A Comparison Study of F-15C Fighter Squadron Ready Aircrew Program Flying Hour Scheduling vs. the RAND Corporation's Flying Hour Scheduling Linear Program
This research compares and contrasts the Flying Hour model created by the RAND corporation with the Ready Aircrew Program (RAP) model from Air Combat Command. The RAP model was designed to generate an annual flying hour program that specifies the minimum number of sorties required to stay tactically safe. The RAND model was designed to provide fighter pilots 13 sorties per month, a number determined from surveys of combat aviation leadership. The RAND model is built on the assumption that the fighter pilots would be immediately ready to deploy to a combat situation. In contrast, squadrons using the RAP model must take extra sorties and time to get fighter pilots ready for war. This research recommends an increase to AFI 1-2F-15V1 annual pilot requirements. This plus-up will increase average monthly sorties for combat mission ready API-1 pilots to the Air Force Safety Center recommended 11 flights per month at a flying hour cost of approximately $1.7 million per squadron.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Energy Laser on the Joint Strike Fighter a Reality in 2025?
High energy lasers (HEL) promise speed-of-light engagement, precision effects, and low collateral damage. These characteristics along with a nearly unlimited magazine make HELs attractive for installation on a tactical platform. This paper will consider whether a HEL equipped F-35 Joint Strike Fighter (JSF) could be fielded in 2025. To answer this question, three topics will be explored. First, will HELs be sufficiently technically mature to permit installation on a fighter platform? Second, will the key supporting systems, to include power generation and storage, thermal management, and beam conditioning and control, be sufficiently technically mature for installation on a fighter platform? Next, will maturity of the key supporting systems occur in time to support a program to integrate a HEL on the JSF? Finally, are the development schedules and funding for the HEL, key supporting systems, and the JSF synchronized to support a 2025 fielding? The research methodology includes a review of current efforts in each of the technology areas mentioned previously. Additionally, interviews with key personnel involved with the JSF program are used to understand the challenges associated with integrating the aforementioned technologies on the JSF. The research concludes that the technical maturity of HELs and their supporting systems will be sufficiently advanced to permit fielding a HEL equipped JSF in 2025. The key issue that may prevent this from occurring is a lack of dedicated funding, both for development of the enabling technologies and also for the HEL integration effort on the JSF. The author closes the paper by exploring the rationale for installing a HEL on the JSF and considering whether the USAF's proposed long range strike vehicle would be a better candidate than the JSF for HEL integration.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Building Air Quality
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Temperature Degradation of 5250-4 Polymer Resin
5250-4 bismaleimide resin is used in high performance polymer matrix composites with high temperature aeronautical applications. This thesis investigated the thermal and oxidative degradation of 5250-4 neat resin powder in argon, air, and oxygen environments. The powder was agedat 163, 177, and 190 璽 簞C in all environments for at least 250 hours. Isothermal thermo-gravimetric analysis demonstrated that weight loss was negligible for agingin the argon environment, indicating weight loss isthe result of an oxidative process at these temperatures.The 5250-4 powder exhibited an initial period of weightgain before eventually losing weight inboth air and oxygen. The applicabilityof a closedloop oxidation scheme to 5250-4 gravimetric behavior was investigated. Kinetic parameters for the scheme were determined for the AirForce Research Laboratory's polymermatrix composite lifetime prediction modeling efforts.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Information Gathering in the High Technology Command and Control Environment
This study investigates the US Army division commander's leadership responsibilities in directing the information gathering effort of his high technology command and control systems. The study first summarizes some major criteria for effective command and control. The study briefly describes today's command and control environment, recognizing the effects of the latest technology, revised doctrine, and the timeless human element of war. It then examines the potential effects of high technology information gathering on effective command and control. The study identifies five leadership requirements for the division commander in directing the information gathering effort. Those requirements are to: emphasize "command" over "control", organize the systems for the information gathering effort, focus the information gathering effort, discipline the information gathering systems, and train for the effort. The study concludes that the division commander's personal and organizational leadership is necessary to gain the great advantages of the US Army division's modern information gathering systems while minimizing the inherent adverse effects of those systems on effective command and control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Command or Control Dilemma
The Maxwell Papers, the Air War College's occasional papers series, focus oncurrent and future issues of interest to the Air Force and US Department of Defense.The first Maxwell Papers was published in May of 1996 with the Air UniversityCommander's signature on the foreword. Maxwell Papers are open to all interestedauthors, particularly Air War College faculty and students, but also to other officersand analysts. Maxwell Papers have been distributed to over 400 addresses includingall senior Air Force and US Department of Defense decision makers, ProfessionalMilitary Education (PME) schools, contractors, and other US agencies, and morethan 40 foreign air forces and institutions. This document is a Air War CollegeMaxwell Paper.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Fuels and Fuel Additives for Highway Vehicles and Their Combustion Products
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Methodology for Using Simulation Results for Test and Evaluation
Each year the Air Force spends billions of dollars on Test and Evaluation to ensure acquisition programs roll out the best possible products. In 1997, the National Research Council assembled to evaluate the overall procedure used in procuring various platforms with system planning, research, development and engineering (SPRDE) and program management (PM) processes. In their final report, they claimed that the full advantages of statistical practices, simulation, model-test-models, and incorporation of prior test information into current test practices have not been fully utilized. To examine one of the report's recommendations, this thesis defines and explores a methodology using simulation to augment or replace test data in lieu of operational testing. Specifically, a validated simulation model employs non-critical factor data from preliminary small sample operational testing.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Benign Weather Modification
Weather modification is a technology once embraced by the U.S. military as a tool to help both wartime and peacetime missions. However, interest in the ability to modify weather has waned over recent years and is now nearly non-existent. This study examines one aspect of weather modification, benign weather modification, for possible use in assisting military operations. After briefly reviewing the history and science of weather modification, this study bounds the aspects of weather modification being addressed. The study then describes barriers to benign weather modification (BWM), showing how they affect current weather modification policy in the military. Then examples are shown of current civilian BWM techniques, their possible use by the military, and some military-unique needs for weather modification. After examining current weather modification and projected future BWM technology, this study concludes that military BWM use deserves another look. Increased reliance on precision guided munitions makes BWM a possible new tool in ensuring accurate targeting with minimal collateral damage. In addition, BWM offers the warplanner a means to dictate battlespace elements at a critical point in a conflict. At a minimum, the U.S. military should conduct a more in-depth review of weather modification to see if technological advances offer opportunities for more "bang for the buck."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Logging the JSF
Within the US Air Force, acquisition, operations, and logistics communities collectively face a perplexing question: What is the best way to plan the acquisition and life-cycle sustainment of a fighter aircraft fleet? To find the answer to this question the following thesis attempts to derive lessons learned from case study analysis to develop a new methodology for future use. Aircraft fleet size, in an acquisition program, is determined by assessing the capabilities necessary to meet current and future operational readiness demands. Aircraft sustainment, although equally important, is typically not considered during early procurement planning due to the difficulty in forecasting the sustainment infrastructure necessary to mitigate effects caused by aging and changing operational requirements. At best a nebulous endeavor, sustainment forecasting is affected by the myriad of dynamic organizational, technological, and budgetary influences caused by rigid DoD acquisition processes and inflexible Congressional appropriations cycles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Fighter Pilot Inventory and Requirements Model
"Historically, managing fighter pilot requirements has been a continual challenge for the Air Force Personnel Center. In recent years, Unmanned Aerial Vehicles have become a highly sought after commodity, and the number of UAV billets have increased, with more increases expected in the near future. Currently 45% of UAV squadrons are manned by combat aircrew. Fighter pilots fills the majority of these slots. This dramatic increase in UAV requirements demands analysis for the impact on fighter pilot requirements. An increase in UAV fighter pilot billets represents a direct increase in force requirements, however, there may be an indirect effect on training and man year requirements."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Examining Air Battle Manager Training Under the Air Force Smart Operations 21 Lens
The study question "Can Air Battle Manager (ABM) training be shortened without a reduction in quality by applying AFSO 21 lean production principles?" is examined in two companion student Professional Student Papers (PSPs). This paper constitutes part one of the companion papers and covers the concepts and principles of AFSO 21, reviews the current state of ABM training syllabi, and follows with an application of AFSO 21 lean principles to the current ABM syllabi. The result of this paper is the finding that a single syllabus at a single base should be pursued. The focus of Part Two, the companion paper by Col Joseph J. Rossacci, addresses the feasibility of implementing the finding from this paper and addresses major variables associated with that finding that need to be considered. Finally, Col Rossacci's paper concludes with the recommendation to implement the findings of these two companion PSPs by consolidating Undergraduate ABM and E-3 Initial Qualification Training at Tinker AFB, Oklahoma. The business case for this consolidation is overwhelmingly positive as it would require an investment in infrastructure of approximately $6.8M, but would net the USAF a saving of $7M+ per year.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Geosynthetic Design Guidance for Hazardous Waste Landfill Cells and Surface Impoundments
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Alternative Disinfectants and Oxidants Guidance Manual
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Presentation of AFCYBER Forces
The future Air Force as part of the Joint Force, in close coordination with multi-national, interagency, and non-government partners, will operate in a complex and uncertain global security environment in which adversaries will seek to apply asymmetric threats to perceived vulnerabilities. International organizations, nation states, rogue states and terrorist organizations are prominent actors in this environment. Taken together, these have led to a shift in the characteristics of joint warfare and crisis resolution. By extension, the Air Force and Joint Force's role in this security environment have changed, especially with regards to cyberspace.2 In 2003, the President of the United States published the National Strategy to Secure Cyberspace as a first step in recognizing the importance of cyberspace to the United States nation interests. As noted in this document, "The way business is transacted, government operates, and national defense is conducted have changed. These activities now rely on an interdependent network of information technology infrastructure called cyberspace. The policy of the Untied States is to protect against the debilitating disruption of information system operations for critical infrastructure and, thereby help to protect the people, economy, and national security of the United States."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Last Manned Fighter
In this paper, Lt Col Robert B. Trsek addresses the question, can and should the Air Force pursue an unmanned multirole fighter to replace manned systems? Unmanned aircraft systems have demonstrated enormous intelligence, surveillance, and reconnaissance (ISR) capabilities in both flexibility and persistence. Current and emerging technology may permit unmanned fighters to replace conventional multirole aircraft in the face of high-endurance missions, evolving threat systems, and political pressure to preserve human life.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Spacepower as a Coercive Force
The purpose of this paper is to propose a spacepower theory and explore the implications of such a theory on future space operations and force structure. Air concepts are considered for what insights they provide to the logic process and operational concepts. This paper emulates the logical process for the development of air concepts while avoiding many contentious issues regarding the relationship between air and space forces. Issues such as a separate space service, air and space integration, and the concept of aerospace forces are not addressed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Command and Control in the Combined Arms Battalion Task Force
This monograph examines the components and relationships in the tactical command and control system of the tank and mechanized infantry battalion task force. The paper views command and control as a system from conceptual and functional perspectives. Beginning with the abstract, various theoretical models illustrate system functions and activity. Relevant battalion level doctrine is reviewed. The battlefield functional areas of maneuver control, fire support, air defense, combat service support, and intelligence and electronic warfare are addressed with emphasis on emerging developments affecting battalion operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Guide to the Biosolids Risk Assessments for the EPA Part 503 Rule
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deterrence 2035
This paper describes the United States' reliance on space and the effect of the new phenomena called CubeSat. It explores current and emerging threats to spacecraft, the role of nanotechnology in developing new space technology, revisits space policy and basic deterrence theory. It further examines how to evolve the traditional understanding of deterrence to limit the potential gain an adversary may try to realize through transparency and diversity or system redundancy. The paper concludes with recommendations to expand the space industrial base to reduce costs and allow technology the ability to drive the miniaturization of spacecrafts along with a modular approach to building satellites and launch systems. In addition to improvements to the space surveillance networks required to track tomorrow's much smaller threat. Only then will the adversary realize that an attack would be futile and ultimately deterred.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Need for a Permanent Gun System on the F-35 Joint Strike Fighter
Historically, the United States Air Force (USAF) concentrates on advanced or future weaponry when it develops advanced/next generation aircraft like the Joint Strike Fighter (JSF). However, some legacy weapons, such as an internal gun system, continue to prove they are still viable and are absolutely necessary if we want our future aircraft to have the flexibility necessary for the wide range of missions we expect them to perform. This point of view is far from being unchallenged. There are many individuals and organizations within the Department of Defense (DoD) and the within the aerospace industry that think the time for a gun on fighter aircraft is long over. These organizations/individuals primarily point to the advancements in modern weaponry to support their point of view. For example, the advancements in precision weapons have provided the USAF with the ability to target virtually any target, in any weather, at any time.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Non-Lethal Weaponry
Consideration of non-lethality and non-lethal weapons by the Department of Defense as an expression of military power is a relatively new yet growing phenomenon. This report explores four issues germane to non-lethal concepts and technologies in the DOD and makes recommendations derived from those issues concerning the integration of non-lethal weaponry into future United States military operations. The approach taken in the research centers on a modified content analysis of unclassified materials published between 1990 and 1997 related to non-lethality and non-lethal weapons. The genesis of non-lethality in the DOD has been convoluted, involving multiple actors struggling over the definition of non-lethality along with scattered operational experiences and the erratic development of policies and technologies. Four motives now drive DOD non-lethality: A changing threat; the need for more response options; the desire to reduce lethality, and force protection. Non-lethality scenarios span the spectrum of conflict and the traditional levels of war, while the suitability criteria for non-lethals include technical feasibility, operational utility, policy acceptability and safety. Coherent, substantiated, decisive and appropriate actions must be taken to ensure the transformation of non-lethality into an integrated component of US armed capability. These efforts require a multitude of actors engaged in policymaking, legislative, doctrinal, architectural and acquisition initiatives drawn from the history, motives, scenarios and criteria associated with non-lethality in the Department of Defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Enabling Battlespace Persistent Surveillance
In 2025, the military's need for persistent surveillance applications will extend beyond current airborne platforms such as Global Hawk and Predator. The future of 2025 contains potential enemies with a material and information focus capable of conducting regular and irregular warfare on foreign lands as well as the continental United States. The US military must invest their energy and money today into researching enabling technologies such as nanotechnology, wireless networks, and micro-electromechanical systems (MEMS) to develop persistent surveillance applications such as Smart Dust for the future.The enabling aspects of these technologies, based in academia or business today, form the basis for the disruptive combat applications in the next 20 years. Nanotechnology, while fantastic in some aspects, reduces today's technology to the molecular level contributing to increased performance for the future. Facilitating globalization, wireless networks link people, computers, and sensors beyond the borders of nations without the need for costly hardware-intensive infrastructure. Finally, MEMS sense a wide array of information with the processing and communication capabilities to act as independent or networked sensors. Fused together into a network of nanosized particles distributed over the battlefield capable of measuring, collecting, and sending information, Smart Dust will transform persistent surveillance for the warfighter.With technological, social, and ethical challenges preventing growth, the US military should lead research, development, and education on these enabling technologies to realize the full benefits of Smart Dust by 2025. Through policy decisions, the United States, as the world's superpower, must continue to lead the development of innovative technologies to preserve the balance of power for the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling and Simulation for Readiness and Capability Assessment
The ability to assess military readiness and capability has been a problem for the Department of Defense, the Congress and military commanders. As recently as the Gulf War readiness reported by some units deploying to the Gulf was, in the words of the General Accounting Office, inflated and unreliable. Inflated and unreliable readiness reporting is a problem for the Department of Defense because it affects budget decisions and long range planning. It is a problem for the Congress because cost versus capability trade-offs are not articulated well. It is a problem for commanders who must depend on these forces in time of war or contingency. The problem exists because there has been no satisfactory objective means of objectively measuring readiness and capability. Objective methods of assessment have relied primarily upon input or resource based measurement tools. Since these provided only partial measures, subjective input was also required and often contradicted the objective data. Even worse, actual capability was sometimes not reflected by either the objective or subjective assessment. Advances in information technology along with the accompanying information explosion have made the use of modeling and simulation for readiness and capability assessment a viable method of assessing not only individual units but entire theaters of operation. These advances will allow the Department of Defense to compare force capability between different units based upon outcome oriented analysis. The ability to compare assessment results from year to year will help the Congress to understand what is purchased with the defense dollar and will allow peacetime exploration of unit and force cost versus readiness and capability tradeoffs. These same advances will allow the commander to objectively explore alternative force mixtures and courses of action prior to committing them with the added advantage that the same information and technology can provide a further step towardachievingThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
F-16 Uninhabited Air Combat Vehicles
The U.S. Air Force is actively pursuing unmanned aerial vehicle (UAV) programs for surveillance and reconnaissance missions. However, the Air Force has not funded any substantial research into bomb or missile carrying "lethal" UAVs, also called uninhabited combat air vehicles (UCAVs), despite the recommendations of the USAF scientific board's New World Vistas, DARPA, and the Air Force 2025 project. With budget constraints and a reluctance to transition to an unmanned combat force, new advanced technology UCAVs are decades from operational status.In the meantime, the U.S. needs to quickly field an interim UCAV program for political, economic and military reasons. An interim UCAV will provide another unmanned military option for U.S. leadership that currently relies on cruise missiles to deal with conflicts where the loss of American lives is politically unacceptable.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Persistent Space Situational Awareness
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Bicarbonate of Soda Blasting Technology for Aircraft Wheel Depainting
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Adversary Use of Commercial Space
The ability to exploit space capabilities was once monopolized by a few select nations. However, the advent of the Information Era begat an increased demand for space services that inevitably drove a responding supply. Today, space-based force enablers are commercially available not just to nations, but individuals, alike. This ready accessibility of space capabilities places both US forces and her space industry at risk. Successfully addressing this risk will require the coordinated efforts of the Departments of Defense, State and Commerce. To best quantify the threat, one must not only determine what services are available, but who is providing them. Unsurprisingly, Russia, the member nations of the European Space Agency, Japan and China pose the greatest menace as adversary sources of space-based capabilities and competitors to US industry. Naturally, these states also host the largest commercial service providers such as SES Global, Arianespace, and Mitsubishi Heavy Industry. The sophistication and state backing of these entities merit close and continued scrutiny. Having identified the sources, one may then assess the services. Of the spectrum available, the greatest equalizer for the opposition to US forces is secure, two-way mobile communications. This is due to its inherent advantages as well as the capabilities such as networking that may be derived from it. Of lesser, but still significant benefit is satellite imagery. High resolution commercial imagery is not yet available on demand, but data as old as several years may still have utility when assessing non-mobile targets such as structures and runways. In contrast to these threats to US forces, the main danger to her industry stems from the limited accessibility of space. Launch segments endure excessive operating costs and high risks. Single failures can jeopardize corporate survival. Foreign companies have significantly lower stakes in this arena because many share the burden of launch expenses with tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Investigation of Ultra-High Strength Fe/4Cr/0.4C Martensitic Steels for Improved Toughness
The Office of Scientific & Technical Information (OSTI), is a part of the U.S. Department of Energy (DOE) that houses research and development results from projects funded by the DOE. The information is generally an article, technical document, conference paper or dissertation. This is one of those publications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A New Age for Aerostats
Both the U.S. and its allies have increasingly relied upon civilian transport aircraft, such as the Civil Reserve Air Fleet (CRAF), to augment organic military airlift. However, the widespread proliferation of Man Portable Air Defense Systems (MANPADS) poses a significant threat to unprotected civilian aircraft. Previous research focused on installing the military's counter-MANPADS systems, such as Infrared Countermeasures (IRCM), on civilian aircraft. However, the unique CRAF operating environment makes such an aircraft-centric approach economically unfeasible. Instead, future counter-MANPADS programs should shift focus from protecting individual aircraft to an area-wide system that protects entire airfields. Aerostats possess unique capabilities that enable them to provide an area-wide counter-MANPADS defense using existing IRCM technology.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Methodology for Using Simulation Results for Test and Evaluation
Each year the Air Force spends billions of dollars on Test and Evaluation to ensure acquisition programs roll out the best possible products. In 1997, the National Research Council assembled to evaluate the overall procedure used in procuring various platforms with system planning, research, development and engineering (SPRDE) and program management (PM) processes. In their final report, they claimed that the full advantages of statistical practices, simulation, model-test-models, and incorporation of prior test information into current test practices have not been fully utilized. To examine one of the report's recommendations, this thesis defines and explores a methodology using simulation to augment or replace test data in lieu of operational testing. Specifically, a validated simulation model employs non-critical factor data from preliminary small sample operational testing.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Basic Field Manual, Vol. IV
This text includes signal regulations and technical information needed by officers and enlisted men of arms other than the Signal Corps engaged in signal communication. It supplements the matter contained in chapter 7, Basic Field Manual, Volume VIII, and prescribes in detail the installation, maintenance, and operation of signal communication agencies which are employed at and forward of brigade headquarters. Chapters include topics on field wire systems, radio, visual signaling, dropped and pick-up airplane messages, message center, orders and instructions for signal communication troops, meteorological information, Signal supply, and a table of radio communication equipment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Effect of Prior Aging on Fatigue Behavior of IM7/BMI 5250-4 Composite at 191-C
IM7/BMI 5250-4 with carbon fiber orientations and [0/90] were aged in air at 191-C for up to 1000 hours. The weight loss was analyzed during the aging process. Tension to failure tests were performed on both the unaged and aged specimens to establish a baseline for the Ultimate Tensile Strengths and Young's Modulus. Tension-tension cyclic load fatigue testing was conducted on the specimen to determine the effect of prior aging on the fatigue response of the composite. Cyclic strain accumulation was not influenced by prior aging, but it was influenced by the stress levels applied. Specimens lost 0.2% more weight than the [0/90] specimens from aging in air.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Advanced Photochemical Oxidation Processes Handbook
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Warfare
As we approach the dawn of the 21st century, success of our national security strategy will depend greatly on our ability to combat the Information Warfare (IW) threat. Old paradigms regarding conventional warfare must change to incorporate this new form of warfare. Our nation's growing dependency on information and information-based technologies has made IW a legitimate weapon for potential adversaries. The "information" and its support infrastructures are becoming extremely vulnerable to hostile attacks. Adversarial forces can now wage information-based warfare from anywhere in the world, and literally remain anonymous. Thus, our ability to recognize and defend against this new form of warfare is paramount to the survival of our national security infrastructure.The thesis of this research project is predicated upon the following premises: First, the exploitation of "information" as a weapon is changing the nature of warfare. Second, although there is much debate about the reality of the IW threat, this paper postulates that adversarial IW tactics pose a legitimate threat to our national security infrastructure. Finally, the Department of Defense (DOD), the Joint Staff, and the Services must remain actively committed to combating the IW threat in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Military Dependence on Commercial Satellite Communications Systems--Strength or Vulnerability?
The military's growing dependence on commercial satellite communications systems will become a strength or vulnerability based on how well the right balance is achieved between commercial and military systems. Determining that balance is a function of clearly understanding both DoD's requirements and the vulnerabilities and risks associated with the use of, and dependence on, commercial systems. This report provides a short overview of the emerging commercial capabilities and then examines in depth the DoD process for validating requirements, the validated MILSATCOM requirements documented through that process, and the risks and vulnerabilities associated with the use of, and dependence on, commercial satellite communications systems. The main conclusion drawn is that commercial capabilities can help satisfy DoD requirements for capacity, but at a "cost" in most cases of accepting risk with respect to several key qualitative requirements, especially with respect to protection, assured access, and control. A few additional conclusions are drawn about how to achieve the best balance to satisfy DoD requirements with the least amount of risk and cost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Diffusion of Military Technologies to Foreign Nations
The purpose of this paper is to recommend that the United States government maintain the defense technological and industrial base (DTIB) by aggressively supporting the US defense industry in the arms transfer process. Ironically, this recommendation is contrary to the position held at the onset of this research and analysis effort. It is written for the microlevel reader (the young pilot, tank operator, etc.), the macrolevel reader (US government staffers and above in the State and Defense departments), and senior government officials (generals, congressmen, and senators) to inform and enhance their ability to understand the DTIB and how arms transfers can help in its preservation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Anatomy of a Capabilities Gap
The Air Force's first stealth fighter has had a long and distinguished service record for our nation providing commanders a then revolutionary capability to fight our nation's wars. The F-117A Nighthawk's traditional mission of knocking down the door for conventional forces to follow will now fall upon other capabilities in the Air Force and other armed services. This paper analyzes and amalgamates available unclassified information covering different aircraft and capabilities currently in the Air Force inventory and those in production. With ever tightening budgets, the Air Force has to make difficult decision, on which programs to discontinue or reduce while keeping a vigilant watch to ensure capabilities do not diminish as it restructures its force. While the B-2 Spirit, F-22A Raptor and AGM-158 JASSM all possess low observable characteristics, an analysis of available unclassified information concludes that there could be a slight capability gap but the risks are not worth the costs to continue operating the F-117A fleet in the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, United States Air Force (USAF) leaders have begun to emphasize space operations. Global Engagement: A Vision for the 21st Century Air Force states that we will eventually transition from an air and space force into a space and air force and various leaders have opined that that air and space are seamless. Gen Ronald R. Fogleman, USAF chief of staff, introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to accomplish F2T2E, the functions performed by the E-3 airborne warning and control system (AWACS) and the E-8 joint surveillance, target attack radar system (JSTARS) will need to migrate to space-based platforms. This study explores how such a migration would occur.Before examining space operations, the historical military need for moving tar-get indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft. Because space systems operate differently from airborne systems, those differences are explored. The organizations involved in space operations are also examined, along with their potential to effect the development of a space-based MTI system. The radar systems of both the AWACS and the JSTARS are described, as well as a few of the most prominent of the proposed space-based systems.The planning for space-based MTI is in its early phases. A "Concept of Operations for Space-Based MTI" has been written, as has a "Space-Based MTI Roadmap." US Space Command has also written the Long Range Plan, which includes space-based MTI concepts in its plan for 2020. These plans are a good start but do not address several important issues, including satellite architecture, whether satellite MTI systems should completely replace airborne systems, who should be responsible for the system, and how battle managers will operate in the new system.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Novel Applications of Functionally Graded Materials
This book offers a thorough understanding of the unique characteristics, characterization techniques, and inventive applications of functionally graded materials. It covers sophisticated functional materials, including metals, composites, polymers, and ceramics, exploring their unique characteristics, and using characterization methods.
Treatise on Military Small Arms and Ammunition, With Theory of the Motion of a Rifle Bullet
The collections contained within the Combined Arms Research Library Digital Library are largely composed of digital versions of paper documents from the Combined Arms Research Library collections and student papers produced at the US Army Command and General Staff College. The documents in this collection cover the areas on the Vietnam Conflict, Korean War, and the U.S. Civil War, to name a few. This is one of those documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Integration of Unmanned Aerial Vehicles Into the Functions of Counterair
With the recent draw down of the US military after the end of the Cold War, the US Department of Defense (DoD) is placing considerable emphasis on employing a lighter, leaner, and more lethal military force to accomplish the strategic objectives mandated by political leadership. As a force enabler for military forces, Unmanned Aerial Vehicles (UAVs) recently demonstrated their potential during NATO military operations in Kosovo. Their activities weren't limited to merely gathering enemy intelligence. As a result of advancements in UAVs capabilities, UAVs expanded their operations by directly assisting in combat missions. The resulting logical question that evolved out of the Kosovo operations is, can UAVs be more actively integrated into other military functions to enhance mission accomplishment? More specifically, can UAVs be incorporated into the function of gaining and maintaining control of the air for US forces? To completely answer this question, this research paper will first analyze the current background of UAVs as seen in recent military operations. Secondly, the function of counter air will be examined to identify the deficiencies US forces have in obtaining control of the air. Third, the present and future capabilities that UAVs can bring to the fight will be identified. Fourth, a detailed examination of which UAVs payloads can be incorporated into the function of counterair will be accomplished. Fifth, this paper will show that UAVs can be effectively integrated to enhance US military weapons systems accomplishment of the function of counterair. Finally, this author will briefly discuss one possible plan to integrate UAVs in the function of counterair to overcome the noted deficiencies.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Data Integration
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Advanced Strategic and Tactical Infrared Expendables
Infrared (IR) flare design was not a strategic player in US defense until the mid 1990s. Prior to 1995 the primary focus was on radio frequency (RF) flares for piloted aircraft. 1993 saw the establishment of a funded Program Management Directive (PMD) explicitly directing the need for advanced IR capabilities implemented in "field operations". The program for Advanced Strategic and Tactical Infrared Expendables (ASTE) was formalized on 5 April 1995 with certification of an Operational Requirements Doctrine (ORD). ASTE set out to work with contractors to develop this emerging technology with aggressive vigor - quite possibly too aggressive for its own good. The design was a simple one, or so they thought. Previous models and dispensing systems were already in place. No one planned for the intensity of the next four years, achieving a Full Rate Production (FRP) contract for only one out of four flares being developed. The extreme complexity of technical mishaps experienced during the Engineering, Manufacturing, and Design phase (MS II, now early MS B) was not a foreseen performance obstacle for engineers and program schedulers. As the 1997 FRP date slipped farther and farther to the right, ASTE's ideal defense technology was not favorably looked upon, creating a ripple effect of significant cost growth and schedule slips throughout the program. This case study takes a look at the problems contributing to the delayed delivery of IR flares and its impact to meeting warfighter needs under constraints brought about by government acquisition policies. Funded with a modest budget, ASTE is only a small representation of the greater Electronic Warfare (EW) programs our military elects to fund over multiple years. Yet, even a small program can offer significant impact to overall government lessons learned in acquisition and budgeting planning and processesThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cca
Top military leadership has identified problems with the timeliness and effectiveness of DoD contingency construction support. Qualitative data was in order to gain clarity on the problem space and lay a foundation for solution generation and selection. Interviews were conducted with agents with experience within the Iraq and Afghanistan theater of operation as well as support functions for the Pentagon. Commanders, Engineers, Lawyers, Acquisition Attorneys, Staff Officers and Program Managers have been interview. The interviews have been analyzed using open coding to answer research question and identify to emergent themes and concepts. The data collected has confirmed the hypothesis that the project programming regulatory structure is not meeting its intent, or the needs of our war fighters. Furthermore, because it is not meeting the war fighter's need the system is being manipulated in order to, "accomplish the mission" which is creating unintended consequences with regard to cost, health, safety, force protection, ADA violations, mission support and safety. Significant negative consequences were found to be attributed to the interpretation of "temporary construction" and the time required to process CCA projects. Additionally, a value stream map was created in order to map the contingency construction approval and funding process. This research effort has provided clarity of the problem space of contingency construction and prepared a foundation for future research to address the problem.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber-Based C4ISR Asset
"The cornerstone of the USAF's global strike and rapid global mobility is its vast cyber-based C4ISR network. The USAF has become so dependent on cyber-based C4ISR capabilities that the network itself has truly become a center of gravity. Unfortunately, the network's critical requirements are highly susceptible to attack from a number of threats. As a result, one of the USAF's greatest capabilities has also become one of its greatest vulnerabilities. Using open-source documentation, this paper outlines the grave threat to the USAF's cyber-based C4ISR and suggests how the USAF should prepare its forces to operate in a cyber-denied environment."--Abstract.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Systems Approach to Understanding the Strategic Advantage of the F/A-22 and Future Stealth Aircraft
The purpose of this thesis is to introduce three concepts into the ongoing debate concerning the procurement of fourth-generation stealth aircraft such as the F/A-22 and Joint Strike Fighter (JSF). Even though an understanding of them is essential for military and civilian policy makers to formulate informed decisions about future aircraft procurement, the following points are frequently absent in discussions of stealth technology. First, advances in stealth technology have shifted it away from a primary to a secondary, although indispensable, aircraft characteristic. Stealth is no longer a stand-alone feature, but an essential system within the entire combat aircraft system. Second, a system of systems that continuously matures, through either evolutionary improvements or the incorporation of other systems, can maintain a continuing margin of advantage over counter-technologies. This statement is particularly true for fourth-generation stealth aircraft. Last, the cost and effort required to counter a system of systems is significantly greater than that required to counter a single technology because an effective counter must defeat multiple components within the system to render it ineffective. Thus, the integration of stealth into an aircraft's system can impose an opportunity cost on adversaries that either exceeds their means or significantly hampers their nation's offensive capabilities. Fully understanding these three concepts and incorporating them into current acquisitions and defense policy debates will more clearly articulate the strategic importance of continuing to develop and employ advanced stealthy aircraft. A failure to acquire these weapon systems will significantly affect America's military capabilities and in turn, the negative strategic impact on the United States will result in a relative strategic advantage for America's adversaries.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.