind of warfare. Contradicting these stereotypes, Air Force cyber operations are carefully planned and controlled by disciplined, rigorously trained operators. Rather than acting alone, these professionals produce effects in support of

  9. Navy Operational Planner: Anti-Submarine Warfare with Time-Dependent Performance

    DTIC Science & Technology

    2017-09-01

    PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT PERFORMANCE by Anthony M. Baldessari September 2017 Thesis Advisor: W. Matthew...reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER: ANTI-SUBMARINE WARFARE WITH TIME -DEPENDENT

  10. Personal Area Networks in Tactical Mobile Devices

    DTIC Science & Technology

    2014-08-01

    TECHNICAL DOCUMENT 2047 August 2014 Personal Area Networks in Tactical Mobile Devices Brian Visser...Tactical Mobile Devices Brian Visser Approved for public release. SSC Pacific San Diego, CA 92152-5001 SB...consistent power source, which is normally not available to patrols. In addition to the lack of computer resources, robust network infrastructure

  11. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    DTIC Science & Technology

    1982-01-01

    remained a fundamental military organization. Simultaneously, however, a few thinkers began to consider the possibility of forces capable of operating at...guerrilla warfare. He had been impressed as well by the British system of intelligence and counter- intelligence, as conducted by their Secret Intelligence...highly respected Columbia Broadcasting System reporter like Elmer Davis as its first director. Although most existing information services were trans

  12. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a 'game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  13. About the bears and the bees: Adaptive responses to asymmetric warfare

    NASA Astrophysics Data System (ADS)

    Ryan, Alex

    Conventional military forces are organised to generate large scale effects against similarly structured adversaries. Asymmetric warfare is a `game' between a conventional military force and a weaker adversary that is unable to match the scale of effects of the conventional force. In asymmetric warfare, an insurgents' strategy can be understood using a multi-scale perspective: by generating and exploiting fine scale complexity, insurgents prevent the conventional force from acting at the scale they are designed for. This paper presents a complex systems approach to the problem of asymmetric warfare, which shows how future force structures can be designed to adapt to environmental complexity at multiple scales and achieve full spectrum dominance.

  14. Affective Decision-Making and Tactical Behavior of Under-15 Soccer Players

    PubMed Central

    Gonzaga, Adeilton dos Santos; Albuquerque, Maicon Rodrigues; Malloy-Diniz, Leandro Fernandes; Greco, Pablo Juan; Teoldo da Costa, Israel

    2014-01-01

    Affective decision-making is a type of Executive Function related to cost benefit analysis in situations where gains and losses imply direct consequences for the subject. The purpose of this study was to explore the influence of the affective decision-making on tactical behavior in soccer players under the age of 15 years old. The System of Tactical Assessment in Soccer (FUT-SAT) was used to assess tactical behavior. To evaluate affective decision-making, we used the neuropsychological test called The Iowa Gambling Task (IGT). The values of the offensive, defensive and game tactical behavior of participants were used to create performance groups. The low (≤25%) and high (≥75%) groups, according to offensive, defensive and game tactical behavior, were compared and shown to be different. The values of the IGT net score of the participants with low and high tactical behavior were compared using the non-parametric Mann-Whitney test. Statistically significant differences between the groups were observed for Defensive Tactical Behavior (Z = −3.133; p = 0.002; r = −0.355) and Game Tactical Behavior (Z = −2.267; p = 0.023; r = −0.260). According to these results, it is possible to state that affective decision-making can influence the tactical behavior of under-15 soccer players. PMID:24978030

  15. The Physics of Warfare

    ERIC Educational Resources Information Center

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  16. "No practical capabilities": American biological and chemical warfare programs during the Korean war.

    PubMed

    Crane, Conrad C

    2002-01-01

    Much controversy still surrounds accusations that American forces in the Far East during the Korean War used biological warfare against North Korea and China. An analysis of recently declassified documents reveals that, although the United States attempted to accelerate its development and acquisition of such weapons during that period, its efforts to create a viable biological warfare capability were unsuccessful. Plans to similarly expand chemical warfare stocks and capabilities were also frustrated. Technological difficulties, personnel shortages, bureaucratic battles between the armed services, and policy limitations combined to hold back advances in American chemical and biological warfare. In light of the recent fears of terrorist attacks with such weapons, this analysis highlights the great difficulties involved in developing, acquiring, and delivering such capabilities.

  17. Technological advancements for the detection of and protection against biological and chemical warfare agents.

    PubMed

    Eubanks, Lisa M; Dickerson, Tobin J; Janda, Kim D

    2007-03-01

    There is a growing need for technological advancements to combat agents of chemical and biological warfare, particularly in the context of the deliberate use of a chemical and/or biological warfare agent by a terrorist organization. In this tutorial review, we describe methods that have been developed both for the specific detection of biological and chemical warfare agents in a field setting, as well as potential therapeutic approaches for treating exposure to these toxic species. In particular, nerve agents are described as a typical chemical warfare agent, and the two potent biothreat agents, anthrax and botulinum neurotoxin, are used as illustrative examples of potent weapons for which countermeasures are urgently needed.

  18. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  19. Strategic Analysis of Irregular Warfare

    DTIC Science & Technology

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  20. AirLand Battle and Tactical Command and Control Automation,

    DTIC Science & Technology

    1987-01-07

    Army Tactical Command and Control System (ATCCS) are the primary subjects of the last period. The precepts of AirLand Battle doctrine are examined to...AirLand Battle and the Army Tactical Command and Control System (ATCCS) are thE primary subjects of the last period. The precepts of AirLand Battle...centralized control is identified. AirLand Battle and the Army Tactical Command and Control System (ATCCS) are the primary subjects of the last

  1. Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among U.S. Air Force Cyber Warfare Operators

    DTIC Science & Technology

    2013-01-01

    distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational

  2. Tactical missile aerodynamics

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J. (Editor); Nielsen, Jack N. (Editor)

    1986-01-01

    The present conference on tactical missile aerodynamics discusses autopilot-related aerodynamic design considerations, flow visualization methods' role in the study of high angle-of-attack aerodynamics, low aspect ratio wing behavior at high angle-of-attack, supersonic airbreathing propulsion system inlet design, missile bodies with noncircular cross section and bank-to-turn maneuvering capabilities, 'waverider' supersonic cruise missile concepts and design methods, asymmetric vortex sheding phenomena from bodies-of-revolution, and swept shock wave/boundary layer interaction phenomena. Also discussed are the assessment of aerodynamic drag in tactical missiles, the analysis of supersonic missile aerodynamic heating, the 'equivalent angle-of-attack' concept for engineering analysis, the vortex cloud model for body vortex shedding and tracking, paneling methods with vorticity effects and corrections for nonlinear compressibility, the application of supersonic full potential method to missile bodies, Euler space marching methods for missiles, three-dimensional missile boundary layers, and an analysis of exhaust plumes and their interaction with missile airframes.

  3. The Airpower Advantage in Future Warfare: The Need for Strategy

    DTIC Science & Technology

    2007-12-01

    political situation which gener- ates war and therefore warfare, foreign and domestic; the social- cultural ideologies , attitudes, habits of mind, and...the ideological rivalries that contributed so powerfully to interstate rivalry, ambition, and anxiety are all but defunct, save only in two respects...instead to fit that still improving competence into a truly holistic approach to warfare. That approach, in its turn, needs to fit into a genu - inely

  4. Sub state Unconventional Warfare: Expanding United States Military Political Options

    DTIC Science & Technology

    2016-05-26

    phases due to competing incumbent efforts. Giap was influenced in his understanding of revolutionary war phasing by Sun Tzu who Giap called one of his...Challenge of Unconventional Warfare. London: Routledge, 2012. Ames, Roger T. Sun - Tzu The Art of Warfare. New York: Ballantine Books, 1993. Amin, Samir...Guerrilla: Insurgents, Patriots, and Terrorists from Sun Tzu to Bin Laden. London: Brassey’s Inc., 2004. Rosenau, William, Subversion and Insurgency

  5. Oceanography and Mine Warfare

    DTIC Science & Technology

    2000-03-13

    of breaking waves , the position and strength of surface currents, and the propagation of the tide into very shallow waters. In the surf zone...6) sediment properties determine shock wave propagation , a method for mine neutralization in the surf zone. 48 OCEANOGRAPHY AND MINE WARFARE...mines will be buried in the sediments, sedimentary explosive shock wave propagation is critical for determining operational performance. Presently, we

  6. Space System Applications to Tactical Operations.

    DTIC Science & Technology

    1984-10-01

    AD-AI51 884 SPACE SYSTEM APPLICATIONS TO TACTICAL OPERATIONSIU) I, ADVISORY GROU)P FOR AEROSPACE RESEARCH AND DEVELOPMENT NEUILIT-SUR-SEINE (FRANCE...FOR1’ AIIII [ I [IiP[E REEAC [ [llllvd[ N I AGARD CONFERENCE PROCEEDINGS No.344 Space System Applications to Tactical Operations DTIC ELECTE...nota %ii. .tm’ ih1.1i .Il t oning oiii.ian later oil Ili thre centturv are charaeteri/ed. Bloth the ad’.antage’. and limitation%. iii space ’.’.’tem

  7. The long darkness: Psychological and moral perspectives on nuclear winter

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grinspoon, L.

    The aftermath of nuclear war - a sustained period of devastation called nuclear winter - would threaten the survival of civilization, even of the human species. In this book some opponents of the arms race describe the consequences of nuclear warfare and offer explanations - drawn from their knowledge of psychiatry, history, religion, and biology - for the irrational behavior of political leaders who risk these consequences and for the reluctance of ordinary citizens to face the horror of the nuclear threat.

  8. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    DTIC Science & Technology

    2017-06-09

    Stretching and Exploiting Thresholds for High -Order War: How Russia, China, and Iran are Eroding American Influence Using Time-Tested Measures...PSYOP Terminology,” in American Institutes for Research, Department of the Army Pamphlet 525-7-1-2, The Art and Science of Psychological Operations...efforts to attack the enemies’ “ power , influence, and will.”88 In the United States, Irregular Warfare was not a part of doctrine until 2007, when the

  9. Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyber Warfare

    DTIC Science & Technology

    2014-05-22

    CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey

  10. Metal organic frameworks for the catalytic detoxification of chemical warfare nerve agents

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hupp, Joseph T.; Farha, Omar K.; Katz, Michael J.

    A method of using a metal organic framework (MOF) comprising a metal ion and an at least bidendate organic ligand to catalytically detoxify chemical warfare nerve agents including exposing the metal-organic-framework (MOF) to the chemical warfare nerve agent and catalytically decomposing the nerve agent with the MOF.

  11. Online Pedagogical Tutorial Tactics Optimization Using Genetic-Based Reinforcement Learning.

    PubMed

    Lin, Hsuan-Ta; Lee, Po-Ming; Hsiao, Tzu-Chien

    2015-01-01

    Tutorial tactics are policies for an Intelligent Tutoring System (ITS) to decide the next action when there are multiple actions available. Recent research has demonstrated that when the learning contents were controlled so as to be the same, different tutorial tactics would make difference in students' learning gains. However, the Reinforcement Learning (RL) techniques that were used in previous studies to induce tutorial tactics are insufficient when encountering large problems and hence were used in offline manners. Therefore, we introduced a Genetic-Based Reinforcement Learning (GBML) approach to induce tutorial tactics in an online-learning manner without basing on any preexisting dataset. The introduced method can learn a set of rules from the environment in a manner similar to RL. It includes a genetic-based optimizer for rule discovery task by generating new rules from the old ones. This increases the scalability of a RL learner for larger problems. The results support our hypothesis about the capability of the GBML method to induce tutorial tactics. This suggests that the GBML method should be favorable in developing real-world ITS applications in the domain of tutorial tactics induction.

  12. Online Pedagogical Tutorial Tactics Optimization Using Genetic-Based Reinforcement Learning

    PubMed Central

    Lin, Hsuan-Ta; Lee, Po-Ming; Hsiao, Tzu-Chien

    2015-01-01

    Tutorial tactics are policies for an Intelligent Tutoring System (ITS) to decide the next action when there are multiple actions available. Recent research has demonstrated that when the learning contents were controlled so as to be the same, different tutorial tactics would make difference in students' learning gains. However, the Reinforcement Learning (RL) techniques that were used in previous studies to induce tutorial tactics are insufficient when encountering large problems and hence were used in offline manners. Therefore, we introduced a Genetic-Based Reinforcement Learning (GBML) approach to induce tutorial tactics in an online-learning manner without basing on any preexisting dataset. The introduced method can learn a set of rules from the environment in a manner similar to RL. It includes a genetic-based optimizer for rule discovery task by generating new rules from the old ones. This increases the scalability of a RL learner for larger problems. The results support our hypothesis about the capability of the GBML method to induce tutorial tactics. This suggests that the GBML method should be favorable in developing real-world ITS applications in the domain of tutorial tactics induction. PMID:26065018

  13. Multistage Deployment of the Army Theater Hospital

    DTIC Science & Technology

    2013-12-01

    analysis on the effects warfare tactics, casualty timing, and casualty types had on the medical treatment facility (Cecchine et al., 2001). This proved...the 44-bed mobile portion of the current CSH was potentially inadequate to support approximately four brigades in an asymmetrical warfare scenario...systems and its increased force effectiveness on the fleet. He utilized quantitative analysis with Lanchester and Hughes-Salvo models to show that

  14. Naval War College Review. Volume 65, Number 2, Spring 2012

    DTIC Science & Technology

    2012-01-01

    warfare doctrine that scarcely exists in today’s American military. Finally, as part of our long-standing effort to understand capabilities and...long before network-centric warfare became a central feature of joint doctrine , the Navy established a program called “Copernicus” to assimilate...exchange data if the right technology, doctrine , tactics, techniques, and procedures were in place. The importance of coalition partners effectively

  15. Fluctuating asymmetry, sociosexuality, and intrasexual competitive tactics.

    PubMed

    Simpson, J A; Gangestad, S W; Christensen, P N; Leck, K

    1999-01-01

    Heterosexual men and women were told they were competing with another same-sex individual for a date with an attractive opposite-sex interviewer. After answering 6 questions, participants were asked to tell the competitor why the interviewer should choose them over the competitor. Participants' videotaped behavior was coded for different behavioral tactics. Men who were more symmetrical and who had a more unrestricted sociosexual orientation were more likely to use direct competition tactics than were less symmetrical and restricted men. Restricted men accentuated their positive personal qualities, presenting themselves as "nice guys." Structural equation modeling revealed that fluctuating asymmetry (FA) was directly associated with the use of direct competition tactics. However, the link between FA and presenting oneself as a nice guy was mediated through sociosexuality. No effects were found for women.

  16. Chemical warfare and the Gulf War: a review of the impact on Gulf veterans' health.

    PubMed

    Riddle, James R; Brown, Mark; Smith, Tyler; Ritchie, Elspeth Cameron; Brix, Kelley Ann; Romano, James

    2003-08-01

    It is unlikely that Gulf War veterans are suffering chronic effects from illnesses caused by chemical warfare nerve agent exposure. Extensive investigation and review by several expert panels have determined that no evidence exists that chemical warfare nerve agents were used during the Gulf War. At no time before, during, or after the war was there confirmation of symptoms among anyone, military or civilian, caused by chemical warfare nerve agent exposure. However, studies of Gulf War veterans have found belief that chemical weapons were used, significantly associated with both severe and mild-moderate illnesses. The psychological impact of a chemical warfare attack, either actual or perceived, can result in immediate and long-term health consequences. The deployment or war-related health impact from life-threatening experiences of the Gulf War, including the perceived exposure to chemical warfare agents, should be considered as an important cause of morbidity among Gulf War veterans.

  17. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). NewSearch

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1994-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 250 citations and includes a subject term index andmore » title list.)« less

  18. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  19. The use of impression management tactics in structured interviews: a function of question type?

    PubMed

    Ellis, Aleksander P J; West, Bradley J; Ryan, Ann Marie; DeShon, Richard P

    2002-12-01

    This study investigated impression management tactic use during structured interviews containing both experience-based and situational questions. Specifically, the authors examined whether applicants' use of impression management tactics depended on question type. Results from 119 structured interviews indicated that almost all of the applicants used some form of impression management. Significantly more assertive than defensive impression management tactics were used, and among assertive tactics, applicants tended to use self-promotion rather than ingratiation. However, different question types prompted the use of different impression management tactics. Ingratiation tactics were used significantly more when applicants answered situational questions, whereas self-promotion tactics were used significantly more when applicants answered experience-based questions. Furthermore, the use of self-promotion and ingratiation tactics was positively related to interviewer evaluations.

  20. Characterization of Tactical Departure Scheduling in the National Airspace System

    NASA Technical Reports Server (NTRS)

    Capps, Alan; Engelland, Shawn A.

    2011-01-01

    This paper discusses and analyzes current day utilization and performance of the tactical departure scheduling process in the National Airspace System (NAS) to understand the benefits in improving this process. The analysis used operational air traffic data from over 1,082,000 flights during the month of January, 2011. Specific metrics included the frequency of tactical departure scheduling, site specific variances in the technology's utilization, departure time prediction compliance used in the tactical scheduling process and the performance with which the current system can predict the airborne slot that aircraft are being scheduled into from the airport surface. Operational data analysis described in this paper indicates significant room for improvement exists in the current system primarily in the area of reduced departure time prediction uncertainty. Results indicate that a significant number of tactically scheduled aircraft did not meet their scheduled departure slot due to departure time uncertainty. In addition to missed slots, the operational data analysis identified increased controller workload associated with tactical departures which were subject to traffic management manual re-scheduling or controller swaps. An analysis of achievable levels of departure time prediction accuracy as obtained by a new integrated surface and tactical scheduling tool is provided to assess the benefit it may provide as a solution to the identified shortfalls. A list of NAS facilities which are likely to receive the greatest benefit from the integrated surface and tactical scheduling technology are provided.

  1. You Won't Get Me: Therapist Responses to Patient Impression Management Tactics.

    PubMed

    Frühauf, Sarah; Figlioli, Patrick; Caspar, Franz

    2017-03-01

    In psychotherapy, therapist and patient influence each other constantly. We aimed to investigate how therapists respond to patient impression management and influence tactics. For 60 videotaped intake interviews, judges rated therapist responses to patient tactics as neutral, desired, or undesired from the patient perspective. Judges rated the therapist responses in 57% as neutral, in 40% as desired, and in 2% as undesired by the patients. The proportions of response outcomes varied across tactics. Therapist responses were unrelated to therapist and patient sex. Therapist experience was related to their responses to the tactic Supplication. Overall, some patient tactics seem to be more challenging for therapists than others. Awareness of such response tendencies can help therapists prepare their reactions to certain patient impression management and influence tactics. Implications for training and research are presented.

  2. Oxidative decontamination of chemical and biological warfare agents using L-Gel.

    PubMed

    Raber, Ellen; McGuire, Raymond

    2002-08-05

    A decontamination method has been developed using a single reagent that is effective both against chemical warfare (CW) and biological warfare (BW) agents. The new reagent, "L-Gel", consists of an aqueous solution of a mild commercial oxidizer, Oxone, together with a commercial fumed silica gelling agent, Cab-O-Sil EH-5. L-Gel is non-toxic, environmentally friendly, relatively non-corrosive, maximizes contact time because of its thixotropic nature, clings to walls and ceilings, and does not harm carpets or painted surfaces. The new reagent also addresses the most demanding requirements for decontamination in the civilian sector, including availability, low maintenance, ease of application and deployment by a variety of dispersal mechanisms, minimal training and acceptable expense. Experiments to test the effectiveness of L-Gel were conducted at Lawrence Livermore National Laboratory and independently at four other locations. L-Gel was tested against all classes of chemical warfare agents and against various biological warfare agent surrogates, including spore-forming bacteria and non-virulent strains of real biological agents. Testing showed that L-Gel is as effective against chemical agents and biological materials, including spores, as the best military decontaminants.

  3. Offensive tactical thinking level of wheelchair basketball players in Arab countries.

    PubMed

    Hindawi, Omar S; Orabi, Samira; Al Arjan, Jafar; Judge, Lawrence W; Cottingham, Michael; Bellar, David Michael

    2013-01-01

    The purpose of this study was to assess the appropriateness of offensive tactical decision-making of Arab basketball players, and to determine if there are differences in the appropriateness of offensive tactical decision-making within the various disability classifications of Arab basketball players. A twenty-question survey was formulated to assess decision-making in offensive tactical situations in wheelchair basketball players. Participants in the present study were 108 athletes from 10 Arab national teams participating in wheelchair basketball. The mean offensive tactical thinking level of wheelchair basketball players in the 20 different situations in the Arab countries ranged between 1.38-2.84, and the standard deviations for these 20 means ranged from 0.41 to 0.90. The total mean of all tactical situations was 2.33, which is moderate thinking level. The influence of the disability classification on the offensive tactical thinking of wheelchair basketball players was addressed by examining the data via a one-way ANOVA. The ANOVA revealed no significant differences among disability classifications/categories in tactical thinking (F(3, 104)=1.12, p=0.34). This study represents the first attempt to identify why Arab nations have not consistently qualified for the Paralympics or World Championships. These findings indicate that the moderate offensive tactical thinking level of wheelchair basketball players on Arab national teams may be part of the reason that performances of these teams have not been as strong as they would like.

  4. Channel CAT: A Tactical Link Analysis Tool

    DTIC Science & Technology

    1997-09-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS CHANNEL CAT : A TACTICAL LINK ANALYSIS TOOL by Michael Glenn Coleman September 1997 Thesis...REPORT TYPE AND DATES COVERED September 1997 Master’s Thesis 4. TITLE AND SUBTITLE CHANNEL CAT : A TACTICAL LINK ANALYSIS TOOL 5. FUNDING NUMBERS 6...tool, the Channel Capacity Analysis Tool (Channel CAT ), designed to provide an automated tool for the anlysis of design decisions in developing client

  5. Underestimated: Our Not So Peaceful Nuclear Future

    DTIC Science & Technology

    2016-01-01

    strategic appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and...has long complained about Israeli nuclear weapons and previously attempted to get nuclear weapons, just announced its intention to tender bids for...cooperation with India, Russia, and the Chinese. As a part of this review, it also would be helpful to game alternative war and military crisis scenarios

  6. The Use of Influence Tactics Among Mid-Level Managers in the Community College.

    ERIC Educational Resources Information Center

    Quinley, John W.; Baker, George A. III; Gillett-Karam, Rosemary

    1995-01-01

    Examines the extent to which community college midlevel managers use power and influence tactics. Results show tactics were not used uniformly and were mostly directed toward lateral levels. Community college administrators employed influence tactics more often than did corporate, with both ranking tactics in almost identical order of use. (19…

  7. Efficacy Evaluation of Current and Future Naval Mine Warfare Neutralization Method

    DTIC Science & Technology

    2016-12-01

    Distribution is unlimited. EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD by Team MIW Cohort SE311-152O...EFFICACY EVALUATION OF CURRENT AND FUTURE NAVAL MINE WARFARE NEUTRALIZATION METHOD 5. FUNDING NUMBERS 6. AUTHOR (S) Team MIW, Systems Engineering...NEUTRALIZATION METHOD Team MIW, Systems Engineering Cohort SE311-152O Submitted in partial fulfillment of the requirements for the degrees of

  8. Calming the Churn: Resolving the Dilemma of Rotational Warfare in Counterinsurgency

    DTIC Science & Technology

    2013-12-01

    warfare in counterinsurgency Publisher Monterey, California: Naval Postgraduate School Issue Date 2013-12 URL http://hdl.handle.net/10945/38873... TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE CALMING THE CHURN: RESOLVING THE DILEMMA OF ROTATIONAL WARFARE IN COUNTERINSURGENCY...operations, however, would not last and, after only a year, MacArthur was sent to other duties thanks to personality conflicts with Taft. His replacement

  9. Fundamental Tactical Principles of Soccer: A Comparison of Different Age Groups.

    PubMed

    Borges, Paulo Henrique; Guilherme, José; Rechenchosky, Leandro; da Costa, Luciane Cristina Arantes; Rinadi, Wilson

    2017-09-01

    The fundamental tactical principles of the game of soccer represent a set of action rules that guide behaviours related to the management of game space. The aim of this study was to compare the performance of fundamental offensive and defensive tactical principles among youth soccer players from 12 to 17 years old. The sample consisted of 3689 tactical actions performed by 48 soccer players in three age categories: under 13 (U-13), under 15 (U-15), and under 17 (U-17). Tactical performance was measured using the System of Tactical Assessment in Soccer (FUT-SAT). The Kruskal Wallis, Mann-Whitney U, Friedman, Wilcoxon, and Cohen's Kappa tests were used in the study analysis. The results showed that the principles of "offensive coverage" (p = 0.01) and "concentration" (p = 0.04) were performed more frequently by the U-17 players than the U-13 players. The tactical principles "width and length" (p < 0.05) and "defensive unit" (p < 0.05) were executed more frequently by younger soccer players. It can be concluded that the frequency with which fundamental tactical principles are performed varies between the gaming categories, which implies that there is valuation of defensive security and a progressive increase in "offensive coverage" caused by increased confidence and security in offensive actions.

  10. Rethinking Cultural Influences on Warfare

    DTIC Science & Technology

    2012-05-17

    36 Jarole B. Manheim, Richard C. Lars Willnat, and Craig Brians , Empirical Political...Willnat, and Craig Brians , Empirical Political Analysis: Quantitative and Qualitative Research Methods (New York: Pearson Education Inc, 2008... Boxer Rebellions. In 1950, China was emerging from 13 years of protracted warfare with Japan and a civil war between the Chinese Communist Party (CCP

  11. Coalition Warfare: the Leadership Challenges

    DTIC Science & Technology

    2011-05-19

    Approved for Public Release; Distribution is Unlimited Coalition Warfare: The leadership challenges A Monograph by Colonel Mark J Thornhill...The leadership challenges . 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Colonel Mark J. Thornhill...multinational operations, leadership challenges , leadership attributes, unity of command. 16. SECURITY CLASSIFICATION OF: UNCLASSIFIED 17. LIMITATION OF

  12. Modifiability Tactics

    DTIC Science & Technology

    2007-09-01

    The Pattern Understood in Terms of Tactics 44 13.4 Variants 44 14 Microkernel Pattern 45 14.1 Problem 45 14.2 Solution 45 14.3 The Pattern...Figure 12: Model-View-Controller Pattern Structure 42 Figure 13: Presentation-Abstraction-Control Pattern Structure 43 Figure 14: Microkernel ...Presentation- Abstraction- Control X X X X Microkernel X X X X X Reflection X X Each pattern is described in more detail in the

  13. The Influence Tactic Preferred by Teaching Faculty: An Exploratory Case Study

    ERIC Educational Resources Information Center

    Rogers-Backus, Bonnie L.

    2010-01-01

    This quantitative study was developed to determine the influence tactic used most often by teachers in a small college classroom. It was hypothesized that the rational persuasion tactic, which is defined as "using logical arguments and factual evidence to persuade the target". (Fu & Yukl, 2000, p. 252) would be the most commonly employed tactic by…

  14. Research of ad hoc network based on SINCGARS network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  15. Online Mate-Retention Tactics on Facebook Are Associated With Relationship Aggression.

    PubMed

    Brem, Meagan J; Spiller, Laura C; Vandehey, Michael A

    2015-10-01

    A measure of Facebook-related mate-retention tactics was developed to investigate the relationship between online behaviors and intimate partner aggression. One hundred and seventy-seven young adults (65 men, 112 women) completed questionnaires that included measures of online and offline mate-retention tactics, Facebook jealousy, Facebook surveillance, and intimate partner violence. A factor analysis yielded four subscales for the Facebook Mate-Retention Tactic Inventory (FMRTI): Care and Affection, Jealousy and Surveillance, Possession Signals, and Punishment of Infidelity Threat. The FMRTI total scores were positively correlated with Facebook jealousy, Facebook surveillance, and use of offline mate-retention tactics. The Jealousy and Surveillance subscale uniquely predicted intimate partner psychological and physical aggression over and above existing measures. Facebook mate-retention tactics fully mediated the relation between Facebook jealousy and both intimate partner psychological and physical aggression. The current study provides preliminary evidence for conceptualizing Facebook as an environment for the use of mate-retention tactics that have real-life implications for intimate partner violence. © The Author(s) 2014.

  16. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-11-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  17. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-10-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology. (Contains 50-250 citations and includes a subject term index andmore » title list.) (Copyright NERAC, Inc. 1995)« less

  18. Chemical and biological warfare: General studies. (Latest citations from the NTIS bibliographic database). Published Search

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1995-09-01

    The bibliography contains citations concerning federally sponsored and conducted studies into chemical and biological warfare operations and planning. These studies cover areas not addressed in other parts of this series. The topics include production and storage of agents, delivery techniques, training, military and civil defense, general planning studies, psychological reactions to chemical warfare, evaluations of materials exposed to chemical agents, and studies on banning or limiting chemical warfare. Other published searches in this series on chemical warfare cover detection and warning, defoliants, protection, and biological studies, including chemistry and toxicology.(Contains 50-250 citations and includes a subject term index and titlemore » list.) (Copyright NERAC, Inc. 1995)« less

  19. The Development of Sport Expertise: Mapping the Tactical Domain.

    ERIC Educational Resources Information Center

    McPherson, Sue L.

    1994-01-01

    Explores issues and research relevant to sport tactical knowledge development and expertise. The paper discusses controversies concerning methodological tools, possible levels of analysis in sport research, sport tactical knowledge and expertise, a protocol structure model for sport, and expert-novice sport research. (SM)

  20. Antidotes and treatments for chemical warfare/terrorism agents: an evidence-based review.

    PubMed

    Rodgers, G C; Condurache, C T

    2010-09-01

    This article reviews the evidence supporting the efficacy of antidotes used or recommended for the potential chemical warfare agents of most concern. Chemical warfare agents considered include cyanide, vesicants, pulmonary irritants such as chlorine and phosgene, and nerve agents. The strength of evidence for most antidotes is weak, highlighting the need for additional research in this area.

  1. Remaining Relevant: Historical Contributions, Civil-Military Challenges, and Anti-Submarine Warfare Capabilities on Coast Guard Cutters

    DTIC Science & Technology

    2018-03-01

    HISTORICAL CONTRIBUTIONS, CIVIL-MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS by Brian A. Smicklas...CONTRIBUTIONS, CIVIL- MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS 5. FUNDING NUMBERS 6. AUTHOR(S) Brian A...MILITARY CHALLENGES, AND ANTI-SUBMARINE WARFARE CAPABILITIES ON COAST GUARD CUTTERS Brian A. Smicklas Commander, U.S. Coast Guard B.S., Coast

  2. Estimated Chemical Warfare Agent Surface Clearance Goals for Remediation Pre-Planning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dolislager, Frederick; Bansleben, Dr. Donald; Watson, Annetta Paule

    2010-01-01

    Health-based surface clearance goals, in units of mg/cm2, have been developed for the persistent chemical warfare agents sulfur mustard (HD) and nerve agent VX as well as their principal degradation products. Selection of model parameters and critical receptor (toddler child) allow calculation of surface residue estimates protective for the toddler child, the general population and adult employees of a facilty that has undergone chemical warfare agent attack.

  3. The Strategic and Political Impacts of Collateral Damage from Strike Warfare

    DTIC Science & Technology

    2015-03-01

    damage from strike warfare focuses on legal, humanitarian, and moral issues . To oversimplify, killing non-combatants is bad, but it happens, and not...humanitarian, and moral issues . To oversimplify, killing non- combatants is bad, but it happens, and not always by accident. Therefore, it is instructive...method of bombing. A significant amount of research on the effects of collateral damage from strike warfare focuses on humanitarian and moral issues

  4. Supporting tactical intelligence using collaborative environments and social networking

    NASA Astrophysics Data System (ADS)

    Wollocko, Arthur B.; Farry, Michael P.; Stark, Robert F.

    2013-05-01

    Modern military environments place an increased emphasis on the collection and analysis of intelligence at the tactical level. The deployment of analytical tools at the tactical level helps support the Warfighter's need for rapid collection, analysis, and dissemination of intelligence. However, given the lack of experience and staffing at the tactical level, most of the available intelligence is not exploited. Tactical environments are staffed by a new generation of intelligence analysts who are well-versed in modern collaboration environments and social networking. An opportunity exists to enhance tactical intelligence analysis by exploiting these personnel strengths, but is dependent on appropriately designed information sharing technologies. Existing social information sharing technologies enable users to publish information quickly, but do not unite or organize information in a manner that effectively supports intelligence analysis. In this paper, we present an alternative approach to structuring and supporting tactical intelligence analysis that combines the benefits of existing concepts, and provide detail on a prototype system embodying that approach. Since this approach employs familiar collaboration support concepts from social media, it enables new-generation analysts to identify the decision-relevant data scattered among databases and the mental models of other personnel, increasing the timeliness of collaborative analysis. Also, the approach enables analysts to collaborate visually to associate heterogeneous and uncertain data within the intelligence analysis process, increasing the robustness of collaborative analyses. Utilizing this familiar dynamic collaboration environment, we hope to achieve a significant reduction of time and skill required to glean actionable intelligence in these challenging operational environments.

  5. What’s Operations Research? and Why Should We (Interagents) Care?

    DTIC Science & Technology

    2010-02-09

    OR (from DSB Report on ISR applications) – World War I • Thomas Edison led anti-submarine warfare tactics study/development – World War II • English...Operations – Joint Warfare – Resources/Readiness/Training – Acquisition – Interdisciplinary Advances in OR • Recent Special Meetings – Power and Energy...the scientific method to inform decisions • Early applications were military operations focused – Lanchester equations of combat – Anti-submarine

  6. Categorical Confusion? The Strategic Implications of Recognizing Challenges Either as Irregular or Traditional

    DTIC Science & Technology

    2012-02-01

    its perpetrator. The signature military style of irregular belligerents is guerrilla tactics privileging a hit-and-run, which is to say raiding... style in warfare. Option 2. The challenge or threat environment for the Unit- ed States does not divide neatly into menaces readily and unambiguously...appears to be a fatal flaw in the proposition that there are distinctively hybrid challenges, wars, strategies, and styles of warfare. Hybridity is not

  7. Gender Differences in the Impact of Warfare Exposure on Self-Rated Health

    PubMed Central

    Wang, Joyce M.; Lee, Lewina O.; Spiro, Avron

    2014-01-01

    BACKGROUND This study examined gender differences in the impact of warfare exposure on self-reported physical health. METHODS Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. FINDINGS Women reported better health status but greater functional impairment than men. In men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared to those who experienced neither stressor or deployment to a war zone only. In women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women, but in men, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared to those who experienced war zone only or neither stressor. CONCLUSIONS Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. PMID:25442366

  8. Fundamental Tactical Principles of Soccer: A Comparison of Different Age Groups

    PubMed Central

    Guilherme, José; Rechenchosky, Leandro; da Costa, Luciane Cristina Arantes; Rinadi, Wilson

    2017-01-01

    Abstract The fundamental tactical principles of the game of soccer represent a set of action rules that guide behaviours related to the management of game space. The aim of this study was to compare the performance of fundamental offensive and defensive tactical principles among youth soccer players from 12 to 17 years old. The sample consisted of 3689 tactical actions performed by 48 soccer players in three age categories: under 13 (U-13), under 15 (U-15), and under 17 (U-17). Tactical performance was measured using the System of Tactical Assessment in Soccer (FUT-SAT). The Kruskal Wallis, Mann-Whitney U, Friedman, Wilcoxon, and Cohen’s Kappa tests were used in the study analysis. The results showed that the principles of “offensive coverage” (p = 0.01) and “concentration” (p = 0.04) were performed more frequently by the U-17 players than the U-13 players. The tactical principles “width and length” (p < 0.05) and “defensive unit” (p < 0.05) were executed more frequently by younger soccer players. It can be concluded that the frequency with which fundamental tactical principles are performed varies between the gaming categories, which implies that there is valuation of defensive security and a progressive increase in “offensive coverage” caused by increased confidence and security in offensive actions. PMID:28828091

  9. Tactical Decision Aids High Bandwidth Links Using Autonomous Vehicles

    DTIC Science & Technology

    2004-01-01

    1 Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) A. J. Healey, D. P. Horner, Center for Autonomous Underwater Vehicle...SUBTITLE Tactical Decision Aids (High Bandwidth Links Using Autonomous Vehicles ) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  10. Technology Transition for Hybrid Warfare

    DTIC Science & Technology

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  11. Tactical Damage Control Resuscitation.

    PubMed

    Fisher, Andrew D; Miles, Ethan A; Cap, Andrew P; Strandenes, Geir; Kane, Shawn F

    2015-08-01

    Recently the Committee on Tactical Combat Casualty Care changed the guidelines on fluid use in hemorrhagic shock. The current strategy for treating hemorrhagic shock is based on early use of components: Packed Red Blood Cells (PRBCs), Fresh Frozen Plasma (FFP) and platelets in a 1:1:1 ratio. We suggest that lack of components to mimic whole blood functionality favors the use of Fresh Whole Blood in managing hemorrhagic shock on the battlefield. We present a safe and practical approach for its use at the point of injury in the combat environment called Tactical Damage Control Resuscitation. We describe pre-deployment preparation, assessment of hemorrhagic shock, and collection and transfusion of fresh whole blood at the point of injury. By approaching shock with goal-directed therapy, it is possible to extend the period of survivability in combat casualties. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  12. Adaptation of a Knowledge-Based Decision-Support System in the Tactical Environment.

    DTIC Science & Technology

    1981-12-01

    002-04-6411S1CURITY CL All PICATION OF 1,416 PAGE (00HIR Onto ea0aOW .L10 *GU9WVC 4bGSI.CAYON S. Voss 10466lVka t... OftesoE ’ making decisons . The...noe..aaw Ad tdlalttt’ IV 680011 MMib) Artificial Intelligence; Decision-Support Systems; Tactical Decision- making ; Knowledge-based Decision-support...tactical information to assist tactical commanders in making decisions. The system, TAC*, for "Tactical Adaptable Consultant," incorporates a database

  13. Blaptica dubia as sentinels for exposure to chemical warfare agents - a pilot study.

    PubMed

    Worek, Franz; Seeger, Thomas; Neumaier, Katharina; Wille, Timo; Thiermann, Horst

    2016-11-16

    The increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents a continuing threat to our societies. Early warning and detection is a key component for effective countermeasures against such deadly agents. Presently available and near term solutions have a number of major drawbacks, e.g. lack of automated, remote warning and detection of primarily low volatile chemical warfare agents. An alternative approach is the use of animals as sentinels for exposure to toxic chemicals. To overcome disadvantages of vertebrates the present pilot study was initiated to investigate the suitability of South American cockroaches (Blaptica dubia) as warning system for exposure to chemical warfare nerve and blister agents. Initial in vitro experiments with nerve agents showed an increasing inhibitory potency in the order tabun - cyclosarin - sarin - soman - VX of cockroach cholinesterase. Exposure of cockroaches to chemical warfare agents resulted in clearly visible and reproducible reactions, the onset being dependent on the agent and dose. With nerve agents the onset was related to the volatility of the agents. The blister agent lewisite induced signs largely comparable to those of nerve agents while sulfur mustard exposed animals exhibited a different sequence of events. In conclusion, this first pilot study indicates that Blaptica dubia could serve as a warning system to exposure of chemical warfare agents. A cockroach-based system will not detect or identify a particular chemical warfare agent but could trigger further actions, e.g. specific detection and increased protective status. By designing appropriate boxes with (IR) motion sensors and remote control (IR) camera automated off-site warning systems could be realized. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. On investigating social dynamics in tactical opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Gao, Wei; Li, Yong

    2014-06-01

    The efficiency of military mobile network operations at the tactical edge is challenging due to the practical Disconnected, Intermittent, and Limited (DIL) environments at the tactical edge which make it hard to maintain persistent end-to-end wireless network connectivity. Opportunistic mobile networks are hence devised to depict such tactical networking scenarios. Social relations among warfighters in tactical opportunistic mobile networks are implicitly represented by their opportunistic contacts via short-range radios, but were inappropriately considered as stationary over time by the conventional wisdom. In this paper, we develop analytical models to probabilistically investigate the temporal dynamics of this social relationship, which is critical to efficient mobile communication in the battlespace. We propose to formulate such dynamics by developing various sociological metrics, including centrality and community, with respect to the opportunistic mobile network contexts. These metrics investigate social dynamics based on the experimentally validated skewness of users' transient contact distributions over time.

  15. 78 FR 53109 - Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti-Submarine Warfare Command; San Diego Bay... Anti-Submarine Warfare Command to protect the relocated marine mammal program. These security zone... Warfare Command, the Commander of Naval Region Southwest, or a designated representative of those...

  16. Relative fitness of alternative male reproductive tactics in a mammal varies between years.

    PubMed

    Schradin, Carsten; Lindholm, Anna K

    2011-09-01

    1. In many species, males can use different behavioural tactics to achieve fertilization, so-called alternative reproductive tactics (ARTs). Few field studies have measured fitness consequences of ARTs under varying environmental conditions. 2. Here, we describe fitness consequences of three phenotypically plastic ARTs in the African striped mouse (Rhabdomys pumilio) and show that relative fitness of ARTs differs between years. Each year represents a different generation. 3. For the generation living under high population density, tactics differed in relative fitness in accordance with the theory of conditional strategies, with highly successful territorial breeding males having 10 times higher success than solitary roaming males and 102 times higher success than adult natally philopatric males. 4. For the generation living under intermediate population density, the territorial breeding and roaming tactics yielded similar fitness, which would be in agreement with the theory of mixed strategies. No philopatric males occurred. 5. For the generation living under low population density, roaming was the only tactic used and some roamers had very high fitness. 6. The main prediction of status-dependent selection for conditional strategies is a correlation between fitness and status, often measured as body mass, but we did not find this correlation within tactics when more than one tactic was expressed in the population. 7. Female distribution seems to have an effect on which reproductive tactics male chose: female defence polygyny when females are clumped (interference competition), but a searching tactic when females are dispersed (scramble competition). In contrast to predictions arising from theory on scramble competition, male body mass was important in determining fitness only in the year when females were dispersed, but not in other years. 8. Our results indicate that the differentiation between conditional and mixed strategies is not an absolute one. In many other

  17. Burnout of teachers as related to influence tactics within the college classroom.

    PubMed

    Lamude, K G; Scudder, J

    1994-10-01

    Previous research has shown that burnout among college teachers is negatively associated with on-task learning and student-oriented concerns expressed as tactics on influence in class. Using data collected from 142 college teachers, this study examined this relationship. Burnout was measured on Cherniss's measure, and tactics of influence were assessed by the Behavior Alteration Message Technique. Analysis indicated burnout in teachers was positively related to pressure and position tactics on influence and negatively related to exchange of rewards, rational arguments, and feedback tactics of influence.

  18. Airborne and Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS)

    DTIC Science & Technology

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-421 Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) As of FY 2017...Information Program Name Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) DoD Component Army Responsible Office References SAR...UNCLASSIFIED 5 Mission and Description Airborne & Maritime/Fixed Station Joint Tactical Radio System (AMF JTRS) products are software programmable

  19. Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project

    DTIC Science & Technology

    2005-09-30

    Technical Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project William R. Metzger Marine...Support Services for the Office of Naval Research Littoral Warfare Advanced Development Project 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  20. Battlefield Medical Network: Biosensors In A Tactical Environment

    DTIC Science & Technology

    2016-03-01

    MEDICAL NETWORK: BIOSENSORS IN A TACTICAL ENVIRONMENT by Ralph R. Montgomery Yekaterina L. Anderson March 2016 Thesis Advisor: Alex...2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE BATTLEFIELD MEDICAL NETWORK: BIOSENSORS IN A TACTICAL ENVIRONMENT 5...School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/ A 10

  1. Transitioning the Tactical Marine Corps to IPv6

    DTIC Science & Technology

    2011-09-01

    SUT System Under Test SYSCOM Systems Command (synonymous with MCSC) TCP Transmission Control Protocol TDS Tactical Data Systems TDN...capability to provide services to the Marine Corps Tactical Data Systems ( TDS ) and other DDS-M systems. The 2 DDS-M can function as the file server...Intelligence ( ATI ) program provides comprehensive application protocols and attacks, as well as feature updates and responsive service and support with

  2. Media/Device Configurations for Platoon Leader Tactical Training

    DTIC Science & Technology

    1985-02-01

    munication and visual communication sig- na ls, VInputs to the The device should simulate the real- Platoon Leader time receipt of all tactical voice...communication, audio and visual battle- field cues, and visual communication signals. 14- Table 4 (Continued) Functional Capability Categories and...battlefield cues, and visual communication signals. 0.8 Receipt of limited tactical voice communication, plus audio and visual battlefield cues, and visual

  3. Analysis of Tactical Intelligence Experience in Southeast Asia

    DTIC Science & Technology

    1976-02-01

    Analysis of Tactical Intelligence Experience in Southeast Asia (U) by John R. Johnson Richard P. Joyce Paul C. Nagle Aristotelis D. Stathacopoulos...INSTRUCTIONSREPORT DOCUMENTATION PAEBEFORE COMPLETING FORM 1. REKPOXT NUMBER F OT CESSION No. I PIENT’S CAT ALOG NUMBER Experience in Southeast Asia (U...WORDS (Confinue, an reverse aide ii neressory and identit’ biy blockA ,wmbor) tactical intelligence intelligence organization Laos Southeast Asia

  4. Electronic Warfare and Radar Systems Engineering Handbook

    DTIC Science & Technology

    1999-04-01

    EWRL Electronic Warfare Reprogrammable ELNOT Emitter Library Notation Library (USN) EM Electromagnetic EWSI EW Systems Integration E-Mail Electronic...ram air turbine (RAT) propellers used to power aircraft pods, helicopter rotor blades, and protruding surfaces of automobile hubcaps will all provide

  5. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  6. Tactics for the Educational Change Agent. A Preliminary Analyisis.

    ERIC Educational Resources Information Center

    Rosenau, Fred S.

    This prototype of a guide for educational change agents focuses on the roles and tactics of personnel employed in nonprofit educational research and development organizations and in state and intermediate education agencies. Included is a compilation of reports from recent users of three classes of tactics: information, demonstration, and field…

  7. Gender differences in the impact of warfare exposure on self-rated health.

    PubMed

    Wang, Joyce M; Lee, Lewina O; Spiro, Avron

    2015-01-01

    This study examined gender differences in the impact of warfare exposure on self-reported physical health. Data are from the 2010 National Survey of Veterans, a nationally representative survey of veterans from multiple eras of service. Regression analyses assessed gender differences in the association between warfare exposure (deployment to a war zone, exposure to casualties) and health status and functional impairment, adjusting for sociodemographics. Women reported better health status but greater functional impairment than men. Among men, those who experienced casualties only or both casualties and deployment to a war zone had worse health compared with those who experienced neither stressor or deployment to a war zone only. Among women, those who experienced casualties only or both stressors reported worse health than those who experienced war zone only, who did not differ from the unexposed. No association was found between warfare exposure and functional impairment in women; in men, however, those who experienced exposure to casualties or both stressors had greater odds of functional impairment compared with those who experienced war zone only or neither stressor. Exposure to casualties may be more predictive of health than deployment to a war zone, especially for men. We did not find a stronger association between warfare exposure and health for women than men. Given that the expansion of women's military roles has allowed them to serve in direct combat, their degree and scope of warfare exposure is likely to increase in the future. Copyright © 2015 Jacobs Institute of Women's Health. All rights reserved.

  8. Submarine Warfare in the 20th & 21st Centuries: A Bibliography

    DTIC Science & Technology

    2003-12-01

    International studies series ser. no. 02-019). 49 p. Bailey, Thomas Andrew and Paul B. Ryan. The Lusitania disaster: an episode in modern warfare and...verlagshandlung, 1939. 212 p. Ellis, Frederick D. The tragedy of the Lusitania : embracing authentic stories by the survivors and eye-witnesses of the disaster...warfare; a study of its methods and spirit, including the crime of the " Lusitania ," a record of observations and evidence. New York, London, D. Appleton

  9. Relationship between tactics and energy expenditure according to level of experience in badminton.

    PubMed

    Dieu, Olivier; Blondeau, Thomas; Vanhelst, Jérémy; Fardy, Paul S; Bui-Xuân, Gilles; Mikulovic, Jacques

    2014-10-01

    Research on racket sports has traditionally focused on expert players and has treated energy expenditure and tactics as independent factors. These prior studies could not assess how energy expenditure and tactics changed as a function of experience and skill. Here, the specific relationship between playing tactics and energy expenditure in badminton were assessed. Participants were classified into five stages of badminton experience on the basis of conative criteria: structural (physical abilities), technical (technical skills), and functional (tactics). The physical activity of 99 players (47 beginners, 15 intermediates, 30 advanced, and 7 experts) was measured using a three-axis accelerometer during a badminton set (21 points, no extra scoring). The results showed that physical activity (counts/sec.) ranged between about 115 (Stage 1) and 155 (Stage 5), and differed significantly across the conative stages. For Stages 2 and 4, defined by an increase in use of tactics, physical activity increased substantially. For Stage 3, defined by a decrease in use of tactics, physical activity decreased significantly. Thus, tactically-oriented play appears to be closely related to physical activity.

  10. Impact of Tactical and Strategic Weather Avoidance on Separation Assurance

    NASA Technical Reports Server (NTRS)

    Refai, Mohamad S.; Windhorst, Robert

    2011-01-01

    The ability to keep flights away from weather hazards while maintaining aircraft-to-aircraft separation is critically important. The Advanced Airspace Concept is an automation concept that implements a ground-based strategic conflict resolution algorithm for management of aircraft separation. The impact of dynamic and uncertain weather avoidance on this concept is investigated. A strategic weather rerouting system is integrated with the Advanced Airspace Concept, which also provides a tactical weather avoidance algorithm, in a fast time simulation of the Air Transportation System. Strategic weather rerouting is used to plan routes around weather in the 20 minute to two-hour time horizon. To address forecast uncertainty, flight routes are revised at 15 minute intervals. Tactical weather avoidance is used for short term trajectory adjustments (30 minute planning horizon) that are updated every minute to address any weather conflicts (instances where aircraft are predicted to pass through weather cells) that are left unresolved by strategic weather rerouting. The fast time simulation is used to assess the impact of tactical weather avoidance on the performance of automated conflict resolution as well as the impact of strategic weather rerouting on both conflict resolution and tactical weather avoidance. The results demonstrate that both tactical weather avoidance and strategic weather rerouting increase the algorithm complexity required to find aircraft conflict resolutions. Results also demonstrate that tactical weather avoidance is prone to higher airborne delay than strategic weather rerouting. Adding strategic weather rerouting to tactical weather avoidance reduces total airborne delays for the reported scenario by 18% and reduces the number of remaining weather violations by 13%. Finally, two features are identified that have proven important for strategic weather rerouting to realize these benefits; namely, the ability to revise reroutes and the use of maneuvers

  11. A Machine Learning System for Analyzing Human Tactics in a Game

    NASA Astrophysics Data System (ADS)

    Ito, Hirotaka; Tanaka, Toshimitsu; Sugie, Noboru

    In order to realize advanced man-machine interfaces, it is desired to develop a system that can infer the mental state of human users and then return appropriate responses. As the first step toward the above goal, we developed a system capable of inferring human tactics in a simple game played between the system and a human. We present a machine learning system that plays a color expectation game. The system infers the tactics of the opponent, and then decides the action based on the result. We employed a modified version of classifier system like XCS in order to design the system. In addition, three methods are proposed in order to accelerate the learning rate. They are a masking method, an iterative method, and tactics templates. The results of computer experiments confirmed that the proposed methods effectively accelerate the machine learning. The masking method and the iterative method are effective to a simple strategy that considers only a part of past information. However, study speed of these methods is not enough for the tactics that refers to a lot of past information. For the case, the tactics template was able to settle the study rapidly when the tactics is identified.

  12. Unmanned Vanguard: Leveraging The Operational Effectiveness Of The Israeli Unmanned Aircraft System Program

    DTIC Science & Technology

    2012-04-01

    tactical electronic and optical reconnaissance (both high and low altitude); and 3) electronic combat (jamming and chaff dispensing).7 In contrast, the...sites or other radar sites. IAI designed the Harpy as a loitering UAS that would sit over the battlefield and search for electronic emissions from...tactical reconnaissance, and can be modified to carry different payloads for electronic warfare or attack missions. The Hermes 450 is the smallest

  13. Quality of Life in Iranian Chemical Warfare Veteran's.

    PubMed

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-05-01

    Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P < 0.001, r = - 0.33). So that the patients who had more than three organs involved had lower quality of life. 95.4% of our participants experienced another complication with respiratory complication and the ophthalmologic complications were the most frequent accompanying condition. The results imply that chemical warfare survivors suffering from late complications have a low health related quality of life.

  14. 78 FR 72025 - Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ...-AA87 Security Zones; Naval Base Point Loma; Naval Mine Anti Submarine Warfare Command; San Diego Bay... establishing a new security zone at the Naval Mine and Anti-Submarine Warfare Command to protect the relocated... Commander of Naval Base Point Loma, the Commander of the Naval Mine Anti Submarine Warfare Command, and the...

  15. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  16. Leading Change Step-by-Step: Tactics, Tools, and Tales

    ERIC Educational Resources Information Center

    Spiro, Jody

    2010-01-01

    "Leading Change Step-by-Step" offers a comprehensive and tactical guide for change leaders. Spiro's approach has been field-tested for more than a decade and proven effective in a wide variety of public sector organizations including K-12 schools, universities, international agencies and non-profits. The book is filled with proven tactics for…

  17. 33 CFR 165.1103 - Security Zone; Naval Mine Anti Submarine Warfare Command; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Submarine Warfare Command; San Diego Bay, San Diego, CA. 165.1103 Section 165.1103 Navigation and Navigable... Eleventh Coast Guard District § 165.1103 Security Zone; Naval Mine Anti Submarine Warfare Command; San... the Naval Mine Anti Submarine Warfare Command, bound by the following coordinates: 32°43′40.9″ N, 117...

  18. Moral Warfare in Counterinsurgency Operations

    DTIC Science & Technology

    2007-05-11

    Moral Warfare in Counterinsurgency Operations A Monograph by MAJOR David C. Chiarenza US Army School of Advanced Military Studies United...OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 11-05-2007 2. REPORT TYPE AMSP Monograph 3...Public Release; Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This study explores the moral level of war in the context of

  19. Chemical analysis of bleach and hydroxide-based solutions after decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX).

    PubMed

    Hopkins, F B; Gravett, M R; Self, A J; Wang, M; Chua, Hoe-Chee; Hoe-Chee, C; Lee, H S Nancy; Sim, N Lee Hoi; Jones, J T A; Timperley, C M; Riches, J R

    2014-08-01

    Detailed chemical analysis of solutions used to decontaminate chemical warfare agents can be used to support verification and forensic attribution. Decontamination solutions are amongst the most difficult matrices for chemical analysis because of their corrosive and potentially emulsion-based nature. Consequently, there are relatively few publications that report their detailed chemical analysis. This paper describes the application of modern analytical techniques to the analysis of decontamination solutions following decontamination of the chemical warfare agent O-ethyl S-2-diisopropylaminoethyl methylphosphonothiolate (VX). We confirm the formation of N,N-diisopropylformamide and N,N-diisopropylamine following decontamination of VX with hypochlorite-based solution, whereas they were not detected in extracts of hydroxide-based decontamination solutions by nuclear magnetic resonance (NMR) spectroscopy or gas chromatography-mass spectrometry. We report the electron ionisation and chemical ionisation mass spectroscopic details, retention indices, and NMR spectra of N,N-diisopropylformamide and N,N-diisopropylamine, as well as analytical methods suitable for their analysis and identification in solvent extracts and decontamination residues.

  20. Relationship between Procedural Tactical Knowledge and Specific Motor Skills in Young Soccer Players

    PubMed Central

    Aquino, Rodrigo; Marques, Renato Francisco R.; Petiot, Grégory Hallé; Gonçalves, Luiz Guilherme C.; Moraes, Camila; Santiago, Paulo Roberto P.; Puggina, Enrico Fuini

    2016-01-01

    The purpose of this study was to investigate the association between offensive tactical knowledge and the soccer-specific motor skills performance. Fifteen participants were submitted to two evaluation tests, one to assess their technical and tactical analysis. The motor skills performance was measured through four tests of technical soccer skills: ball control, shooting, passing and dribbling. The tactical performance was based on a tactical assessment system called FUT-SAT (Analyses of Procedural Tactical Knowledge in Soccer). Afterwards, technical and tactical evaluation scores were ranked with and without the use of the cluster method. A positive, weak correlation was perceived in both analyses (rho = 0.39, not significant p = 0.14 (with cluster analysis); and rho = 0.35; not significant p = 0.20 (without cluster analysis)). We can conclude that there was a weak association between the technical and the offensive tactical knowledge. This shows the need to reflect on the use of such tests to assess technical skills in team sports since they do not take into account the variability and unpredictability of game actions and disregard the inherent needs to assess such skill performance in the game. PMID:29910300

  1. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  2. Tissue-based water quality biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias [Oak Ridge, TN; Sanders, Charlene A [Knoxville, TN

    2003-05-27

    A water quality sensor for detecting the presence of at least one chemical or biological warfare agent includes: a cell; apparatus for introducing water into the cell and discharging water from the cell adapted for analyzing photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms in water; a fluorometer for measuring photosynthetic activity of naturally occurring, free-living, indigenous photosynthetic organisms drawn into the cell; and an electronics package that analyzes raw data from the fluorometer and emits a signal indicating the presence of at least one chemical or biological warfare agent in the water.

  3. Tissue-based standoff biosensors for detecting chemical warfare agents

    DOEpatents

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  4. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    NASA Astrophysics Data System (ADS)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  5. Joint Light Tactical Vehicle (JLTV): Background and Issues for Congress

    DTIC Science & Technology

    2017-01-10

    Joint Light Tactical Vehicle (JLTV): Background and Issues for Congress Andrew Feickert Specialist in Military Ground Forces January 10, 2017......Congressional Research Service Summary The Joint Light Tactical Vehicle (JLTV) is being developed by the Army and the Marine Corps as a successor to the High

  6. Development of vaccines for bio-warfare agents.

    PubMed

    Rosenthal, S R; Clifford, J C M

    2002-01-01

    There is a recognized need for the development of new vaccines (as well as other biologicals and drugs) to counteract the effects of a potential bio-terrorist or bio-warfare event in the U.S. domestic population and military forces. Regulation of products to protect against potential bio-warfare agents poses unique challenges since the usual measures of efficacy that require exposure to natural disease may not currently be possible, for epidemiological and ethical reasons. To help to address this issue, the FDA has published and requested comments on a proposed animal rule intended to address certain efficacy issues for new agents for use against lethal or permanently disabling toxic substances. Recent product development activity has focused on Bacillus anthracis (anthrax) and variola major (smallpox), agents that are regarded as highest priority in posing a risk to national security. FDA resources exist to assist vaccine developers with regard to the novel challenges posed in the dinical development of these products.

  7. Computational models of intergroup competition and warfare.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Letendre, Kenneth; Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that themore » burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.« less

  8. Organizing Chaos: The Tactical Assault Kit Collaborative Mission Planner

    DTIC Science & Technology

    2018-12-01

    choice. Case studies , such as the 2017 Presidential Inauguration Collective Security Event, Operation Flaming Sword 2017, and the counter-ISIS campaign...rallied around the Tactical Assault Kit (TAK) as their mission command tool of choice. Case studies , such as the 2017 Presidential Inauguration...authorities ADA Air Defense Artillery ADM Army Design Methodology ADAPT Advanced Digital Advisor Partner Technologies ATAK Android Tactical Assault Kit

  9. [The re-introduction of malaria in the Pontine Marshes and the Cassino district during the end of World War II. Biological warfare or global war tactics?].

    PubMed

    Sabbatani, Sergio; Fiorino, Sirio; Manfredi, Roberto

    2013-12-01

    After the fall of the Fascist regime on September 8, 1943, Italy was split into two parts: (i) the Southern regions where the King Victor Emanuel III and the military general staff escaped was under the control of English-American allied armies, and (ii) the northern regions comprising Lazio, Tuscany, Umbria, and Marche still under the control of the Germans. The German Wehrmacht, after suffering several defeats on Southern lines, established a new strengthened line of defence called the Gustav line, located south of Rome and crossing in the western portion the recently-drained Pontine Marshes. In his book published in 2006, Frank Snowden hypothesised that occupying German armies in 1943 had initiated a programme of re-flooding the Pontine plain as a biological warfare strategy to re-introduce malaria infection in the territories south of Rome, Such a plan was intended (i) to slow down the advance of English-American forces, and (ii) to punish Italians who abandoned their former allies. Other authors, including Annibale Folchi, Erhard Geissler, and Jeanne Guillemin, have disputed this hypothesis based on an analysis of recently-uncovered archive documents. What is not disputed is that the flooding of the Pontine and Roman plains in 1943 contributed to a severe malaria epidemic in 1944, which was associated with exceptionally high morbidity and mortality rates in the afflicted populations. Herein, we critically evaluate the evidence and arguments of whether the Wehrmacht specifically aimed to spread malaria as a novel biological warfare strategy in Italy during the Second World War. In our opinion, evidence for specific orders to deliberately spread malaria by the German army is lacking, although the strategy itself may have been considered by Nazis during the waning years of the war.

  10. The Maritime Strategy Debates: A Guide to the Renaissance of U.S. Naval Strategic Thinking in the 1980s.

    DTIC Science & Technology

    1988-02-24

    strategy, as well as strike warfare and tactical innovations). ** Gray, Colin , "Maritime Strategy", Proceedings, February 1986, pp 34-42. (Supportive...driven document). ** Gray, Colin S., "Keeping the Soviets Landlocked: Geostrategy for a Maritime America", The National Interest, Summer 1986, pp 24-36...latter on the role of U.S. and allied submarines in the Maritime Strategy: "We dare not go it alone"). ** Drury , F., "Naval Strike Warfare and the

  11. Tactics for the New Guerilla Trainer.

    ERIC Educational Resources Information Center

    Mershon, Phil

    2001-01-01

    Discusses tactics for surviving as a trainer in an unfriendly organizational atmosphere. Offers a method for demonstrating to managers the connection between quality assurance and employee empowerment. (JOW)

  12. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  13. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation

    DTIC Science & Technology

    2009-10-09

    Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review

  14. DARPA Technical Accomplishments. Volume 2. An Historical Review of Selected DARPA Projects

    DTIC Science & Technology

    1991-04-01

    Deputy Director, respectively, of the ARPA Tactical Technology Office, arranged a workshop on tactical systems and technology at the Naval Undersea ...experiment.7 The signal processing for ARTEMIS, and later for LASA, was done by IBM. In the late 1960s the National Academy’s Committee on Undersea Warfare...conducted a Summer Study to review potential advances in undersea surveillance, at the request of the Navy. Among other things this group recommended

  15. Brain Transcriptional Profiles of Male Alternative Reproductive Tactics and Females in Bluegill Sunfish

    PubMed Central

    Partridge, Charlyn G.; MacManes, Matthew D.; Knapp, Rosemary; Neff, Bryan D.

    2016-01-01

    Bluegill sunfish (Lepomis macrochirus) are one of the classic systems for studying male alternative reproductive tactics (ARTs) in teleost fishes. In this species, there are two distinct life histories: parental and cuckolder, encompassing three reproductive tactics, parental, satellite, and sneaker. The parental life history is fixed, whereas individuals who enter the cuckolder life history transition from sneaker to satellite tactic as they grow. For this study, we used RNAseq to characterize the brain transcriptome of the three male tactics and females during spawning to identify gene ontology (GO) categories and potential candidate genes associated with each tactic. We found that sneaker males had higher levels of gene expression differentiation compared to the other two male tactics. Sneaker males also had higher expression in ionotropic glutamate receptor genes, specifically AMPA receptors, compared to other males, which may be important for increased spatial working memory while attempting to cuckold parental males at their nests. Larger differences in gene expression also occurred among male tactics than between males and females. We found significant expression differences in several candidate genes that were previously identified in other species with ARTs and suggest a previously undescribed role for cAMP-responsive element modulator (crem) in influencing parental male behaviors during spawning. PMID:27907106

  16. Brain Transcriptional Profiles of Male Alternative Reproductive Tactics and Females in Bluegill Sunfish.

    PubMed

    Partridge, Charlyn G; MacManes, Matthew D; Knapp, Rosemary; Neff, Bryan D

    2016-01-01

    Bluegill sunfish (Lepomis macrochirus) are one of the classic systems for studying male alternative reproductive tactics (ARTs) in teleost fishes. In this species, there are two distinct life histories: parental and cuckolder, encompassing three reproductive tactics, parental, satellite, and sneaker. The parental life history is fixed, whereas individuals who enter the cuckolder life history transition from sneaker to satellite tactic as they grow. For this study, we used RNAseq to characterize the brain transcriptome of the three male tactics and females during spawning to identify gene ontology (GO) categories and potential candidate genes associated with each tactic. We found that sneaker males had higher levels of gene expression differentiation compared to the other two male tactics. Sneaker males also had higher expression in ionotropic glutamate receptor genes, specifically AMPA receptors, compared to other males, which may be important for increased spatial working memory while attempting to cuckold parental males at their nests. Larger differences in gene expression also occurred among male tactics than between males and females. We found significant expression differences in several candidate genes that were previously identified in other species with ARTs and suggest a previously undescribed role for cAMP-responsive element modulator (crem) in influencing parental male behaviors during spawning.

  17. Integrating Defense, Diplomacy, and Development (3 D) in the Naval Special Warfare Operator

    DTIC Science & Technology

    2010-12-01

    DIPLOMACY, AND DEVELOPMENT (3 D) IN THE NAVAL SPECIAL WARFARE OPERATOR by William Fiack William Roberts Tim Sulick December 2010...Development (3 D) in the Naval Special Warfare Operator 6. AUTHOR(S) William Fiack, William Roberts, Timothy Sulick 5. FUNDING NUMBERS 7. PERFORMING...MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES The views expressed in

  18. Quality of Life in Iranian Chemical Warfare Veteran's

    PubMed Central

    Ebadi, Abbas; Moradian, Tayeb; Mollahadi, Mohsen; Saeed, Yaser; Refahi, Ali Akbar

    2014-01-01

    Background: Mustard gas has different effects on different body systems such as respiratory tract, blood, gastrointestinal, skin, eye, endocrine and peripheral nervous system. Objectives: The purpose of this study was to determine the quality of life in chemical warfare veterans due to sulfur mustard exposure. Patients and Methods: In a cross-sectional and analytic study, 242 patients who had a chemical injury during the Iran-Iraq war (1980-1983) and their lung damage was proven were investigated in our study. The quality of life was measured in these patients using an extensively validated Iranian version of SF-36. Results: The mean age of veterans was 44.12 ± 4.9 ranging from 22 to 62 years. Our results showed that chemical warfare had a decreased quality of life in all subscales of the SF-36. The lowest scores in SF-36 subscales were related to role physical and general health. The data also showed a significant relationship between the number of organs involved and the quality of life in these patients (P < 0.001, r = − 0.33). So that the patients who had more than three organs involved had lower quality of life. 95.4% of our participants experienced another complication with respiratory complication and the ophthalmologic complications were the most frequent accompanying condition. Conclusions: The results imply that chemical warfare survivors suffering from late complications have a low health related quality of life. PMID:25031863

  19. New Developments in Chinese Strategic Psychological Warfare

    DTIC Science & Technology

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  20. Situation Awareness Information Dominance & Information Warfare.

    DTIC Science & Technology

    1997-02-01

    Information warfare and its primary objective of achieving information dominance over enemy forces have arisen as a major area of emphasis for future...military actions. The concept of information dominance and the issues involved in attaining it are explored through a model of situation awareness...directions for the development of systems to support the goal of information dominance can be established.

  1. Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

    DTIC Science & Technology

    Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while

  2. Defining Islamic Way of Warfare and Its Comparison with Al Qaeda Doctrine

    DTIC Science & Technology

    2012-06-08

    DEFINING ISLAMIC WAY OF WARFARE AND ITS COMPARISON WITH AL QAEDA DOCTRINE A thesis presented to the Faculty of the U.S. Army...subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO...Islamic way of warfare. It is important to understand that anything, to be qualified as Islamic, has to have a reference from the core sources of Islam

  3. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    PubMed

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  5. The Tactics of Hope

    ERIC Educational Resources Information Center

    Cytrynbaum, Pamela

    2010-01-01

    In this article, the author provides an intimate glimpse into the writing work that Joe Cytrynbaum did with students from Manley Career Academy High School in Chicago. The author's discussion of Joe's "tactics of hope" is layered and brought to life by Joe's poetry and the poetry of his students. The author presents Joe's poems and the…

  6. Tactical Communications Training Environment for Unmanned Aircraft System Operators

    DTIC Science & Technology

    2016-12-15

    communication and teamwork skills. The Night Vision Tactical Trainer - Shadow (NVTT-Shadow) was developed as a game -based desktop solution to train...advanced individual training Soldiers and UAS course instructors. The usability testing demonstrated the feasibility of interactive gaming applied to MUM...T tactical communications. Ratings and comments from both students and instructors validated the need as well as mission context, game content, and

  7. Tactical assessment in a squad of intelligent bots

    NASA Astrophysics Data System (ADS)

    Gołuński, Marcel; Wasiewicz, Piotr

    2010-09-01

    In this paper we explore the problem of communication and coordination in a team of intelligent game bots (aka embodied agents). It presents a tactical decision making system controlling the behavior of an autonomous bot followed by the concept of a team tactical decision making system controlling the team of intelligent bots. The algorithms to be introduced have been implemented in the Java language by means of Pogamut 2 framework, interfacing the bot logic with Unreal Tournament 2004 virtual environment.

  8. IMS software developments for the detection of chemical warfare agent

    NASA Technical Reports Server (NTRS)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  9. Enhancing The National Map Through Tactical Planning and Performance Monitoring

    USGS Publications Warehouse

    ,

    2008-01-01

    Tactical planning and performance monitoring are initial steps toward improving 'the way The National Map works' and supporting the U.S. Geological Survey (USGS) Science Strategy. This Tactical Performance Planning Summary for The National Map combines information from The National Map 2.0 Tactical Plan and The National Map Performance Milestone Matrix. The National Map 2.0 Tactical Plan is primarily a working document to guide The National Map program's execution, production, and metrics monitoring for fiscal years (FY) 2008 and 2009. The Tactical Plan addresses data, products, and services, as well as supporting and enabling activities. The National Map's 2-year goal for FY 2008 and FY 2009 is to provide a range of geospatial products and services that further the National Spatial Data Infrastructure and underpin USGS science. To do this, the National Geospatial Program will develop a renewed understanding during FY 2008 of key customer needs and requirements, develop the infrastructure to support The National Map business model, modernize its business processes, and reengineer its workforce. Priorities for The National Map will be adjusted if necessary to respond to changes to the project that may impact resources, constrain timeframes, or change customer needs. The supporting and enabling activities that make it possible to produce the products and services of The National Map will include partnership activities, improved compatibility of systems, outreach, and integration of data themes.

  10. The Age of Irregular Warfare: So What?

    DTIC Science & Technology

    2010-01-01

    Lynne Rienner, 2002), and Michael Vlahos , Fighting Identity: Sacred War and World Change (Westport, CT: Praeger Security Interna- tional, 2009). 7...the forms that warfare will take.” 8 I agree with Michael Vlahos that we poten- tially make matters worse by using the image of a triangle to depict

  11. Unorthodox Thoughts about Asymmetric Warfare

    DTIC Science & Technology

    2003-01-01

    Unorthodox Thoughts about Asymmetric Warfare MONTGOMERY C. MEIGS “Bad terminology is the enemy of good thinking.” — Warren Buffett 1 I n the last few...Mr. Buffett , the Sage of Omaha, and agree on a set of definitions that will provide our tools for analysis. In preempting the terrorist are we really...still apt. 10. Warren Bennis and Burt Nanus, Leaders (New York: HarperCollins, 1997), pp. 102-40. Bennis and Nanus provide a useful construct for

  12. Information Warfare and International Law

    DTIC Science & Technology

    1998-01-01

    OMB control number. 1. REPORT DATE 1998 2. REPORT TYPE 3. DATES COVERED 00-00-1998 to 00-00-1998 4. TITLE AND SUBTITLE Information Warfare and...international law where those dictates endanger or conflict with the pursuit of their fundamental interests , including national security. The Legal...34war," and may not be covered by the humanitarian provisions that attempt to lessen war’s cruelty.28 FIGURE 3 The Purpose of This Book The

  13. Modeling Anti-Air Warfare With Discrete Event Simulation and Analyzing Naval Convoy Operations

    DTIC Science & Technology

    2016-06-01

    WARFARE WITH DISCRETE EVENT SIMULATION AND ANALYZING NAVAL CONVOY OPERATIONS by Ali E. Opcin June 2016 Thesis Advisor: Arnold H. Buss Co...REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MODELING ANTI-AIR WARFARE WITH DISCRETE EVENT...In this study, a discrete event simulation (DES) was built by modeling ships, and their sensors and weapons, to simulate convoy operations under

  14. An evolutionary theory of large-scale human warfare: Group-structured cultural selection.

    PubMed

    Zefferman, Matthew R; Mathew, Sarah

    2015-01-01

    When humans wage war, it is not unusual for battlefields to be strewn with dead warriors. These warriors typically were men in their reproductive prime who, had they not died in battle, might have gone on to father more children. Typically, they are also genetically unrelated to one another. We know of no other animal species in which reproductively capable, genetically unrelated individuals risk their lives in this manner. Because the immense private costs borne by individual warriors create benefits that are shared widely by others in their group, warfare is a stark evolutionary puzzle that is difficult to explain. Although several scholars have posited models of the evolution of human warfare, these models do not adequately explain how humans solve the problem of collective action in warfare at the evolutionarily novel scale of hundreds of genetically unrelated individuals. We propose that group-structured cultural selection explains this phenomenon. © 2015 Wiley Periodicals, Inc.

  15. Future Carrier-Based Tactical Aircraft Study

    DOT National Transportation Integrated Search

    1996-03-01

    This report describes an aircraft database which was developed to identify technology trends for several classes of tactical naval aircraft, including subsonic attack, supersonic fighter, and supersonic multimission aircraft classes. This study used ...

  16. Changing the Scale and Efficiency of Chemical Warfare Countermeasure Discovery Using the Zebrafish

    PubMed Central

    Peterson, Randall T.; MacRae, Calum A.

    2013-01-01

    As the scope of potential chemical warfare agents grows rapidly and as the diversity of potential threat scenarios expands with non-state actors, so a need for innovative approaches to countermeasure development has emerged. In the last few years, the utility of the zebrafish as a model organism that is amenable to high-throughput screening has become apparent and this system has been applied to the unbiased discovery of chemical warfare countermeasures. This review summarizes the in vivo screening approach that has been pioneered in the countermeasure discovery arena, and highlights the successes to date as well as the potential challenges in moving the field forward. Importantly, the establishment of a zebrafish platform for countermeasure discovery would offer a rapid response system for the development of antidotes to the continuous stream of new potential chemical warfare agents. PMID:24273586

  17. A Descriptive Analysis of US Prehospital Care Response to Law Enforcement Tactical Incidents.

    PubMed

    Aberle, Sara J; Lohse, Christine M; Sztajnkrycer, Matthew D

    2015-01-01

    Law enforcement tactical incidents involve high-risk operations that exceed the capabilities of regular, uniformed police. Despite the existence of tactical teams for 50 years, little is known about the frequency or nature of emergency medical services (EMS) response to tactical events in the United States. The purpose of this study was to perform a descriptive analysis of tactical events reported to a national EMS database. Descriptive analysis of the 2012 National Emergency Medical Services Information System (NEMSIS) Public Release research data set, containing EMS emergency response data from 41 states. A total of 17,479,328 EMS events were reported, of which 3,953 events were coded as "Activation-Tactical or SWAT Specialty Service/Response Team." The most common level of prehospital care present on scene was basic life support (55.2%). The majority (72.3%) of tactical incident activations involved a single patient; mass casualty incidents occurred in 0.5% of events. The most common EMS response locations were homes (48.4%), streets or highways (37.0%), and public buildings (6.3%). The mean age of treated patients was 44.1 years ± 22.0 years; 3.5% of tactical incident activation patients were aged 8 years or less. Injuries were coded as firearm assault in 14.8% and as chemical exposure in 8.9% of events. Cardiac arrest occurred in 5.1% of patients, with the majority (92.2%) occurring prior to EMS arrival. The primary symptoms reported by EMS personnel were pain (37.4%), change in responsiveness (13.1%), and bleeding (8.1%). Advanced airway procedures occurred in 30 patients. No patients were documented as receiving tourniquets or needle thoracostomy. Approximately 11 EMS responses in support of law enforcement tactical operations occur daily in the United States. The majority occur in homes and involve a single patient. Advanced airway procedures are required in a minority of patients. Cardiac arrest is rare and occurs prior to EMS response in the majority of

  18. Comparison of Three Instructional Approaches to Enhance Tactical Knowledge in Volleyball among University Students

    ERIC Educational Resources Information Center

    Vande Broek, Gert; Boen, Filip; Claessens, Manu; Feys, Jos; Ceux, Tanja

    2011-01-01

    This study investigated the decision-making process of three instructional groups (i.e., teacher-centered, student-centered with tactical questioning and student-centered without tactical questioning) in practical courses in volleyball among university students. All students (N = 122) performed a Tactical Awareness task on the correctness of the…

  19. Biological Warfare at the 1346 Siege of Caffa

    PubMed Central

    2002-01-01

    On the basis of a 14th-century account by the Genoese Gabriele de’ Mussi, the Black Death is widely believed to have reached Europe from the Crimea as the result of a biological warfare attack. This is not only of great historical interest but also relevant to current efforts to evaluate the threat of military or terrorist use of biological weapons. Based on published translations of the de’ Mussi manuscript, other 14th-century accounts of the Black Death, and secondary scholarly literature, I conclude that the claim that biological warfare was used at Caffa is plausible and provides the best explanation of the entry of plague into the city. This theory is consistent with the technology of the times and with contemporary notions of disease causation; however, the entry of plague into Europe from the Crimea likely occurred independent of this event. PMID:12194776

  20. Tactical Satellite 3

    NASA Astrophysics Data System (ADS)

    Davis, T. M.; Straight, S. D.; Lockwook, R. B.

    2008-08-01

    Tactical Satellite 3 is an Air Force Research Laboratory Science and Technology (S&T) initiative that explores the capability and technological maturity of small, low-cost satellites. It features a low cost "plug and play" modular bus and low cost militarily significant payloads - a Raytheon developed Hyperspectral imager and secondary payload data exfiltration provided by the Office of Naval Research. In addition to providing for ongoing innovation and demonstration in this important technology area, these S&T efforts also help mitigate technology risk and establish a potential concept of operations for future acquisitions. The key objectives are rapid launch and on-orbit checkout, theater commanding, and near-real time theater data integration. It will also feature a rapid development of the space vehicle and integrated payload and spacecraft bus by using components and processes developed by the satellite modular bus initiative. Planned for a late summer 2008 launch, the TacSat-3 spacecraft will collect and process images and then downlink processed data using a Common Data Link. An in-theater tactical ground station will have the capability to uplink tasking to spacecraft and will receive full data image. An international program, the United Kingdom Defence Science and Technology Laboratory (DSTL) and Australian Defence Science and Technology Organisation (DSTO) plan to participate in TacSat-3 experiments.

  1. Technical and tactical skills related to performance levels in tennis: A systematic review.

    PubMed

    Kolman, Nikki S; Kramer, Tamara; Elferink-Gemser, Marije T; Huijgen, Barbara C H; Visscher, Chris

    2018-06-11

    The aim of this systematic review is to provide an overview of outcome measures and instruments identified in the literature for examining technical and tactical skills in tennis related to performance levels. Such instruments can be used to identify talent or the specific skill development training needs of particular players. Searches for this review were conducted using the PubMed, Web of Science, and PsycInfo databases. Out of 733 publications identified through these searches, 40 articles were considered relevant and included in this study. They were divided into three categories: (1) technical skills, (2) tactical skills and (3) integrated technical and tactical skills. There was strong evidence that technical skills (ball velocity and to a lesser extent ball accuracy) and tactical skills (decision making, anticipation, tactical knowledge and visual search strategies) differed among players according to their performance levels. However, integrated measurement of these skills is required, because winning a point largely hinges on a tactical decision to perform a particular stroke (i.e., technical execution). Therefore, future research should focus on examining the relationship between these skills and tennis performance and on the development of integrated methods for measuring these skills.

  2. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    PubMed

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  3. Timescales for exploratory tactical behaviour in football small-sided games.

    PubMed

    Ric, Angel; Hristovski, Robert; Gonçalves, Bruno; Torres, Lorena; Sampaio, Jaime; Torrents, Carlota

    2016-09-01

    The aim of this study was to identify the dynamics of tactical behaviour emerging on different timescales in football small-sided games and to quantify short- and long-term exploratory behaviour according to the number of opponents. Two teams of four professional male footballers played small-sided games against two different teams with a variable number of opponents (3, 5 and 7). Data were collected using a combination of systematic observation and a non-differential global positioning system (15 Hz). The temporal diversity and structural flexibility of the players were determined by calculating the dynamic overlap order parameter q, entropy and trapping strength. Analysis of the exploratory dynamics revealed two different timescales, forming a different metastable landscape of action for each constraint. Fast dynamics lasted on average a few seconds and consisted of changes in tactical patterns. The long timescale corresponded to the shared tasks of offence and defence lasting tens of seconds. The players' tactical diversity decreased with an increasing number of opponents, especially in defence. Manipulating numerical imbalance is likely to promote changes in the diversity, unpredictability and flexibility of tactical solutions. The fact that the temporally nested structure of constraints shaped the emergence of tactical behaviour provides a new rationale for practice task design. The manipulation of numerical imbalance on the timescale of a few tens of seconds, on which the exploratory behaviour of players saturates, may help coaches to optimise the exploratory efficiency of the small-sided games.

  4. Impact of Terrain Features for Tactical Network Connectivity

    DTIC Science & Technology

    2013-09-01

    Impact of Terrain Features for Tactical Network Connectivity David Tate Lance Joneckis John Fregeau Corinne Kramer David Sparrow I N S T I T U...2000. I N S T I T U T E F O R D E F E N S E A N A LY S E S IDA Document NS D-5026 Impact of Terrain Features for Tactical Network Connectivity...visibility is acceptable when networks operate over flat terrain. Under our simple LOS model of connectivity, mobility has little impact in such an

  5. Consequence Management of a Yield-Producing Nuclear Detonation INCONUS: is NORTHCOM Ready

    DTIC Science & Technology

    2009-05-04

    command between Title 10 and Title 32 forces that would respond to a nuclear disaster will be a critical weakness. The CBRNE (Chemical, Biological...management response at the tactical level. The transportation requirements for the CCMRF response to a nuclear disaster will be significant and may affect the

  6. Iran’s Nuclear Program: Status

    DTIC Science & Technology

    2009-11-25

    wave software, and neutron sources, which could be useful for developing nuclear weapons.44 In addition, ElBaradei’s May 2008 report notes that...Intelligence stated that the Bureau continues to stand by this estimate. 77 The time frame described in the 2007 NIE is the same as one described in a... standing with the IAEA has ever used this tactic. North Korea restarted its nuclear weapons program after announcing its withdrawal from the NPT in

  7. Osteoarthritis and the Tactical Athlete: A Systematic Review

    PubMed Central

    Cameron, Kenneth L.; Driban, Jeffrey B.; Svoboda, Steven J.

    2016-01-01

    Objective: Although tactical athletes (eg, military service members, law enforcement personnel, fire fighters) are exposed to several known risk factors, it remains unclear if they are at increased risk for osteoarthritis (OA). The purpose of this systematic review was to investigate the association between serving as a tactical athlete and the incidence and prevalence of OA. Data Sources: We completed a comprehensive systematic literature search in November 2014 using 12 bibliographic databases (eg, PubMed, Ovid, SportDiscus) supplemented with manual searches of reference lists. Study Selection: Studies were included if they met the following criteria: (1) an aim of the study was to investigate an association between tactical athletes and OA; (2) the outcome measure was radiographic OA, clinical OA, total joint replacement, self-reported diagnosis of OA, or placement on a waiting list for a total joint replacement; (3) the study design was a cohort study; and (4) the study was written in English. Data Extraction: One investigator extracted data from articles that met all inclusion criteria (eg, group descriptions, measures of disease burden, source of nonexposed controls). Data Synthesis: Twelve articles met the inclusion criteria and described retrospective cohort studies. Firefighters, active-duty military service members, and veteran military parachutists consistently had a higher incidence or prevalence of knee, hip, or any OA diagnosis (4 studies). Active-duty pilots and veteran military parachutists may have a higher prevalence of spine OA, but this was not statistically significant (2 studies). Occupational risk factors for OA among tactical athletes include rank and branch of military service. The risk of OA among individuals who completed mandatory national military service remains unclear (6 studies). Conclusions: The incidence of OA among tactical athletes appears to be significantly higher when compared with nonexposed controls. Further research is

  8. Organizational Political Tactics in Universities

    ERIC Educational Resources Information Center

    Nejad, Bahareh Azizi; Abbaszadeh, Mir Mohammad Seiied; Hassani, Mohammad

    2011-01-01

    The present research aimed to promote understanding of political tactics in organizations. Political behavior in nowadays-complex conditions is a process that the conflicts, contrasts and differences among interested groups are resolved. It means dialogue, attention to different goals in organizations, regarding the interest of different groups,…

  9. Tactical Versus Strategic Behavior: General Aviation Piloting in Convective Weather Scenarios

    NASA Technical Reports Server (NTRS)

    Latorella, Kara A.; Chamberlain, James P.

    2002-01-01

    We commonly describe environments and behavioral responses to environmental conditions as 'tactical' and 'strategic.' However theoretical research defining relevant environmental characteristics is rare, as are empirical investigations that would inform such theory. This paper discusses General Aviation (GA) pilots' descriptions of tactical/strategic conditions with respect to weather flying, and evaluates their ratings along a tactical/strategic scale in response to real convective weather scenarios experienced during a flight experiment with different weather information cues. Perceived risk was significantly associated with ratings for all experimental conditions. In addition, environmental characteristics were found to be predictive of ratings for Traditional IMC (instrument meteorological conditions), i.e., aural weather information only, and Traditional VMC (visual meteorological conditions), i.e., aural information and an external view. The paper also presents subjects' comments regarding use of Graphical Weather Information Systems (GWISs) to support tactical and strategic weather flying decisions and concludes with implications for the design and use of GWISs.

  10. United States Coast Guard Antisubmarine Warfare (ASW) in the Maritime Defense Zone (MDZ) - A Strategic Approach

    DTIC Science & Technology

    1989-03-01

    RIC ILE COPY AIR WAR COLLGE REEAC R~pCR UNITED STATES COAST GUARD ANTISUBMARINE WARFARE (ASW) IN THE MARITIME DEFENSE ZONE (MDZ) -A STRATEGIC...going to perform in these MDZs. Those tasks identified so far include: port and coastal physical security & preventive safety, mine warfare

  11. Irregular Warfare Centric Foreign Internal Defense

    DTIC Science & Technology

    2013-06-01

    goods, its weak security forces and the gap unfilled by international forces.126 Scott Mann conducted a video interview on October 3 , 2012 and...Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE June 2013 3 . REPORT TYPE AND DATES COVERED...DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words) Conflict over the past few decades has changed drastically. Warfare changed with the conflict

  12. Making a vision document tangible using "vision-tactics-metrics" tables.

    PubMed

    Drury, Ivo; Slomski, Carol

    2006-01-01

    We describe a method of making a vision document tangible by attaching specific tactics and metrics to the key elements of the vision. We report on the development and early use of a "vision-tactics-metrics" table in a department of surgery. Use of the table centered the vision in the daily life of the department and its faculty, and facilitated cultural change.

  13. Research on tactical information display technology for interactive virtual cockpit

    NASA Astrophysics Data System (ADS)

    Sun, Zhongyun; Tian, Tao; Su, Feng

    2018-04-01

    Based on a fact that traditional tactical information display technology suffers from disadvantages of a large number of data to be transferred and low plotting efficiency in an interactive virtual cockpit, a GID protocol-based simulation has been designed. This method dissolves complex tactical information screens into basic plotting units. The indication of plotting units is controlled via the plotting commands, which solves the incompatibility between the tactical information display in traditional simulation and the desktop-based virtual simulation training system. Having been used in desktop systems for helicopters, fighters, and transporters, this method proves to be scientific and reasonable in design and simple and efficient in usage, which exerts a significant value in establishing aviation equipment technology support training products.

  14. Interagency Cooperation for Irregular Warfare at the Combatant Command

    DTIC Science & Technology

    2009-01-01

    Directorate, and the USSOCOM Interagency Task Force ( IATF ) offer examples of JIACGs coping with the issues of IW. Each organization possesses strengths...46 USSOCOM IATF History...Force for Irregular Warfare ( IATF IW).33 EUCOM conducts interagency

  15. A history of biological and chemical warfare and terrorism.

    PubMed

    Malloy, C D

    2000-07-01

    This article provides a brief history of biological warfare and terrorism. It contends that examining disease in history provides public health specialists with the knowledge necessary to improve our surveillance system for potential acts of bioterrorism.

  16. Age-dependent male mating tactics in a spider mite-A life-history perspective.

    PubMed

    Sato, Yukie; Rühr, Peter T; Schmitz, Helmut; Egas, Martijn; Blanke, Alexander

    2016-10-01

    Males often fight with rival males for access to females. However, some males display nonfighting tactics such as sneaking, satellite behavior, or female mimicking. When these mating tactics comprise a conditional strategy, they are often thought to be explained by resource holding potential (RHP), that is, nonfighting tactics are displayed by less competitive males who are more likely to lose a fight. The alternative mating tactics, however, can also be explained by life-history theory, which predicts that young males avoid fighting, regardless of their RHP, if it pays off to wait for future reproduction. Here, we test whether the sneaking tactic displayed by young males of the two-spotted spider mite can be explained by life-history theory. We tested whether young sneaker males survive longer than young fighter males after a bout of mild or strong competition with old fighter males. We also investigated whether old males have a more protective outer skin-a possible proxy for RHP-by measuring cuticle hardness and elasticity using nanoindentation. We found that young sneaker males survived longer than young fighter males after mild male competition. This difference was not found after strong male competition, which suggests that induction of sneaking tactic is affected by male density. Hardness and elasticity of the skin did not vary with male age. Given that earlier work could also not detect morphometric differences between fighter and sneaker males, we conclude that there is no apparent increase in RHP with age in the mite and age-dependent male mating tactics in the mite can be explained only by life-history theory. Because it is likely that fighting incurs a survival cost, age-dependent alternative mating tactics may be explained by life-history theory in many species when reproduction of old males is a significant factor in fitness.

  17. Project CHECO Southeast Asia Report. Tactical Airlift in SEA

    DTIC Science & Technology

    1972-02-15

    Air Force doctrine regarded the TALO as a member of the Tactical Air Control Party and thus responsible to the Air Liaison Officer ( ALO ) in 3 14 3...UNCLASSIFIED, I UNCLASSIFIED that area. However, the ALO was concerned with tactical air operations Isuch as delivery of ordnance and close air support...staff. Con- sequently, the TALOs and ALOs had little in common and in many instances were not collocated. Thus, the utilization of TALOs in Vietnam was

  18. TWIRL: Tactical Warfare in the ROSS Language.

    DTIC Science & Technology

    1984-10-01

    outputs of sponsored reserch for gee distribution. Publications of The Rand Corporation do not nece. * surily reflect the opinions or policies of the...I.I- V%.. CONTENTS p PREFACE ....................................................... iii SUM M ARY...objets involved in a battle. For wse in analysis or training. this facility would enable a human to play an active. decPisknmaking role during a

  19. Entomological Terrorism: A Tactic in Asymmetrical Warfare

    DTIC Science & Technology

    2010-06-01

    from high populations of pests , itching bites, and loss of sleep can also reduce morale.4(p2) One documented threat to military personnel that could...vector plant or animal pathogens or directly damage economically important crops and livestock. Table 1 identifies plant pests of significant...Species originally released for agricultural or economic gains that later became problematic pests  Species released in an act of

  20. Evaluation of tactical training in team handball by means of artificial neural networks.

    PubMed

    Hassan, Amr; Schrapf, Norbert; Ramadan, Wael; Tilp, Markus

    2017-04-01

    While tactical performance in competition has been analysed extensively, the assessment of training processes of tactical behaviour has rather been neglected in the literature. Therefore, the purpose of this study is to provide a methodology to assess the acquisition and implementation of offensive tactical behaviour in team handball. The use of game analysis software combined with an artificial neural network (ANN) software enabled identifying tactical target patterns from high level junior players based on their positions during offensive actions. These patterns were then trained by an amateur junior handball team (n = 14, 17 (0.5) years)). Following 6 weeks of tactical training an exhibition game was performed where the players were advised to use the target patterns as often as possible. Subsequently, the position data of the game was analysed with an ANN. The test revealed that 58% of the played patterns could be related to the trained target patterns. The similarity between executed patterns and target patterns was assessed by calculating the mean distance between key positions of the players in the game and the target pattern which was 0.49 (0.20) m. In summary, the presented method appears to be a valid instrument to assess tactical training.

  1. Interpersonal conflict tactics and substance use among high-risk adolescents.

    PubMed

    Unger, Jennifer B; Sussman, Steve; Dent, Clyde W

    2003-07-01

    Adolescents who use aggressive tactics to handle interpersonal conflicts may be at high risk for substance use, while adolescents who possess coping strategies to avoid or manage interpersonal conflict may be at lower risk for substance use. This study examined the association between interpersonal conflict tactics and substance use among 631 continuation high school students. Items from a modified Conflict Tactics Scale formed three factors: Physical Aggression, Nonphysical Aggression, and Nonaggression. Logistic regression analyses revealed that adolescents' ways of responding to interpersonal conflicts were associated with their substance use. Use of physical aggression was associated with a higher risk of cigarette, alcohol, marijuana, and other drug use. Use of nonphysical aggression was associated with a higher risk of cigarette and alcohol use. Use of nonaggressive conflict tactics was associated with a lower risk of cigarette use. Adolescents who respond to interpersonal conflicts in an aggressive manner, whether physical or verbal/psychological, may be at increased risk for substance use, while nonaggressive conflict management skills may be protective. Possibly, teaching adolescents nonaggressive techniques for handling interpersonal conflict may be a useful strategy for preventing both interpersonal violence and substance use.

  2. Marketing Tactics and Parents' Loyalty: The Mediating Role of School Image

    ERIC Educational Resources Information Center

    Li, Chung-Kai; Hung, Chia-Hung

    2009-01-01

    Purpose: This paper aims to investigate how marketing tactics can enhance parents' loyalty in the educational context. Building on extant research, it proposes an integrated framework in which perceived marketing tactics are related to school image, which in turn is related to parents' loyalty. Design/methodology/approach: Five marketing tactics…

  3. The Persuade Package Hypothesis: Further Evidence for an Influence Tactics Schema.

    ERIC Educational Resources Information Center

    Aguinis, Herman; And Others

    Researchers interested in social power in organizational contexts have focused on investigating whether situational factors affect people's preferences for types of influence tactics. The persuade package is defined as a small standard set of methods (influence tactics) that leads to a particular goal (persuade the target to do something). The…

  4. [Perspectives in the treatments of poisonings by organophosphorus insecticides and warfare nerve agents].

    PubMed

    Sogorb-Sánchez, M A; Vilanova-Gisbert, E; Carrera-González, V

    Organophosphorus compounds are worldwide employed as insecticides and are yearly responsible of several millions of poisonings. The chemical structure of most of the warfare nerve agents also corresponds with an organophosphorus compound. Organophosphorus insecticides and warfare nerve agents exert their main toxicological effects through inhibition of acetylcholinesterase. Current treatments of patients poisoned with organophosphorus compounds include atropine (in order to protect muscarinic receptors), oximes (in order to accelerate the reactivation of the inhibited acetylcholinesterase) and benzodiazepines (in order to avoid convulsions). The administration of phosphotriesterases (enzymes involved in the detoxication of organophosphorus compounds through hydrolysis) is a very effective treatment against poisonings by organophosphorus insecticides and warfare nerve agents. There are experimental preventive treatments based on the simultaneous administration of carbamates and certain antimuscarinic drugs, different from atropine, which notably improve the efficacy of the classical treatments applied after poisonings by warfare nerve agents. The treatments based in the administration of phosphotriesterases might be the response to the call of the World Health Organization for searching new treatments with capability to reduce the high mortality recorded in the cases of poisonings by organophosphorus compounds. These treatments can be applied in a preventive way without the intrinsic neurotoxicity associated to the preventive treatments based on carbamates and antimuscarinic drugs. Therefore, these treatments are specially interesting for people susceptible to suffer severe exposures, i.e. sprayers in the farms.

  5. Convoy Protection under Multi-Threat Scenario

    DTIC Science & Technology

    2017-06-01

    14. SUBJECT TERMS antisubmarine warfare, convoy protection, screening, design of experiments, agent-based simulation 15. NUMBER OF...46 5. Scenarios 33–36 (Red Submarine Tactic-2) ...............................46 IV. DESIGN OF EXPERIMENT...47 C. NEARLY ORTHOGONAL LATIN HYPERCUBE DESIGN ............51 V. DATA ANALYSIS

  6. The evolution of genetic and conditional alternative reproductive tactics

    PubMed Central

    2016-01-01

    Frequency-dependent selection may drive adaptive diversification within species. It is yet unclear why the occurrence of alternative reproductive tactics (ARTs) is highly divergent between major animal taxa. Here we aim to clarify the environmental and social conditions favouring the evolution of intra-population variance of male reproductive phenotypes. Our results suggest that genetically determined ARTs that are fixed for life evolve when there is strong selection on body size due to size-dependent competitiveness, in combination with environmental factors reducing size benefits. The latter may result from growth costs or, more generally, from age-dependent but size-independent mortality causes. This generates disruptive selection on growth trajectories underlying tactic choice. In many parameter settings, the model also predicts ARTs to evolve that are flexible and responsive to current conditions. Interestingly, the conditions favouring the evolution of flexible tactics diverge considerably from those favouring genetic variability. Nevertheless, in a restricted but relevant parameter space, our model predicts the simultaneous emergence and maintenance of a mixture of multiple tactics, both genetically and conditionally determined. Important conditions for the emergence of ARTs include size variation of competitors, which is inherently greater in species with indeterminate growth than in taxa reproducing only after reaching their terminal body size. This is probably the reason why ARTs are more common in fishes than in other major taxa. PMID:26911960

  7. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  8. Augmented Reality at the Tactical and Operational Levels of War

    DTIC Science & Technology

    2015-10-24

    benefits and challenges their personnel will experience once AR systems are fully adopted. This paper will explain these benefits and challenges as...develop, procure, and integrate systems it believes will benefit its tactical combat units and operational leaders. Ultimately, as the capabilities of...friendly forces, can also help to prevent collateral damage and civilian casualties. Beyond the immediate life-and-death benefits at the tactical

  9. Job Tactics of Women in Banking.

    ERIC Educational Resources Information Center

    Larwood, Laurie; Kaplan, Mindy

    1980-01-01

    Investigated tactics used by women branch bank officers for succeeding in management. Results showed a high degree of agreement about the importance of a number of items, including the ability to make decisions and the demonstration of competence. (Author)

  10. Teaching Combative Sports through Tactics

    ERIC Educational Resources Information Center

    Kozub, Francis M.; Kozub, Mary L.

    2004-01-01

    Martial arts have become popular in the United States and have transitioned from being spectator sports to avenues for active participation by people of all ages. The purpose of this article is to highlight tactical similarities in selected combative sport activities and to provide martial arts and wrestling instructors with an alternative…

  11. IW Cyberlaw. The Legal Issues of Information Warfare

    DTIC Science & Technology

    1999-01-01

    actions. The Information Warfare Center at Kelly AFB, Texas, casts a wide net in its definition of information war- fare. Its view is that... Maura T. McGowan, in an unpublished study en- titled “Law of Armed Conflict” (Colorado Springs, Colo.: United States Air Force Academy, Department of

  12. Changing Face of Warfare

    DTIC Science & Technology

    2015-06-12

    cohesion and contributed to morale, it also served to limit what a leader could do, especially in terms of imposing discipline. Thus the military...characterized by control through the use of tight battle formations to maintain cohesion and discipline. Offensive tactics ruled the day, despite...work, Operations of War, stressed the importance of the offensive to the "suicidal in the defender.Ŝ Hamley’s work became a text at West Point in

  13. An integrated environment for tactical guidance research and evaluation

    NASA Technical Reports Server (NTRS)

    Goodrich, Kenneth H.; Mcmanus, John W.

    1990-01-01

    NASA-Langley's Tactical Guidance Research and Evaluation System (TGRES) constitutes an integrated environment for the development of tactical guidance algorithms and evaluating the effects of novel technologies; the modularity of the system allows easy modification or replacement of system elements in order to conduct evaluations of alternative technologies. TGRES differs from existing systems in its capitalization on AI programming techniques for guidance-logic implementation. Its ability to encompass high-fidelity, six-DOF simulation models will facilitate the analysis of complete aircraft dynamics.

  14. The eyesafe visioceilometer - A tactical visibility and cloud height lidar

    NASA Astrophysics Data System (ADS)

    Barnes, E. S.; Lentz, W. J.

    A recent breakthrough in the mathematical solution to the lidar equation combined with state-of-the-art microelectronics has made it possible to produce the first portable ceiling, visibility, and rangefinding device suitable for tactical use by the U.S. Army. The signal processor of the former XE-2 (Nd:YAG) can be adapted to an eyesafe unit by making use of an erbium glass laser and a GaInAs PIN photodiode detector. It is pointed out that the XE-3 (Eyesafe Visioceilometer) provides tactical real-time data when and where the user needs it, with an accuracy superior to existing nonportable runway equipment. Attention is given to system evolution, lidar theory, the relationship of backscattering and extinction coefficients, a system description, the transient recorder, the analysis of data, and details regarding tactical applications.

  15. Children's responses to mothers' and fathers' emotionality and tactics in marital conflict in the home.

    PubMed

    Cummings, E Mark; Goeke-Morey, Marcie C; Papp, Lauren M; Dukewich, Tammy L

    2002-12-01

    Addressing a gap in methodological approaches to the study of links between marital conflict and children, 51 couples were trained to complete home diary reports on everyday marital conflicts and children's responses. Parental negative emotionality and destructive conflict tactics related to children's insecure emotional and behavioral responses. Parental positive emotionality and constructive conflict tactics were linked with children's secure emotional responding. When parents' emotions and tactics were considered in the same model, negative emotionality was more consistently related to children's negative reactions than were destructive conflict tactics, whereas constructive conflict tactics were more consistently related to children's positive reactions than parents' positive emotionality. Differences in children's responding as a function of specific parental negative emotions (anger, sadness, fear) and parent gender were identified.

  16. Military medicine and the ethics of war: British colonial warfare during the Seven Years War (1756-63).

    PubMed

    Charters, Erica

    2010-01-01

    This article examines 18th-century European warfare, tracing the first formal codifications of conventions of war, frequently introduced by military physicians and initially regarding the treatment of the sick and wounded. It outlines to what extent these conventions were followed in practice, particularly in the challenging environment of American irregular warfare, with a focus on the most well-known incident of "biological warfare" in the period: the deliberate spread of smallpox by British officers among Amerindians in 1763. More broadly, it demonstrates that the history of military medicine provides a fruitful method with which to uncover assumptions about the ethics of war.

  17. Simulated experiment for elimination of chemical and biological warfare agents by making use of microwave plasma torch

    NASA Astrophysics Data System (ADS)

    Hong, Yong C.; Kim, Jeong H.; Uhm, Han S.

    2004-02-01

    The threat of chemical and biological warfare agents in a domestic terrorist attack and in military conflict is increasing worldwide. Elimination and decontamination of chemical and biological warfare (CBW) agents are immediately required after such an attack. Simulated experiment for elimination of CBW agents by making use of atmospheric-pressure microwave plasma torches is carried out. Elimination of biological warfare agents indicated by the vitrification or burnout of sewage sludge powders and decomposition of toluene gas as a chemical agent stimulant are presented. A detailed characterization for the elimination of the simulant chemicals using Fourier transform infrared and gas chromatography is also presented.

  18. The Human Domain and the Future of Army Warfare: Present as Prelude to 2050

    DTIC Science & Technology

    2017-07-01

    ERDC/CERL MP-17-2 ii Abstract Studies on the future of warfare tend to focus on technology and place but largely overlook the actors. Warfare in 2050...will be predominantly urban, utilizing robotics and other advanced technologies , but at the core will re- main an inherently human and political...collaboration for success. Despite the ap- peal of advanced technology , the U.S. Army could greatly benefit by looking beyond strictly technological

  19. Nanoplatforms for Detection, Remediation and Protection Against Chem-Bio Warfare

    NASA Astrophysics Data System (ADS)

    Denkbaş, E. B.; Bayram, C.; Kavaz, D.; Çirak, T.; Demirbilek, M.

    Chemical and biological substances have been used as warfare agents by terrorists by varying degree of sophistication. It is critical that these agents be detected in real-time with high level of sensitively, specificity, and accuracy. Many different types of techniques and systems have been developed to detect these agents. But there are some limitations in these conventional techniques and systems. Limitations include the collection, handling and sampling procedures, detection limits, sample transfer, expensive equipment, personnel training, and detection materials. Due to the unique properties such as quantum effect, very high surface/volume ratio, enhanced surface reactivity, conductivity, electrical and magnetic properties of the nanomaterials offer great opportunity to develop very fast, sensitive, accurate and cost effective detection techniques and systems to detect chemical and biological (chem.-bio) warfare agents. Furthermore, surface modification of the materials is very easy and effective way to get functional or smart surfaces to be used as nano-biosensor platform. In that respect many different types of nanomaterials have been developed and used for the detection, remediation and protection, such as gold and silver nanoparticles, quantum dots, Nano chips and arrays, fluorescent polymeric and magnetic nanoparticles, fiber optic and cantilever based nanobiosensors, nanofibrillar nanostructures etc. This study summarizes preparation and characterization of nanotechnology based approaches for the detection of and remediation and protection against chem.-bio warfare agents.

  20. Origins of the Tactical Nuclear Weapons Modernization Program: 1969-1979

    NASA Astrophysics Data System (ADS)

    Yaffe, Michael David

    On December 12, 1979, the North Atlantic Treaty Organization decided to deploy new long-range theater nuclear forces, Pershing II and Ground-Launched Cruise Missiles. This marked the first major change in NATO's nuclear stockpile since the adoption of the flexible response strategy in 1967. The decision was controversial inasmuch as the Allies disagreed on the fundamental role of nuclear weapons in this strategy and, thereby, the types and number of weapons required for an effective deterrent posture. Europeans generally preferred long-range weapons capable of striking the Soviet Union and small conventional forces while Americans preferred shorter-range nuclear weapons and a stalwart conventional defense. Thus, the December decision is often described as purely politically motivated, in which the Americans reluctantly acquiesced to a European initiative for long-range weapons, prominently expressed by West German Chancellor Helmut Schmidt in 1977. Recently declassified US government documents reveal, however, that long-range missiles were part of a long-term comprehensive nuclear modernization program conceived in the Pentagon under Defense Secretary James Schlesinger during the period of 1973 through 1975, and presented to skeptical European elites who favored arms control negotiations over costly new deployments. This program was motivated as much by changes in the American national security culture as by an increase in the Soviet military threat to Europe. It was grounded on a clear military rationale: "that a feasible and affordable conventional defense is only possible if NATO has modern nuclear forces" that can effectively hold at risk Warsaw Pact ground and air forces throughout the depth of their employment from the inner-German border to the western military districts of the Soviet Union. When the new US administration in 1977 disagreed with the modernization plan and its rationale, opting instead for more conventional forces, the Allies in a reversal of

  1. Influence Tactics in the Classroom and Their Relationship to Student Satisfaction

    ERIC Educational Resources Information Center

    Standifird, Stephen S.; Pons, Frank; Moshavi, Dan

    2008-01-01

    We argue that an instructor's use of influence tactics can be classified as soft, rational, and strong in nature and that the use of these tactics will have a differential impact on student satisfaction. We find support for the existence of the three categories of influence. We find that student satisfaction is positively influenced by the use of…

  2. How Does the Supply Requisitioning Process Affect Average Customer Wait Time Onboard U.S. Navy Destroyers?

    DTIC Science & Technology

    2013-05-07

    warfare qualifications SWSCO and NASO. Next, LCDR Saucedo reported to the Fleet Industrial Supply Center, San Diego, where she assumed the duties as the...16  D.  NAVAL TACTICAL COMMAND SUPPORT SYSTEM .................. 17  1.  Operational Maintenance ...21  4.  Method

  3. Wireless Tactical Networks in Support of Undersea Research

    DTIC Science & Technology

    2001-04-01

    of 802.11 is to provide a radio capable of transmitting voice, video, and data standard set of operational rules so that WLAN products between its...networking in support of the network-centric [TFB-99] Trangeled A., Franchi P., Berni A., Data warfare concept, in which operational advantage is

  4. The Cyber Warfare Professional: Realizations for Developing the Next Generation

    DTIC Science & Technology

    2011-01-01

    consequences for the others. However, just as airpower soon emerged as a revolution in military affairs during the early twentieth century, so may cyber warfare become the next revolution for the new millennium.

  5. History of chemical and biological warfare agents.

    PubMed

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  6. Edge-Enabled Tactical Systems (Poster)

    DTIC Science & Technology

    2014-10-23

    Recently added capabilities allow fine grained network and data optimization in Disconnected, Intermittent, Low-Bandwidth (DIL) environments by...Research Focus Establishing Trusted Identities in Disconnected Tactical Environments We will develop trusted identity solutions that work within the...constraints of DIL environments in which there is no consistent access to third-party online trusted authorities that validate the credentials of

  7. Graduate Medical Education in Tactical Medicine and the Impact of ACGME Accreditation of EMS Fellowships.

    PubMed

    Tang, Nelson; Levy, Matthew J; Margolis, Asa M; Woltman, Nathan

    Physician interest in tactical medicine as an area of professional practice has grown significantly over the past decade. The prevalence of physician involvement in terms of medical oversight and operational support of civilian tactical medicine has experienced tremendous growth during this timeframe. Factors contributing to this trend are multifactorial and include enhanced law enforcement agency understanding of the role of the tactical physician, support for the engagement of qualified medical oversight, increasing numbers of physicians formally trained in tactical medicine, and the ongoing escalation of intentional mass-casualty incidents worldwide. Continued vigilance for the sustenance of adequate and appropriate graduate medical education resources for physicians seeking training in the comprehensive aspects of tactical medicine is essential to ensure continued advancement of the quality of casualty care in the civilian high-threat environment. 2017.

  8. Tactics: A Soviet View

    DTIC Science & Technology

    1984-01-01

    the greatest revolutionizing influence on the nature of combined arms combat and the methods for conducting it, and on the development of tactics as...their combat employment. Meanwhile, the penetrating radiation of a neutron burst has a destructive effect not only on humans and animals , but on...agents may be most diverse. It has been noted in the foreign press that in the American armed forces the Air Force has the greatest capability for

  9. Management of chemical warfare injuries (on CD-ROM). Data file

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1996-08-01

    The threat of use of chemical warfare agents (agents of `mass destruction`) is no longer confined to the battlefield. Agent releases by terrorists in Japan in 1995 served to awaken the world to the dangers faced by civilian communities far removed from centers of armed conflict. The ability to save lives in the event of a chemical agent release turns on provision of immediate and correct medical care in the field and hospital. Being able to ensure availability of life-saving care depends on reaching both military and civilian medical personnel with information on chemical warfare agents and on keeping theirmore » skills and knowledge current. While this is of critical importance both to the Department of Defense and to civilian agencies charged with protecting the public, it also is a daunting and potentially expensive task in view of the numbers and geographic dispersion of persons to be trained. The Department of Defense has addressed and overcome these challenges, to the benefit of the military and civilians, by using computer technology as the vehicle by which cost-effective chemical warfare agent training may be conveniently delivered to all who require it. The multi-media instructional program, Management of Chemical Warfare Injuries, was developed for military use by the Naval Health Sciences Education and Training Command, with the technical assistance of the U.S. Army Medical Command. It was originally designed for delivery via video disc, a format used extensively within the Navy. However, in response to a request from the Federal Emergency Management Agency, the Office of the Secretary of Defense agreed to repackage the materials for delivery on CD-ROM in order to make them accessible to a larger audience. In addition, the Navy agreed to include on the two CD-ROMs which contain the program a ready reference not found on the video disc: the Army`s `Medical Management of Chemical Casualties` handbooks for field and medical personnel.« less

  10. Soviet short-range nuclear forces: flexible response or flexible aggression. Student essay

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, T.R.

    1987-03-23

    This essay takes a critical look at Soviet short-range nuclear forces in an effort to identify Soviet capabilities to fight a limited nuclear war with NATO. From an analysis of Soviet military art, weapon-system capabilities and tactics, the author concludes that the Soviets have developed a viable limited-nuclear-attack option. Unless NATO reacts to this option, the limited nuclear attack may become favored Soviet option and result in the rapid defeat of NATO.

  11. Air Power and Warfare: A Supplement

    DTIC Science & Technology

    2002-02-01

    The Aeronautical History Collection of Colonel Richard Gimbel. , This bibliography, Number 99 in the Library’s Special Bibliography Series, was...H848 1992) Kohn, Richard H., and Joseph P. Harahan. Air Superiority in World War II and Korea: An Interview with Gen. James Fereuson, Gen. Robert M...Mark A. "Airpower as a Second Front." Airpowcr Journal 9 (Fall 1995): 63-73 Hallion, Richard P. "Airpower and the Changing Nature of Warfare." Joint

  12. Stealing thunder as a courtroom tactic revisited: processes and boundaries.

    PubMed

    Dolnik, Lara; Case, Trevor I; Williams, Kipling D

    2003-06-01

    Stealing thunder refers to a dissuasion tactic in which an individual reveals potentially incriminating evidence first, for the purpose of reducing its negative impact on an evaluative audience. We examined whether it was necessary to frame the negative revelation in a manner that downplayed its importance, and found that stealing thunder successfully dissuaded mock jurors even without framing. We also sought to determine the mechanism by which stealing thunder operated, and found that stealing thunder led mock jurors to change the meaning of incriminating evidence to be less damaging to the individual. We also found that stealing thunder's effectiveness did not hinge on whether or not opposing counsel also mentioned the thunder evidence, and that the stealing thunder tactic was no longer effective when opposing counsel revealed to the mock jurors that the stealing thunder tactic had been used on them.

  13. The role of leader influence tactics and safety climate in engaging employees' safety participation.

    PubMed

    Clarke, Sharon; Ward, Katie

    2006-10-01

    This study examines the effect of leader influence tactics on employee safety participation in a U.K.-based manufacturing organization, examining the role of safety climate as a mediator. Structural equation modeling showed that leader influence tactics associated with a transformational leadership style had significant relationships with safety participation that were partially mediated by the safety climate (consultation) or fully mediated by the safety climate (inspirational appeals). In addition, leader influence tactics associated with a transactional leadership style had significant relationships with safety participation: rational persuasion (partially mediated by safety climate) and coalition tactics (direct effect). Thus, leaders may encourage safety participation using a combination of influence tactics, based on rational arguments, involvement in decision making, and generating enthusiasm for safety. The influence of building trust in managers is discussed as an underlying mechanism in this relationship. Practical implications are highlighted, including the design of leadership development programs, which may be particularly suited to high-reliability organizations.

  14. Situation assessment in the Paladin tactical decision generation system

    NASA Technical Reports Server (NTRS)

    Mcmanus, John W.; Chappell, Alan R.; Arbuckle, P. Douglas

    1992-01-01

    Paladin is a real-time tactical decision generator for air combat engagements. Paladin uses specialized knowledge-based systems and other Artificial Intelligence (AI) programming techniques to address the modern air combat environment and agile aircraft in a clear and concise manner. Paladin is designed to provide insight into both the tactical benefits and the costs of enhanced agility. The system was developed using the Lisp programming language on a specialized AI workstation. Paladin utilizes a set of air combat rules, an active throttle controller, and a situation assessment module that have been implemented as a set of highly specialized knowledge-based systems. The situation assessment module was developed to determine the tactical mode of operation (aggressive, defensive, neutral, evasive, or disengagement) used by Paladin at each decision point in the air combat engagement. Paladin uses the situation assessment module; the situationally dependent modes of operation to more accurately represent the complex decision-making process of human pilots. This allows Paladin to adapt its tactics to the current situation and improves system performance. Discussed here are the details of Paladin's situation assessment and modes of operation. The results of simulation testing showing the error introduced into the situation assessment module due to estimation errors in positional and geometric data for the opponent aircraft are presented. Implementation issues for real-time performance are discussed and several solutions are presented, including Paladin's use of an inference engine designed for real-time execution.

  15. Tactic-specific differences in seminal fluid influence sperm performance

    PubMed Central

    Locatello, Lisa; Poli, Federica; Rasotto, Maria B.

    2013-01-01

    Seminal fluid often makes up a large part of an ejaculate, yet most empirical and theoretical studies on sperm competition have focused on how sperm characteristics (number and quality) affect fertilization success. However, seminal fluid influences own sperm performance and may potentially influence the outcome of sperm competition, by also affecting that of rivals. As a consequence males may be expected to allocate their investment in both sperm and seminal fluid in relation to the potential level of competition. Grass goby (Zosterisessor ophiocephalus) is an external fertilizer with guard-sneaker mating tactics, where sperm competition risk varies according to the tactic adopted. Here, we experimentally manipulated grass goby ejaculates by separately combining sperm and seminal fluid from territorial and sneaker males. While sperm of sneaker and territorial males did not differ in their performance when they interacted with their own seminal fluid only, sperm of sneakers increased their velocity and fertilization rate in the presence of territorial males' seminal fluid. By contrast, sneaker males' seminal fluid had a detrimental effect on the performance of territorial males' sperm. Sperm velocity was unaffected by the seminal fluid of males employing the same tactic, suggesting that seminal fluid's effect on rival-tactic sperm is not based on a self/non-self recognition mechanism. Our findings show that cross interactions of sperm and seminal fluid may influence the fertilization success of competing ejaculates with males investing in both sperm and seminal fluid in response to sperm competition risk. PMID:23363633

  16. Tactic-specific differences in seminal fluid influence sperm performance.

    PubMed

    Locatello, Lisa; Poli, Federica; Rasotto, Maria B

    2013-03-22

    Seminal fluid often makes up a large part of an ejaculate, yet most empirical and theoretical studies on sperm competition have focused on how sperm characteristics (number and quality) affect fertilization success. However, seminal fluid influences own sperm performance and may potentially influence the outcome of sperm competition, by also affecting that of rivals. As a consequence males may be expected to allocate their investment in both sperm and seminal fluid in relation to the potential level of competition. Grass goby (Zosterisessor ophiocephalus) is an external fertilizer with guard-sneaker mating tactics, where sperm competition risk varies according to the tactic adopted. Here, we experimentally manipulated grass goby ejaculates by separately combining sperm and seminal fluid from territorial and sneaker males. While sperm of sneaker and territorial males did not differ in their performance when they interacted with their own seminal fluid only, sperm of sneakers increased their velocity and fertilization rate in the presence of territorial males' seminal fluid. By contrast, sneaker males' seminal fluid had a detrimental effect on the performance of territorial males' sperm. Sperm velocity was unaffected by the seminal fluid of males employing the same tactic, suggesting that seminal fluid's effect on rival-tactic sperm is not based on a self/non-self recognition mechanism. Our findings show that cross interactions of sperm and seminal fluid may influence the fertilization success of competing ejaculates with males investing in both sperm and seminal fluid in response to sperm competition risk.

  17. An Examination of the Conceptual Basis of a Tactical, Logistical, and Air Simulation (ATLAS).

    DTIC Science & Technology

    1980-03-01

    guides the simulation from the start. From this scenario and the de - veloping tactical situation comes information which triggers the tactical-decision...effect of tactical aircraft in a combat situation together with the effect of weapons to destroy the aircraft. The presence of transport aircraft is...sector, the ability of that sector to resupply existing combat units, to transport replacement items and supplies, and to move the new unit through

  18. Survival tactics for managing the hospital marketing effort.

    PubMed

    Schaupp, D L; Ponzurick, T G; Schaupp, F W

    1994-01-01

    Hospital marketing is an intricate and complex process. Especially difficult is the transition the hospital marketer must make from designing marketing strategies to implementing those strategies. This transition usually causes the marketer to call upon a different set of skills. These skills involve managing the personnel needed to implement the designed marketing strategy. Unfortunately, little in the way of formal training is provided the marketer for developing these management skills. Therefore, the authors have comprised a series of tactical procedures designed to assist the hospital marketer to survive this transition. Using these tactics for decision-making guidelines may help to improve the management of the hospital's marketing effort.

  19. Unconventional Warfare in the American Civil War

    DTIC Science & Technology

    2004-06-18

    Miller Thesis Title: Unconventional Warfare in the American Civil War Approved by: , Thesis Committee Chair LTC ( R ) Gregory T. Beck...M.A. , Member LTC ( R ) Richard Barbuto, Ph.D. , Consulting Faculty LTC ( R ) James B. Martin, Ph.D. Accepted this 18th day of...troops and supplies to forward areas. In official correspondence dated 26 May 1864 from Captain A. V. Barringer , Chief Quartermaster, Department of West

  20. Electronic warfare antenna systems - Past and present

    NASA Astrophysics Data System (ADS)

    Yaw, D.

    1981-09-01

    In discussing fixed beam arrays, it is noted that an array may be used to create simultaneous fixed beams or to form asymmetric beams of a desired shape. Attention is also given to arrays and beam control, noting that for some electronic warfare applications combinations of broad and narrow beam antenna response are needed. Other topics include ECM jamming antenna techniques and advanced array systems.

  1. Hardware-in-the-loop simulation for undersea vehicle applications

    NASA Astrophysics Data System (ADS)

    Kelf, Michael A.

    2001-08-01

    Torpedoes and other Unmanned Undersea Vehicles (UUV) are employed by submarines and surface combatants, as well as aircraft, for undersea warfare. These vehicles are autonomous devices whose guidance systems rival the complexity of the most sophisticated air combat missiles. The tactical environment for undersea warfare is a difficult one in terms of target detection,k classification, and pursuit because of the physics of underwater sounds. Both hardware-in-the-loop and all-digital simulations have become vital tools in developing and evaluating undersea weapon and vehicle guidance performance in the undersea environment.

  2. Needle Decompression of Tension Pneumothorax Tactical Combat Casualty Care Guideline Recommendations

    DTIC Science & Technology

    2012-07-06

    SUBJECT: Needle Decompression of Tension Pneumothorax Tactical Combat Casualty Care Guideline Recommendations 2012-05 2 demonstrating the...Decompression of Tension Pneumothorax Tactical Combat Casualty Care Guideline Recommendations 2012-05 3 needle may be too short to reliably reach the...at the AAL as the preferred site for needle decompression of a presumed tension pneumothorax . Further, studies evaluating chest wall thickness are

  3. Two vs. One Keep Away: A Simple Game of Beginning Tactics

    ERIC Educational Resources Information Center

    Belka, David E.

    2005-01-01

    In the last decade or so, there has been a shift toward small-sided games played in smaller spaces, with limited rules and an emphasis on tactics. The goal of the current instruction is to use less complex game settings to develop players who then learn to make more appropriate and quicker tactical decisions. In this article, the author presents…

  4. Manipulation tactics of patients with neurotic disorders in everyday life and during therapy.

    PubMed

    Mandal, Eugenia; Horak, Adam

    2016-01-01

    The objective of the study was to examine the repertoire and intensity of manipulation tactics of neurotic patients in everyday life and during therapy, as well as diagnosing the intensity of Machiavellianism in neurotic patients. There were 111 study subjects: 44 patients with diagnosed neurotic disorders, 44 people from the control group and 23 therapists. The manipulation tactics were measured by means of survey methods of E. Mandal and D. Kocur and Machiavellianism was measured using the MACH-IV scale of M. Christi and F. Geis. In comparison to people from the control group, the patients were more willing to use manipulation tactics such as guilt induction, threatening to break up the relationship, and self-mutilation but less willing to use supplication/begging. The intensity of tendency to undertake manipulation was higher in everyday life than during therapy. The Machiavellianism of patients was positively correlated with the tendency to employ manipulation tactics. Differences within the scope of general Machiavellianism between the patients and the control group were not noted. The manipulation tactics of neurotic patients are of morbid nature. They are related to anxiety, feeling of guilt and hostility. The tendency to manipulate correlates with Machiavellianism.

  5. Countering Gray-Zone Hybrid Threats: An Analysis of Russias New Generation Warfare and Implications for the US Army

    DTIC Science & Technology

    2016-10-18

    education ...Publication (JP) 1, Doctrine for the Armed Forces of the United States, there are two forms of warfare, traditional and irregular, and...combat mission in 2010. Looking at OIF, the US Army participated in both traditional and irregular warfare and the characterization of

  6. Argoball: A Dynamic-Rules Game for Teaching Striking-and-Fielding Game Tactics

    ERIC Educational Resources Information Center

    Todorovich, John R.; Fox, James P.; Ryan, Stuart; Todorovich, Sarah W.

    2008-01-01

    Physical educators using the teaching games for understanding (TGFU) approach employ modified game forms to teach children skills and tactics. Inspired by Danish Longball, "Argoball" is a dynamic-rules game that teachers interested in the TGFU model use to help their students develop effective skills and tactics to better participate in…

  7. Combining tactics to exploit allee effects for eradication of alien insect populations

    Treesearch

    David Maxwell Suckling; Patrick C. Tobin; Deborah G. McCullough; Daniel A. Herms

    2012-01-01

    Invasive species increasingly threaten ecosystems, food production, and human welfare worldwide. Hundreds of eradication programs have targeted a wide range of nonnative insect species to mitigate the economic and ecological impacts of biological invasions. Many such programs used multiple tactics to achieve this goal, but interactions between tactics have received...

  8. Light and Heavy Tactical Wheeled Vehicle Fuel Consumption Evaluations Using Fuel Efficient Gear Oils (FEGO)

    DTIC Science & Technology

    2016-05-01

    UNCLASSIFIED LIGHT AND HEAVY TACTICAL WHEELED VEHICLE FUEL CONSUMPTION EVALUATIONS USING FUEL EFFICIENT GEAR OILS (FEGO) FINAL... HEAVY TACTICAL WHEELED VEHICLE FUEL CONSUMPTION EVALUATIONS USING FUEL EFFICIENT GEAR OILS (FEGO) FINAL REPORT TFLRF No. 477 by Adam C...August 2014 – March 2016 4. TITLE AND SUBTITLE LIGHT AND HEAVY TACTICAL WHEELED VEHICLE FUEL CONSUMPTION EVALUATIONS USING FEUL EFFICIENT GEAR OILS

  9. Review of the Instruments Most Frequently Employed to Assess Tactics in Physical Education and Youth Sports

    ERIC Educational Resources Information Center

    Arias, Jose L.; Castejon, Francisco Javier

    2012-01-01

    Investigators' increased interest in teaching game tactics requires generalizable assessment instruments that are appropriate to whatever is needed by the tactic. This literature review aims to provide information about the instruments most frequently used to assess tactics in youth sports. We found that very few studies used instruments that…

  10. Working memory capacity as controlled attention in tactical decision making.

    PubMed

    Furley, Philip A; Memmert, Daniel

    2012-06-01

    The controlled attention theory of working memory capacity (WMC, Engle 2002) suggests that WMC represents a domain free limitation in the ability to control attention and is predictive of an individual's capability of staying focused, avoiding distraction and impulsive errors. In the present paper we test the predictive power of WMC in computer-based sport decision-making tasks. Experiment 1 demonstrated that high-WMC athletes were better able at focusing their attention on tactical decision making while blocking out irrelevant auditory distraction. Experiment 2 showed that high-WMC athletes were more successful at adapting their tactical decision making according to the situation instead of relying on prepotent inappropriate decisions. The present results provide additional but also unique support for the controlled attention theory of WMC by demonstrating that WMC is predictive of controlling attention in complex settings among different modalities and highlight the importance of working memory in tactical decision making.

  11. Biodiversity conservation and armed conflict: a warfare ecology perspective.

    PubMed

    Hanson, Thor

    2018-04-23

    The activities involved in preparing for, executing, and recovering from armed conflict are globally pervasive and consequential, with significant impacts on natural systems. Effects on biodiversity are predominantly negative, produced by direct and indirect battlefield impacts, as well as the general breakdown of social, economic, and governance systems during wartime. Certain conservation opportunities do occur, however, particularly on lands set aside for training exercises, buffer zones, and peace parks. Here, the relationship between armed conflict and biodiversity is reviewed using the temporal framework of warfare ecology, which defines warfare as an ongoing process of three overlapping stages: preparations, war (armed conflict), and postwar activities. Several themes emerge from recent studies, including a heightened awareness of biodiversity conservation on military lands, the potential for scientific and conservation engagement to mitigate negative biodiversity impacts in war zones, and the importance of the postwar period for incorporating biodiversity priorities into reconstruction and recovery efforts. Research limitations and knowledge gaps are also discussed. © 2018 New York Academy of Sciences.

  12. The United States and biological warfare: secrets from the early cold war and Korea.

    PubMed

    Bruwer, A

    2001-01-01

    The United States and Biological Warfare is about accusations that the United States resorted to bacteriological warfare at a time of great military stress during the Korean War. In December 1951, the then US Secretary of Defense ordered early readiness for offensive use of biological weapons. Soon afterwards, the North Korean and Chinese armies accused the United States of starting a large-scale biological warfare experiment in Korea. The US State Department denied the accusation. Both parties to the dispute maintain their positions today. The authors spent 20 years researching the accusations in North America, Europe and Japan. They were the first foreigners to be given access to Chinese classified documents. The reader is also introduced to the concept of 'plausible denial', an official US policy which allowed responsible governmental representatives to deny knowledge of certain events. The authors hope that their work will contribute to the understanding of a time when modern war expanded into a new type of violence.

  13. Managing a perilous stigma: Ex-offenders' use of reparative impression management tactics in hiring contexts.

    PubMed

    Ali, Abdifatah A; Lyons, Brent J; Ryan, Ann Marie

    2017-09-01

    Individuals with a criminal record face employment challenges because of the nature of their stigma. In this study, we examined the efficacy of using reparative impression management tactics to mitigate integrity concerns associated with a perilous stigma. Drawing on affect control theory, we proposed that the use of 3 impression management tactics-apology, justification, excuse-would differentially affect hiring evaluations through their influence on perceived remorse and anticipated workplace deviance. Across 3 studies, we found support for our proposed model. Our results revealed the use of an apology or justification tactic when explaining a previous criminal offense had a positive indirect effect on hiring evaluations, whereas the use of an excuse tactic had a negative indirect effect. These findings suggest applicants may benefit from using impression management tactics that communicate remorse when discussing events or associations that violate integrity expectations. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Tactical emergency medical support programs: a comprehensive statewide survey.

    PubMed

    Bozeman, William P; Morel, Benjamin M; Black, Timothy D; Winslow, James E

    2012-01-01

    Specially trained tactical emergency medical support (TEMS) personnel provide support to law enforcement special weapons and tactics (SWAT) teams. These programs benefit law enforcement agencies, officers, suspects, and citizens. TEMS programs are increasingly popular, but there are wide variations in their organization and operation and no recent data on their prevalence. We sought to measure the current prevalence and specific characteristics of TEMS programs in a comprehensive fashion in a single southeastern state. North Carolina emergency medical services (EMS) systems have county-based central EMS oversight; each system was surveyed by phone and e-mail. The presence and selected characteristics of TEMS programs were recorded. U.S. Census data were used to measure the population impact of the programs. All of the 101 EMS systems statewide were successfully contacted. Thirty-three counties (33%) have TEMS programs providing medical support to 56 local law enforcement agencies as well as state and federal agencies. TEMS programs tend to be located in more populated urban and suburban areas, serving a population base of 5.9 million people, or 64% of the state's population. Tactical medics in the majority of these programs (29/33; 88%) are not sworn law enforcement officers. Approximately one-third of county-based EMS systems in North Carolina have TEMS programs. These programs serve almost two-thirds of the state's population base, using primarily nonsworn tactical medics. Comparison with other regions of the country will be useful to demonstrate differences in prevalence and program characteristics. Serial surveillance will help track trends and measure the growth and impact of this growing subspecialty field.

  15. Why people believe they were exposed to biological or chemical warfare: a survey of Gulf War veterans.

    PubMed

    Brewer, Noel T; Lillie, Sarah E; Hallman, William K

    2006-04-01

    The study sought to understand better how people come to believe they have been exposed to biological and chemical warfare. We conducted telephone interviews with 1,009 American veterans (65% response rate) deployed and not deployed to the Gulf War, a conflict during which there were credible threats that such warfare could be used. Only 6% of non-Gulf War veterans reported exposure to biological or chemical warfare, but most of Gulf War veterans reported exposure (64%). The majority of these were unsure whether the exposure was chemical or biological in nature. The most commonly reported exposure indicators were receiving an alert from the military and having physical symptoms. Veterans who were certain of the type of exposure (biological or chemical) were more likely to recall having been told by the military and to recall physical symptoms. Future communications with soldiers and the general public about biological and chemical warfare may need to emphasize the uncertain nature of such risk information. Evaluations of exposure diagnostic technologies should take into account the problem of people initially believing, but not later discounting, false positive results.

  16. A validity generalization procedure to test relations between intrinsic and extrinsic motivation and influence tactics.

    PubMed

    Barbuto, John E; Moss, Jennifer A

    2006-08-01

    The relations of intrinsic and extrinsic motivation with use of consultative, legitimating, and pressure influence tactics were examined using validity generalization procedures. 5 to 7 field studies with cumulative samples exceeding 800 were used to test each relationship. Significance was found for relation between agents' intrinsic motivation and their use of consultative influence tactics and agents' extrinsic motivation and their use of legitimating influence tactics.

  17. Considerations for multiple hypothesis correlation on tactical platforms

    NASA Astrophysics Data System (ADS)

    Thomas, Alan M.; Turpen, James E.

    2013-05-01

    Tactical platforms benefit greatly from the fusion of tracks from multiple sources in terms of increased situation awareness. As a necessary precursor to this track fusion, track-to-track association, or correlation, must first be performed. The related measurement-to-track fusion problem has been well studied with multiple hypothesis tracking and multiple frame assignment methods showing the most success. The track-to-track problem differs from this one in that measurements themselves are not available but rather track state update reports from the measuring sensors. Multiple hypothesis, multiple frame correlation systems have previously been considered; however, their practical implementation under the constraints imposed by tactical platforms is daunting. The situation is further exacerbated by the inconvenient nature of reports from legacy sensor systems on bandwidth- limited communications networks. In this paper, consideration is given to the special difficulties encountered when attempting the correlation of tracks from legacy sensors on tactical aircraft. Those difficulties include the following: covariance information from reporting sensors is frequently absent or incomplete; system latencies can create temporal uncertainty in data; and computational processing is severely limited by hardware and architecture. Moreover, consideration is given to practical solutions for dealing with these problems in a multiple hypothesis correlator.

  18. Investigating User Search Tactic Patterns and System Support in Using Digital Libraries

    ERIC Educational Resources Information Center

    Joo, Soohyung

    2013-01-01

    This study aims to investigate users' search tactic application and system support in using digital libraries. A user study was conducted with sixty digital library users. The study was designed to answer three research questions: 1) How do users engage in a search process by applying different types of search tactics while conducting different…

  19. Al Qaeda and Fourth Generation Warfare as its Strategy

    DTIC Science & Technology

    2008-01-01

    and materia ~ as well as money, from one point ofthe non- linear battlefield to another, thereby giving more flexibility to obtain the right materials...translated by Griffith, Samuel B., On Guerilla Warfare, (1937),21-22. 14 Bodansky, Yossef, Bin Laden The Man Who Declared War on America (Rocklin: Prima

  20. Air Power in Irregular Warfare

    DTIC Science & Technology

    2012-12-01

    special or unconventional manner. One such use of air power involved airdropping baskets of pigeons into German controlled territories, which...agents and other personnel, to undertake hazardous landing missions far behind enemy lines, and to drop billions of leaflets over Europe.”264 Labeled...surround by hazardous terrain and marked by just a single balloon rising through the dense jungle canopy. The general tactic was to make “small and

  1. Resource Management in Tactical Military Networks

    DTIC Science & Technology

    2006-12-01

    FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE ...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in

  2. Towards a Game-Based Periscope Simulator for Submarine Officers Tactical Training

    DTIC Science & Technology

    2016-06-01

    release; distribution is unlimited TOWARDS A GAME -BASED PERISCOPE SIMULATOR FOR SUBMARINE OFFICERS TACTICAL TRAINING by Rodrigo da Silva Vieira...ONLY 2. REPORT DATE June 2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE TOWARDS A GAME -BASED PERISCOPE SIMULATOR...career to learn and practice these skills. Following an instructional system design process, this thesis developed a 3D, game -based periscope tactical

  3. Naval Surface Warfare Center Carderock Division, Technical Digest

    DTIC Science & Technology

    2001-12-01

    Survivability Systems: An Overview Fred J. Fisch 139 Modeling and Simulation of Weapons Effects on Ships Robert R. Wunderlick 143 Intelligent Networks ...communications capability of forces afloat to support emerging network -centric warfare doc- trines. Stealth, for our next generation of warships...fully-inte- grated, fully- networked electronic countermeasures system, developed in parallel and in close coordination with sister systems. An

  4. Comparing Child Outcomes of Physical Punishment and Alternative Disciplinary Tactics: A Meta-Analysis

    ERIC Educational Resources Information Center

    Larzelere, Robert E.; Kuhn, Brett R.

    2005-01-01

    This meta-analysis investigates differences between the effect sizes of physical punishment and alternative disciplinary tactics for child outcomes in 26 qualifying studies. Analyzing differences in effect sizes reduces systematic biases and emphasizes direct comparisons between the disciplinary tactics that parents have to select among. The…

  5. National environmental observing system to mitigate the effects of nuclear-biological-chemical (NBC) attacks: strategic and tactical

    NASA Astrophysics Data System (ADS)

    Fleming, Rex J.

    2003-09-01

    The challenge of obtaining an adequate environmental support system to help mitigate the effects of various terrorist generated plumes is articulated and a fiscally responsible solution is presented. A substantially improved national system of upper air data observing systems serves as a powerful information source prior to a terrorist event. A mobile tactical observing system for measuring the environment and for measuring the composition and intensity of the plume is implemented immediately following an event. Only proven and tested technologies are used. Program costs, benefits for the fight against terrorism, and multiple benefits to other aspects of the economy are summarized.

  6. LG based decision aid for naval tactical action officer's (TAO) workstation

    NASA Astrophysics Data System (ADS)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg; Boyd, Ron

    2005-05-01

    In the increasingly NetCentric battlespace of the 21st century, Stilman Advanced Strategies Linguistic Geometry software has the potential to revolutionize the way that the Navy fights in two key areas: as a Tactical Decision Aid and for creating a relevant Common Operating Picture. Incorporating STILMAN's software into a prototype Tactical Action Officers (TAO) workstation as a Tactical Decision Aid (TDA) will allow warfighters to manage their assets more intelligently and effectively. This prototype workstation will be developed using human-centered design principles and will be an open, component-based architecture for combat control systems for future small surface combatants. It will integrate both uninhabited vehicles and onboard sensors and weapon systems across a squadron of small surface combatants. In addition, the hypergame representation of complex operations provides a paradigm for the presentation of a common operating picture to operators and personnel throughout the command hierarchy. In the hypergame technology there are game levels that span the range from the tactical to the global strategy level, with each level informing the others. This same principle will be applied to presenting the relevant common operating picture to operators. Each operator will receive a common operating picture that is appropriate for their level in the command hierarchy. The area covered by this operating picture and the level of detail contained within it will be dependent upon the specific tasks the operator is performing (supervisory vice tactical control) and the level of the operator (or command personnel) within the command hierarchy. Each level will inform the others to keep the picture concurrent and up-to-date.

  7. Tactical resource allocation and elective patient admission planning in care processes.

    PubMed

    Hulshof, Peter J H; Boucherie, Richard J; Hans, Erwin W; Hurink, Johann L

    2013-06-01

    Tactical planning of resources in hospitals concerns elective patient admission planning and the intermediate term allocation of resource capacities. Its main objectives are to achieve equitable access for patients, to meet production targets/to serve the strategically agreed number of patients, and to use resources efficiently. This paper proposes a method to develop a tactical resource allocation and elective patient admission plan. These tactical plans allocate available resources to various care processes and determine the selection of patients to be served that are at a particular stage of their care process. Our method is developed in a Mixed Integer Linear Programming (MILP) framework and copes with multiple resources, multiple time periods and multiple patient groups with various uncertain treatment paths through the hospital, thereby integrating decision making for a chain of hospital resources. Computational results indicate that our method leads to a more equitable distribution of resources and provides control of patient access times, the number of patients served and the fraction of allocated resource capacity. Our approach is generic, as the base MILP and the solution approach allow for including various extensions to both the objective criteria and the constraints. Consequently, the proposed method is applicable in various settings of tactical hospital management.

  8. Particle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Xiaohui; Potok, Thomas E

    2009-12-01

    To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used non-linear optimal tool to model the emergence of insurgency campaign. The objective of this research is to apply the particle swarm metaphor as a model of insurgent social adaptation for the dynamically changing environment and to provide insight and understanding of insurgency warfare. Our results show that unified leadership, strategic planning, and effective communication between insurgent groups are notmore » the necessary requirements for insurgents to efficiently attain their objective.« less

  9. Bridging the Gap in the Realm of Information Dominance: A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare

    DTIC Science & Technology

    2010-09-01

    THE REALM OF INFORMATION DOMINANCE : A CONCEPT OF OPERATIONS FOR THE NAVAL POSTGRADUATE SCHOOL CENTER FOR CYBER WARFARE by Cynthia R. Duke...Bridging the Gap in the Realm of Information Dominance : A Concept of Operations for the Naval Postgraduate School Center for Cyber Warfare 6...of importance to the U.S. Military service and its allies. 15. NUMBER OF PAGES 102 14. SUBJECT TERMS Cyber Warfare, Information Dominance 16

  10. Demonstrating tactical information services from coordinated UAV operations

    NASA Astrophysics Data System (ADS)

    Bay, John S.

    2006-05-01

    As the component technologies for unmanned aerial vehicles mature, increased attention is being paid to the problem of command and control. Many UAVs, even small lightweight versions, are seeing significant operational time as a result of the Iraq war, and consequently, users are becoming increasingly proficient with the platform technologies and are considering new and more elaborate tactics, techniques, and procedures (TTPs), as well as concepts of operations (CONOPS), for their use, both individually and in teams. This paper presents one such concept and summarizes the progress made toward that goal in a recent research program. In particularly, the means by which a team of UAVs can be considered a tactical information resource is investigated, and initial experimental results are summarized.

  11. Placing Tactical Data into the MIST and LC2IEDM Systems

    DTIC Science & Technology

    2003-10-01

    Defence R& D Canada DEFENCE DÉFENSE & Placing Tactical Data into the MIST and LC2IEDM Systems Anthony W. Isenor Technical Memorandum DRDC Atlantic TM...intentionally left blank. Copy No: Placing Tactical Data into the MIST and LC2IEDM Systems Anthony W. Isenor Defence R& D Canada – Atlantic Technical...currently underway at Defence R& D Canada – Atlantic, as well as international efforts with The Technical Cooperation Program (TTCP). Both groups

  12. Anti Submarine Warfare Search Models

    DTIC Science & Technology

    2016-09-01

    worthwhile to send a helicopter out to search for the target? The answer to this operational question depends on the probability of finding the target and...fist,” and “lungs” of the ASW weapon. This balance certainly depends upon the mission and the tactical parameters of the associated scenario. For...effectiveness of search models depends on the scenario and assumptions made, and one can never perfectly model an operational scenario. Each chapter

  13. Big data and tactical analysis in elite soccer: future challenges and opportunities for sports science.

    PubMed

    Rein, Robert; Memmert, Daniel

    2016-01-01

    Until recently tactical analysis in elite soccer were based on observational data using variables which discard most contextual information. Analyses of team tactics require however detailed data from various sources including technical skill, individual physiological performance, and team formations among others to represent the complex processes underlying team tactical behavior. Accordingly, little is known about how these different factors influence team tactical behavior in elite soccer. In parts, this has also been due to the lack of available data. Increasingly however, detailed game logs obtained through next-generation tracking technologies in addition to physiological training data collected through novel miniature sensor technologies have become available for research. This leads however to the opposite problem where the shear amount of data becomes an obstacle in itself as methodological guidelines as well as theoretical modelling of tactical decision making in team sports is lacking. The present paper discusses how big data and modern machine learning technologies may help to address these issues and aid in developing a theoretical model for tactical decision making in team sports. As experience from medical applications show, significant organizational obstacles regarding data governance and access to technologies must be overcome first. The present work discusses these issues with respect to tactical analyses in elite soccer and propose a technological stack which aims to introduce big data technologies into elite soccer research. The proposed approach could also serve as a guideline for other sports science domains as increasing data size is becoming a wide-spread phenomenon.

  14. New studies disputing allegations of bacteriological warfare during the Korean War.

    PubMed

    Rolicka, M

    1995-03-01

    In the television series Korea the Unknown War produced jointly by Thames Television (London) and WGBH (Boston) in 1990, General Matthew Ridgway, Commander in Chief of United Nations forces during the Korean War, called the accusations that the United States waged bacteriological warfare "black propaganda." The charges discredited the United States and, despite denials and many international discussions, have not been completely refuted until new. Following studies in archives previously not available for research and after uncovering new sources, many specific examples of black propaganda were discovered that contained false information and lies discrediting the United States. The mechanism of lies, which convinced the Korean population that bacteriological warfare was going on and that the only way not to become victims of the United States' inhuman cruelty was to fight, are shown in this paper.

  15. Tactical Nuclear Weapons-Does the U.S. Army Still Need Them?

    DTIC Science & Technology

    1995-05-17

    Harry Summers, Colonel, US Army (Ret), "Good Riddance to a Nuclear Disaster ," Army Times, October 14, 1991, p. 78. 140 MAJ Vokac, p. 24. 141 Biddle, p...Role in U.S. Military Strategy?" Comparative Strategy, Vol. 13, pp. 197-209. Summers, Harry, Col. US Army (Ret), "Good Riddance to Nuclear Disaster ," Army

  16. 'Power base' tactics for workplace change - an interview study with industrial engineers and ergonomists.

    PubMed

    Berlin, Cecilia; Neumann, W Patrick; Theberge, Nancy; Örtengren, Roland

    2017-05-01

    The work activities of industrial engineers (IEs) and ergonomists drive workplace changes. The purpose of this study is to compare the work practices of the two professions and examine (1) how IEs and ergonomists gain influence over workplace changes and (2) whether there are prevailing types of intentional interaction behaviours called Power bases (PB) present in the interaction tactics they employ. The study identified key behavioural strategies used by the interviewees to successfully influence workplace changes; these were then mapped to their corresponding PB. Results showed that IEs and ergonomists were successfully influencing workplace changes using several tactics across the spectrum of PB, with the exception of Reward and Coercion. The study concludes with a list of recommended workplace change agent tactics, and proposes that a PB 'analytical lens' can serve to increase the budding ergonomists' critical and analytical skills when considering possible workplace change tactics. Practitioner Summary: This interview study examines how workplace ergonomics change agents, represented by the two professions: industrial engineers and ergonomists, perceive and exercise their capacity to influence workplace change. Key behavioural tactics that interviewees have found successful are reported, alongside effects on short- and long-term relations with other workplace-influencing stakeholders.

  17. Alternative reproductive tactics and inverse size-assortment in a high-density fish spawning aggregation.

    PubMed

    Karkarey, Rucha; Zambre, Amod; Isvaran, Kavita; Arthur, Rohan

    2017-02-28

    At high densities, terrestrial and marine species often employ alternate reproductive tactics (ARTs) to maximize reproductive benefits. We describe ARTs in a high-density and unfished spawning aggregation of the squaretail grouper (Plectropomus areolatus) in Lakshadweep, India. As previously reported for this species, territorial males engage in pair-courtship, which is associated with a pair-spawning tactic. Here, we document a previously unreported school-courtship tactic; where territorial males court multiple females in mid-water schools, which appears to culminate in a unique 'school-spawning' tactic. Courtship tactics were conditional on body size, local mate density and habitat, likely associated with changing trade-offs between potential mating opportunities and intra-sexual competition. Counter-intuitively, the aggregation showed a habitat-specific inverse size-assortment: large males courted small females on the reef slope while small males courted equal-sized or larger females on the shelf. These patterns remained stable across two years of observation at high, unfished densities. These unique density-dependent behaviours may disappear from this aggregation as overall densities decline due to increasing commercial fishing pressure, with potentially large consequences for demographics and fitness.

  18. Learned Tactics for Asset Allocation

    DTIC Science & Technology

    2013-06-01

    based on off-policy and on-policy tempo - ral difference learning [6, 31, 47]. The basic prin- ciple that unifies MARL techniques is to identify and...patterns with regu- larities such as symmetry, repetition, and repetition with variation [49, 50, 54]. For example, simply by in- cluding a Gaussian...tactics and policies while still exhibiting variation across the policy geometry. In other words, policies are spread across the substrate in a

  19. Tactical Defenses Against Systematic Variation in Wind Tunnel Testing

    NASA Technical Reports Server (NTRS)

    DeLoach, Richard

    2002-01-01

    This paper examines the role of unexplained systematic variation on the reproducibility of wind tunnel test results. Sample means and variances estimated in the presence of systematic variations are shown to be susceptible to bias errors that are generally non-reproducible functions of those variations. Unless certain precautions are taken to defend against the effects of systematic variation, it is shown that experimental results can be difficult to duplicate and of dubious value for predicting system response with the highest precision or accuracy that could otherwise be achieved. Results are reported from an experiment designed to estimate how frequently systematic variations are in play in a representative wind tunnel experiment. These results suggest that significant systematic variation occurs frequently enough to cast doubts on the common assumption that sample observations can be reliably assumed to be independent. The consequences of ignoring correlation among observations induced by systematic variation are considered in some detail. Experimental tactics are described that defend against systematic variation. The effectiveness of these tactics is illustrated through computational experiments and real wind tunnel experimental results. Some tutorial information describes how to analyze experimental results that have been obtained using such quality assurance tactics.

  20. Scientific impacts on nuclear strategic policy: Dangers and opportunities

    NASA Astrophysics Data System (ADS)

    Keeny, Spurgeon M.

    1988-12-01

    Nuclear weapons have revolutionized warfare, making a mutual capability for assured destruction a fact of life and mutual assured deterrence the underlying nuclear strategy of the superpowers. The program to find a technical solution to the threat of nuclear weapons by creating an impervious defense is fatally flawed by failure to consider responses available to a sophisticated adversary at much lower cost. Responses could involve: exploiting vulnerabilities; increased firepower; technical innovation; and circumvention. Efforts to achieve strategic defense would in fact increase risk of nuclear war by stimulating the nuclear arms race since history demonstrates neither side will allow its deterrent force to be seriously degraded. Defenses would increase instability in times of a crisis. Science has also reduced the risk of nuclear war by making possible improved control and safety of nuclear forces and predictability of US/Soviet relations, verifiability of arms control agreements, and survivable strategic systems. Science can be a tool for good or evil; mankind must be its masters not its slaves.

  1. Trial Maneuver Generation and Selection in the Paladin Tactical Decision Generation System

    NASA Technical Reports Server (NTRS)

    Chappell, Alan R.; McManus, John W.; Goodrich, Kenneth H.

    1992-01-01

    To date, increased levels of maneuverability and controllability in aircraft have been postulated as tactically advantageous, but little research has studied maneuvers or tactics that make use of these capabilities. In order to help fill this void, a real time tactical decision generation system for air combat engagements, Paladin, has been developed. Paladin models an air combat engagement as a series of discrete decisions. A detailed description of Paladin's decision making process is presented. This includes the sources of data used, methods of generating reasonable maneuvers for the Paladin aircraft, and selection criteria for choosing the "best" maneuver. Simulation results are presented that show Paladin to be relatively insensitive to errors introduced into the decision process by estimation of future positional and geometric data.

  2. Trial maneuver generation and selection in the Paladin tactical decision generation system

    NASA Technical Reports Server (NTRS)

    Chappell, Alan R.; Mcmanus, John W.; Goodrich, Kenneth H.

    1993-01-01

    To date, increased levels of maneuverability and controllability in aircraft have been postulated as tactically advantageous, but little research has studied maneuvers or tactics that make use of these capabilities. In order to help fill this void, a real-time tactical decision generation system for air combat engagements, Paladin, has been developed. Paladin models an air combat engagement as a series of discrete decisions. A detailed description of Paladin's decision making process is presented. This includes the sources of data used, methods of generating reasonable maneuvers for the Paladin aircraft, and selection criteria for choosing the 'best' maneuver. Simulation results are presented that show Paladin to be relatively insensitive to errors introduced into the decision process by estimation of future positional and geometric data.

  3. Punishment sustains large-scale cooperation in prestate warfare

    PubMed Central

    Mathew, Sarah; Boyd, Robert

    2011-01-01

    Understanding cooperation and punishment in small-scale societies is crucial for explaining the origins of human cooperation. We studied warfare among the Turkana, a politically uncentralized, egalitarian, nomadic pastoral society in East Africa. Based on a representative sample of 88 recent raids, we show that the Turkana sustain costly cooperation in combat at a remarkably large scale, at least in part, through punishment of free-riders. Raiding parties comprised several hundred warriors and participants are not kin or day-to-day interactants. Warriors incur substantial risk of death and produce collective benefits. Cowardice and desertions occur, and are punished by community-imposed sanctions, including collective corporal punishment and fines. Furthermore, Turkana norms governing warfare benefit the ethnolinguistic group, a population of a half-million people, at the expense of smaller social groupings. These results challenge current views that punishment is unimportant in small-scale societies and that human cooperation evolved in small groups of kin and familiar individuals. Instead, these results suggest that cooperation at the larger scale of ethnolinguistic units enforced by third-party sanctions could have a deep evolutionary history in the human species. PMID:21670285

  4. Heuristic automation for decluttering tactical displays.

    PubMed

    St John, Mark; Smallman, Harvey S; Manes, Daniel I; Feher, Bela A; Morrison, Jeffrey G

    2005-01-01

    Tactical displays can quickly become cluttered with large numbers of symbols that can compromise effective monitoring. Here, we studied how heuristic automation can aid users by intelligently "decluttering" the display. In a realistic simulated naval air defense task, 27 experienced U.S. Navy users monitored a cluttered airspace and executed defensive responses against significant threats. An algorithm continuously evaluated aircraft for their levels of threat and decluttered the less threatening ones by dimming their symbols. Users appropriately distrusted and spot-checked the automation's assessments, and decluttering had very little effect on which aircraft were judged as significantly threatening. Nonetheless, decluttering improved the timeliness of responses to threatening aircraft by 25% as compared with a baseline display with no decluttering; it was especially beneficial for threats in more peripheral locations, and 25 of 27 participants preferred decluttering. Heuristic automation, when properly designed to guide users' attention by decluttering less important objects, may prove valuable in many cluttered monitoring situations, including air traffic management, crisis team management, and tactical situation awareness in general.

  5. American Spirit: A Leadership Philosophy for U.S. Tactical Forces

    DTIC Science & Technology

    1991-12-18

    1 2 HQDA, FM 22-103- Leadership and Command at Senior Levels, June 1987, 31. 1 3 1bid" vii. 1 4 James J. Schneider. "The Theory of Operational Art...AD-A25B 390 0 AMERICAN SP=RI A Leadership Philosophy for U.S. Tactical Forces A Monograph by Major William J. Wansley Field Artillery DTIC S S LAVIS... LEADERSHIP PHILOSOPHY FOR U. S. TACTICAL FORCES ,OIOlS) WILLIAM J. WANSLEY, USA lORMING ORGANIZATION NAM&(S) AND ADURESSgES) s. PtRrORMING ORGANIZATION )OL OF

  6. Miniaturized low-cost ion mobility spectrometer for fast detection of chemical warfare agents.

    PubMed

    Zimmermann, Stefan; Barth, Sebastian; Baether, Wolfgang K M; Ringer, Joachim

    2008-09-01

    Ion mobility spectrometry (IMS) is a well-known method for detecting hazardous compounds in air. Typical applications are the detection of chemical warfare agents, highly toxic industrial compounds, explosives, and drugs of abuse. Detection limits in the low part per billion range, fast response times, and simple instrumentation make this technique more and more popular. In particular, there is an increasing demand for miniaturized low-cost IMS for hand-held devices and air monitoring of public areas by sensor networks. In this paper, we present a miniaturized aspiration condenser type ion mobility spectrometer for fast detection of chemical warfare agents. The device is easy to manufacture and allows single substance identification down to low part per billion-level concentrations within seconds. The improved separation power results from ion focusing by means of geometric constraints and fluid dynamics. A simple pattern recognition algorithm is used for the identification of trained substances in air. The device was tested at the German Armed Forces Scientific Institute for Protection Technologies-NBC-Protection. Different chemical warfare agents, such as sarin, tabun, soman, US-VX, sulfur mustard, nitrogen mustard, and lewisite were tested. The results are presented here.

  7. Analysis of Physiological, Technical, and Tactical Analysis during a Friendly Football Match of Elite U19.

    PubMed

    Ortega, Juan Ignacio; Evangelio, Carlos; Clemente, Filipe Manuel; Martins, Fernando Manuel Lourenço; González-Víllora, Sixto

    2016-06-16

    The main objective was to analyze a friendly match of youth elite soccer players identifying the variance of tactical and physiological response parameters during the game. In addition, detecting the impact of both halves on player performance. For the purposes of this study twenty-two U19 players were analyzed playing 11v11. Activity profile, heart rate (HR and HRmax), grouped in five different zones were analyzed via Bluetooth technology, technical performance was analyzed by the Team Sport Assessment Procedure (TSAP), and tactical performance was measured by Social Network Analysis. A comparison of heart rate responses showed significant main effects in the halves (p = 0.001; η p 2 = 0.623). A comparison between tactical position and technical performance had significant main effects (p = 0.001; η p 2 = 0.390). Tactical position showed statistically significant effects on tactical prominence (p = 0.002; η p 2 = 0.296). Therefore, fatigue is a component distinguished in technical/tactical parameters, such as volume of play and efficiency index. Results suggest that fatigue effects may constrain technical performance and, for that reason, the use of instruments to monitor the fatigue effect during matches may be suggested.

  8. Analysis of Physiological, Technical, and Tactical Analysis during a Friendly Football Match of Elite U19

    PubMed Central

    Ortega, Juan Ignacio; Evangelio, Carlos; Clemente, Filipe Manuel; Martins, Fernando Manuel Lourenço; González-Víllora, Sixto

    2016-01-01

    The main objective was to analyze a friendly match of youth elite soccer players identifying the variance of tactical and physiological response parameters during the game. In addition, detecting the impact of both halves on player performance. For the purposes of this study twenty-two U19 players were analyzed playing 11v11. Activity profile, heart rate (HR and HRmax), grouped in five different zones were analyzed via Bluetooth technology, technical performance was analyzed by the Team Sport Assessment Procedure (TSAP), and tactical performance was measured by Social Network Analysis. A comparison of heart rate responses showed significant main effects in the halves (p = 0.001; ηp2 = 0.623). A comparison between tactical position and technical performance had significant main effects (p = 0.001; ηp2 = 0.390). Tactical position showed statistically significant effects on tactical prominence (p = 0.002; ηp2 = 0.296). Therefore, fatigue is a component distinguished in technical/tactical parameters, such as volume of play and efficiency index. Results suggest that fatigue effects may constrain technical performance and, for that reason, the use of instruments to monitor the fatigue effect during matches may be suggested. PMID:29910283

  9. Technical-tactical analysis of youth olympic taekwondo combat.

    PubMed

    Tornello, Francesco; Capranica, Laura; Minganti, Carlo; Chiodo, Salvatore; Condello, Giancarlo; Tessitore, Antonio

    2014-04-01

    The purpose of this study was to define the technical and tactical profiles of official youth taekwondo competitions played under the most recent rules of the International Taekwondo Federation. Tactical actions (i.e., attack, defense, and block), technical executions (from 1- to 4-point scores), kicking legs (i.e., front/rear and right/left), and overall technical effectiveness were investigated in relation to match outcome of semifinal and final competitions (n = 50) of youth (aged 13-14 years) black belt athletes during the Italian Taekwondo Cadet Championship. Differences (p < 0.001) were found among all action typologies (Attack: 50.9 ± 2.2%; Defense: 27.7 ± 1.5%; Block: 21.3 ± 1.6%), with winners showing fewer (p = 0.005) offensive actions and more (p = 0.001) defensive actions with respect to non-winners. Independently from match outcome, technical exchanges showed differences (p < 0.001) for technical executions. Winners resulted more efficient (p < 0.001) for both technical and tactical variables. In general, these findings showed that Cadets tend to adopt an offensive strategy. In considering that the adoption of the new electronic system requires athletes to execute correct technical actions to have a score assigned, coaches should emphasize the effectiveness of scoring techniques and help athletes to effectively improve their defense and counterattack capabilities.

  10. Camouflage and Deception Techniques for Urban Warfare

    DTIC Science & Technology

    1980-10-01

    ý 1 97418W / 7. AU"Olil’a) . CONTRACT GA GRANT NUMBER~o) 06. 01911TRMUINORGANIATIOENT NAME AND ADRSS1. RGRMELM ROETTS Cappoulagad forpubl apic ...of air to achieve rigidity as well as~ flotation . lii’ dco br g wohll le iul~lvel iiear real rilbbonl bridlges in order to con1fuse ellicini...A.. (PT. Spain. "~Attackingr and Defending, Populated Places?" Military Review, (October 19414). Felts. Robert. "Urban Warfare. Emerging Material

  11. Thumping the Hive: Russian Neocortical Warfare in Chechnya

    DTIC Science & Technology

    2004-09-01

    against the determined, resourceful Muslim tribes of the mountains and forests of the Central Caucasus, Russia’s military forces compiled a frustrating...warfare against minds and envisioning weapons as any means used to change the enemy’s will.” The merging of these two hemispheric approaches produces... single adviser in the Soviet system 40 Ibid., 5. 41 Szafranski, 409. 19 can allow himself to

  12. Potassium Ferrate: A Novel Chemical Warfare Agent Decontaminant

    DTIC Science & Technology

    2004-11-16

    POTASSIUM FERRATE : A NOVEL CHEMICAL WARFARE AGENT DECONTAMINANT Russell Greene greener@battelle.org (Battelle Memorial Institute, West...difficulties, and/or unsatisfactory CWA destruction efficiencies. Potassium ferrate (K2FeO4) addresses all of these issues through its high oxidation...used and proposed, are unstable (with respect to loss of activity) and/or difficult to prepare, store and transport. Potassium ferrate (K2FeO4) has

  13. User’s Guide for Tactical Thinking Behaviorally Anchored Rating Scales

    DTIC Science & Technology

    2006-06-01

    Shafer , J., Ross, K. G., Cox, D. A., & Shadrick, S . B. (2005). A behaviorally anchored assessment tool to measure tactical thinking proficiency. Paper...NUMBER User’s Guide for Tactical Thinking Behaviorally Anchored Rating W74V8H-04-C-0018 Scales 5b. PROGRAM ELEMENT NUMBER 622785 6. AUTHOR( S ) 5c...cognition by observing and rating behaviors . Phillips, Shafer , Ross, Cox, and Shadrick (2005) describe the process by which the T- BARS were developed. This

  14. A Tactical-Game Approach and Enhancement of Metacognitive Behaviour in Elementary School Students

    ERIC Educational Resources Information Center

    Chatzipanteli, Athanasia; Digelidis, N.; Karatzoglidis, C.; Dean, R.

    2016-01-01

    Background: "Teaching games for understanding" (TGfU) is a tactical-game approach to teaching, in which participants are learning via the processes intrinsic to the games themselves. Purpose: The aim of the study was to examine the effectiveness of a tactical-game model in promoting metacognitive behaviour in elementary-school students.…

  15. Are the Soviets Talking about Tactical Intelligence in Their Open-Source Publications?

    DTIC Science & Technology

    1981-06-01

    tactical intelligence. The articles surveyed demonstrate that the Soviets have chosen ground reconnaissance as the basis for their tactical...overruns the enemy, drives six to seven km./deeper and forces the enemy to deploy his reserves. This information is combined’with the personal ...collecting (management) is performed. The articles surveyed deal with the regimental intelligence officer. His functions are listed; the importance of

  16. Central American Tactical Airlift Wing

    DTIC Science & Technology

    2017-03-17

    will examine the airlift demands for Central America. Then it will examine the success of the HAW in Europe. Next, cost analysis will illustrate the...feasibility of a collaborative airlift wing in Central America. Finally, we will offer a proposal for the construct of the Tactical Airlift Wing...been unable to perform outside of the HAW construct . In the same way that the HAW provides heavy airlift to partner nations that would otherwise be

  17. IPv6 Tactical Network Management

    DTIC Science & Technology

    2009-09-01

    is transitioning to IPv6 networks. While the benefits provided by IPv6 are numerous, its challenges lie in managing a network on the scale...operability, and usability in a tactical network is under way. New challenges are also presented by the need to integrate into the IPv6 segment new...Accessing this information also presents challenges . Feasibility studies are conducted to show that, for these devices, the IPv6 domain is at least

  18. Prognostication: Do the Services See the Same Future of Warfare?

    DTIC Science & Technology

    2008-05-01

    conduct of war, warfare. 24 Dana Johnson, Scott Pace, C. Bryan Gabbard , Space: Emerging Options for National Power, (RAND, 1998), 10. 25 Creveld, 145...Bryan Gabbard . Space: Emerging Options for National Power, RAND http://www.rand.org/pubs/monograph_reports/MR517/, 1998. (Accessed 5 January 2008

  19. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    NASA Astrophysics Data System (ADS)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  20. A Model for Developing and Assessing Tactical Decision-Making Competency in Game Play

    ERIC Educational Resources Information Center

    Pagnano-Richardson, Karen; Henninger, Mary L.

    2008-01-01

    All teachers want their students to become better game players who are motivated to participate in and outside of class. Students need to learn how to make good tactical decisions, in addition to being skilled movers, in order to become competent game players. When students make better tactical decisions, they experience more success and therefore…

  1. Personal protection during resuscitation of casualties contaminated with chemical or biological warfare agents--a survey of medical first responders.

    PubMed

    Brinker, Andrea; Prior, Kate; Schumacher, Jan

    2009-01-01

    The threat of mass casualties caused by an unconventional terrorist attack is a challenge for the public health system, with special implications for emergency medicine, anesthesia, and intensive care. Advanced life support of patients injured by chemical or biological warfare agents requires an adequate level of personal protection. The aim of this study was to evaluate the personal protection knowledge of emergency physicians and anesthetists who would be at the frontline of the initial health response to a chemical/biological warfare agent incident. After institutional review board approval, knowledge of personal protection measures among emergency medicine (n = 28) and anesthetics (n = 47) specialty registrars in the South Thames Region of the United Kingdom was surveyed using a standardized questionnaire. Participants were asked for the recommended level of personal protection if a chemical/biological warfare agent(s) casualty required advanced life support in the designated hospital resuscitation area. The best awareness within both groups was regarding severe acute respiratory syndrome, and fair knowledge was found regarding anthrax, plague, Ebola, and smallpox. In both groups, knowledge about personal protection requirements against chemical warfare agents was limited. Knowledge about personal protection measures for biological agents was acceptable, but was limited for chemical warfare agents. The results highlight the need to improve training and education regarding personal protection measures for medical first receivers.

  2. The role of the sand in chemical warfare agent exposure among Persian Gulf War veterans: Al Eskan disease and "dirty dust".

    PubMed

    Korényi-Both, A L; Svéd, L; Korényi-Both, G E; Juncer, D J; Korényi-Both, A L; Székely, A

    2000-05-01

    The purpose of this paper is to inquire into the relationship between Al Eskan disease and the probable exposure to chemical warfare agents by Persian Gulf War veterans. Al Eskan disease, first reported in 1991, compromises the body's immunological defense and is a result of the pathogenic properties of the extremely fine, dusty sand located in the central and eastern region of the Arabian peninsula. The disease manifests with localized expression of multisystem disorder. Signs and symptoms of Al Eskan disease have been termed by the news media "Persian Gulf syndrome." The dust becomes a warfare agent when toxic chemicals are microimpregnated into inert particles. The "dirty dust" concept, that the toxicity of an agent could be enhanced by absorption into inactive particles, dates from World War I. A growing body of evidence shows that coalition forces have encountered Iraqi chemical warfare in the theater of operation/Persian Gulf War to a much greater extent than early U.S. Department of Defense information had indicated. Veterans of that war were exposed to chemical warfare agents in the form of direct (deliberate) attacks by chemical weapons, such as missiles and mines, and indirect (accidental) contamination from demolished munition production plants and storage areas, or otherwise. We conclude that the microimpregnated sand particles in the theater of operation/Persian Gulf War depleted the immune system and simultaneously acted as vehicles for low-intensity exposure to chemical warfare agents and had a modifying-intensifying effect on the toxicity of exposed individuals. We recommend recognition of a new term, "dirty sand," as a subcategory of dirty dust/dusty chemical warfare agents. Our ongoing research efforts to investigate the health impact of chemical warfare agent exposure among Persian Gulf War veterans suggest that Al Eskan disease is a plausible and preeminent explanation for the preponderance of Persian Gulf War illnesses.

  3. Tactical metrics that discriminate winning, drawing and losing teams in UEFA Euro 2012®.

    PubMed

    Winter, Christian; Pfeiffer, Mark

    2016-01-01

    The objectives of this article are twofold: first, an innovative approach to notational analysis in football is outlined. By considering the important theoretical requirements for the analysis of sports games (like the interaction between two parties, the procedural sequence of action or the significance of tactical behaviour) the meaning of the introduced parameters, called tactical metrics, is illustrated. In a second step, the validity of this approach is tested using matches of the Union of European Football Associations (UEFA) Euro 2012® to investigate a connection between these metrics and success. The results show that 11 tactical metrics model tactical behaviour in 4 different dimensions (game speed, transition play after ball recovery, transition play after ball loss and offence efficiency (OE)). Discriminant analysis based on the factor values leads to a correct classification of 64.8% identifying winners, losers and drawers. This successful discrimination reveals a connection between match success and the presented metrics. Especially, the transition play after losing the ball and the OE seem to be factors connected directly with the result of a match, since those were important values for a successful discrimination. Furthermore, the procedural description of tactical behaviour provides the opportunity to conduct meaningful recommendations for the training and coaching process.

  4. Airborne Tactical Intent-Based Conflict Resolution Capability

    NASA Technical Reports Server (NTRS)

    Wing, David J.; Vivona, Robert A.; Roscoe, David A.

    2009-01-01

    Trajectory-based operations with self-separation involve the aircraft taking the primary role in the management of its own trajectory in the presence of other traffic. In this role, the flight crew assumes the responsibility for ensuring that the aircraft remains separated from all other aircraft by at least a minimum separation standard. These operations are enabled by cooperative airborne surveillance and by airborne automation systems that provide essential monitoring and decision support functions for the flight crew. An airborne automation system developed and used by NASA for research investigations of required functionality is the Autonomous Operations Planner. It supports the flight crew in managing their trajectory when responsible for self-separation by providing monitoring and decision support functions for both strategic and tactical flight modes. The paper focuses on the latter of these modes by describing a capability for tactical intent-based conflict resolution and its role in a comprehensive suite of automation functions supporting trajectory-based operations with self-separation.

  5. Cyber-Defense: A Taxonomy of Tactics for Managing Cyberstalking.

    PubMed

    Tokunaga, Robert S; Aune, Krystyna S

    2015-06-16

    Cyberstalking research has revealed information about who is perpetrating what offense to whom. This study adds to research on cyberstalking by exploring how victims respond to the unwanted pursuit. The reflections of cyberstalking victims were content analyzed to answer research questions about different risk management behaviors, their effectiveness, and their relationship with specific cyberstalking behaviors. Findings indicated that victims used seven general management tactics of which ignore/avoidance, active technological disassociation, and help seeking were the most common. Using technology to move away from pursuers was reported as the most effective tactic for managing the unwanted relational pursuit. The results also suggested that victims' management responses were associated with the type of behaviors experienced. © The Author(s) 2015.

  6. Examination of Psychological Type and Preferred Negotiation Tactics and Strategies of Contract Negotiators

    DTIC Science & Technology

    1992-09-01

    Auxiliary Process .................. 23 iii Page The Myers-Briggs Type Indicator ....................... 24 The Relationship of Personality Type and...negotiation tactics and/or strategies. Major Charan Johnstone (1986) studied the relationship of psychological type as measured by the Myers-Briggs Type...1986:118). Determining psychological type for both government and industry negotiators, and the relationship to negotiation tactics and strategies may

  7. A Heuristic Decision Making Model to Mitigate Adverse Consequences in a Network Centric Warfare/Sense and Respond System

    DTIC Science & Technology

    2005-05-01

    made. 4. Do military decision makers identify / analyze adverse consequences presently? Few do based on this research and most don’t do it effectively ...A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM...ENS/05-01 A HEURISTIC DECISION MAKING MODEL TO MITIGATE ADVERSE CONSEQUENCES IN A NETWORK CENTRIC WARFARE / SENSE AND RESPOND SYSTEM

  8. Littoral Combat Ship Open Ocean Anti-Submarine Warfare

    DTIC Science & Technology

    2014-06-01

    maintain stealth and its defense in order to properly conduct an attack on a surface vessel (Sternhell and Thorndike 2014, 102). This statement...its target, the surface combatants can counter by increasing their speed (Sternhell and Thorndike 2014). While the maximum speed of the current...120316_PS.pdf Sternhell, Charles M, and Alan M Thorndike . 2014. “Antisubmarine Warfare in World War II.” CNA Analysis & Solutions. Accessed April 14, 2014

  9. Strategic Information Warfare: Challenges for the United States.

    DTIC Science & Technology

    1998-05-01

    Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997

  10. Russian and Chinese Information Warfare: Theory and Practice

    DTIC Science & Technology

    2004-06-01

    Integral neurolinguistic programming •Placing essential programs into the conscious or sub- conscious mind •Subconscious suggestions that modify human...Generators of special rays •Optical systems • Neurolinguistic programming •Computer psychotechnology •The mass media •Audiovisual effects •Special effects...Information Warfare: Theory and Practice 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  11. Tactical Combat Casualty Care in the Canadian Forces: lessons learned from the Afghan war

    PubMed Central

    Savage, Erin; Forestier, Colleen; Withers, Nicholas; Tien, Homer; Pannell, Dylan

    2011-01-01

    Tactical Combat Casualty Care (TCCC) is intended to treat potentially preventable causes of death on the battlefield, but acknowledges that application of these treatments may place the provider and even the mission in jeopardy if performed at the wrong time. Therefore, TCCC classifies the tactical situation with respect to health care provision into 3 phases (care under fire, tactical field care and tactical evacuation) and only permits certain interventions to be performed in specific phases based on the danger to the provider and casualty. In the 6 years that the Canadian Forces (CF) have been involved in sustained combat operations in Kandahar, Afghanistan, more than 1000 CF members have been injured and more than 150 have been killed. As a result, the CF gained substantial experience delivering TCCC to wounded soldiers on the battlefield. The purpose of this paper is to review the principles of TCCC and some of the lessons learned about battlefield trauma care during this conflict. PMID:22099324

  12. Soldier-worn augmented reality system for tactical icon visualization

    NASA Astrophysics Data System (ADS)

    Roberts, David; Menozzi, Alberico; Clipp, Brian; Russler, Patrick; Cook, James; Karl, Robert; Wenger, Eric; Church, William; Mauger, Jennifer; Volpe, Chris; Argenta, Chris; Wille, Mark; Snarski, Stephen; Sherrill, Todd; Lupo, Jasper; Hobson, Ross; Frahm, Jan-Michael; Heinly, Jared

    2012-06-01

    This paper describes the development and demonstration of a soldier-worn augmented reality system testbed that provides intuitive 'heads-up' visualization of tactically-relevant geo-registered icons. Our system combines a robust soldier pose estimation capability with a helmet mounted see-through display to accurately overlay geo-registered iconography (i.e., navigation waypoints, blue forces, aircraft) on the soldier's view of reality. Applied Research Associates (ARA), in partnership with BAE Systems and the University of North Carolina - Chapel Hill (UNC-CH), has developed this testbed system in Phase 2 of the DARPA ULTRA-Vis (Urban Leader Tactical, Response, Awareness, and Visualization) program. The ULTRA-Vis testbed system functions in unprepared outdoor environments and is robust to numerous magnetic disturbances. We achieve accurate and robust pose estimation through fusion of inertial, magnetic, GPS, and computer vision data acquired from helmet kit sensors. Icons are rendered on a high-brightness, 40°×30° field of view see-through display. The system incorporates an information management engine to convert CoT (Cursor-on-Target) external data feeds into mil-standard icons for visualization. The user interface provides intuitive information display to support soldier navigation and situational awareness of mission-critical tactical information.

  13. Destruction of chemical warfare surrogates using a portable atmospheric pressure plasma jet

    NASA Astrophysics Data System (ADS)

    Škoro, Nikola; Puač, Nevena; Živković, Suzana; Krstić-Milošević, Dijana; Cvelbar, Uroš; Malović, Gordana; Petrović, Zoran Lj.

    2018-01-01

    Today's reality is connected with mitigation of threats from the new chemical and biological warfare agents. A novel investigation of cold plasmas in contact with liquids presented in this paper demonstrated that the chemically reactive environment produced by atmospheric pressure plasma jet (APPJ) is potentially capable of rapid destruction of chemical warfare agents in a broad spectrum. The decontamination of three different chemical warfare agent surrogates dissolved in liquid is investigated by using an easily transportable APPJ. The jet is powered by a kHz signal source connected to a low-voltage DC source and with He as working gas. The detailed investigation of electrical properties is performed for various plasmas at different distances from the sample. The measurements of plasma properties in situ are supported by the optical spectrometry measurements, whereas the high performance liquid chromatography measurements before and after the treatment of aqueous solutions of Malathion, Fenitrothion and Dimethyl Methylphosphonate. These solutions are used to evaluate destruction and its efficiency for specific neural agent simulants. The particular removal rates are found to be from 56% up to 96% during 10 min treatment. The data obtained provide basis to evaluate APPJ's efficiency at different operating conditions. The presented results are promising and could be improved with different operating conditions and optimization of the decontamination process.

  14. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore

    USGS Publications Warehouse

    Rayl, Nathaniel; Bastille-Rousseau, Guillaume; Organ, John F.; Mumma, Matthew; Mahoney, Shane P.; Soulliere, Colleen; Lewis, Keith; Otto, Robert; Murray, Dennis; Waits, Lisette; Fuller, Todd

    2018-01-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator–prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves).During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined.As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per‐capita rate at which bears killed calves followed a type‐I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves.Our results reveal that

  15. A Framework for Teaching Tactical Game Knowledge.

    ERIC Educational Resources Information Center

    Wilson, Gail E.

    2002-01-01

    Provides an example of a framework of generic knowledge, designed for teachers, that describes and explains the foundational tactical aspects of invasive team-game play. The framework consists of four modules: participants and their roles, objectives, action principles, and action options. Guidelines to help instructors design practical activities…

  16. Comparison Of The I-Gel Supraglottic And King Laryngotracheal Airways In A Simulated Tactical Environment.

    PubMed

    March, Juan A; Tassey, Theresa E; Resurreccion, Noel B; Portela, Roberto C; Taylor, Stephen E

    2018-01-01

    When working in a tactical environment there are several different airway management options that exist. One published manuscript suggests that when compared to endotracheal intubation, the King LT laryngotracheal airway (KA) device minimizes time to successful tube placement and minimizes exposure in a tactical environment. However, comparison of two different blind insertion supraglottic airway devices in a tactical environment has not been performed. This study compared the I-Gel airway (IGA) to the KA in a simulated tactical environment, to determine if one device is superior in minimizing exposure and minimizing time to successful tube placement. This prospective randomized cross over trial was performed using the same methods and tactical environment employed in a previously published study, which compared endotracheal intubation versus the KA in a tactical environment. The tactical environment was simulated with a one-foot vertical barrier. The participants were paramedic students who wore an Advanced Combat Helmet (ACH) and a ballistic vest (IIIA) during the study. Participants were then randomized to perform tactical airway management on an airway manikin with either the KA or the IGA, and then again using the alternate device. The participants performed a low military type crawl and remained in this low position during each tube placement. We evaluated the time to successful tube placement between the IGA and KA. During attempts, participants were videotaped to monitor their height exposure above the barrier. Following completion, participants were asked which airway device they preferred. Data was analyzed using Student's t-test across the groups for time to ventilation and height of exposure. In total 19 paramedic students who were already at the basic EMT level participated. Time to successful placement for the KA was 39.7 seconds (95%CI: 32.7-46.7) versus 14.4 seconds (95%CI: 12.0-16.9) for the IGA, p < 0.001. Maximum height exposure of the helmet

  17. Sink or Swim: The Marine Corps Capacity to Conduct a Marine Expeditionary Brigade Amphibious Assault using Expeditionary Maneuver Warfare

    DTIC Science & Technology

    2010-03-01

    Expeditionary Maneuver Warfare? This study addresses the equipment issues surrounding the Marine expeditionary brigade ’s’ ability to conduct an amphibious...addresses the equipment issues surrounding the expeditionary brigade’s ability to conduct an amphibious assault under expeditionary maneuver warfare in...1 Issues and Elements of the Modern-Day MEB Assault .................................................................. 2 The Marine Corps

  18. Physical and technical performances are not associated with tactical prominence in U14 soccer matches.

    PubMed

    Clemente, Filipe Manuel; Figueiredo, António José; Martins, Fernando Manuel Lourenço; Mendes, Rui Sousa; Wong, Del P

    2016-01-01

    The aim of this study was to analyse the association between physical/technical variables and the tactical prominence variables in U14 soccer matches. Twenty-two young amateur soccer players (13.5 [Formula: see text] 0.5 years old, 5.4 [Formula: see text] 0.5 years of practice, 163.3 [Formula: see text] 9.8 cm in body height) from two teams of the Portuguese regional league volunteered for the study. Our results showed positive and moderate correlation between dribbling test and betweenness centrality (r = 0.324; p = 0.142), and negative moderate correlation between %fatigue index and betweenness centrality (r = -0.390; p = 0.073). Physical and technical variables had no statistical differences among tactical positions. Nevertheless, when tactical prominence of players from four tactical positions were compared, significant differences were found in terms of degree prestige (p = 0.001) and degree centrality (p = 0.002). This pilot study did not find strong correlations between physical/technical levels and tactical prominence in soccer matches.

  19. Modern Application of Liddell Hart’s Doctrine on Infantry Tactics.

    DTIC Science & Technology

    1983-06-03

    new system is that the platoon should be the basis of all infantry training." The reason for this statement soon becomes clear as he describes all...lecture was titled, "Man-in-the-Dark" Theory of Infantry Tactics and the "Expanding Torrent" System of Attack. These theories will be explained in the...was pub- lished. This book elaborates the lecture and also has an appendix on, "A system for teaching the elements of tactics for a platoon". The book

  20. Redefining Tactical Operations for MER Using Cloud Computing

    NASA Technical Reports Server (NTRS)

    Joswig, Joseph C.; Shams, Khawaja S.

    2011-01-01

    The Mars Exploration Rover Mission (MER) includes the twin rovers, Spirit and Opportunity, which have been performing geological research and surface exploration since early 2004. The rovers' durability well beyond their original prime mission (90 sols or Martian days) has allowed them to be a valuable platform for scientific research for well over 2000 sols, but as a by-product it has produced new challenges in providing efficient and cost-effective tactical operational planning. An early stage process adaptation was the move to distributed operations as mission scientists returned to their places of work in the summer of 2004, but they would still came together via teleconference and connected software to plan rover activities a few times a week. This distributed model has worked well since, but it requires the purchase, operation, and maintenance of a dedicated infrastructure at the Jet Propulsion Laboratory. This server infrastructure is costly to operate and the periodic nature of its usage (typically heavy usage for 8 hours every 2 days) has made moving to a cloud based tactical infrastructure an extremely tempting proposition. In this paper we will review both past and current implementations of the tactical planning application focusing on remote plan saving and discuss the unique challenges present with long-latency, distributed operations. We then detail the motivations behind our move to cloud based computing services and as well as our system design and implementation. We will discuss security and reliability concerns and how they were addressed

  1. Condition-dependent female preference for male genitalia length is based on male reproductive tactics.

    PubMed

    Hernandez-Jimenez, Armando; Rios-Cardenas, Oscar

    2017-12-06

    There is extensive morphological variation of male genitalia across animals with internal fertilization, even among closely related species. Most studies attempting to explain this extraordinary diversity have focused on processes that occur post-copula (e.g. sperm competition, cryptic female choice). Only a few studies have focused on the pre-copula process of female preference. In addition, the extent to which this variation could be associated with the use of different reproductive tactics has yet to be explored. Here, we show that female preference for male genitalia length in two livebearing fishes depends on the type of reproductive tactic of the males being evaluated as well as the body condition of the female. In a species where all males coax females to acquire matings (courters), females preferred males with short genitalia. In a species with genetically influenced alternative reproductive tactics (courter males that only court and produce courter sons, sneaker males that use the coercive tactic of sneak chase and produce sneaker sons), female preference depended on an interaction between male tactic and female condition: females in good condition preferred courter males with short genitalia, and sneaker males with long genitalia. Our results suggest that female preference for male traits favourable to their sons may be an important factor contributing to the diversification of male genitalia. Despite the contrasting selection for genitalia length that our female preference tests suggest, we found no significant differences in genitalia length between coaxing (courters) and coercive (sneakers) males. Our study represents a starting point to more clearly understand the role of alternative reproductive tactics and variation in female mate preference in the evolution of male genitalia. © 2017 The Author(s).

  2. Unmanned Warfare: Second and Third Order Effects Stemming from the Afghan Operational Environment between 2001 and 2010

    DTIC Science & Technology

    2011-06-10

    the very nature of warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video ...warfare took a dramatic step into the future. With new assets capable of remaining airborne for nearly 24 hours and live video feeds streaming to...shape the battlefield during protracted combat operations. From the real time video feeds, to the 24 hour coverage of an area of interest, tangible

  3. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    DTIC Science & Technology

    2015-03-01

    information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance . Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with

  4. Categories and continua of destructive and constructive marital conflict tactics from the perspective of U.S. and Welsh children.

    PubMed

    Goeke-Morey, Marcie C; Cummings, E Mark; Harold, Gordon T; Shelton, Katherine H

    2003-09-01

    Categories and continua of parents' marital conflict tactics based on multiple, conceptually grounded criteria were tested. Participants were 175 U.S. children, ages 8-16 years (88 boys, 87 girls) and 327 Welsh children, ages 11-12 years (159 boys, 168 girls). Children's responses (affective, cognitive, behavioral) to analog presentations of 10 everyday marital conflict tactics enacted by fathers or mothers showed substantial variation as a function of tactic used. Orderings of conflict tactics on the various response criteria varied as a function of moderators, particularly the gender of the parent expressing the conflict tactic. Conflict tactics were classified as either constructive or destructive according to criteria derived from the emotional security hypothesis. Except for calm discussion, classifications did not change regardless of cultural group, parent gender, or child age or gender. Recommendations for negotiating everyday marital conflict for the children's sake are discussed.

  5. Introduction to electronic warfare

    NASA Astrophysics Data System (ADS)

    Schleher, D. C.

    A broad overview of electronic warfare (EW) is given, emphasizing radar-related EW applications. A broad perspective of the EW field is first given, defining EW terms and giving methods of EW threat analysis and simulation. Electronic support measures and electronic countermeasures (ECM) systems are described, stressing their application to radar EW. Radars are comprehensively discussed from a system viewpoint with emphasis on their application in weapon systems and their electronic counter-countermeasures capabilities. Some general topics in C3 systems are described, stressing communication systems, C3I systems, and air defense systems. Performance calculations for EW and radar systems are covered, and modern EW signal processing is described from an airborne ECM perspective. Future trends and technology in the EW world are considered, discussing such topics as millimeter-wave EW, low-observable EW technology, GaAs monolithic circuits, VHSIC, and AI.

  6. Manstein’s Campaigns - More Than Tactics

    DTIC Science & Technology

    1988-03-22

    O . ,S UNCLASSIFIED USAWC MILITARY STUDIES PROGRAM PAPER MANSTEIN’S CAMPAIGNS - MORE THAN TACTICS Acceso ..or NTIS CRA&I DTIC TAB AN INDIVIDUAL...transportation and arteries of communication. And in a similar vain, Liddell Hart writes of the German campaign in Russia: The issue in Russia depended less on

  7. Just War and Postmodern Warfare: A German Case Study

    DTIC Science & Technology

    2015-04-01

    warfare construct, Germany is shaping a military concept based on recent conflicts and unfettered by biases of conventional strategies, organizations...remain sovereign while subconsciously evolving toward liberal democratic ideas. In respecting each country’s political sensitivities, Germany’s...before exhausting all diplomatic, economic and information instruments. Whereas the term AU/ACSC/PINSON/AY15 13 “interests” may bias the United

  8. Unconventional Warfare and Counterinsurgency in Pakistan: A Brief History

    DTIC Science & Technology

    2012-11-01

    inter-connected. Punjabi Pakistani militants with sophisticated asymmetric warfare training and experience fighting Indian forces in Kashmir...factions. These Punjabi Pakistani militants would prove to be some of the most dangerous opponents of the government after 2006. From 2003 to 2006, the...68 Khan. “Untangling the Punjabi Taliban Network”. CTC Sentinel, March 2010; Franco, “Tehrik-e-Taliban Pakistan.” 69 Iqbal

  9. Differential investment into testes and sperm production in alternative male reproductive tactics of the African striped mouse (Rhabdomys pumilio).

    PubMed

    Schradin, Carsten; Eder, Susanne; Müller, Karin

    2012-05-01

    Males that follow alternative reproductive tactics might differ in their investment into testis development and sperm production. The resource-allocation hypothesis predicts that males following a sneaker tactic should invest more into sperm production than dominant territorial males which should invest more into mate guarding. This hypothesis is supported by studies in species where individual males cannot switch between tactics (fixed tactics). Here we present the first data for a species where males can switch between tactics (plastic tactics). We studied African striped mice (Rhabdomys pumilio) in captivity, mimicking three tactics observed in the field: philopatric group-living males, singly-housed males representing roaming males, and group-living breeding males. We measured quantitative and qualitative reproductive traits, as well as serum and testis hormone concentrations. We found no support for the resource-allocation hypothesis, since breeding and singly-housed males invested similarly in testes and sperm. However, philopatric males had significantly smaller testes and epididymides, lower sperm counts, lower testosterone and higher corticosterone levels than males of the two other tactics. Philopatric males did not reach a larger body mass than singly-housed males with well developed reproductive traits, indicating that they did not trade investment in sperm production against growth. Interestingly, testis testosterone concentrations of philopatric males did not differ from those of other males. Our data suggest that philopatric males are reproductively suppressed by the breeding male, but might be ready to increase their serum testosterone levels when social and environmental conditions allow for this physiological switch accompanying the behavioral switch between tactics. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Structural Analysis of Technical-Tactical Elements in Table Tennis and their Role in Different Playing Zones

    PubMed Central

    Munivrana, Goran; Petrinović, Lidija Zekan; Kondrič, Miran

    2015-01-01

    For the purpose of determining the overall structure of technical-tactical elements in table tennis and evaluating their role in different playing zones around the table, a new measuring instrument (a questionnaire) was formulated that took advantage of the expert knowledge of top, world class table tennis coaches. The results of the hierarchical taxonomic (cluster) analysis showed that the overall structure of the technical-tactical elements forming the table tennis technique could be divided into three basic groups; a group of technical-tactical elements (A) used in the phase of preparing one’s own and disabling the opponent’s attack; a group of technical-tactical elements (B) used in the phase of attack and counterattack; and a group of technical-tactical elements (C) used in the phase of defense. The differences among the obtained groups of table tennis elements were determined by applying the Kruskal-Wallis test, while relations between the groups and their role in different playing zones around the table were analyzed by comparing the average values of the experts’ scores. PMID:26557204

  11. Structural Analysis of Technical-Tactical Elements in Table Tennis and their Role in Different Playing Zones.

    PubMed

    Munivrana, Goran; Petrinović, Lidija Zekan; Kondrič, Miran

    2015-09-29

    For the purpose of determining the overall structure of technical-tactical elements in table tennis and evaluating their role in different playing zones around the table, a new measuring instrument (a questionnaire) was formulated that took advantage of the expert knowledge of top, world class table tennis coaches. The results of the hierarchical taxonomic (cluster) analysis showed that the overall structure of the technical-tactical elements forming the table tennis technique could be divided into three basic groups; a group of technical-tactical elements (A) used in the phase of preparing one's own and disabling the opponent's attack; a group of technical-tactical elements (B) used in the phase of attack and counterattack; and a group of technical-tactical elements (C) used in the phase of defense. The differences among the obtained groups of table tennis elements were determined by applying the Kruskal-Wallis test, while relations between the groups and their role in different playing zones around the table were analyzed by comparing the average values of the experts' scores.

  12. Modeling the transport of chemical warfare agents and simulants in polymeric substrates for reactive decontamination

    NASA Astrophysics Data System (ADS)

    Pearl, Thomas; Mantooth, Brent; Varady, Mark; Willis, Matthew

    2014-03-01

    Chemical warfare agent simulants are often used for environmental testing in place of highly toxic agents. This work sets the foundation for modeling decontamination of absorbing polymeric materials with the focus on determining relationships between agents and simulants. The correlations of agents to simulants must consider the three way interactions in the chemical-material-decontaminant system where transport and reaction occur in polymer materials. To this end, diffusion modeling of the subsurface transport of simulants and live chemical warfare agents was conducted for various polymer systems (e.g., paint coatings) with and without reaction pathways with applied decontamination. The models utilized 1D and 2D finite difference diffusion and reaction models to simulate absorption and reaction in the polymers, and subsequent flux of the chemicals out of the polymers. Experimental data including vapor flux measurements and dynamic contact angle measurements were used to determine model input parameters. Through modeling, an understanding of the relationship of simulant to live chemical warfare agent was established, focusing on vapor emission of agents and simulants from materials.

  13. Textbook of Military Medicine. Part 1. Warfare, Weaponry, and the Casualty. Part 5. Conventional Warfare. Ballistic, Blast, and Burn Injuries

    DTIC Science & Technology

    1991-01-01

    United States. Because the vast majority of our patients are not active -duty military personnel, it may seem that our day-to-day ac- tivities are far... activated . A designated time-delay fuse uses an Source: Reference 8 15 Conventional Warfare: Ballistic, Blast, and Burn Injuries explosion and the...be found embedded and unexploded in tissue. The fuse is located at the tip of the warhead, and is activated and will deionate on contact only after

  14. The Venus "Shell-over-Star" hieroglyph and Maya warfare: An examination of the interpretation of a Mayan symbol

    NASA Astrophysics Data System (ADS)

    Voit, Claudia Ann

    For decades, Maya scholars have associated the Mayan "Shell-Star" (also referred to as "Star-War") hieroglyph with Maya warfare. Put forward by scholars such as Floyd Lounsbury and David Kelley, and later advanced by Linda Schele, David Freidel, Ian Graham, Peter Matthews, Anthony Aveni and others, there are now dozens of published articles and chapters relating the hieroglyph to Venus and warfare. Venus is one of the most notable celestial objects outside of the Sun and Moon and was highly visible to the inhabitants of the Maya world. The Dresden Codex (an astronomical almanac) contains important information about the planet Venus, and the calendar section was deciphered by the librarian and mathematician, Ernst Förstemann in the late 1800s. In his decipherment, he deduced that the numbers contained in the tables must be connected to the orbital period of the planet. There is no other planet with the same orbital period 3 as Venus. Förstemann suggested that the decoded astronomy tables were used by the Maya to determine when to wage war. This interpretation, along with others, like Floyd Lounsbury`s study of Venus and the Long Count date at Bonampak were the seeds that have led to methodological errors that first began to take root in Maya research. The idea of the Venus association with warfare took hold and continues to propagate. Many scholars continue to assert that the "shell-star" glyph is related to warfare events. Others, like Gerardo Aldana, and Stanley Guenter, have recently come forward to reexamine and question the hieroglyph and its relationship, if any, to Maya warfare. I suggest, further, that methodological errors may have occurred along the way. I propose that these errors include data lost in translation, and inaccurate translations. In addition, the statistical analysis of Venus cycles has weak points. If this identification of the errors is correct, we need to re-evaluate the weakened foundation on which we are building our assertions about

  15. 2009 Tactical Wheeled Vehicles Conference (TWV)

    DTIC Science & Technology

    2009-02-03

    Concept / Status / Joint Effort Between TARDEC & CERDEC • Leverage Military / Commercial vehicular technologies to equip tactical vehicles with a common... Vehicles Trailer (HEMAT) Heavy Equipment Transport (HETS) Container Handling Unit (CHU) Armored Security Vehicle Over 1200 systems fielded 978...Important Note: While EMIP is an excellent means to introduce new technologies to the Military , it can not change vehicle systems. Army PM’s are

  16. Stormy Waters: Technology, Sea Control and Regional Warfare

    DTIC Science & Technology

    1994-06-01

    AD-A283 945 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA "DTIC TI ELECTETHESIS • S Sop()z 994 v G STOwM NATERS "T"CDOLOGY, SEA CNTROL AND REGIONAL... S . FUNDING NUMBERS Stormy Waters: Technology, Sea Control and Regional Warfare 6. AUTHOR( S ) David A. Schnell 7. PERFORMING ORGANIZATION NAME( S ) AND...ADDRESSRES) 8. PERFORMING ORGANIZATION Naval Postgraduate School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING/MONITORING AGENCY NAME( S ) AND

  17. Tactic changes in dusky frillgoby Bathygobius fuscus sneaker males: effects of body size and nest availability.

    PubMed

    Takegaki, T; Kaneko, T; Matsumoto, Y

    2013-02-01

    Field and laboratory studies were conducted to examine the effects of nest availability and body size on changes in male mating tactics from sneaking to nest-holding in the dusky frillgoby Bathygobius fuscus. In the field, the body size of nest-holding males decreased from early to mid-breeding season, suggesting the possibility of a change in the tactics of sneaker males to nest-holding. Many sneaker males did not use vacant spawning nests even when size-matched nests were available, but they continued to reproduce as sneakers. Similarly, in aquarium experiments with available vacant nests, some sneaker males became nest-holders irrespective of their body size, but some did not. These results showed that nest availability is not a limiting factor for changes in tactics by sneaker males in this species. Because tactic-unchanged sneaker males were co-housed with larger nest-holding males in the tanks, the body size of nearby nest-holding males may have affected the decision to change tactics for sneaker males. Moreover, smaller individuals among tactic-changed males tended to spend more time until spawning, probably because they had relatively larger costs and smaller benefits of reproduction as nest-holding males compared to larger males. © 2012 The Authors. Journal of Fish Biology © 2012 The Fisheries Society of the British Isles.

  18. Prevention of nuclear war

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lifton, R.J.

    Physicians are exercising their responsibility as healers in their efforts to prevent nuclear war. Death for Hiroshima survivors was experienced in four stages: the immediate impact of destruction, the acute impact of radiation, delayed radiation effects, and later identification as an atomic bomb survivor. Each phase had its physical and psychological impacts and negates Hiroshima as a model for rational behavior despite those who claim survival is possible for those who are prepared. The psychic effects of modern nuclear, chemical, and germ warfare need to be challenged with a symbolization of life and immortality. Studies of psychological reactions to themore » terror children felt during practice air-raid drills indicate that the fears can be surpressed and re-emerge in adult life as a linking of death with collective annihilation. Other themes which emerge are feelings of impermanence, craziness, identification with the bomb, and a double existence. Psychic numbing and the religion of nuclearism cause dangerous conflicts with the anxieties caused by increasing awareness of death. (DCK)« less

  19. Closed loop supply chain network design with fuzzy tactical decisions

    NASA Astrophysics Data System (ADS)

    Sherafati, Mahtab; Bashiri, Mahdi

    2016-09-01

    One of the most strategic and the most significant decisions in supply chain management is reconfiguration of the structure and design of the supply chain network. In this paper, a closed loop supply chain network design model is presented to select the best tactical and strategic decision levels simultaneously considering the appropriate transportation mode in activated links. The strategic decisions are made for a long term; thus, it is more satisfactory and more appropriate when the decision variables are considered uncertain and fuzzy, because it is more flexible and near to the real world. This paper is the first research which considers fuzzy decision variables in the supply chain network design model. Moreover, in this study a new fuzzy optimization approach is proposed to solve a supply chain network design problem with fuzzy tactical decision variables. Finally, the proposed approach and model are verified using several numerical examples. The comparison of the results with other existing approaches confirms efficiency of the proposed approach. Moreover the results confirms that by considering the vagueness of tactical decisions some properties of the supply chain network will be improved.

  20. I Am Right for Your Child! : Tactics for Manipulating Potential Parents-In-Law.

    PubMed

    Apostolou, Menelaos

    2015-12-01

    Parents and children have converging as well as diverging interests with respect to the latter's mate choices. Diverging interests frequently result in children choosing mates who do not gain the approval of their parents. Manipulation then arises wherein parents try to drive away undesirable prospective sons- and daughters-in-law, and the latter employ counter manipulation to make the former to change their minds. The present research aims to identify and measure the effectiveness of manipulation tactics that individuals employ to influence their partners' parents to accept them as mates for their daughters and sons. Study 1 recruited a sample of 106 Greek-Cypriots and, using open-ended questionnaires, identified 41 acts that individuals employ on their partners' parents. Using principal-components analysis, in a sample of 738 Greek-Cypriots, Study 2 classified these acts into seven broader manipulation tactics and identified the ones that are more and the ones that are less likely to be employed. Study 3 examined in a sample of 414 Greek-Cypriots the effectiveness of these tactics in altering parents' minds and finds a moderate effectiveness, with some tactics being more effective than others. The implications of these findings are discussed.

  1. Meniere's disease: A surgeon's tactics

    NASA Technical Reports Server (NTRS)

    Soldatov, I.

    1980-01-01

    Surgical procedures for treating Meniere's disease are discussed. Based on the results of 250 operations, it is concluded that interventions are sufficiently effective not only with vestibular dysfunction, but also with hearing disorders. In surgical treatment of Meniere's disease, it is expedient to adhere to by-stage tactics: to start with the simplest and least traumatic interventions - operations on the nerves of the tympanic cavity, and if these are ineffective to use more complex methods, including drainage or shunting of the endolymphatic sac.

  2. [DIFFERENTIATED TACTICS OF VIDEOTHORACOSCOPIC DIAGNOSIS OF THE PLEURAL EXUDATE SYNDROME].

    PubMed

    Ivashchenko, V E; Kalabukha, I A; Mayetnyi, E M

    2016-04-01

    Differentiated tactics of diagnostic videothoracoscopy (VTHS) in a pleural exudate syndrome, which ought to be treated with hydrothorax elimination and artificial pneumothorax creation, was proposed. Further roentgenological investigation permits to create a plan for the operation conduction and a certain anesthesia application. Criteria for the operation planning and the anesthesiological support choice were elaborated. Results of VTHS conduction in 261 patients in Department of Thoracic Surgery were analyzed. The differentiated tactics for the VTHS performance application have had saved the patients from the unnecessary endotracheal narcosis conduction, and reduced a pharmacological load on a patient, as well as a rate of contraindications for the operation usage and the stationary treatment duration.

  3. WASTE MINIZATION OPPORTUNITY ASSESSMENT: NAVAL UNDERSEA WARFARE ENGINEERING STATION - KEYPORT, WA

    EPA Science Inventory

    This report describes the application of EPA's waste minimization assessment procedures to a torpedo maintenance facility at the Naval Undersea Warfare Engineering Station, Keyport, WA. he assessment focused on the Mark 48 shop and the Mark 46 shop. hese shops service the Mark 48...

  4. Destruction of chemical warfare agents using metal-organic frameworks

    NASA Astrophysics Data System (ADS)

    Mondloch, Joseph E.; Katz, Michael J.; Isley, William C., III; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W.; Hall, Morgan G.; Decoste, Jared B.; Peterson, Gregory W.; Snurr, Randall Q.; Cramer, Christopher J.; Hupp, Joseph T.; Farha, Omar K.

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic ZrIV ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  5. Destruction of chemical warfare agents using metal-organic frameworks.

    PubMed

    Mondloch, Joseph E; Katz, Michael J; Isley, William C; Ghosh, Pritha; Liao, Peilin; Bury, Wojciech; Wagner, George W; Hall, Morgan G; DeCoste, Jared B; Peterson, Gregory W; Snurr, Randall Q; Cramer, Christopher J; Hupp, Joseph T; Farha, Omar K

    2015-05-01

    Chemical warfare agents containing phosphonate ester bonds are among the most toxic chemicals known to mankind. Recent global military events, such as the conflict and disarmament in Syria, have brought into focus the need to find effective strategies for the rapid destruction of these banned chemicals. Solutions are needed for immediate personal protection (for example, the filtration and catalytic destruction of airborne versions of agents), bulk destruction of chemical weapon stockpiles, protection (via coating) of clothing, equipment and buildings, and containment of agent spills. Solid heterogeneous materials such as modified activated carbon or metal oxides exhibit many desirable characteristics for the destruction of chemical warfare agents. However, low sorptive capacities, low effective active site loadings, deactivation of the active site, slow degradation kinetics, and/or a lack of tailorability offer significant room for improvement in these materials. Here, we report a carefully chosen metal-organic framework (MOF) material featuring high porosity and exceptional chemical stability that is extraordinarily effective for the degradation of nerve agents and their simulants. Experimental and computational evidence points to Lewis-acidic Zr(IV) ions as the active sites and to their superb accessibility as a defining element of their efficacy.

  6. Continuous Acoustic Sensing With an Unmanned Aerial Vehicle System for Anti-Submarine Warfare in a High-Threat Area

    DTIC Science & Technology

    2015-12-01

    strive in multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next...multiple warfare areas. This research benefits not only the Navy, through enhancement of offensive warfighting by testing the next generation of...produce and definitely worth the research and testing to be a positive asset for the Navy. It not only can stay on station for an exponential amount of

  7. Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq

    DTIC Science & Technology

    2006-05-26

    Winning the Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq A Monograph by Major...Counterinsurgency Fight in Iraq: The Role of Political Culture in Counterinsurgency Warfare 2003-2006 in Iraq 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e...14. ABSTRACT This monograph provides insight into the importance of political culture in relation to developing a counterinsurgency strategy. This

  8. Space and Naval Warfare Systems Command and Overall Navy Needs to Improve Management of Waiver and Deferral Requests

    DTIC Science & Technology

    2015-10-08

    Management of Waiver and Deferral Requests Visit us at www.dodig.mil Objective Our objective for this audit was to evaluate the Space and Naval Warfare...We conducted this audit in accordance with generally accepted government auditing standards. We considered management comments on a draft of...OFFICIAL USE ON Y Introduction DODIG-2016-003 │ 1 Introduction Objective Our objective for this audit was to evaluate the Space and Naval Warfare

  9. Feasibility Study for the Use of Green, Bio-Based, Efficient Reactive Sorbent Material to Neutralize Chemical Warfare Agents

    DTIC Science & Technology

    2012-08-02

    REPORT Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents 14. ABSTRACT 16...way cellulose, lignin and hemicelluloses interact as well as whole wood dissolution occurs in ILs. The present project was conducted to 1. REPORT...Feasibility study for the use of green, bio-based, efficient reactive sorbent material to neutralize chemical warfare agents Report Title ABSTRACT Over the

  10. Scientific impacts on nuclear strategic policy: Dangers and opportunities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keeny S.M. Jr.

    1988-12-15

    Nuclear weapons have revolutionized warfare, making a mutual capability for assured destruction a fact of life and mutual assured deterrence the underlying nuclear strategy of the superpowers. The program to find a technical solution to the threat of nuclear weapons by creating an impervious defense is fatally flawed by failure to consider responses available to a sophisticated adversary at much lower cost. Responses could involve: exploiting vulnerabilities; increased firepower; technical innovation; and circumvention. Efforts to achieve strategic defense would in fact increase risk of nuclear war by stimulating the nuclear arms race since history demonstrates neither side will allow itsmore » deterrent force to be seriously degraded. Defenses would increase instability in times of a crisis. Science has also reduced the risk of nuclear war by making possible improved control and safety of nuclear forces and predictability of US/Soviet relations, verifiability of arms control agreements, and survivable strategic systems. Science can be a tool for good or evil; mankind must be its masters not its slaves.« less

  11. Lanchester-Type Models of Warfare. Volume I

    DTIC Science & Technology

    1980-10-01

    1 / - -I SLEVEL 0 LANCHESTER-TYPE MODELS OF WARFARE VOLUME I$ by James G. Taylor Professor of Operations Research Naval Postgraduate School Monterey...California a DTIC¢-• 1 tELECTED S• OCT 28 1980 • D bFiFTr--••5i•:hii:rfl 8 00 O 20 01 9 Approved for public 8e0 -.;209-’ )Distribution Unlimited KL...34’:•-~ l,,, I " .. .. .. . . .. ... , . . , • •_. . .• .: _ - •’ .. - ..A ] . ......LJ- srcr.’NTY CL ASS 1CATl.,N OF’ TNH 4 a. , 1 A t HI At) IN .TWV

  12. Joint Doctrine for Barriers, Obstacles, and Mine Warfare

    DTIC Science & Technology

    1999-02-24

    of explosives. Typical tactical examples are barbed wire obstacles and tank ditches. Operational and strategic barriers and obstacles may also be...total of 10 ocean minesweepers, 9 amphibious ships, 6 fleet tugs, 3 salvage ships, and 19 destroyers. Twenty-four CH-53D Sea Stallions from Marine

  13. Recognizing and Adapting to Unrestricted Warfare Practices by China

    DTIC Science & Technology

    2012-02-15

    Sun Zi, are of particular significance. These men taught obedience to the state, the primacy of relationships over law, and the importance of...Von Clausewitz and Baron Antoine Jomini. Whereas Clausewitz provided a theoretical strategic framework for warfare where “war is a continuation of...of family (filial Piety), ritual, loyalty, meritocracy, relationships , and the desire to avoid shame and losing face.17 Chinese rulers often used

  14. Health-related quality of life of chemical warfare victims: an assessment with the use of a specific tool.

    PubMed

    Biat Saeed, Khaled; Parandeh, Akram; Alhani, Fatemeh; Salaree, Mohammad Mehdi

    2014-02-01

    Exposure to chemical warfare gases significantly changes the quality of life (QoL) of victims and has significant chronic adverse effects. This study sought to assess the health-related QoL (HRQoL) of chemical victims by means of a tool specifically designed for this purpose. The correlation of their QoL with several demographic factors was evaluated as well. In this descriptive cross-sectional study, 120 chemical warfare victims were selected from subjects presenting to selected medical centers in Tehran in 2012 using convenience sampling. Two questionnaires of demographic information and HRQoL of chemical warfare victims (specific tool) were used for data collection. The data were analyzed using SPSS version 20 software (IBM, Armonk, NY, USA). The mean and standard deviation (mean ± SD) of scores obtained by chemical warfare victims in physical, psychosocial and spiritual domains was 39.6 ± 16.5, 42.1 ± 15.2 and 82.4 ± 15.4, respectively. Different age groups showed a significant difference in the psychosocial domain score (P < 0.01). Also, the physical and spiritual domain scores had significant differences with respect to the level of education (P < 0.001). The occupational status showed significant differences in the psychosocial and spiritual domains scores of QoL (P < 0.001). The physical and psychosocial domain scores also accounted for a significant difference with respect to the duration and severity of pulmonary symptoms (P < 0.05). Considering the importance and high value of spirituality in chemical warfare victims, it can be used as strategically for these patients to help them cope with their injury and improve their physical and psychosocial health and QoL.

  15. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore.

    PubMed

    Rayl, Nathaniel D; Bastille-Rousseau, Guillaume; Organ, John F; Mumma, Matthew A; Mahoney, Shane P; Soulliere, Colleen E; Lewis, Keith P; Otto, Robert D; Murray, Dennis L; Waits, Lisette P; Fuller, Todd K

    2018-05-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator-prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves). During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined. As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per-capita rate at which bears killed calves followed a type-I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves. Our results reveal that generalist

  16. The Imperatives of Tactical Level Maintenance,

    DTIC Science & Technology

    1986-11-24

    consist of the imperatives of tactical level maintenance. These imperatives are: fix forward; provision of repair parts supply in a responsive manner...Fix forward; Provide rer,onsi,,e repair parts supply support; Conduct responsive recoer’, and e,)acuat!Dr operations; Establish and maintain...1 primary battlefield source of supple becomes the maintenance system. The role of maintenance, therefore, is to ass-ist in tne pro ’,51 _n

  17. Tactical Radar Technology Study. Volume II.

    DTIC Science & Technology

    1980-03-01

    area around the component by air conditioning of some nature. The electronic components are solid state and densely packaged. The use of heat pipe ...capabilities. The heat pipe industry may be able to achieve considerable improvement. A tactical assessment of the threat resistance threshold required...Operating -60 to +1550 F (+ Solar Radiation) Temperature Nonoperating -70 to +155F Relative Humidity 100% Winds 45 knots - operation 45-60 knots

  18. Proximal detection of chemical warfare agents using PMIRRAS

    NASA Astrophysics Data System (ADS)

    Petryk, Michael W. P.; Marenco, Armando J.

    2010-04-01

    Non-contact chemical warfare agent detection has been demonstrated on military painted surfaces using polarization modulation infrared reflection-absorption spectroscopy (PMIRRAS). Notably, VX has been detected on chemical agent resistance coating (CARC) paint at a distance of approximately 10 cm. PMIRRAS does not rely on the presence of chemical vapors and is not affected by many common battlefield interferants such as aerosolized dust, water and diesel vapors, etc., making it highly suitable for use in operational environments.

  19. Determination of trace amounts of chemical warfare agent degradation products in decontamination solutions with NMR spectroscopy.

    PubMed

    Koskela, Harri; Rapinoja, Marja-Leena; Kuitunen, Marja-Leena; Vanninen, Paula

    2007-12-01

    Decontamination solutions are used for an efficient detoxification of chemical warfare agents (CWAs). As these solutions can be composed of strong alkaline chemicals with hydrolyzing and oxidizing properties, the analysis of CWA degradation products in trace levels from these solutions imposes a challenge for any analytical technique. Here, we present results of application of nuclear magnetic resonance spectroscopy for analysis of trace amounts of CWA degradation products in several untreated decontamination solutions. Degradation products of the nerve agents sarin, soman, and VX were selectively monitored with substantially reduced interference of background signals by 1D 1H-31P heteronuclear single quantum coherence (HSQC) spectrometry. The detection limit of the chemicals was at the low part-per-million level (2-10 microg/mL) in all studied solutions. In addition, the concentration of the degradation products was obtained with sufficient confidence with external standards.

  20. Towards Organized Disorder: The Evolution of American Infantry Assault Tactics, 1778-1919

    DTIC Science & Technology

    1979-12-17

    military training. 5 3 Many officers who would hold this post would play key roles in shaping infantry tactical doctrine. During Thayer’s admlnis...produce more. Meanwhile Scott would insure that these officers had a tactical system they could use. General Scott was to play a large part in the...Gettysburg in 1863. 5 2Wiley, p. 76. tth 5 3The bayonet played a very small role in Civil War combat compared to the destruction caused by the Minie

  1. Evidence for ontogenetically and morphologically distinct alternative reproductive tactics in the invasive Round Goby Neogobius melanostomus.

    PubMed

    Bleeker, Katinka; de Jong, Karen; van Kessel, Nils; Hinde, Camilla A; Nagelkerke, Leopold A J

    2017-01-01

    Alternative reproductive tactics are characterized by the occurrence of discrete alternative morphs that differ in behavioural, morphological and physiological traits within the same sex. Although much effort has been made to describe the behaviour, morphology and physiology of such alternative morphs, less effort has been invested investigating how much overlap there is in the characteristics of such morphs in natural populations. We studied random population samples of the invasive Round Goby Neogobius melanostomus from five different localities in the river Rhine system in the Netherlands. We found two morphologically and physiologically distinct male morphs which likely represent alternative reproductive tactics. Almost all mature males under 9.35 cm total length had a gonadosomatic index > 3%, suggestive of a sneaker tactic, while nearly all males above 9.35 cm has a gonadosomatic index of < 3%, suggestive of a parental tactic. Cheek size and eye diameter alone were sufficient to distinguish the two morphs. Gonads had a different relationship with size in the two morphs, indicating separate growth trajectories. The gonad mass of sneaker morphs would be ca. 7.5 times as high as the gonad mass of parental morphs of the same total length after extrapolation. Few (9%) intermediates were found, suggesting that the expression of alternative reproductive tactics is determined before the first breeding season. This contrasts with studies on other goby species, which show evidence of plastic tactics that can be affected by social circumstances. We conclude that it is possible to distinguish two alternative male morphs in the Dutch Round Goby population using morphological measurements alone. Although behavioural observations are needed to provide conclusive evidence, the difference in GSI between these morphs indicates that these morphs reflect alternative reproductive tactics.

  2. Evidence for ontogenetically and morphologically distinct alternative reproductive tactics in the invasive Round Goby Neogobius melanostomus

    PubMed Central

    de Jong, Karen; van Kessel, Nils; Hinde, Camilla A.; Nagelkerke, Leopold A. J.

    2017-01-01

    Alternative reproductive tactics are characterized by the occurrence of discrete alternative morphs that differ in behavioural, morphological and physiological traits within the same sex. Although much effort has been made to describe the behaviour, morphology and physiology of such alternative morphs, less effort has been invested investigating how much overlap there is in the characteristics of such morphs in natural populations. We studied random population samples of the invasive Round Goby Neogobius melanostomus from five different localities in the river Rhine system in the Netherlands. We found two morphologically and physiologically distinct male morphs which likely represent alternative reproductive tactics. Almost all mature males under 9.35 cm total length had a gonadosomatic index > 3%, suggestive of a sneaker tactic, while nearly all males above 9.35 cm has a gonadosomatic index of < 3%, suggestive of a parental tactic. Cheek size and eye diameter alone were sufficient to distinguish the two morphs. Gonads had a different relationship with size in the two morphs, indicating separate growth trajectories. The gonad mass of sneaker morphs would be ca. 7.5 times as high as the gonad mass of parental morphs of the same total length after extrapolation. Few (9%) intermediates were found, suggesting that the expression of alternative reproductive tactics is determined before the first breeding season. This contrasts with studies on other goby species, which show evidence of plastic tactics that can be affected by social circumstances. We conclude that it is possible to distinguish two alternative male morphs in the Dutch Round Goby population using morphological measurements alone. Although behavioural observations are needed to provide conclusive evidence, the difference in GSI between these morphs indicates that these morphs reflect alternative reproductive tactics. PMID:28369128

  3. Impression Management and Interview and Job Performance Ratings: A Meta-Analysis of Research Design with Tactics in Mind

    PubMed Central

    Peck, Jessica A.; Levashina, Julia

    2017-01-01

    Impression management (IM) is pervasive in interview and job performance settings. We meta-analytically examine IM by self- and other-focused tactics to establish base rates of tactic usage, to understand the impact of tactics on interview and job performance ratings, and to examine the moderating effects of research design. Our results suggest IM is used more frequently in the interview rather than job performance settings. Self-focused tactics are more effective in the interview rather than in job performance settings, and other-focused tactics are more effective in job performance settings rather than in the interview. We explore several research design moderators including research fidelity, rater, and participants. IM has a somewhat stronger impact on interview ratings in lab settings than field settings. IM also has a stronger impact on interview ratings when the target of IM is also the rater of performance than when the rater of performance is an observer. Finally, labor market participants use IM more frequently and more effectively than students in interview settings. Our research has implications for understanding how different IM tactics function in interview and job performance settings and the effects of research design on IM frequency and impact. PMID:28261135

  4. Children's disengagement from cancer care and treatment on the ward: an undesirable social tactic in the long term.

    PubMed

    Løvschal-Nielsen, P; Clausen, N; Meinert, L

    2017-11-01

    This anthropological study explores children's non-social reactions during the active treatment period, the on-treatment, in a paediatric oncology ward in a Danish university hospital. It is argued that, although some children's non-social reactions is a tactical disengagement to manage the on-treatment situation, such non-social tactics might ultimately prove an undesirable strategy with negative long-term social consequences for social survivorship. Data were generated over 7 months of ethnographic fieldwork between May 2011 and January 2013, using qualitative methods such as participant observation and open-ended interviewing. Fifty children of both sexes between 4 and 15 years, their families and hospital staff participated in the study. These data formed the basis for the study. The findings show that children's response to care challenges, including exhaustion from care management, exposure from being in a public space, and the open-ended duration of treatment, configure in tactic forms that we term social disengagement. It is suggested that such tactical social disengagement might expand into long-term social patterns, and, as such, change from an alleviating tactic to a socially isolating and damaging tactic for survivors of cancer in childhood. © 2016 John Wiley & Sons Ltd.

  5. Impression Management and Interview and Job Performance Ratings: A Meta-Analysis of Research Design with Tactics in Mind.

    PubMed

    Peck, Jessica A; Levashina, Julia

    2017-01-01

    Impression management (IM) is pervasive in interview and job performance settings. We meta-analytically examine IM by self- and other-focused tactics to establish base rates of tactic usage, to understand the impact of tactics on interview and job performance ratings, and to examine the moderating effects of research design. Our results suggest IM is used more frequently in the interview rather than job performance settings. Self-focused tactics are more effective in the interview rather than in job performance settings, and other-focused tactics are more effective in job performance settings rather than in the interview. We explore several research design moderators including research fidelity, rater, and participants. IM has a somewhat stronger impact on interview ratings in lab settings than field settings. IM also has a stronger impact on interview ratings when the target of IM is also the rater of performance than when the rater of performance is an observer. Finally, labor market participants use IM more frequently and more effectively than students in interview settings. Our research has implications for understanding how different IM tactics function in interview and job performance settings and the effects of research design on IM frequency and impact.

  6. Factors Affecting the Retention Decisions of Female Surface Warfare Officers

    DTIC Science & Technology

    2003-03-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS Approved for public release; distribution is unlimited. FACTORS AFFECTING THE RETENTION...Warfare Officers 6. AUTHOR(S) Clifton, Elizabeth A. 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School ...for the degree of MASTER OF SCIENCE IN LEADERSHIP AND HUMAN RESOURCE DEVELOPMENT from the NAVAL POSTGRADUATE SCHOOL March 2003

  7. Hybrid Warfare: How to Shape Special Operations Forces

    DTIC Science & Technology

    2016-06-10

    irregular tactics, information operations, and deliberate terrorism as they waged war against Russia in the territory of Chechnya and o deep in Russian...Russia initially had to withdraw its forces from Chechnya , but later led by a former KGB operative, Vladimir Putin, were able to defeat the Chechen rebels

  8. MOFwich: Sandwiched Metal-Organic Framework-Containing Mixed Matrix Composites for Chemical Warfare Agent Removal.

    PubMed

    Peterson, Gregory W; Lu, Annie X; Hall, Morgan G; Browe, Matthew A; Tovar, Trenton; Epps, Thomas H

    2018-02-28

    This work describes a new strategy for fabricating mixed matrix composites containing layered metal-organic framework (MOF)/polymer films as functional barriers for chemical warfare agent protection. Through the use of mechanically robust polymers as the top and bottom encasing layers, a high-MOF-loading, high-performance-core layer can be sandwiched within. We term this multifunctional composite "MOFwich". We found that the use of elastomeric encasing layers enabled core layer reformation after breakage, an important feature for composites and membranes alike. The incorporation of MOFs into the core layer led to enhanced removal of chemical warfare agents while simultaneously promoting moisture vapor transport through the composite, showcasing the promise of these composites for protection applications.

  9. Skills and offensive tactics used in pick-up basketball games.

    PubMed

    Wang, Jianyu; Liu, Wenhao; Moffit, Jeffrey

    2009-10-01

    The purpose of this study was to describe skills and offensive tactics frequently used in pick-up basketball games. 65 participants were recruited from public basketball courts. An observational instrument was developed to analyze the performances of pick-up games. Participants' performances were videotaped and coded. Results indicated that the passing skills most frequently observed in the games were chest pass, overhead pass, and bounce pass. For dribbling, crossover dribble and change-of-pace dribble were frequently observed. Jump shot, set shot, and layup were also frequently used. The offensive tactics frequently used included drive, cut, and set screen. The study may be beneficial for helping young people prepare to play pick-up basketball games.

  10. Information Management For Tactical Reconnaissance

    NASA Astrophysics Data System (ADS)

    White, James P.

    1984-12-01

    The expected battlefield tactics of the 1980's and 1990's will be fluid and dynamic. If tactical reconnaissance is to meet this challenge, it must explore all ways of accelerating the flow of information through the reconnaissance cycle, from the moment a tasking request is received to the time the mission results are delivered to the requestor. In addition to near real-time dissemination of reconnaissance information, the mission planning phase needs to be more responsive to the rapidly changing battlefield scenario. By introducing Artificial Intelligence (AI) via an expert system to the mission planning phase, repetitive and computational tasks can be more readily performed by the ground-based mission planning system, thereby permitting the aircrew to devote more of their time to target study. Transporting the flight plan, plus other mission data, to the aircraft is simple with the Fairchild Data Transfer Equipment (DTE). Aircrews are relieved of the tedious, error-prone, and time-consuming task of manually keying-in avionics initialization data. Post-flight retrieval of mission data via the DTE will permit follow-on aircrews, just starting their mission planning phase, to capitalize on current threat data collected by the returning aircrew. Maintenance data retrieved from the recently flown mission will speed-up the aircraft turn-around by providing near-real time fault detection/isolation. As future avionics systems demand more information, a need for a computer-controlled, smart data base or expert system on-board the aircraft will emerge.

  11. Integration of Lead Discovery Tactics and the Evolution of the Lead Discovery Toolbox.

    PubMed

    Leveridge, Melanie; Chung, Chun-Wa; Gross, Jeffrey W; Phelps, Christopher B; Green, Darren

    2018-06-01

    There has been much debate around the success rates of various screening strategies to identify starting points for drug discovery. Although high-throughput target-based and phenotypic screening has been the focus of this debate, techniques such as fragment screening, virtual screening, and DNA-encoded library screening are also increasingly reported as a source of new chemical equity. Here, we provide examples in which integration of more than one screening approach has improved the campaign outcome and discuss how strengths and weaknesses of various methods can be used to build a complementary toolbox of approaches, giving researchers the greatest probability of successfully identifying leads. Among others, we highlight case studies for receptor-interacting serine/threonine-protein kinase 1 and the bromo- and extra-terminal domain family of bromodomains. In each example, the unique insight or chemistries individual approaches provided are described, emphasizing the synergy of information obtained from the various tactics employed and the particular question each tactic was employed to answer. We conclude with a short prospective discussing how screening strategies are evolving, what this screening toolbox might look like in the future, how to maximize success through integration of multiple tactics, and scenarios that drive selection of one combination of tactics over another.

  12. Tactical Firefighter Teams: Pivoting Toward the Fire Service’s Evolving Homeland Security Mission

    DTIC Science & Technology

    2016-09-01

    critical response command C-TECC Committee on Tactical Emergency Casualty Care EMS emergency medical services EMT emergency medical technician ESU...Interagency Tactical Response Model: Integrating Fire and EMS with Law Enforcement to Mitigate Mumbai-Style Terrorist Attacks (New York: FDNY Center...the assailants, several traditional fire and EMS activities must often occur simultaneously to successfully mitigate the threat. Although rare

  13. Development of a National Consensus for Tactical Emergency Medical Support (TEMS) Training Programs--Operators and Medical Providers.

    PubMed

    Schwartz, Richard; Lerner, Brooke; Llwewllyn, Craig; Pennardt, Andre; Wedmore, Ian; Callaway, David; Wightman, John; Casillas, Raymond; Eastman, Alex; Gerold, Kevin; Giebner, Stephen; Davidson, Robert; Kamin, Richard; Piazza, Gina; Bollard, Glenn; Carmona, Phillip; Sonstrom, Ben; Seifarth, William; Nicely, Barbara; Croushorn, John; Carmona, Richard

    2014-01-01

    Tactical teams are at high risk of sustaining injuries. Caring for these casualties in the field involves unique requirements beyond what is provided by traditional civilian emergency medical services (EMS) systems. Despite this need, the training objectives and competencies are not uniformly agreed to or taught. An expert panel was convened that included members from the Departments of Defense, Homeland Security, Justice, and Health and Human Services, as well as federal, state, and local law-enforcement officers who were recruited through requests to stakeholder agencies and open invitations to individuals involved in Tactical Emergency Medical Services (TEMS) or its oversight. Two face-to-face meetings took place. Using a modified Delphi technique, previously published TEMS competencies were reviewed and updated. The original 17 competency domains were modified and the most significant changes were the addition of Tactical Emergency Casualty Care (TECC), Tactical Familiarization, Legal Aspects of TEMS, and Mass Casualty Triage to the competency domains. Additionally, enabling and terminal learning objectives were developed for each competency domain. This project has developed a minimum set of medical competencies and learning objectives for both tactical medical providers and operators. This work should serve as a platform for ensuring minimum knowledge among providers, which will serve enhance team interoperability and improve the health and safety of tactical teams and the public. 2014.

  14. Conflict Without Casualties: Non-Lethal Weapons in Irregular Warfare

    DTIC Science & Technology

    2007-09-01

    the body,” and the Geneva Protocol of 1925, bans the use of chemical and biological weapons .11 On 8 April 1975, President Ford issued Executive...E Funding – PE 63851M) (accessed 15 December 2006). The American Journal of Bioethics . “Medical Ethics and Non-Lethal Weapons .” Bioethics.net...CASUALTIES: NON-LETHAL WEAPONS IN IRREGULAR WARFARE by Richard L. Scott September 2007 Thesis Advisor: Robert McNab Second Reader

  15. U.S. Army Special Forces Roles in Asymmetric Warfare

    DTIC Science & Technology

    2001-06-01

    1Jonathan B . Tucker, “Asymmetric Warfare: An Emerging Threat to U.S. Security,” Forum For Applied Research and Public Policy (Monterey...8Ibid., 34. 9Tucker, 11. 10Ibid., 2. 11 Henry H . Shelton, GEN, USA, Commander in Chief, U.S. Special Operations Command...the Senate Armed Services Committee, “Military Threats and Security Challenges Through 2015,” (Washington: 3 February 2000), 3. 26GEN Henry H

  16. Mental Rotation of Tactical Instruction Displays Affects Information Processing Demand and Execution Accuracy in Basketball.

    PubMed

    Koopmann, Till; Steggemann-Weinrich, Yvonne; Baumeister, Jochen; Krause, Daniel

    2017-09-01

    In sports games, coaches often use tactic boards to present tactical instructions during time-outs (e.g., 20 s to 60 s in basketball). Instructions should be presented in a way that enables fast and errorless information processing for the players. The aim of this study was to test the effect of different orientations of visual tactical displays on observation time and execution performance. High affordances in visual-spatial transformation (e.g., mental rotation processes) might impede information processing and might decrease execution performance with regard to the instructed playing patterns. In a within-subjects design with 1 factor, 10 novice students were instructed with visual tactical instructions of basketball playing patterns with different orientations either showing the playing pattern with low spatial disparity to the players' on-court perspective (basket on top) or upside down (basket on bottom). The self-chosen time for watching the pattern before execution was significantly shorter and spatial accuracy in pattern execution was significantly higher when the instructional perspective and the real perspective on the basketball court had a congruent orientation. The effects might be explained by interfering mental rotation processes that are necessary to transform the instructional perspective into the players' actual perspective while standing on the court or imagining themselves standing on the court. According to these results, coaches should align their tactic boards to their players' on-court viewing perspective.

  17. Divisional Electronic Warfare Combat (DEWCOM) Model - User Manual.

    DTIC Science & Technology

    1980-09-01

    ulated combat hours. DTIC TA% 1~ Il m I UNCLASSIFIED SIECURITY CLASSIFICATION Or THIS PAGEft7n Date Entered) 4 ’ ./ .7"* t l DIVISIONAL ELECTRONIC WARFARE...277 4.2.1 Report M (Unit Status) ....... .......................... 277 4.2.2 Report M2 (Link Status...NONE in the first 4 spaces. 27 Mai -RF DEWCOM M S aoNE_ DAF INPUT DATA PREPARATI toI 2 4 . 8 1() 1 12 ,1 14 15 1 1718 lq2n2122 21242526 2728293031 3233

  18. The need for command and control instant message adaptive interfaces: lessons learned from Tactical Tomahawk human-in-the-loop simulations.

    PubMed

    Cummings, M L

    2004-12-01

    In the recent development of a human-in-the-loop simulation test bed designed to examine human performance issues for supervisory control of the Navy's new Tactical Tomahawk missile, measurements of operator situation awareness (SA) and workload through secondary tasking were taken through an embedded instant messaging program. Instant message interfaces (otherwise known as "chat"), already a means of communication between Navy ships, allow researchers to query users in real-time in a natural, ecologic setting, and thus provide more realistic and unobtrusive measurements. However, in the course of this testing, results revealed that some subjects fixated on the real-time instant messaging secondary task instead of the primary task of missile control, leading to the overall degradation of mission performance as well as a loss of SA. While this research effort was the first to quantify command and control performance degradation as a result of instant messaging, the military has recognized that in its network centric warfare quest, instant messaging is a critical informal communication tool, but has associated problems. Recently, a military spokesman said that managing chat in current military operations was sometimes a "nightmare," because military personnel have difficulty in handling large amounts of information through chat, and then synthesizing knowledge from this information. This research highlights the need for further investigation of the role of instant messaging interfaces both on task performance and situation awareness, and how the associated problems could be ameliorated through adaptive display design.

  19. Towards responsible system development in health services: a discourse analysis study of design conflict resolution tactics.

    PubMed

    Irestig, Magnus; Timpka, Toomas

    2010-02-01

    We set out to examine design conflict resolution tactics used in development of large information systems for health services and to outline the design consequences for these tactics. Discourse analysis methods were applied to data collected from meetings conducted during the development of a web-based system in a public health context. We found that low risk tactics were characterized by design issues being managed within the formal mandate and competences of the design group. In comparison, high risk tactics were associated with irresponsible compromises, i.e. decisions being passed on to others or to later phases of the design process. The consequence of this collective disregard of issues such as responsibility and legitimacy is that the system design will be impossible to implement in factual health service contexts. The results imply that downstream responsibility issues have to be continuously dealt with in system development in health services.

  20. Marine Corps NBC Warfare: Determining Clinical Supply Requirements for Treatment of Battlefield Casualties from Chemical and Biological Warfare

    DTIC Science & Technology

    2003-05-01

    medical supply blocks. Two available botulism antitoxins—the Centers for Disease Control and Prevention (CDC) trivalent equine antitoxin for serotypes...4th Ed. Fort Detrick, MD. U.S. Army Medical Research Institute of Infectious Diseases ; 2001: 9-12. 3. Sidell, FR, Franz, David R. Overview: Defense...Diagnosis and Treatment of Diseases of Tactical Importance to U.S. Central Command. Aberdeen Proving Ground, MD: U.S. Army Center for Health Promotion and