Integrating the B-2 Into Link 16 Operations
Network centric warfare is a key enabler to present day military operations. Link 16, a tactical data link, is one means that combat air forces utilize to leverage network centric warfare. In the past, the B-2 community relied on stove-piped communications systems, but now the B-2 is in the early stages of implementing a fully integrated Link 16 system. This paper will show that the current integration of Link 16 will enhance the B-2's overall mission effectiveness by decreasing aircrew workload, increasing situational awareness, and eliminating many opportunities for human error. However, the current Link 16 implementation also has several hurdles to overcome in order to be fully effective. These hurdles, which include implementing hardware and software improvements, maximizing training opportunities, and emphasizing a commitment to Link 16 use in combat operations, are also addressed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
After the KC-135, What Next? Exploring the Future Capabilities and Acquisition of our Next Generation Tanker
This research paper covers several aspects of the current and future tanker acquisition. Not only does it research capabilities related tanker acquisition but it also explores the proper capabilities required of future tanker assets. The research progresses from a historical perspective to the current available options for the next generation tanker. From there data is used to show possible capabilities and missions appropriate for aerial refueling assets. Topics discussed are dual role tanker/airlift possibilities, spiral development of "SMART" tanker capabilities, and possible associated tanker platform missions. Final recommendations are given for future tanker platform acquisition and capabilities it should have for tomorrow's wartime scenario's.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
On the Right Course
The Department of Defense (DOD), specifically the United States Air Force (USAF) is responsible for the acquisition, operation, and sustainment of the Global Positioning System (GPS). As a result they have the enormous responsibility of keeping pace with the ever-growing military and civilian markets. This responsibility brings with it a lot of criticism over the management of the system which is utilized largely by the international and national civil communities. Conservative modernization deployment strategies, delayed acquisition schedules, and international distrust are a few of the criticisms that face the USAF GPS team. Inevitably, the DOD and the USAF must be in tune with the needs of and dramatic impacts that their decisions make on the millions of users worldwide. They are. Despite the astronomical growth and dependency on GPS, the DOD strikes an adequate balance between military and civilian users. This delicate balance is achieved throughout the course of the program as seen through an exploration of history, policy, strategy, and performance.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Geosynthetic Clay Liners Used in Municipal Solid Waste Landfills
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Continuous Emission Monitoring Systems for Non-Criteria Pollutants
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Military Dependence on Commercial Satellite Communications Systems--Strength or Vulnerability?
The military's growing dependence on commercial satellite communications systems will become a strength or vulnerability based on how well the right balance is achieved between commercial and military systems. Determining that balance is a function of clearly understanding both DoD's requirements and the vulnerabilities and risks associated with the use of, and dependence on, commercial systems. This report provides a short overview of the emerging commercial capabilities and then examines in depth the DoD process for validating requirements, the validated MILSATCOM requirements documented through that process, and the risks and vulnerabilities associated with the use of, and dependence on, commercial satellite communications systems. The main conclusion drawn is that commercial capabilities can help satisfy DoD requirements for capacity, but at a "cost" in most cases of accepting risk with respect to several key qualitative requirements, especially with respect to protection, assured access, and control. A few additional conclusions are drawn about how to achieve the best balance to satisfy DoD requirements with the least amount of risk and cost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Reconnaissance
Ever since the Isrealis demonstrated how Unmanned Aerial Vehicles (UAVs) could be effectively used in operations, interest in UAVs has intensified. Following their successful employment on the battlefield in Desert Storm, technology has driven the development of more capable UAVs. The major improvements in UAVs in recent years have been in the role of tactical reconnaissance. In this role the UAV has significant capabilities to offer, some that are unmatched by other platforms. This paper will demonstrate that with the growing importance of information in warfare the UAV is suited to fill the information gap on the battlefield. The doctrine for UAV operations has not kept pace with the fast paced developments in this field. Their organization also needs to break out of the traditional mind-set. When employed in an efficient manner, the inherent qualities of expendability and low cost make the UAV capable of significantly complementing manned aircraft platforms in the role of tactical reconnaissance.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Determination of Yield and Flow Surfaces for Inconel 718 Under Axial-Torsional Loading at Temperatures Up to 649 C
An experimental program to determine flow surfaces has been established and implemented for solution annealed and aged IN718. The procedure involved subjecting tubular specimens to various ratios of axial-torsional stress at temperatures between 23 and 649 C and measuring strain with a biaxial extensometer. Each stress probe corresponds to a different direction in stress space, and unloading occurs when a 30 microstrain (1 micro eplison = 10(exp -6) mm/mm) offset is detected. This technique was used to map out yield loci in axial-torsional stress space. Flow surfaces were determined by post-processing the experimental data to determine the inelastic strain rate components. Surfaces of constant inelastic strain rate (SCISRS) and surfaces of constant inelastic power (SCIPS) were mapped out in the axial-shear stress plane. The von Mises yield criterion appeared to closely fit the initial loci for solutioned IN718 at 23 C. However, the initial loci for solutioned IN718 at 371 and 454 C, and all of the initial loci for aged IN718 were offset in the compression direction. Subsequent loci showed translation, distortion, and for the case of solutioned IN718, a slight cross effect. Aged IN718 showed significantly more hardening behavior than solutioned IN718.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Development of a Pilot Candidate Selection Model Using Multivariate Techniques
Every year the Air Force spends millions of dollars to send personnel through Undergraduate Pilot Training (UPT). To be accepted into UPT, a candidate must go through a selection process to ensure the Air Force is choosing personnel best suited to succeed in the rigorous training environment. One of the key factors provided to the selection board is the Pilot Candidate Selection Method (PCSM) score. The PCSM weights a candidate's Air Force Officer Qualification Test (AFOQT) score, Federal Aviation Administration (FAA) flying hours, and a Basic Attributes Test (BAT) score to provide a single score between 1 and 99. The goal of this study was to apply a full range of multivariate data analysis techniques as well as current pattern recognition practices to the provided data to determine an appropriate model to predict pilot success. The new model was validated to establish its predictive accuracy, capabilities, and limits. In order to avoid bias, the model development process did not make any comparisons to the current PCSM model. However, a post-development comparison was made to determine relative model performance. The performance of the new model was superior to the existing model. The difference in performance between the two models is shown to be statistically and practically significant.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Activated Sludge Process Using Pure Oxygen
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Non-Cooperative Detection of Frequency-Hopped GMSK Signals
Many current and emerging communication signals use Gaussian Minimum Shift Keyed (GMSK), Frequency-Hopped (FH) waveforms to reduce adjacent-channel interference while maintaining Low Probability of Intercept (LPI) characteristics. These waveforms appear in both military (Tactical Targeting Networking Technology, or TTNT) and civilian (Bluetooth) applications. This research develops wideband and channelized radiometer intercept receiver models to detect a GMSK-FH signal under a variety of conditions in a tactical communications environment. The signal of interest (SOI) and receivers have both fixed and variable parameters.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Application of Intelligent Systems to the Close Air Support Mission
The US is clearly moving toward developing an autonomous attack capability, and the intelligent systems to provide battlefield situational awareness will be a key enabling technology for this autonomous attack capability. Within the close air support (CAS) environment, the application of intelligent systems could facilitate the tasks of joint terminal attack controller (JTAC) and the CAS command and control (C2) system. Associated-based systems can provide the JTAC and CAS C2 structure with the intelligent systems for battlefield situational awareness. Both associate systems would utilize an assessor, planner, and interface framework. These systems could be utilized to aid the JTAC in developing attacks and make the C2 process more efficient, thus making the overall CAS system more effective. An associate-based CAS system would make optimal use of available air assets and be less likely to result in fratricide or collateral damage while also ensuring adherence to the rules of engagement. This paper will examine associate systems and CAS operations along with the application of associate systems to the JTAC and CAS C2 process and the associated doctrinal implications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Diffusion of Military Technologies to Foreign Nations
The purpose of this paper is to recommend that the United States government maintain the defense technological and industrial base (DTIB) by aggressively supporting the US defense industry in the arms transfer process. Ironically, this recommendation is contrary to the position held at the onset of this research and analysis effort. It is written for the microlevel reader (the young pilot, tank operator, etc.), the macrolevel reader (US government staffers and above in the State and Defense departments), and senior government officials (generals, congressmen, and senators) to inform and enhance their ability to understand the DTIB and how arms transfers can help in its preservation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber-Based C4ISR Asset
"The cornerstone of the USAF's global strike and rapid global mobility is its vast cyber-based C4ISR network. The USAF has become so dependent on cyber-based C4ISR capabilities that the network itself has truly become a center of gravity. Unfortunately, the network's critical requirements are highly susceptible to attack from a number of threats. As a result, one of the USAF's greatest capabilities has also become one of its greatest vulnerabilities. Using open-source documentation, this paper outlines the grave threat to the USAF's cyber-based C4ISR and suggests how the USAF should prepare its forces to operate in a cyber-denied environment."--Abstract.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Geosynthetic Clay Liners Used in Municipal Solid Waste Landfills
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Examination of Air Force Crash Damage or Disabled Aircraft Recovery Program Resourcing
The Air Force's resources are becoming more constrained every year. In turn, these opportunities provide a roadmap for solution planning and programming in direct support of weapon systems and the warfighter. This research effort is an attempt to provide a regionalization methodology and cost benefit analysis for the Aircraft Crash Damaged or Disabled Aircraft Recovery (CDDAR) Program in order to provide better management and maximum utilization of scarce resources. If we contrast the capabilities in both permissive and opposed environments, we discover that capabilities of the Air Force CDDAR program are unparalleled, bar none, when it comes to flexibility and adaptability to overcome unforeseen circumstances. The Air Force must be good stewards of tax payer dollars and that is what drives this research.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Discrete Event Simulation of a Suppression of Enemy Air Defenses (SEAD) Mission
Contemporary military campaigns increasingly count on the use of air power. Suppression of enemy air defenses (SEAD) operations have been a crucial element of military air power for 50 years. Several developments and evolution in both air defense and attack systems suggest that SEAD missions will continue to have growing importance to air forces. Since SEAD operations have a significant impact on air campaigns, it is important to examine their efficiency and identify improvement opportunities. This study explores factors that influence SEAD operations through use of a discrete event simulation built in Arena and subsequent statistical analysis of the results.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Aircrew Performance Cutting-Edge Tech
Introduction to human performance -- Fatigue operations -- Vision enhancement/refractive eye surgery -- Nuclear biological and chemical (NBC) threat environment and the Tactical air (TACAIR) operator -- Directed energy weapons/battlefield lasers -- Mishap reduction -- Conclusions/recommendations. Appendix A: US Navy corneal surgery policy."Using cutting-edge technology to create a human factors advantage in military operations will contribute to success on the battlefield of the future whether below the surface, on the surface, in the air, or in space. Human factors system selection in the past has appeared to be arbitrary and intermittent, with no unifying vision and apparently little or no coordination between the military services. Mature, timely applied technology will reduce risk and enhance combat capability. By decreasing mishaps during training and combat, there will be a reduced number of lost lives of highly trained and costly aircrew, while preserving training and combat assets (aircraft/unmanned vehicles). A concomitant increase in survivability through better understanding of human factors technology will ultimately give the modern aviation warrior a tactical edge throughout the full spectrum of combat and provide secondary benefits to the civilian aviation sector. This paper will explain currently available and emerging aviation human factors technological advances in today's military aviation weapons systems and recommend a vision (and direction) for the most promising, emerging aviation human factors-related technological advances. Emerging human factors areas addressed in this paper include fatigue; vision enhancement/refractive eye surgery; nuclear, biological, and chemical weapons; directed energy weapons; mishap reduction; service culture; situational awareness; spatial disorientation; simulation; and training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Models for Sortie Generation With Autonomic Logistics Capabilities
The primary objective of this research is to investigate the impact of an autonomic logistics system (ALS) on the sortie generation process for an individual airbase. As in some prior studies of this process, the methodology used to model the sortie generation process is a queueing network containing fork-join nodes for concurrent maintenance activities. The sortie generation rate is commonly regarded as the primary performance measure of the sortie generation process. This measure coincides with the throughput and is used to compare two models: i) pre-ALS operations and ii) ALS-enhanced airbase operations. Analysis of the models shows that the ALS model yields higher generation rates under a variety of scenarios resulting from the differences in the sortie generation process that are inherent when an ALS is implemented. These results demonstrate that implementation of an ALS will positively impact the sortie generation process by increased sortie generation rates with equivalent or reduced resource levels.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Emergency Response Plan Guidance for Small and Medium Community Water Systems to Comply With the Public Health Security and Bioterrorism Preparedness and Response Act of 2002
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space Power Theory
Is there a single comprehensive theory that could shape future space and air forces? This essay examines the current state of space power theory. The method of research was a literature review of books, periodicals, government and private reports, and conference proceedings via Air University Library and the Internet, as well as personal contact with faculty members from several military schools. This effort identified basic elements of military theory: definitions, explanations and predictions: which then became a qualification as well as a framework for this paper. The major findings of this paper are that 1) Space power theory is emerging: it exists and is growing in the form of definitions, explanations and predictions of the nature, significance and functioning of systems in space; 2) A single comprehensive space power theory does not exist; and 3) Space power theory has much room for improvement in its definitions, explanations and predictions of space power. Finally, this paper recommends that future theorists 1) Expand all areas of space power theory to create a more robust body of literature; 2) Thoroughly examine the contributions of early space theorists (see Chapter 3, Note 1); 3) Address, in detail, the two "hot topics" in space power theory today: space control and space force organization; and 4) Seek a single comprehensive space power theory to bring together the lasting ideas of space power for the purpose of shaping future space forces.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Integration of Unmanned Aerial Vehicles Into the Functions of Counterair
With the recent draw down of the US military after the end of the Cold War, the US Department of Defense (DoD) is placing considerable emphasis on employing a lighter, leaner, and more lethal military force to accomplish the strategic objectives mandated by political leadership. As a force enabler for military forces, Unmanned Aerial Vehicles (UAVs) recently demonstrated their potential during NATO military operations in Kosovo. Their activities weren't limited to merely gathering enemy intelligence. As a result of advancements in UAVs capabilities, UAVs expanded their operations by directly assisting in combat missions. The resulting logical question that evolved out of the Kosovo operations is, can UAVs be more actively integrated into other military functions to enhance mission accomplishment? More specifically, can UAVs be incorporated into the function of gaining and maintaining control of the air for US forces? To completely answer this question, this research paper will first analyze the current background of UAVs as seen in recent military operations. Secondly, the function of counter air will be examined to identify the deficiencies US forces have in obtaining control of the air. Third, the present and future capabilities that UAVs can bring to the fight will be identified. Fourth, a detailed examination of which UAVs payloads can be incorporated into the function of counterair will be accomplished. Fifth, this paper will show that UAVs can be effectively integrated to enhance US military weapons systems accomplishment of the function of counterair. Finally, this author will briefly discuss one possible plan to integrate UAVs in the function of counterair to overcome the noted deficiencies.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Connecting the Edge
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Anatomy of a Capabilities Gap
The Air Force's first stealth fighter has had a long and distinguished service record for our nation providing commanders a then revolutionary capability to fight our nation's wars. The F-117A Nighthawk's traditional mission of knocking down the door for conventional forces to follow will now fall upon other capabilities in the Air Force and other armed services. This paper analyzes and amalgamates available unclassified information covering different aircraft and capabilities currently in the Air Force inventory and those in production. With ever tightening budgets, the Air Force has to make difficult decision, on which programs to discontinue or reduce while keeping a vigilant watch to ensure capabilities do not diminish as it restructures its force. While the B-2 Spirit, F-22A Raptor and AGM-158 JASSM all possess low observable characteristics, an analysis of available unclassified information concludes that there could be a slight capability gap but the risks are not worth the costs to continue operating the F-117A fleet in the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Developing a Predictive Model for Unscheduled Maintenance Requirements on United States Air Force Installations
The United States Air Force Civil Engineer community continually strives for more descriptive methods to explain the impact of funding decisions on future infrastructure conditions. This paper develops one such method by using linear regression and time series analysis to develop a predictive model to forecast future year man-hour and funding requirements for unscheduled maintenance. The results provide predictive models for up to a 5 year forecast with improved results for a 3 year outlook and routine maintenance calls.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analysis of Air Force Civil Engineering Strategic Planning
Several organizations within the Department of Defense, including the Air Force Civil Engineer, are actively engaged in strategic planning in an effort to create a roadmap for future capabilities and performance. The objective of this research was to analyze the strategic planning process of the Air Force Civil Engineer (CE) as well as the effectiveness of the Civil Engineer Strategic Plan (CESP). The methodology used to complete this analysis was conducted in two distinct phases: 1) process modeling and evaluation, and 2) performance measure evaluation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Relevance
Operation DESERT STORM led to the awareness that space assets could be instrumental at the operational, tactical, and strategic levels of war. Air Force Chief of Staff, General Merrill McPeak has been widely quoted as calling DESERT STORM the "first space war"1. The use of Space during Operation DESERT STORM left commanders asking, how do I effectively employed space in concert with combat operations, and who are my Space experts? The United States Air Force permanently assigns space professionals to regional Commands, operational wings, and even tactical squadrons to integrate space and its effects. This ensures space is taught and implemented during routine training as well as combat operations to ensure forces "train as they fight". The Air Force Weapons School (USAFWS) provides graduate-level instructor courses that provide the world's most advanced training in weapons and tactics employment to officers of the combat air forces. Airmen attending the USAFWS are recognized experts in their system. While attending the USAFWS, they are immersed in all aspects of their weapon system and graduate as system experts. Space graduates of the USAFWS, Space Weapons Officers (SWOs), are immersed in the "full spectrum" of Space. This training results in a graduate who is a space "generalists" rather than a system specific expert.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Wired Garrison Design Concept Applied to Fort Leavenworth, Kansas
The Wired Garrison Communications-Electronics Design Concept incorporates technological advances to best serve Army installation communication needs. The Fort Leavenworth user needs have increased during the first few years. The Army has not applied the Wired Garrison Concept to Fort Leavenworth. This study seeks to determine if the Army could apply the Wired Garrison Concept to Fort Leavenworth to meet the short-term projected communications requirements. Investigation reveals that the Wired Garrison Communications-Electronics Design Concept can be applied to Fort Leavenworth, Kansas. The Wired Garrison is suitable to support the United States Army Combined Arms Combat Developments Activity. This concept is particularly applicable to the needs of the United States Army Command and General Staff College.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
What are the Right Fire Support Requirements for Army Airborne Forced Entry Operations With the Changing Contemporary Operational Environment?
This thesis studies the use of fire support platforms for Army airborne operations conducted within the new operational environment. It focused on how field artillery can be a combat enabler for maneuver during forced entry operations (FEO). It is argued that the contemporary operational environment (COE) is more dangerous and less predictable than the previous operational environment of the Cold War. In this context, the National Command Authority should maintain a rapid response, forcible entry capability to set conditions for follow-on forces. Units, such as the 82d Airborne Division and Rangers, can lead the effort in FEOs. When a maneuver commander conducts an FEO he visualizes how the operation will unfold. As part of his visualization he must consider what is the right fire support requirement to help achieve success. Currently the maneuver commander is supported by AC-130 gunships to different types of airborne field artillery and mortar units. In order for him to achieve success he must decide on the right combination of versatility, firepower, and maneuver within the different capabilities of each fire support platform. This thesis analyzes the comparison of criteria for these systems. This allows the maneuver commander and staff to decide on the right fire support platform to conduct FEOs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Data Integration
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Non-Lethal Weaponry
Consideration of non-lethality and non-lethal weapons by the Department of Defense as an expression of military power is a relatively new yet growing phenomenon. This report explores four issues germane to non-lethal concepts and technologies in the DOD and makes recommendations derived from those issues concerning the integration of non-lethal weaponry into future United States military operations. The approach taken in the research centers on a modified content analysis of unclassified materials published between 1990 and 1997 related to non-lethality and non-lethal weapons. The genesis of non-lethality in the DOD has been convoluted, involving multiple actors struggling over the definition of non-lethality along with scattered operational experiences and the erratic development of policies and technologies. Four motives now drive DOD non-lethality: A changing threat; the need for more response options; the desire to reduce lethality, and force protection. Non-lethality scenarios span the spectrum of conflict and the traditional levels of war, while the suitability criteria for non-lethals include technical feasibility, operational utility, policy acceptability and safety. Coherent, substantiated, decisive and appropriate actions must be taken to ensure the transformation of non-lethality into an integrated component of US armed capability. These efforts require a multitude of actors engaged in policymaking, legislative, doctrinal, architectural and acquisition initiatives drawn from the history, motives, scenarios and criteria associated with non-lethality in the Department of Defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyberspace
In December 2005, the USAF adjusted its mission statement, identifying cyberspace as a war fighting domain equal to air and space. The initial efforts to deliver a coherent war fighting capability with the objective of obtaining cyberspace superiority are well underway. Programming plans have been formulated, organization structures vetted, personnel manning identified, and vision statements and operational constructs have been published. But it appears this endeavor is premised on today's operational environment and near-term desired effects, neglecting the strategic implications and constraints of operating within a globalized context. So the question must be asked, is the USAF cyberspace mission at risk in the out years 2025-2050? This paper seeks to address the question of mission risk by examining current cyberspace posture against considerations resulting from future globalization: specifically in the areas of extended economic centers of gravity, complexity of international laws and alliances, and the changing nature of warfare. Indeed, it can be argued that the USAF's initializing cyberspace framework is inadequate to meet the challenges of future globalization, and thus places the cyberspace superiority mission in the out years 2025-2050 at risk. As a remedy, this paper also presents three broad areas of recommendation to mitigate this mission risk: pursuing a more holistic and unified cyberspace institution; engaging and leading federal-level cyberspace initiatives in research and development and codifying legal precedence; and integrating unrestricted cyberspace operations into traditional Air Force and Joint-level exercises and activities.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Nano Air Vehicles
This paper documents the result of a future technology forecast study to determine when operationally useful nano aerial vehicles or NAVs will be achieved. This was accomplished as part of the Blue Horizons Research Team tasked by the Chief of Staff of the United States Air Force to explore emerging technologies and make recommendations for long range investment. This study utilized a future forecasting method called the Delphi Method which was developed by the RAND Corporation in the 1960s to make the forecast. The results indicate NAVs capable of operating in swarms will be available within 10 years to perform operational missions. This paper recommends the Air Force begin work now to fully develop operational concepts and requirements for NAVs to guide future development work and enter the Joint Capabilities and Integration Development System to fully define capability requirements for swarming NAVs across the services to gain efficiencies in development and acquisition of these systems and to avoid duplicative requirements and programs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analysis of Invalid Emission Testing in the California Smog Check Program
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Thermal Characteristics of Pitch Based Carbon Foam and Phase Change Materials
Phase-change thermal energy storage devices offer thermal control systems an option that allows a smaller heat sink to be used by absorbing the thermal energy quickly and storing it in the phase change to prevent failure of electronic components and then slowly releasing the heat to the heat sink. This paper experimentally determined the transient response of carbon foam with a phase-change material by measuring the response to a step temperature input to test samples. The transient response was recorded until steady state was reached. An analytic response was created and compared against the measured response. A simplified analytic prediction of the transient response was developed by using an energy balance. This approximation was then compared against the experimental results.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Utility Tactical Transport Aircraft System (UTTAS) a Critical Look at its Repairability
It is the author's contention that procurement of the UTTAS as designed in prototype models will require changes in the existing aircraft maintenance system to insure repairability at DS level. The structural design was critically studied to assess the capability of the Army's aircraft maintenance system to repair the UTTAS if damaged in combat. The airframe was the focus of the paper. Limited references to systems and components were required because of their needs for airframe mount/attaching points and the relationship of their weight to structural strength requirements. The author establishes himself as a highly experienced source and develops comparisons between the UH-lH and the UTTAS prototypes.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Life Cycle Assessment and Economic Analysis of Wind Turbines Using Monte Carlo Simulation
The United States depends heavily on nonrenewable fossil fuels to generate electricity. Using renewable energy sources, such as wind, could reduce air emissions and fossil fuel dependency. Previous studies have examined the life cycle costs and environmental impacts of using wind to generate electricity, but results have varied due to inconsistent modeling assumptions. This research uses Monte Carlo simulation to conduct an economic payback analysis and life cycle assessment of 11 modern, utility-scale wind turbines. Hourly meteorological data was used to evaluate 239 U.S. locations. For each location, the wind turbine with the shortest median payback period was assumed to be the economically preferred turbine model. This simulation demonstrates that variance in the model output is primarily caused by differences in location-specific climate data (wind speed, air density). Depending on the location, the median economic payback periods ranged from 2 to 132 years. 41% of the locations had median payback periods less than 10 years, and 63% less than 15 years. Considering a typical turbine lifespan of 15-30 years, wind turbines are not economically viable at all locations. At locations with favorable wind resources, wind turbines are likely to be superior to electricity production using natural gas or coal. For the preferred wind turbine, the median life cycle energy intensities at all 239 locations ranged from 0.05-0.54 (KWh energy inputs/KWh outputs), compared to 2.3 for natural gas and 2.6-3.5 for coal-fired electricity generation. The median CO2 (eq) intensity values range from 13-156 g-CO2 (eq)/kWh for the preferred wind turbine, compared to 585 g-CO2 (eq)/kWh for natural gas and 757-1042 g-CO2 (eq)/kWh for coal-fired power plants.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, United States Air Force (USAF) leaders have begun to emphasize space operations. Global Engagement: A Vision for the 21st Century Air Force states that we will eventually transition from an air and space force into a space and air force and various leaders have opined that that air and space are seamless. Gen Ronald R. Fogleman, USAF chief of staff, introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to accomplish F2T2E, the functions performed by the E-3 airborne warning and control system (AWACS) and the E-8 joint surveillance, target attack radar system (JSTARS) will need to migrate to space-based platforms. This study explores how such a migration would occur. Before examining space operations, the historical military need for moving tar-get indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft. Because space systems operate differ ently from airborne systems, those differences are explored. The organizations involved in space operations are also examined, along with their potential to effect the development of a space-based MTI system. The radar systems of both the AWACS and the JSTARS are described, as well as a few of the most promi nent of the proposed space-based systems. The planning for space-based MTI is in its early phases. A "Concept of Operations for Space-Based MTI" has been written, as has a "Space-Based MTI Roadmap." US Space Command has also written the Long Range Plan, which includes space-based MTI concepts in its plan for 2020. These plans are a good start but do not address several important issues, including satellite architec ture, whether satellite MTI systems should completely replace airborne systems, who should be responsible for the system, and how battle managers will operate in the new system.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Head Tracking for 3D Audio Using a GPS-Aided MEMS IMU
Audio systems have been developed which use stereo headphones to project sound in three dimensions. When using these 3D audio systems, audio cues sound like they are originating from a particular direction. There is a desire to apply 3D audio to general aviation applications, such as projecting control tower transmissions in the direction of the tower or providing an audio orientation cue for VFR pilots who find themselves in emergency zero-visibility conditions. 3D audio systems, however, require real-time knowledge of the pilot's head orientation in order to be effective. This research describes the development and testing of a low-cost head tracking system for 3D audio rendering applied in general aviation. The system uses a low-cost MEMS IMU combined with a low-cost, single frequency GPS receiver. Real-time data from both of these systems was sent to a laptop computer where a real-time Kalman filter was implemented in MATLAB to solve for position velocity, and attitude. The attitude information was then sent to a 3D audio system for sound direction rendering. The system was flight tested on board a Raytheon C-12C aircraft. The accuracy of the system was measured by comparing its output to truth data from a high-accuracy post-processed navigation-grade INS/DGPS solution. Results showed that roll and pitch error were accurate to within 1-2 degrees, but that heading error was dependent upon the flight trajectory. During straight-and-level flight, the heading error would drift up to 10-15 degrees because of heading unobservability. However, even with heading error, the ability of a pilot to determine the correct direction of a 3D audio cue was significantly improved when using the developed head tracking system over using the navigation-grade INS/GPS system fixed to the aircraft.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Core Logistics Capability Policy Applied to USAF Combat Aircraft Avionics Software
The 1985 National Defense Authorization Act required the U.S. Government to maintain the public capability to sustain military systems that play a role in war plans and contingency scenarios - referred to as core. This research analyzes application of this law to the modification of fielded USAF manned combat aircraft Operational Flight Programs (OFPs). First, a review of the content and history of the law and implementing policies was performed. The intent of Title 10's core requirement was analyzed with respect to the risk of relying on private sector depot maintenance in today's environment. Next, models were developed as a tool for determining whether OFP work is more appropriately designated as maintenance or development. The models were applied to current combat aircraft OFPs, and results suggest that most OFP modification is development and not maintenance. Foundational to the models, a common lexicon is proposed with definitions of software maintenance and other key terms. Lastly, a new model for source of repair decisions is proposed which includes a risk analysis for all depot work, regardless of core designation. Beneficial to program offices, depot organizations, and HQ AFMC, this framework allows greater flexibility and cost savings by emphasizing competition based on cost effectiveness.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
After the KC-135, What Next? Exploring the Future Capabilities and Acquisition of our Next Generation Tanker
This research paper covers several aspects of the current and future tanker acquisition. Not only does it research capabilities related tanker acquisition but it also explores the proper capabilities required of future tanker assets. The research progresses from a historical perspective to the current available options for the next generation tanker. From there data is used to show possible capabilities and missions appropriate for aerial refueling assets. Topics discussed are dual role tanker/airlift possibilities, spiral development of "SMART" tanker capabilities, and possible associated tanker platform missions. Final recommendations are given for future tanker platform acquisition and capabilities it should have for tomorrow's wartime scenario's.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Geolocation of an Audio Source in a Multipath Environment Using Time-of-Arrival
The Air Force and the Department of Defense (DoD) are continually searching for ways to protect U.S. forces, both stateside and abroad. One continuing threat, especially in the current world environment, is gunfire from an unseen sniper. Designated areas, such as a forward deployed base or motorcade route, need to be continuously monitored for sniper fire. Once detected, these gunmen need to be located in real time. One possible method for accomplishing this task is to geolocate the audio signals generated using time-of-arrival (TOA) algorithms. These algorithms rely on direct-path measurements for accuracy. Multipath environments therefore pose a problem when measuring signals from the audio spectrum. The errors induced by a multipath environment can be reduced by introducing additional audio receivers to the detection system. By sampling all possible combinations of a minimum set of receivers (four), a more accurate location can be calculated. An accuracy of six meters can be achieved roughly 69 percent of the time, though most of the error occurs in the vertical component. An accuracy of six meters in the X/Y plane can be achieved approximately 97 percent of the time.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Developing a Predictive Model for Unscheduled Maintenance Requirements on United States Air Force Installations
The United States Air Force Civil Engineer community continually strives for more descriptive methods to explain the impact of funding decisions on future infrastructure conditions. This paper develops one such method by using linear regression and time series analysis to develop a predictive model to forecast future year man-hour and funding requirements for unscheduled maintenance. The results provide predictive models for up to a 5 year forecast with improved results for a 3 year outlook and routine maintenance calls.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Preventing a Cyber Dresden
World Wars I and II witnessed air power's development in the crucible of hostilities. Ambiguous and competing air power schools of thought, on occasion, resulted in the strategically questionable employment of air power. The Allies' bombing of the cultural city of Dresden in February 1945 serves as a vivid instance of the results of these tensions. The firestorms that devastated Dresden now inflame the contemporary air power debate: was the area bombing of Dresden proportionate to the commensurate military gains? Striking similarities exist between the emergence of cyber power today, as a means of warfare in a new domain, and the development of air power in the first half of the twentieth century. Reflection upon air power's evolution has been employed as a guide for the more efficient and effective development of cyber power. An analysis of air power's formative years has highlighted many of the pitfalls that lie hidden on cyber power's developmental path. An awareness of these pitfalls will allow cyber power to develop pre-emptive strategies on how best to avoid them; thus, debates pertaining to a cyber Dresden will be able to take place before, rather than after, the event. Learning from air power's early experiences will help prevent cyber power from becoming mired in the same pits that frustrated air power's development. In turn, cyber advocates will be better able to concentrate their focus upon developing a coherent theory of cyber power, uniquely tailored to the challenges of their own domain.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Beyond Awareness
Ever since the United States beat the Soviet Union in the space race, the United States has lived with an illusion of space superiority. In military terms, this means that the United States has enjoyed both freedom of action and freedom from action in space. The Chinese shoot-down of the FY-1C satellite on January 11, 2007 forced the United States to look over its shoulder, and when it did, the United States realized that not only was the race still on, but the dragon and others were rapidly gaining ground. One year later the United States responded by shooting down the US-193 satellite in what may be the opening volley of a new contest to control space. The 2007 Chinese anti-satellite (ASAT) test clearly shows that other nations are aware of the US dependence on space and some of them may be unwilling to let US space superiority go unchallenged. In order to maintain freedom of action in space, the United States must move beyond the present paradigm of space situational awareness and towards one of comprehensive space situational knowledge.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Advanced Strategic and Tactical Infrared Expendables
Infrared (IR) flare design was not a strategic player in US defense until the mid 1990s. Prior to 1995 the primary focus was on radio frequency (RF) flares for piloted aircraft. 1993 saw the establishment of a funded Program Management Directive (PMD) explicitly directing the need for advanced IR capabilities implemented in "field operations". The program for Advanced Strategic and Tactical Infrared Expendables (ASTE) was formalized on 5 April 1995 with certification of an Operational Requirements Doctrine (ORD). ASTE set out to work with contractors to develop this emerging technology with aggressive vigor - quite possibly too aggressive for its own good. The design was a simple one, or so they thought. Previous models and dispensing systems were already in place. No one planned for the intensity of the next four years, achieving a Full Rate Production (FRP) contract for only one out of four flares being developed. The extreme complexity of technical mishaps experienced during the Engineering, Manufacturing, and Design phase (MS II, now early MS B) was not a foreseen performance obstacle for engineers and program schedulers. As the 1997 FRP date slipped farther and farther to the right, ASTE's ideal defense technology was not favorably looked upon, creating a ripple effect of significant cost growth and schedule slips throughout the program. This case study takes a look at the problems contributing to the delayed delivery of IR flares and its impact to meeting warfighter needs under constraints brought about by government acquisition policies. Funded with a modest budget, ASTE is only a small representation of the greater Electronic Warfare (EW) programs our military elects to fund over multiple years. Yet, even a small program can offer significant impact to overall government lessons learned in acquisition and budgeting planning and processesThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
United States Air Force Precision Engagement Against Mobile Targets
Major Kosan discusses the deficiency in the US Air Force's ability to precisely attack mobile targets at standoff ranges with minimal collateral damage as revealed by recent airpower operations. He addresses the technological as well as the international, national, and military strategic environmental issues that may affect technology. Major Kosan focuses on USAF munition precision engagement capabilities; thus, he does not perform an in-depth analysis of aerial platform precision engagement capabilities. He focuses on only USAF's research, development, and acquisition strategy in regards to precision conventional strike capabilities against mobile targets. Major Kosan predicts that future airpower operations will be executed in politically sensitive strategic environments and will require the ability to precisely destroy mobile targets that may have been strategically placed by an adversary in areas with high risk of collateral damage.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cost-Benefit Analysis Tools for Avionics Parts Obsolescence
Obsolescence management, an ever-increasing topic in the Department of Defense, is not new. Since the service life of military systems is much longer than commercial systems, maintaining military systems when parts and components go out of production remains a sustainment challenge. Typically, resolving obsolete parts problems are incorrectly identified as reliability and maintainability issues that provide no improved capability or reduced cost; the primary benefit is continued sustainability of the existing system. Since loss of a capability is not an option, maintaining the capability without a part redesign does require increased cost for the commercial market to support a military-unique application. In addition, constrained defense funding will necessitate prudent use of limited funding to balance current systems maintenance and new systems acquisition. The specific objective of this project is to show the need for automated cost-benefit analysis tools to assist program/item managers in identifying the cost savings associated with resolving obsolete parts problems.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.