Theater Space Warfare
Theater space warfare is emerging from two streams of evolution in military space: the role of space in military operations and the role of the theater in space operations. Indispensable at the strategic level throughout the Cold War, space is now proving indispensable at the operational and tactical level. As the incorporation of space into warfare accelerates over the next decade, the concept of space-enabled warfare puts a premium on access to space and effective integration into joint operations. The role of the theater in space operations is also evolving, from passive consumer to that of an active consumer and producer of space effects. Microsatellites, near-space assets, and adversary satellite jammers all necessitate active theater participation in space operations. Unfortunately, today's joint doctrine has missed this on-going evolution, leaving the US military ill prepared to optimize space across joint operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Harnessing Light
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Development of a Night Vision Goggle Heads-Up Display for Paratrooper Guidance
This thesis provides the proof of concept for the development and implementation of a Global Positioning System (GPS) display via Night Vision Goggles (NVG) Heads-Up Display (HUD) for paratroopers. The system has been designed for soldiers who will be able to utilize the technology in the form of a processing system worn in an ammo pouch and displayed via NVG HUD as a tunnel in the sky. The tunnel in the sky display design is essentially a series of boxes displayed within the goggle's HUD leading the paratrooper to the desired Landing Zone (LZ). The algorithm developed is effective and e cient in order to receive GPS sensor data, correlate head-tracking data, and display the combined information in the paratrooper's NVG HUD as the tunnel in the sky. The primary goal of the project is to provide a product which allows Special Operations personnel to reach a desired LZ in obscured visibility conditions, i.e. darkness, clouds, smoke, and other unforeseen situations. This allows missions to be carried out around the clock, even in adverse visibility conditions which would normally halt operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dissolution of Chromium From Inhalable Primer Paint Particles Into a Simulated Lung Fluid
The use of chromate as a corrosion inhibitor in primer paint is an essential component for the protection of aluminum-skinned aircraft and the primary source of hexavalent chromium (Cr (VI)) exposure to USAF aircraft painters. The objective of this research was to quantify the dissolution of chromate from freshly sprayed paint particles into a simulated lung fluid (SLF). Two primer paints were sprayed with a paint spray gun to generate overspray particles for collection into impingers filled with SLF. Particles were allowed to soak in SLF for 24 and 48 hours and then the particles were removed by centrifugation. The remaining Cr (VI) dissolved in the SLF was then compared to the initial Cr (VI) concentration with particles. The results indicate that the dissolution of Cr (VI) into SLF is hindered by the paint. Also, the results indicate that the amount of Cr (VI) dissolved into SLF from the paint particles is not significantly different between the two paints tested or between the 24- and 48-hour resident times. This study suggests that Cr (VI) in paint particles is less bioavailable than Cr (VI) in other particles such as dust or mist.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Decision Analysis With Value-Focused Thinking as a Methodology in Structuring the Civil Engineer Operations Flight
The organizational structure of the civil engineer operations flight has been in a constant state of change since the flight's inception and is currently prescribed only to the element level. This requires an operations flight commander to decide on the organizational structure best suited for their unique situation without any guidance or support. This difficult decision is compounded by the numerous organizational structures currently in use and the myriad of installation-unique factors that impact the decision.To provide insight and defensible support for an operations flight commander faced with this decision, a value- focused thinking process was used to create a value model that aids in evaluating possible organizational structures. To ensure that the results of this research are applicable across the Air Force, the value model was created in a way that identifies the basic values of any operations flight commander. The resulting value model was then used to evaluate how well different organizational structures performed with respect to these generic values. To further strengthen the results and ensure their wide-ranging relevance, the model was used to evaluate a representative sample of organizational structures from the perspective of multiple scenarios.The results of this research provide an operations flight commander a concise, straightforward, and defensible means of selecting an organizational structure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
What are the Right Fire Support Requirements for Army Airborne Forced Entry Operations With the Changing Contemporary Operational Environment?
This thesis studies the use of fire support platforms for Army airborne operations conducted within the new operational environment. It focused on how field artillery can be a combat enabler for maneuver during forced entry operations (FEO). It is argued that the contemporary operational environment (COE) is more dangerous and less predictable than the previous operational environment of the Cold War. In this context, the National Command Authority should maintain a rapid response, forcible entry capability to set conditions for follow-on forces. Units, such as the 82d Airborne Division and Rangers, can lead the effort in FEOs. When a maneuver commander conducts an FEO he visualizes how the operation will unfold. As part of his visualization he must consider what is the right fire support requirement to help achieve success. Currently the maneuver commander is supported by AC-130 gunships to different types of airborne field artillery and mortar units. In order for him to achieve success he must decide on the right combination of versatility, firepower, and maneuver within the different capabilities of each fire support platform. This thesis analyzes the comparison of criteria for these systems. This allows the maneuver commander and staff to decide on the right fire support platform to conduct FEOs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Providing Near-Term, Combat Effective Space Situational Awareness
Early on in the space age, the US and USSR tacitly agreed not to interfere with each other's satellite operations. This served to significantly reduce tensions during the Cold War. However, it also resulted in eliminated any hostile threats to space systems. In the absence of this threat, US development of Space Situation Awareness (SSA) capabilities concentrated on locating, identifying, and tracking as many orbiting objects as possible. A robust network of sensor sites and control nodes were built, and these have met most, if not all, warfighter needs for over fifty years. Today's situation has changed. Space has become indispensable to US national security. Nations have already denied or tried to deny space capabilities to other nations, and threats continue to proliferate. Leaders inside and outside the military recognize this, and a number of programs are in development to provide more robust SSA. However, until these systems are operational, a potentially dangerous vulnerability exists. Quick, cost-effective capabilities need to be implemented to fill this gap.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Comparative Analysis of Internal and External Solutions to Provide Air Combat Maneuvering Instrumentation Functionality
Major Panarisi summarizes the development of current and proposed family of Air combat Maneuvering Instrumentation (ACMI) systems-considered the gold standard of training mission enhancements-and presents the capabilities each system provides. He uses the Kadena Interim Training system as a suitable case study to compare requirements of current ACMI features to the capabilities available using internal components. He contends that internal systems can be installed long before the next generation system will be operational. Thus, Major Panarisi proposes alternatives that offer the potential to save millions of dollars in operating costs and which allow ACMI training on every mission independent of ground-based equipment and external stores.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Behavior of Three Metallic Alloys Under Combined Axial-Shear Stress at 650 C
Three materials, Inconel 718, Haynes 188, and 316 stainless steel, were tested under an axial-torsional stress state at 650 C. The objective of this study was to quantify the evolution of the material while in the viscoplastic domain. Initial and subsequent yield surfaces were experimentally determined to quantify hardening. Subsequent yield surfaces (yield surfaces taken after a preload) had a well-defined front side, in the prestrain direction, but a poorly defined back side, opposite the prestrain direction. Subsequent yield surfaces exhibited isotropic hardening by expansion of the yield surface, kinematic hardening by translation of the yield surface, and distortional hardening by flattening of the yield surface in the direction opposite to the last prestrain. An existing yield function capable of representing isotropic, kinematic, and distortional hardening was used to fit each yield surface. Four variables are used to describe each surface. These variables evolve as the material state changes and have been regressed to the yield surface data.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space Force 2020
Because of world events and legislation like Goldwater-Nichols, Air Force roles and missions continue to change, and do so under great scrutiny. In particular, military space issues have assumed even greater importance following recognition of the Persian Gulf War as "the first space war," and with the November 1996 release of the Air Force's latest White Paper, Global Engagement: A Vision for the 21st Century Air Force. This white paper included the most important USAF statement ever concerning the role of space in the future of the Air Force: "We are now transitioning from an air force into an air and space force on an evolutionary path to a space and air force." But beyond the overall direction this strategic vision provides, the Air Force does not have a clear and supportable interpretation or definition of future Air Force space operations or "uniformed" space operators. This research paper attempts to provide that interpretation and to further expand the awareness and understanding of Air Force core competencies and mission areas as they relate to space operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weaponeering the Future
Direct Energy weapons can exist on the battlefield of today. Yet, the warfighter needs to know what Probability of Damage theses weapons can attain. Currently, the Joint Munitions Effectiveness Manual calculates a Single Sortie Probability of Damage for conventional Blast and Fragmentation weapons. Using Futures Research methodology allows determination of what effects Direct Energy weapons will impart in the year 2035. The Status of Futures Index (SoFI) method compares complex entities to one another across multiple dimensions. Adapting the Single Sortie Probability of Damage formula for Lasers, Microwave and Millimeter wave weapons allows a determination of their effectiveness. The required formulas for each type of Direct Energy Weapons' Probability of Damage (or Effect) are derived and explained. The Direct Energy weapons are compared to both conventional weapons and one another. Adjusting these Probability equations adjusted for various inputs enables a forecast of the future capabilities of each weapon. The current trend trajectory establishes a baseline estimate of future Probabilities of Effect. Then, disruptive technologies are analyzed for their effect on the weapons capabilities. Each type of weapon poses a unique challenge. For Laser to match the capabilities of Blast/Fragmentation weapons, the power output must be increased. Microwaves, not only require increases in power, but also advances in antenna technology. Millimeter wave weapons can currently produce the required power, but manufacturing the weapons proves an obstacle. To overcome these difficulties, new technologies must be pursued. The SoFI method allows continuous evaluation of progress toward the goal of effective Direct Energy Weapons.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Comparison of Variance-to-Mean Ratio Methods for Reparables Inventory Management
In an effort to improve aircraft availability, this research compared the efficiency of ten methods of determining variance-to-mean ratios (VTMRs, VMRs, V/Ms) for repairable, spare aircraft parts known as reparables. These methods are base pipeline quantity, Hill-Stevens (220 LRUs), a variation of Hill-Stevens (10 1s), Hill-Stevens (230 LRUs), the Sherbrooke, a variation of Sherbrooke (10 1s), historical data, a new regression function, variance-to-mean ratio equals 1.00 or variance-to-mean ratio equals 1.01. Using VTMRs derived from quarterly organizational intermediate maintenance (OIM) demands for line-replaceable units (LRUs) from the D200A Secondary Item Requirement System (SIRS) databases in aircraft sustainability model scenarios and Excel spreadsheet simulation, this research concluded the VTMRs have an impact on aircraft availability and the cost of inventory.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
On the Right Course
The Department of Defense (DOD), specifically the United States Air Force (USAF) is responsible for the acquisition, operation, and sustainment of the Global Positioning System (GPS). As a result they have the enormous responsibility of keeping pace with the ever-growing military and civilian markets. This responsibility brings with it a lot of criticism over the management of the system which is utilized largely by the international and national civil communities. Conservative modernization deployment strategies, delayed acquisition schedules, and international distrust are a few of the criticisms that face the USAF GPS team. Inevitably, the DOD and the USAF must be in tune with the needs of and dramatic impacts that their decisions make on the millions of users worldwide. They are. Despite the astronomical growth and dependency on GPS, the DOD strikes an adequate balance between military and civilian users. This delicate balance is achieved throughout the course of the program as seen through an exploration of history, policy, strategy, and performance.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Benign Weather Modification
Weather modification is a technology once embraced by the United States (US) military as a tool to help both wartime and peacetime missions. However, interest in the ability to modify weather has waned over recent years and is now nearly nonexistent.This study examines one aspect of weather modification, benign weather modification (BWM), for possible use in assisting military operations. After briefly reviewing the history and science of weather modification, this thesis bounds the aspects of weather modification being addressed. It then describes barriers to BWM, showing how they affect current weather modification policy in the military. Examples are shown of current civilian BWM techniques, their possible use by the military, and some military-unique needs for weather modification.After examining current weather modification and projected future BWM technology, the author concludes that military BWM use deserves another look. Increased reliance on precision guided munitions makes BWM a possible new tool in ensuring accurate targeting with minimal collateral damage. In addition, BWM offers the war planner a means to dictate battle space elements at a critical point in a conflict. At a minimum, the US military should conduct a more in-depth review of weather modification to see if technological advances offer opportunities for more "bang for the buck."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Preventing a Cyber Dresden
World Wars I and II witnessed air power's development in the crucible of hostilities. Ambiguous and competing air power schools of thought, on occasion, resulted in the strategically questionable employment of air power. The Allies' bombing of the cultural city of Dresden in February 1945 serves as a vivid instance of the results of these tensions. The firestorms that devastated Dresden now inflame the contemporary air power debate: was the area bombing of Dresden proportionate to the commensurate military gains? Striking similarities exist between the emergence of cyber power today, as a means of warfare in a new domain, and the development of air power in the first half of the twentieth century. Reflection upon air power's evolution has been employed as a guide for the more efficient and effective development of cyber power. An analysis of air power's formative years has highlighted many of the pitfalls that lie hidden on cyber power's developmental path. An awareness of these pitfalls will allow cyber power to develop pre-emptive strategies on how best to avoid them; thus, debates pertaining to a cyber Dresden will be able to take place before, rather than after, the event. Learning from air power's early experiences will help prevent cyber power from becoming mired in the same pits that frustrated air power's development. In turn, cyber advocates will be better able to concentrate their focus upon developing a coherent theory of cyber power, uniquely tailored to the challenges of their own domain.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Immersive Learning Simulations in Aircraft Maintenance Training
This paper examines a relatively new computer based training system called Immersive Learning Simulation (ILS) which shows great signs of cutting training time. Many reasons exist to examine the question of whether or not ILS would save time and money if applied to aircraft maintenance training in the Air Force. For instance, using actual military aircraft to train maintenance technicians is a costly proposition. Although hands-on training is necessary, and will be for the foreseeable future, our current computer systems running ILS software could provide realistic training. Immersive Learning Simulation has the potential to provide cost savings, time savings, and increased aircraft and parts availability over more traditional methods of training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Framework for Prognostics Reasoning
The use of system data to make predictions about the future system state, commonly known as prognostics, is a rapidly developing field. Prognostics seeks to build on current diagnostic equipment capabilities for its predictive capability. Many military systems, including the Joint Strike Fighter (JSF), are planning to include on-board prognostics systems to enhance system supportability and affordability. Current research efforts supporting these developments tend to focus on developing a prognostic tool for one specific system component. This dissertation research presents a comprehensive literature review of these developing research efforts. It also develops presents a mathematical model for the optimum allocation of prognostics sensors and their associated classifiers on a given system and all of its components. The model assumptions about system criticality are consistent with current industrial philosophies. This research also develops methodologies for combining sensor classifiers to allow for the selection of the best sensor ensemble.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Dissolution of Chromium From Inhalable Primer Paint Particles Into a Simulated Lung Fluid
The use of chromate as a corrosion inhibitor in primer paint is an essential component for the protection of aluminum-skinned aircraft and the primary source of hexavalent chromium (Cr (VI)) exposure to USAF aircraft painters. The objective of this research was to quantify the dissolution of chromate from freshly sprayed paint particles into a simulated lung fluid (SLF). Two primer paints were sprayed with a paint spray gun to generate overspray particles for collection into impingers filled with SLF. Particles were allowed to soak in SLF for 24 and 48 hours and then the particles were removed by centrifugation. The remaining Cr (VI) dissolved in the SLF was then compared to the initial Cr (VI) concentration with particles. The results indicate that the dissolution of Cr (VI) into SLF is hindered by the paint. Also, the results indicate that the amount of Cr (VI) dissolved into SLF from the paint particles is not significantly different between the two paints tested or between the 24- and 48-hour resident times. This study suggests that Cr (VI) in paint particles is less bioavailable than Cr (VI) in other particles such as dust or mist.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Decision Model for Selecting Energy Efficient Technologies for Low-Sloping Roof Tops Using Value-Focused Thinking
The Air Force has a large inventory of low-sloping built up roofs (BURs) and millions of dollars are spent each year retrofitting these systems. The DOD has been directed to reduce non-renewable energy consumption by using energy-efficient technologies. These two details present a great opportunity to use the open roof space to install energy-efficient roofing technologies. The purpose of this research is to provide Air Force decision makers with a tool to assist them in deciding what roofing technologies should be installed on facilities. Value Focused-Thinking is the methodology used to construct the model, in which values were used, instead of alternatives, to create the model.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Technology Selection for Enhancing F-16 Capability
This study, with support of the Aeronautical Systems Center, builds a scientific decision support system intended for Air Combat Command. Past decision-making techniques are discussed and their limitations are explained. Two multiattribute decision-making techniques, analytical hierarch process and value focused thinking, are studied. Due to limitations of analytical hierarchy process, value focused thinking is accepted as the best fit for our problem. A value hierarchy model is developed using value focused thinking for selecting the most beneficiary F-16 engine modifications depending on anticipated Air Combat Command values. Ten modifications are ranked using value model to validate the process. Cost is involved in the rankings to show the benefit per dollar invested. Optimization techniques are used to form various effective modification sets due to changing budget constraints. Sensitivity analyses show that the model is weight sensitive. This study proves that multiattribute decision-making techniques and particularly value focused thinking approach can be used to create a scientific decision support system for Air Combat Command.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Treatise on Military Small Arms and Ammunition, With Theory of the Motion of a Rifle Bullet
The collections contained within the Combined Arms Research Library Digital Library are largely composed of digital versions of paper documents from the Combined Arms Research Library collections and student papers produced at the US Army Command and General Staff College. The documents in this collection cover the areas on the Vietnam Conflict, Korean War, and the U.S. Civil War, to name a few. This is one of those documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Shock Wave Dynamics of Novel Aluminized Detonations and Empirical Model for Temperature Evolution From Post-Detonation Combustion Fireballs
This research characterizes the blast wave and temperature evolution of an explosion fireball in order to improve the classification of aluminized conventional munitions based on a single explosive type such as RDX. A drag model fit to data shows initial shock velocities of 1.6-2.8 km/s and maximum fireball radii ranging from 4.3-5.8 m with most of the radii reached by 50 ms upon detonation. The Sedov-Taylor point blast model is fitted to data where a constant release (s=1) of energy upon detonation suggests shock energies of 0.5-8.9 MJ with blast dimensionalities indicative of the spherical geometry (n 3) observed in visible imagery. An inverse correlation exists between blast wave energy and overall aluminum content in the test articles. Using a radiative cooling term and a secondary combustion term, a physics-based empirical model is able to reduce 82 data points to five fit parameters to describe post-detonation combustion fireballs. The fit-derived heat of combustion has a 96% correlation with the calculated heat of combustion but has a slope of 0.49 suggesting that only half of the theoretical heat of combustion is realized. Initial temperature is not a good discriminator of detonation events but heat of combustion holds promise as a potential variable for event classification.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evaluation of Operation and Maintenance Factors Limiting Municipal Wastewater Treatment Plant Performance
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Logging the JSF
Within the US Air Force, acquisition, operations, and logistics communities collectively face a perplexing question: What is the best way to plan the acquisition and life-cycle sustainment of a fighter aircraft fleet? To find the answer to this question the following thesis attempts to derive lessons learned from case study analysis to develop a new methodology for future use. Aircraft fleet size, in an acquisition program, is determined by assessing the capabilities necessary to meet current and future operational readiness demands. Aircraft sustainment, although equally important, is typically not considered during early procurement planning due to the difficulty in forecasting the sustainment infrastructure necessary to mitigate effects caused by aging and changing operational requirements. At best a nebulous endeavor, sustainment forecasting is affected by the myriad of dynamic organizational, technological, and budgetary influences caused by rigid DoD acquisition processes and inflexible Congressional appropriations cycles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Power Microwaves on the Future Battlefield
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
USAF Aircraft Maintenance Management
Aircraft maintenance performance has steadily declined since the Objective Wing organizational structure was implemented for the Tactical Air Forces (TAF). Is the Objective Wing the right organizational structure for aircraft maintenance? USAF maintenance management philosophies have changed numerous times. Over the past 50 years, the Air Force searched for an organization that maximized efficiency and performance. Reorganization has been the preferred method of gaining efficiency or performance. The focus of this research is to analyze past organizational structures to define key elements that affect maintenance performance and develop an organization that will improve maintenance performance. The research method is a historical analysis of tactical aircraft maintenance organizations in the USAF. The researcher found that there are three key elements that affect the organizational structure and its subsequent performance. Those elements are context, culture, and strategy. A maintenance organizational structure must be based on these enduring elements to succeed. A matrix organizational structure based on our current and expected context, culture, and strategy is proposed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Warfare
As we approach the dawn of the 21st century, success of our national security strategy will depend greatly on our ability to combat the Information Warfare (IW) threat. Old paradigms regarding conventional warfare must change to incorporate this new form of warfare. Our nation's growing dependency on information and information-based technologies has made IW a legitimate weapon for potential adversaries. The "information" and its support infrastructures are becoming extremely vulnerable to hostile attacks. Adversarial forces can now wage information-based warfare from anywhere in the world, and literally remain anonymous. Thus, our ability to recognize and defend against this new form of warfare is paramount to the survival of our national security infrastructure.The thesis of this research project is predicated upon the following premises: First, the exploitation of "information" as a weapon is changing the nature of warfare. Second, although there is much debate about the reality of the IW threat, this paper postulates that adversarial IW tactics pose a legitimate threat to our national security infrastructure. Finally, the Department of Defense (DOD), the Joint Staff, and the Services must remain actively committed to combating the IW threat in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Survey of Satellite Communications System Vulnerabilities
The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries. Attacks on these satellites could cause military communications to become unavailable at critical moments during a conflict. This research dissected a typical satellite communications system in order to provide an understanding of the possible attacker entry points into the system, to determine the vulnerabilities associated with each of these access points, and to analyze the possible impacts of these vulnerabilities to U.S. military operations. By understanding these vulnerabilities of U.S. communications satellite systems, methods can be developed to mitigate these threats and protect future systems. This research concluded that the satellite antenna is the most vulnerable component of the satellite communications system's space segment. The antenna makes the satellite vulnerable to intentional attacks such as: RF jamming, spoofing, meaconing, and deliberate physical attack. The most vulnerable Earth segment component was found to be the Earth station network, which incorporates both Earth station and NOC vulnerabilities. Earth segment vulnerabilities include RF jamming, deliberate physical attack, and Internet connection vulnerabilities. The most vulnerable user segment components were found to be the SSPs and PoPs. SSPs are subject to the vulnerabilities of the services offered, the vulnerabilities of Internet connectivity, and the vulnerabilities associated with operating the VSAT central hub. PoPs are susceptible to the vulnerabilities of the PoP routers, the vulnerabilities of Internet and Intranet connectivity, and the vulnerabilities associated with cellular network access.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Combined Arm Battalion and AirLand Battle
This monograph addresses how combined arms organizations should be formed in our Army today. Specifically, it focuses on the question, "what arms, if any, should be combined organically at battalion level?" This issue is important because our AirLand Battle doctrine considers combined arms to be essential to winning on the modern battlefield. Therefore, we should investigate the best means by which to maximize the potential of the organizations. The monograph first examines the theoretical foundation for combined arms. Next, both historical and contemporary evidence are examined to derive a set of criteria that can be used to analyze the four selected arms: infantry, armor, artillery, and engineer in terms of the AirLand battlefield environment. The five selected criteria are frequency of interaction, competence of commander to synchronize the effects of weapon systems, scarcity of resources, cope of tactical missions, and similarity in range and mobility. These criteria are key factors that should be used whenever determining how an organization should be structured organically. Conclusions concerning the structure of a combined arms battalion are drawn from an analysis of these dominant criteria. This monograph concludes that infantry and armor are the only two arms that should be combined organically at battalion level. By combining these two arms permanently, it is almost certain that the combat potential of the organizations will increase.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Moderate Course for USAF UAV Development
USAF unmanned aerial vehicle (UAV) advocacy from 1980 to date has swung from an apparent disinterest in UAV systems to an aggressive acceptance of UAVs to solve mission needs. However, continued UAV programmatic setbacks indicate an appropriate UAV course for the Air Force remains to be charted. Tactical UAV programs between 1980 and the early 1990s conspicuously lacked USAF involvement and demonstrated a sub-par evolution of UAV capabilities, technology, and development. However, spurred by concern over mission loss to sister services, USAF demonstrated a mid-1990s new found interest in UAVs despite the less-than-proven performance of previous UAV systems. USAF UAV acceptance was embodied in four UAV end states and two High Altitude Endurance (HAE) UAVs. However, continued setbacks with HAE UAV programs soon impacted USAF's ability to meet UAV end state timelines as well as USAF commitment to UAV funding. HAE UAV miscues indicate the USAF UAV course charted after its mid-1990s UAV acceptance was founded on unproven technology. Consequently, this paper recommends a moderate USAF UAV course founded on proven technology and conservative investment. This moderate UAV course is enabled by a `wait and see' approach with the ongoing HAE UAV Advanced Concept Technology Demonstration (ACTD). The `wait and see' approach commits minimal USAF funds to HAE UAVs pending successful HAE UAV technology demonstration.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Benign Weather Modification
Weather modification is a technology once embraced by the U.S. military as a tool to help both wartime and peacetime missions. However, interest in the ability to modify weather has waned over recent years and is now nearly non-existent. This study examines one aspect of weather modification, benign weather modification, for possible use in assisting military operations. After briefly reviewing the history and science of weather modification, this study bounds the aspects of weather modification being addressed. The study then describes barriers to benign weather modification (BWM), showing how they affect current weather modification policy in the military. Then examples are shown of current civilian BWM techniques, their possible use by the military, and some military-unique needs for weather modification. After examining current weather modification and projected future BWM technology, this study concludes that military BWM use deserves another look. Increased reliance on precision guided munitions makes BWM a possible new tool in ensuring accurate targeting with minimal collateral damage. In addition, BWM offers the warplanner a means to dictate battlespace elements at a critical point in a conflict. At a minimum, the U.S. military should conduct a more in-depth review of weather modification to see if technological advances offer opportunities for more "bang for the buck."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
At the Crossroads of Cyber Warfare
This thesis provides signposts to guide the Royal Australian Air Force during its journey through the development of a cyber capability. As with most journeys, there are always multiple paths; the challenge is to choose a path that will deliver an effective cyber force with the available resources. The emergence of cyberspace changed the character of war in ways Clausewitz could never have imagined. Cyber violence transcends the physical environment, creating effects on an adversary's warfighting capabilities as severe as a kinetic weapon. Uncertainty, the fog that envelopes all aspects of conflict, remains ever-present; however, cyber enables commanders greater situation awareness, shifting the shade of fog from opaque to translucent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Investigation of the Effects of Target Feature Variations on Ballistic Missile RCS
Uncertainties in certain features of target geometries result in a loss of confidence in the signature assessment of the target. Knowledge of the impact to a target's radarcross section (RCS) due to changes to specific target features can assist to identifywhether uncertainty in a certain target feature warrants a loss of confidence in the targetsignature. This study will allow a development of a general "rule-of-thumb" on how theradar signature of a target varies as a function of the target's specific target features. Thetargets of interest which this study is centered around are fictitious ballistic missiles.Four target features that were investigated: fin size, nosecone shape, effect of panelriveting along the sides of the missile and the effects of heat shielding on the nosecone.By varying each of the four target features into a missile configuration and comparing toanother configuration, a relationship between specific target features and its effect on theradar cross section of a ballistic missile can be obtained. Based on the range of possibleconfigurations that target's feature can take, it is possible to estimate a range of possiblevalues of the radar signature. This will enable the user of the signature data to have abetter understanding of the target being assessed and target characteristics when acomplete knowledge of target configuration is unavailable.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Combat Aerial Vehicles
Military operations since Desert Storm have taken an almost ultramodern style of warfare a step away from the notion of sequential operations of the past, throughout the successful concept of parallel warfare during the Gulf War, toward a transformational strategy of network-centric warfare (NCW) now being adopted by the Department of Defense. The key technologies associated with NCW are information superiority, stealth, precision, engagement, combination of manned and unmanned aerial platforms. Recent events around the world demonstrate the unique capabilities of the Predator Unmanned Aerial Vehicle have triggered a revolution in unmanned aerospace vehicle research. Proponents, including the President of the United States, are touting the Unmanned Combat Aerial Vehicle (UCAV) as the next generation bomber and fighter platform. This paper investigates the feasibility of an unmanned aerial vehicle as an alternative in close air support (CAS) operations. Can an unmanned airplane engage targets in close proximity to friendly troops with the same or better results than a manned aircraft? To better understand the military applications of UCAVs conducting CAS, several areas must be considered doctrine, cost, survivability, distinct capabilities, and demonstrated accuracy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Information Gathering in the High Technology Command and Control Environment
This study investigates the US Army division commander's leadership responsibilities in directing the information gathering effort of his high technology command and control systems. The study first summarizes some major criteria for effective command and control. The study briefly describes today's command and control environment, recognizing the effects of the latest technology, revised doctrine, and the timeless human element of war. It then examines the potential effects of high technology information gathering on effective command and control. The study identifies five leadership requirements for the division commander in directing the information gathering effort. Those requirements are to: emphasize "command" over "control", organize the systems for the information gathering effort, focus the information gathering effort, discipline the information gathering systems, and train for the effort. The study concludes that the division commander's personal and organizational leadership is necessary to gain the great advantages of the US Army division's modern information gathering systems while minimizing the inherent adverse effects of those systems on effective command and control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analysis of the Economic and Environmental Effects of Compressed Natural Gas as a Vehicle Fuel, Vol. 1
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Caught in a Jam
Caught in a Jam: the US Air Force's Electronic Attack Conundrum Stealth or low-observable aircraft are not a substitute for air defense suppression. As Air Force leaders strive to recapitalize the air fleet with fifth generation capability, they are failing to address a core component of modern air combat--electronic attack (EA). Electronic attack is the shield that protects all generations of air assets from the bite of integrated air defense systems. No form of warfare, including stealth air warfare, is sufficient on its own. All are able to be threatened in ways that make them vulnerable to attack. This lesson was evident in Kosovo almost a decade ago when Serbians armed with early generation surface-to-air missiles where able to track, target, and shoot down an F-117 stealth fighter. This lesson seems lost, unfortunately, by today's air leaders seeking to acquire more advanced, high-priced, fighters to re-posture our nation's air inventory. While these procurements are certainly warranted, they do not guarantee a significantly higher probability of success without adequate support jamming assets in the anti-access environment of an advanced, sophisticated air defense network. Our adversaries have the benefit of observing two decades of stealth employment and are not complacent. The Air Force must take bold steps now to cement its stake in securing the shield that has protected coalition air assets since the Vietnam War. If the Air Force continues to ignore the EA gap staring them in the face, the fundamental operational concept of air employment will be significantly altered and the entire force structure will be at greater risk. The US Navy has provided electronic attack for the joint force since the mid-1990's when the Air Force decided to retire its EF-111 and RF-4 airframes in the wake of the successes of the Persian Gulf War. Stealth technology was seen as a panacea for defeating air defense systems. The Navy, lacking organic stealth capability, decided tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Linking ABM Competencies and AWACS Capabilities to Future Operations
The functions air battle managers (ABM) provide to tactical and operational warfighters through the utilization of systems onboard the E-3 Airborne Warning and Control System (AWACS) enhances the forces capability to conduct missions in support of the Joint Force Commander's objectives. However, contention on how to properly integrate battle management functions into operations occurs between ABMs, mission commanders, and leadership at the operational level. This is due to confusion surrounding doctrinal definitions of battle management/command and control (BMC2), changing missions for AWACS employment, and constantly evolving core competencies of ABMs. Subsequently, ABMs find themselves accomplishing several tasks and missions simultaneously in order to support combat operations. Joint Functional Air Component Commanders, combat plans and operations divisions in the Combined Air and Space Operations Center (CAOC), and mission commanders have used BM to ensure successful mission accomplishment in accordance with the commanders' intent. Regardless of doctrinal misconceptions among leadership, the efforts of competent ABMs lead the success of BM at the tactical level of warfare. These challenges will continue to persist as improvement in technology provides enhanced reach-back communications to the CAOC. As conflict changes and technology improves, future battle management tasks must be identified in order to evolve and create competencies that will provide the Joint Force Commander with a credible function that can fuse the tactical and operational aspects BMC2.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Systems
The Fiscal Year (FY) 2001 National Defense Authorization Act (NDAA) signed into law a mandate directing the Department of Defense (DoD) to develop and procure Unmanned Systems through FY 2030. These unmanned air, ground, and sea systems are being designed to support Full Spectrum Operations (FSO) in a hybrid-threat environment. The impact for the 2020 Joint Task Force (JTF) is that it will operate with unmanned systems that will revolutionize the way it conducts its operations. Furthermore, the 2020 JTF will be required to leverage cutting-edge information technologies that will ensure a secure and collaborative command and control network in a security environment that is increasingly competitive due to the proliferation of advanced unmanned systems. The challenge then is to posture the 2020 JTF to integrate these revolutionary unmanned systems. The essential tasks are to ensure operational reach and establish operational access throughout operations which are increasingly ready to be accomplished with revolutionary unmanned systems in lieu of manned systems.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Expendable Remotely Piloted Vehicles for Strategic Offensive Airpower Roles
Major Larm examines the feasibility of developing expendable remotely piloted vehicles (RPV) and explores future concepts of conventional US offensive airpower roles. He outlines the historical base of the larger category of unmanned aerial vehicles. Major Larm does not propose to take the pilot out of the cockpit, but he examines the concept of taking the cockpit out of the aircraft. By incorporating the added dimension of employing one-use vehicles to this concept, he attempts to reveal representative-though not all-encompassing-innovative airpower ideas. Major Larm's conclusion is that the use of expendable RPVs for strategic offensive airpower roles is a viable concept.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Methodology for Using Simulation Results for Test and Evaluation
Each year the Air Force spends billions of dollars on Test and Evaluation to ensure acquisition programs roll out the best possible products. In 1997, the National Research Council assembled to evaluate the overall procedure used in procuring various platforms with system planning, research, development and engineering (SPRDE) and program management (PM) processes. In their final report, they claimed that the full advantages of statistical practices, simulation, model-test-models, and incorporation of prior test information into current test practices have not been fully utilized. To examine one of the report's recommendations, this thesis defines and explores a methodology using simulation to augment or replace test data in lieu of operational testing. Specifically, a validated simulation model employs non-critical factor data from preliminary small sample operational testing.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
APTI Course 470
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Stretching the Umbilical Cord
This study addresses the question of whether or not the Air Force should continue to develop a Split Air Operations Center (AOC) capability whose components are geographically separated, electronically connected, and codependent for task accomplishment. The author analyzes the dilemma created by the Joint Forces Air Component Commander's (JFACC's) desire to collocate with both his AOC and the Joint Forces Commander (JFC) at a forward location, counterbalanced by the need to reduce deployed footprint for various reasons ? the most significant of which is to enhance his deployed force protection posture. The study examines the Split AOC as a potential solution to this dilemma. The paper begins by describing a contemporary, collocated AOC structure, as used by the Combat Air Forces' worldwide-deployable Numbered Air Forces. It then contrasts this contemporary AOC with the Split AOC paradigm.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Building a True Air and Space Operations Center
"The role of space in American military operations has evolved significantly since the end of the Cold War with the theater Air and Space Operations Center (AOC) playing a major role in integrating space effects into theater warfare. Moving far beyond traditional support roles, space operations in the AOC now include the defense of friendly space capabilities from interference and attack; the offensive ability to disrupt or deny an adversary the use of space; and coordination of theater space operations. However, the organization of space operations in the AOC has not kept pace with these changes. The primary assertion in this study is that the AOC needs to reorganize space personnel in the AOC and build a robust space organization to meet the Joint Force Air Component Commander's (JFACC) expanding space responsibilities. This will help resolve ambiguities and shortfalls in the current organization of space personnel that hinder the execution of these responsibilities. Today, the Air Force is on the threshold of building a true Air and Space Operations Center that can deliver air and space effects in support of air, land, maritime, and special operations forces. While there is no perfect organizational structure, the adoption of a Space Specialty Team or Space Division construct in the AOC can improve the JFACC's ability to execute his air and space war fighting responsibilities in support of the Joint Force Commander's objectives."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Relevance
Operation DESERT STORM led to the awareness that space assets could be instrumental at the operational, tactical, and strategic levels of war. Air Force Chief of Staff, General Merrill McPeak has been widely quoted as calling DESERT STORM the "first space war"1. The use of Space during Operation DESERT STORM left commanders asking, how do I effectively employed space in concert with combat operations, and who are my Space experts? The United States Air Force permanently assigns space professionals to regional Commands, operational wings, and even tactical squadrons to integrate space and its effects. This ensures space is taught and implemented during routine training as well as combat operations to ensure forces "train as they fight". The Air Force Weapons School (USAFWS) provides graduate-level instructor courses that provide the world's most advanced training in weapons and tactics employment to officers of the combat air forces. Airmen attending the USAFWS are recognized experts in their system. While attending the USAFWS, they are immersed in all aspects of their weapon system and graduate as system experts. Space graduates of the USAFWS, Space Weapons Officers (SWOs), are immersed in the "full spectrum" of Space. This training results in a graduate who is a space "generalists" rather than a system specific expert.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, Air Force leaders have begun to emphasize space operations. Global Engagement states that we will eventually transition from an Air and Space Force into a Space and Air Force and various leaders have opined that that air and space are "seamless." Air Force Chief-of-Staff General Fogleman introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to actually accomplish F2T2E, the functions currently performed by the E-3 Airborne Warning and Control System (AWACS) and the E-8 Joint Surveillance Target Attack Radar System (JSTARS) will need to migrate to space-based platforms. This thesis explores how such a migration would occur. Before examining space operations, the historical military need for moving target indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Elimination of Corrosion
United States Air Force aircraft currently average 30 years old. As this aircraft fleet continues to age, the cost of corrosion maintenance, both in terms of dollars spent and lost operational readiness, increases correspondingly. Corrosion maintenance cost the Air Force over $1.5 billion in 2004, and trends show that number quickly rising, as it cost only $800 million in 1998. These rising costs must be reversed before Air Force operations suffer serious detrimental effects. Nanotechnology offers one possible solution for creating new revolutionary anticorrosion coatings capable of adapting to environmental damage and conditions.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cca
Top military leadership has identified problems with the timeliness and effectiveness of DoD contingency construction support. Qualitative data was in order to gain clarity on the problem space and lay a foundation for solution generation and selection. Interviews were conducted with agents with experience within the Iraq and Afghanistan theater of operation as well as support functions for the Pentagon. Commanders, Engineers, Lawyers, Acquisition Attorneys, Staff Officers and Program Managers have been interview. The interviews have been analyzed using open coding to answer research question and identify to emergent themes and concepts. The data collected has confirmed the hypothesis that the project programming regulatory structure is not meeting its intent, or the needs of our war fighters. Furthermore, because it is not meeting the war fighter's need the system is being manipulated in order to, "accomplish the mission" which is creating unintended consequences with regard to cost, health, safety, force protection, ADA violations, mission support and safety. Significant negative consequences were found to be attributed to the interpretation of "temporary construction" and the time required to process CCA projects. Additionally, a value stream map was created in order to map the contingency construction approval and funding process. This research effort has provided clarity of the problem space of contingency construction and prepared a foundation for future research to address the problem.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.