Fuels and Fuel Additives for Highway Vehicles and Their Combustion Products
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Nanotechnology Weapons
Innovations from nanotechnology are starting to make their way into products on the commercial market as well as information and combat systems for the military. Improvements brought about by nanotechnology will be revolutionary, but, nanotechnology will also present entirely new threats. Steps must be taken now to address the asymmetrical menace posed by future nanotechnology weapons. Production rates of nanomaterials are also rising dramatically, yet there is a general lack of agreement and understanding about their dangers. Sometime within the next 5-10 years, development of a new type of chemical or biological weapon based on discoveries in nanotechnology could be a very real possibility, yet the Department of Defense (DOD) has not initiated programs to focus specifically on understanding or preventing this new type of threat. The DOD should take action now to solve the unknowns as it relates to the dangers of nanostructures, raise awareness on the dangers of nanotechnology within US research institutions and internationally alike, and introduce nanotechnology weapons into DOD educational environments and strategic planning.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Airborne Laser and the Future of Theater Missile Defense
The theater ballistic missile (TBM) problem encountered in the Persian Gulf War revealed an alarming deficiency in US defenses. This paper takes a brief look at the major theater missile defense (TMD) systems in use and under development by the US today. Second, it focuses on the performance of the Army's Patriot defense system in the Gulf War. Finally, the paper offers an in-depth look at the development of the Airborne Laser (ABL) and how it should fit into an overall national structure for TMD. The paper concludes that Patriot performance in the Gulf war was unsatisfactory, not just because of system flaws, but because of the concept of point defense itself. The ABL provides a unique solution to collateral damage inherent in point defense concepts. In addition, the ABL can provide advanced warning to other theater defense systems in the event of a mass launch which could overtax the ABL's capabilities. The paper offers several recommendations for the future direction of TMD. First, phase out point defense completely and channel those funds into development of the other TMD systems which minimize collateral damage to the assets they are intended to protect. Second, expedite development of the ABL as the first line of TMD, backed up by long-range theater systems. Third, continue to develop true theater defense systems; that is, systems which have a range of hundreds of kilometers such as the Navy's Aegis and the Army's THAAD systems, preventing TBMs from getting close to their intended target.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Innovative Liner Concepts
The study of normal impedance of perforated plate acoustic liners including the effect of bias flow was studied. Two impedance models were developed by modeling the internal flows of perforate orifices as infinite tubes with the inclusion of end corrections to handle finite length effects. These models assumed incompressible and compressible flows, respectively, between the far field and the perforate orifice. The incompressible model was used to predict impedance results for perforated plates with percent open areas ranging from 5% to 15%. The predicted resistance results showed better agreement with experiments for the higher percent open area samples. The agreement also tended to deteriorate as bias flow was increased. For perforated plates with percent open areas ranging from 1% to 5%, the compressible model was used to predict impedance results. The model predictions were closer to the experimental resistance results for the 2% to 3% open area samples. The predictions tended to deteriorate as bias flow was increased. The reactance results were well predicted by the models for the higher percent open area, but deteriorated as the percent open area was lowered (5%) and bias flow was increased. A fit was done on the incompressible model to the experimental database. The fit was performed using an optimization routine that found the optimal set of multiplication coefficients to the non-dimensional groups that minimized the least squares slope error between predictions and experiments. The result of the fit indicated that terms not associated with bias flow required a greater degree of correction than the terms associated with the bias flow. This model improved agreement with experiments by nearly 15% for the low percent open area (5%) samples when compared to the unfitted model. The fitted model and the unfitted model performed equally well for the higher percent open area (10% and 15%).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Estimating the Effects of Radio Frequency Identification Tagging Technologies on the Army's War-Time Logistics Network
Some civilian business practices, such as radio frequency identification (RFID) tags, were used for the first time by the Army in a major conflict during Operation Iraqi Freedom (OIF). RFID tags were attached to every container and pallet in all sustainment shipments entering and exiting the area of operations (AOR). Although RFID tagging was somewhat successful during OIF, the logistics network still suffered significant problems, to include lack of asset visibility and ineffective theater distribution. Implementing business practices on the battlefield seems like an easy answer to these problems, but the implementation of RFID tags may or may not easily transition to a military of combat environment. The purpose of this research was to discover if the business practice of using RFID tags to track equipment and supplies could be effectively used in a war-time environment by the Army's logistics network.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Automatic Target Recognition Classification System Evaluation Methodology
This dissertation research makes contributions towards the evaluation of developing Automatic Target Recognition (ATR) technologies through the application of decision analysis (DA) techniques. ATR technology development decisions should rely not only on the measures of performance (MOPs) associated with a given ATR classification system (CS), but also on the expected measures of effectiveness (MOEs) of the potential end product. The purpose of this research is to improve the decision-making process for ATR technology development. The basis of the research is a decision analysis framework that allows decision-makers in the ATR community to synthesize the performance measures, costs, and characteristics of each ATR system with the preferences and values of both the ATR evaluators and the warfighters.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Analysis of the Potential for Using Over-The-Horizon Radar Systems for Space Surveillance
The Australian Defence Force is investigating the development of a space surveillance system. While several dedicated facilities for space surveillance are in operation around the world, Australia's Over-The-Horizon Radar (OTHR) network has some potential for this role. The OTHR operates in the HF band and is constrained by the propagation effects of the ionosphere. A spherically stratified ionospheric model and a model for a nominal OTHR antenna are developed that allow calculation of path propagation, power distribution, and clutter returns. A software-based radar receiver processing system is modeled to determine detection probabilities and the minimum detectable radar cross-section of targets in typical low earth orbit (LEO) trajectories. The high clutter power levels, coupled with long target ranges and high velocities, mean that range-Doppler tradeoffs have a great impact on the resulting detection capabilities. While the system as modeled has the potential to provide some coverage for LEO targets, operational constraints mean the necessary conditions for detection of space targets would rarely be met while the system is involved in traditional OTHR tasking. Further, the long wavelengths and large antenna beams mean the accuracy of any positioning information is low.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Combat Aerial Vehicles
With the success of Unmanned Aerial Vehicles (UAV) in Operations Allied Force, Enduring Freedom, and Iraqi Freedom, many in Congress and DoD are pushing to put more UAV capability on the battlefield of tomorrow. More importantly, the desire is to have these UAVs shift from reconnaissance to offensive combat platforms commonly referred to as UCAVs (Unmanned Combat Aerial Vehicles). UCAV's first mission is Suppression of Enemy Air Defenses (SEAD) and its complementary mission of Electronic Warfare (EW) sometimes referred to as jamming. Early support for these particular missions can be traced to a couple of factors. The first is the need to supplement and eventually replace the current Low Density/High Demand (LD/HD) manned systems such as the F-16CJ for SEAD and the EA-6B for EW. While these assets are limited in quantity, they are also artificially limited in employment capability due to concern for the aircrew in the dangerous environment in which they are forced to operate. This paper investigates the UCAV alternatives, to include sensor and weapon technology, and then recommends a course of action. The challenges of making a UCAV that can do the same job as a manned aircraft cheaper and more effectively will be the key drivers in deciding whether this is the right direction.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Where's My GPS?
The United States possesses the most powerful military force in the world and the underpinning for that force is provided by the ubiquity of Positioning, Navigation and Timing (PNT) systems; the United States Air Force's Global Positioning System (GPS) is by far the most prevalent. The vast majority of US combat systems and capabilities, including foundational capabilities such as global situational awareness and precision long-range strike, heavily leverage the capabilities provided by GPS. However, by integrating GPS into every significant combat system, it is argued that the USAF has inadvertently created a vulnerability that will be exploited by future foes. The USAF and our joint partners cannot afford to operate without GPS and PNT capability and therefore must learn to operate through GPS and PNT degradation. To do so, the USAF must develop and nurture across its core competencies two critical capabilities: the ability recognize a degraded PNT environment and the ability to successfully operate in said environs. The threat should not be over-stated but neither should decision-makers and leaders wish away the challenges presented by operations in PNT degraded environments. Rather, a combination of mitigations such as testing, exercises, training, policy changes, material solutions and operational tactics, techniques and procedures must all be synchronized in a manner that guarantees that US combat forces are equipped and trained to achieve mission success in all PNT environments.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tension-Compression Fatigue of Hi-Nicalon/SiC Ceramic Matrix Composite at 1200 C in Air and Steam
The tension-compression fatigue of a Hi-Nicalon /Silicon Carbide ceramic matrix composite (CMC) was studied at 1200?簞C in laboratory air and in steam environment. The CMC investigated in this effort consisted of an oxidation inhibited HyprSiC matrix reinforced with laminated woven Hi-Nicalon fibers. Fiber preforms had pyrolytic carbon fiber coating with boron carbide overlay applied were then densified with the HyprSiC oxidation inhibited matrix through chemical vapor infiltration (CVI). The tensile stressstrain behavior was evaluated and the tensile properties measured at 1200?簞C. Tension-compression fatigue tests were conducted at a frequency of 1.0 Hz with a ratio of minimum stress to maximum stress of R = -1.0. Tension-compression fatigue behavior was studied for fatigue stresses ranging from 80 to 300 MPa in air and in steam. Fatigue run-out was defined as 2x10璽 繕 cycles. Fatigue limit (based on a run-out condition of 2x10璽 繕 cycles) was 80 MPa in air and in steam. The presence of steam decreased the fatigue life of specimens tested above the fatigue limit. Specimens that achieved fatigue run-out were subjected to tensile tests to failure to characterize the retained tensile properties. The material retained 100% of its tensile strength. Reduction in tensile modulus was 68% while the change in compressive modulus was negligible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Da Pam 750璽"1
The United States Army Publishing Directorate is the Army's leader in publishing and delivering informational products worldwide. Their main mission is to supply official authenticated information to enhance the readiness of the total force. Some product topics include: Army Regulations, Engineering Technical Manuals, Administrative Publications, Circulars and Pamphlets. This is one of their documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Structure-Property Relationships of Bismaleimides
The purpose of this research was to control and systematically vary the network topology of bismaleimides through cure temperature and chemistry (addition of various coreactants) and subsequently attempt to determine structure-mechanical property relationships. Characterization of the bismaleimide structures by dielectric, rheological, and thermal analyses, and density measurements was subsequently correlated with mechanical properties such as modulus, yield strength, fracture energy, and stress relaxation. The model material used in this investigation was 4,4'-BismaleiMidodIphenyl methane (BMI). BMI was coreacted with either 4,4'-Methylene Dianiline (MDA), o, o'-diallyl bisphenol A (DABA) from Ciba Geigy, or Diamino Diphenyl Sulfone (DDS). Three cure paths were employed: a low- temperature cure of 140 C where chain extension should predominate, a high-temperature cure of 220 C where both chain extension and crosslinking should occur simultaneously, and a low-temperature (140 C) cure followed immediately by a high-temperature (220 C) cure where the chain extension reaction or amine addition precedes BMI homopolymerization or crosslinking. Samples of cured and postcured PMR-15 were also tested to determine the effects of postcuring on the mechanical properties. The low-temperature cure condition of BMI/MDA exhibited the highest modulus values for a given mole fraction of BMI with the modulus decreasing with decreasing concentration of BMI. The higher elastic modulus is the result of steric hindrance by unreacted BMI molecules in the glassy state. The moduli values for the high- and low/high-temperature cure conditions of BMI/MDA decreased as the amount of diamine increased. All the moduli values mimic the yield strength and density trends. For the high-temperature cure condition, the room- temperature modulus remained constant with decreasing mole fraction of BMT for the BMI/DABA and BMI/DDS systems. Postcuring PMR-15 increases the modulus over that of the cured mateThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, United States Air Force (USAF) leaders have begun to emphasize space operations. Global Engagement: A Vision for the 21st Century Air Force states that we will eventually transition from an air and space force into a space and air force and various leaders have opined that that air and space are seamless. Gen Ronald R. Fogleman, USAF chief of staff, introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to accomplish F2T2E, the functions performed by the E-3 airborne warning and control system (AWACS) and the E-8 joint surveillance, target attack radar system (JSTARS) will need to migrate to space-based platforms. This study explores how such a migration would occur. Before examining space operations, the historical military need for moving tar-get indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft. Because space systems operate differ ently from airborne systems, those differences are explored. The organizations involved in space operations are also examined, along with their potential to effect the development of a space-based MTI system. The radar systems of both the AWACS and the JSTARS are described, as well as a few of the most promi nent of the proposed space-based systems. The planning for space-based MTI is in its early phases. A "Concept of Operations for Space-Based MTI" has been written, as has a "Space-Based MTI Roadmap." US Space Command has also written the Long Range Plan, which includes space-based MTI concepts in its plan for 2020. These plans are a good start but do not address several important issues, including satellite architec ture, whether satellite MTI systems should completely replace airborne systems, who should be responsible for the system, and how battle managers will operate in the new system.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Measuring the Operational Readiness of an Air Force Network Warfare Squadron
As part of its squadron activation, the 315th Network Warfare Squadron (NWS) requested assistance from the Air Force Institute of Technology in developing criteria for declaring Initial Operational Capability (IOC) and Full Operational Capability (FOC) to assess the unit's operational readiness. The research methodology included a review of current Department of Defense (DoD), Joint, and Air Force publications and instructions, as well as a review of three different unit activations: the new Air Force Cyberspace Command, an F/A-22 Fighter Squadron, and an Intelligence Squadron. By comparing the Joint Capabilities Integration and Development System (JCIDS) process and the Status of Resources and Training System (SORTS) process, it is clear that unit readiness is measured and reported by SORTS Category Levels (C-Level) to support wartime missions, not by IOC and FOC milestones. This paper reviews SORTS computations and provides a case study of a notional Air Force NWS to propose that any new cyber squadron should report operational readiness starting with C-5 for unit activation, then C-3 to declare initial operational readiness, and finally C-1 to declare full wartime mission readiness.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evaluation of a Methanol-Fueled (M85) Turbocharged Nissan Sentra
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Transforming U.S. Air Force Enlisted Aircraft Maintenance Training
How can the United States Air Force transform the way it trains a new generation of enlisted aircraft maintainers to support modern weapon systems despite a diminishing workforce? Infusing the latest commercial 3-D interactive computer technology into Air Force enlisted maintenance training programs capitalizes on the current generation's inherent technical skills, prepares them to work on advanced aircraft systems and saves scarce resources. From 1996 through 2003 the Air Force Audit Agency evaluated aircraft maintenance training in the Air National Guard, Air Force Reserve and active duty units and found all three require drastic improvements. An analysis of Bloom's Taxonomy on the cognitive, affective and psychomotor learning domains sets the groundwork for how the proliferation of computer technology improves knowledge, attitude and skills for young aircraft maintainers. The overall result is a transformation from antiquated classrooms used by previous generations to a digital classroom of the future that focuses on existing computer technologies. High-tech, interactive computer systems transform the way a new generation of Airmen learn aircraft systems and maintenance procedures. The Air Force produces a better trained maintenance workforce by slashing classroom time, increasing aircraft system knowledge and fostering greater interest in training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
EIA Technical Review Guidelines Non-Metal and Metal Mining
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling and Simulation for Readiness and Capability Assessment
The ability to assess military readiness and capability has been a problem for the Department of Defense, the Congress and military commanders. As recently as the Gulf War readiness reported by some units deploying to the Gulf was, in the words of the General Accounting Office, inflated and unreliable. Inflated and unreliable readiness reporting is a problem for the Department of Defense because it affects budget decisions and long range planning. It is a problem for the Congress because cost versus capability trade-offs are not articulated well. It is a problem for commanders who must depend on these forces in time of war or contingency. The problem exists because there has been no satisfactory objective means of objectively measuring readiness and capability. Objective methods of assessment have relied primarily upon input or resource based measurement tools. Since these provided only partial measures, subjective input was also required and often contradicted the objective data. Even worse, actual capability was sometimes not reflected by either the objective or subjective assessment. Advances in information technology along with the accompanying information explosion have made the use of modeling and simulation for readiness and capability assessment a viable method of assessing not only individual units but entire theaters of operation. These advances will allow the Department of Defense to compare force capability between different units based upon outcome oriented analysis. The ability to compare assessment results from year to year will help the Congress to understand what is purchased with the defense dollar and will allow peacetime exploration of unit and force cost versus readiness and capability tradeoffs. These same advances will allow the commander to objectively explore alternative force mixtures and courses of action prior to committing them with the added advantage that the same information and technology can provide a further step towardachievingThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Put the Joint Back in the Joint Strike Fighter
Short Takeoff Vertical Land (STOVL) technology existed for high-performance aircraft since the late 1960s, but the United States Air Force (USAF) elected not to acquire a STOVL fighter despite the United States Marine Corp (USMC) and coalition partners such as Great Britain and Italy investing in such fighters. The former Chief of Staff of the Air Force (CSAF) stated the USAF is interested in acquiring a STOVL variant (designated as the F-35B) of the Joint Strike Fighter (JSF) in addition to the F-35A, the USAF JSF variant.1 To date, the current CSAF has not reversed this decision but this may be due to the absence of a study that clearly states the advantages and disadvantages of the F-35B for the USAF. The USAF still needs a research project to examine this subject and clearly state the pros and cons.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
TM 5-698-4
The United States Army Publishing Directorate is the Army's leader in publishing and delivering informational products worldwide. Their main mission is to supply official authenticated information to enhance the readiness of the total force. Some product topics include: Army Regulations, Engineering Technical Manuals, Administrative Publications, Circulars and Pamphlets. This is one of their documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Simulation Modeling and Analysis of TNMCS for the B-1 Strategic Bomber
Simulation provides a method of modeling complex systems which would otherwise be impractical for quantitative experimentation. While other analytic techniques have been used to explore Total Non-Mission Capable [due to] Supply (TNMCS) rates, simulation offers a novel approach to discovering what aspects of the supply chain impact this metric. This research develops a discrete event simulation to investigate factors which affect TNMCS rates for the B-1B by modeling the core processes within the Air Force (AF) supply chain. A notional fleet of 16 aircraft at a single air base (Ellsworth AFB, SD) is modeled based on historical supply and maintenance data. To identify and quantify the effects of various factors, an experimental design is used for analyzing the output of our high-level discrete event simulation. Additionally, two different approaches to reporting and modeling Air Logistics Center (ALC) stockage effectiveness (SE) are compared to our baseline simulation. This exploration shows several factors which significantly impact TNMCS rates and have the potential to reduce them to their current targets.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Microhardness and Strain Field Characterization of Self-Reacting Friction Stir and Plug Welds of Dissimilar Aluminum Alloys
Friction stir welding (FSW) is a solid state welding process with potential advantages for aerospace and automotive industries dealing with light alloys. Self-reacting friction stir welding (SR-FSW) is one variation of the FSW process being developed at the National Aeronautics and Space Administration (NASA) for use in the fabrication of propellant tanks. Friction plug welding is used to seal the exit hole that remains in a circumferential SR-FSW. This work reports on material properties and strain patterns developed in a SR-FSW with a friction plug weld. Specifically, this study examines the behavior of a SR-FSW formed between an AA 2014-T6 plate on the advancing side and an AA 2219-T87 plate on the retreating side and a SR-FSW (AA 2014-T6 to AA 2219-T87) with a 2219-T87 plug weld. This study presents the results of a characterization of the micro-hardness, joint strength, and strain field characterization of SR-FSW and FPW joints tested at room temperature and cryogenic temperatures.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Thermomechanical Response of Shape Memory Alloy Hybrid Composites
This study examines the use of embedded shape memory alloy (SMA) actuators for adaptive control of the thermomechanical response of composite structures. A nonlinear thermomechanical model is presented for analyzing shape memory alloy hybrid composite (SMAHC) structures exposed to steady-state thermal and dynamic mechanical loads. Also presented are (1) fabrication procedures for SMAHC specimens, (2) characterization of the constituent materials for model quantification, (3) development of the test apparatus for conducting static and dynamic experiments on specimens with and without SMA, (4) discussion of the experimental results, and (5) validation of the analytical and numerical tools developed in the study. Excellent agreement is achieved between the predicted and measured SAMHC responses including thermal buckling, thermal post-buckling and dynamic response due to inertial loading. The validated model and thermomechanical analysis tools are used to demonstrate a variety of static and dynamic response behaviors including control of static (thermal buckling and post-buckling) and dynamic responses (vibration, sonic fatigue, and acoustic transmission). and SMAHC design considerations for these applications. SMAHCs are shown to have significant advantages over conventional response abatement approaches for vibration, sonic fatigue, and noise control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Temperature Degradation Mechanisms in Polymer Matrix Composites
Polymer matrix composites are increasingly used in demanding structural applications in which they may be exposed to harsh environments. The durability of such materials is a major concern, potentially limiting both the integrity of the structures and their useful lifetimes. The goal of the current investigation is to develop a mechanism-based model of the chemical degradation which occurs, such that given the external chemical environment and temperatures throughout the laminate, laminate geometry, and ply and/or constituent material properties, we can calculate the concentration of diffusing substances and extent of chemical degradation as functions of time and position throughout the laminate. This objective is met through the development and use of analytical models, coupled to an analysis-driven experimental program which offers both quantitative and qualitative information on the degradation mechanism. Preliminary analyses using a coupled diffusion/reaction model are used to gain insight into the physics of the degradation mechanisms and to identify crucial material parameters. An experimental program is defined based on the results of the preliminary analysis which allows the determination of the necessary material coefficients. Thermogravimetric analyses are carried out in nitrogen, air, and oxygen to provide quantitative information on thermal and oxidative reactions. Powdered samples are used to eliminate diffusion effects. Tests in both inert and oxidative environments allow the separation of thermal and oxidative contributions to specimen mass loss. The concentration dependency of the oxidative reactions is determined from the tests in pure oxygen. Short term isothermal tests at different temperatures are carried out on neat resin and unidirectional macroscopic specimens to identify diffusion effects. Mass loss, specimen shrinkage, the formation of degraded surface layers and surface cracking are recorded as functions of exposure time.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Comparison of Variance-to-Mean Ratio Methods for Reparables Inventory Management
In an effort to improve aircraft availability, this research compared the efficiency of ten methods of determining variance-to-mean ratios (VTMRs, VMRs, V/Ms) for repairable, spare aircraft parts known as reparables. These methods are base pipeline quantity, Hill-Stevens (220 LRUs), a variation of Hill-Stevens (10 1s), Hill-Stevens (230 LRUs), the Sherbrooke, a variation of Sherbrooke (10 1s), historical data, a new regression function, variance-to-mean ratio equals 1.00 or variance-to-mean ratio equals 1.01. Using VTMRs derived from quarterly organizational intermediate maintenance (OIM) demands for line-replaceable units (LRUs) from the D200A Secondary Item Requirement System (SIRS) databases in aircraft sustainability model scenarios and Excel spreadsheet simulation, this research concluded the VTMRs have an impact on aircraft availability and the cost of inventory.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Non-Cooperative Detection of Frequency-Hopped GMSK Signals
Many current and emerging communication signals use Gaussian Minimum Shift Keyed (GMSK), Frequency-Hopped (FH) waveforms to reduce adjacent-channel interference while maintaining Low Probability of Intercept (LPI) characteristics. These waveforms appear in both military (Tactical Targeting Networking Technology, or TTNT) and civilian (Bluetooth) applications. This research develops wideband and channelized radiometer intercept receiver models to detect a GMSK-FH signal under a variety of conditions in a tactical communications environment. The signal of interest (SOI) and receivers have both fixed and variable parameters.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Uninhabited Combat Aerial Vehicles
When US Air Force Capt Scott O'Grady's F-16 was shot down over Bosnia in June 1995, Americans watched anxiously as aircraft and helicopters searched for the missing pilot. When O'Grady was retrieved safely from a Balkan forest, television networks cut to special bulletins.Two months later, an Air Force reconnaissance aircraft also crashed in hostile territory. No attempt to search for the crew was made. The incident rated two lines near the back of most newspapers. Rather than dodging Serbs and eating bugs to survive comfortably, the operators of the Predator unmanned airplane were sitting in an air-conditioned shelter at the USAF's base at Aviano, Italy.-Bill SweetmanPopular Science Bill Sweetman's description of Capt Scott O'Grady's rescue highlights the fact that today's United States (US) military leaders must be sensitive to political and social pressures to keep friendly casualties to a minimum. The loss of a single airman can have a tremendous effect on an entire military operation. Leaders must also contend with shrinking force structures and decreasing military budgets, while the US armed forces remain engaged around the world and across the conflict spectrum. They must find ways to "do more with less." These realities, which are unlikely to change in the foreseeable future, are forcing military leaders to seek new ways to carry on with the business of the United States; and the unmanned aerial vehicle (UAV) is a possible solution to this dilemma.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Directed Energy Weapon System for Ballistic Missile Defense
Ballistic missiles carrying nuclear weapons and the proliferation of nuclear weapons represent two of the gravest threats to the security of the United States, its service members, and allies. It may come as no surprise that the international threat environment the U.S. will face for many decades to come will be fundamentally different from the Cold War era and different from today's global fight against terrorist organizations and extremism. The list of global actors who possess ballistic missiles or seek to acquire the technology has grown exponentially over the years from a total of nine countries in 1972 to 33 countries today. Rogue states, chief among them North Korea and Iran, continue to place a premium on the acquisition of nuclear weapons technology and the platforms to delivery them. Both India and Pakistan have active nuclear programs and North Korea solidified its position in the world as a nuclear-capable state. While Russia contains that world's second largest nuclear stockpile, China possesses the world's most active ballistic missile development program.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Persistent Space Situational Awareness
In the decades since the space program first began, the United States has become more and more dependent on space across a broad spectrum of military, commercial, and civil applications. That dependence brings with it an inherent vulnerability, and recent evidence of the growing threat, combined with acknowledged gaps that exist in our ability to rapidly characterize and attribute attacks on our satellites results in a compelling need for a robust space situational awareness (SSA) capability. The Distributed Real-time Awareness Global Network in Space (DRAGNETS) is one solution that leverages the trend toward distributed, networked military capabilities that nanotechnology will enable within the next 20 years. The DRAGNETS approach uses distributed constellations of thousands of very small sugar cube-sized femtosats to maintain continual cognizance of the space environment. Current and future advances in nanotechnology will lead to substantial miniaturization of satellite functions and allow the Air Force to field flexible, adaptive, and responsive systems as part of an overall SSA architecture. In order to realize the DRAGNETS vision, the Air Force should plan phased investments leading to an operational assessment of a prototype DRAGNETS constellation at a technology readiness level of 7 by 2025. The end result will be a capability that, when integrated with existing ground and space-based SSA assets, provides Combatant Commanders and senior decision makers with the necessary awareness to preserve maximum flexibility in the use of US space capabilities.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Stealth
This paper traces the development of stealth as an example of the way in which technology is invented, selected, acquired, and employed by the U.S. Armed Forces. The relationship between technology and the American culture that uses it is the foundation of the discussion. Stealth, as a specific technology, is traced from the prominent position of technology in the American way of war through its employment on the battlefield in Operation DESERT STORM. Lessons from this development highlight the different levels of success achieved by the American way of war as contrasted to the American way of acquisition. Finally, doctrine technology application, future opportunities, and limitations are explored in an effort to flesh out a comprehensive view of how the development of stealth contributed to the American way of war and what lessons can be applied to the key supporting element, the American way of acquisition. The apparent effectiveness of the application of stealth technologies should not imply that the same level of success was achieved in the acquisition of those technologies. The seemingly unplanned convergence of basic research, a well understood requirement, a number of supporting technologies, and the right entrepreneur is compared to a robust application of stealth technology to combat through the medium of doctrine. The author concludes that doctrine does not have the same effect on the technology process selection as it has on its application and that the importance of the human element to technology development has not diminished, but continues to grow.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tests of Centrifugally Cast Steel
"Tests of Centrifugally Cast Steel" (1921) presents a detailed examination of the properties and performance of steel produced using the centrifugal casting method. Authored by G. K. Burgess, this work contributes to the field of metallurgy and mechanical engineering, providing valuable insights into the characteristics of centrifugally cast steel. The study likely includes comprehensive testing procedures, analysis of material properties, and comparisons to traditionally cast steel. This volume offers a historical perspective on early 20th-century steel manufacturing techniques and their impact on industrial applications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Hypersonic Global Strike Feasibility and Options
This paper explores the feasibility of hypersonic weapons and aircraft as global strike options in the 2035 timeframe. The paper proposes there are currently two limitations or gaps in U.S. prompt global strike capabilities; timeliness, and increasingly the ability to gain access to the highly-defended target area. Additionally, the USAF has a long history of using advanced technology to stay ahead of the threat defense systems and gaining access to target sets, and by 2035, anti-access and area denial (A2/AD) technologies will increasingly threaten the USAF ability to hold any target on the globe at risk. Therefore, given the fact that technologies will continue developing to diminish and deny the advantages of stealth and space assets, could speed once again allow access to denied, heavily defended targets and close the gap for prompt global strike by 2035? The analysis begins with a brief overview of past hypersonic programs and reveals the lack of coherent government policy or USAF confidence in future military utility for hypersonic weapons or aircraft.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space 2035
Space capabilities are vital to United States national power, commerce, science, and prestige. These capabilities will grow even more vital to the United States' and the global economy by 2035. What will the space technology and operating environment look like in 2035? Technology trends in two fundamental areas -- spacecraft and space transportation -- indicate space technologies, capabilities, products, and services will become far more affordable, ubiquitous, globally available, and interconnected. By 2035, the Space Cloud will emerge. Analogous to the network model of cloud computing, the primary nodes of the Space Cloud will be globally accessible, space-based, have access to virtually limitless solar power resources, possess a global high altitude field of regard, and will be both distributed and collaborative.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Employment of Unmanned Aircraft Systems for Canadian Forces Anti-Submarine Warfare
Fixed-wing Unmanned Aircraft Systems (UAS) technology has experienced exponential growth over the past 10-15 years and is now employed as an intelligence, surveillance, and reconnaissance (ISR) asset by virtually every modern military force in the world, as well as by civil law enforcement agencies. Currently, more than 30 nations are developing or manufacturing more than 250 models of UAS. Substantial commercial market growth and competition in fixed wing UAS platforms for military and law enforcement applications resulted in a wide variety of UAS platforms from small, hand-launched aircraft that operate at low altitudes for short-duration, to large, complex turbo-prop and jet powered aircraft capable of long-endurance operations at medium and high altitudes. Employment of Medium-Altitude, Long-Endurance (MALE) and High-Altitude, Long Endurance (HALE) UAS in the anti-submarine warfare (ASW) role is rapidly becoming feasible through emerging technologies and expanded payload capacities, the most significant of which are secure high-bandwidth Beyond Line of Sight (BLOS) satellite datalink communications, miniature light-weight sonobuoys, and real-time shore-based acoustic processing. As a result, UAS may be a technically feasible future Canadian Forces (CF) ASW capability as a complementary or stand-alone alternative to manned fixed-wing and rotary-wing maritime ASW platforms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Treatise on Military Small Arms and Ammunition, With Theory of the Motion of a Rifle Bullet
The collections contained within the Combined Arms Research Library Digital Library are largely composed of digital versions of paper documents from the Combined Arms Research Library collections and student papers produced at the US Army Command and General Staff College. The documents in this collection cover the areas on the Vietnam Conflict, Korean War, and the U.S. Civil War, to name a few. This is one of those documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Achieving Decision Making Superiority
The USAF is making a commitment to dominate the cyberspace domain in the same manner it dominates the air and space domains. This commitment comes during a time of accelerating growth in technology. If the current acceleration in technology continues, by the year 2025 defending U.S. cyberspace equity will require speed only available through automation of our cyber systems and decision making processes. To fly, fight and win in cyberspace the USAF should prepare for an OODA loop (observe, orient, decide, and act) measured in microseconds. Who will harness the capabilities of the cyber domain and integrate them with existing air and space capabilities? The infrastructure to protect our networks exists, but where is the cadre of cyber warriors (CW) to be educated? The accelerating pace of change in cyber technology brings new capabilities and increased availability for all players from nation states to small terrorist cells and criminals. This paper examines the need for the USAF to combine the specialized skills of CW with tactical genius and a warrior culture in a Cyber Weapons School (CWS).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
TM 5-698-2
The United States Army Publishing Directorate is the Army's leader in publishing and delivering informational products worldwide. Their main mission is to supply official authenticated information to enhance the readiness of the total force. Some product topics include: Army Regulations, Engineering Technical Manuals, Administrative Publications, Circulars and Pamphlets. This is one of their documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Temperature Coarsening of Cr2Nb Precipitates in Cu-8 Cr-4 Nb Alloy
A new high-temperature-strength, high-conductivity Cu-Cr-Nb alloy with a CrNb ratio of 2:1 was developed to achieve improved performance and durability. The Cu-8 Cr4 Nb alloy studied has demonstrated remarkable thermal and microstructural stability after long exposures at temperatures up to 0.98 T(sub m). This stability was mainly attributed to the slow coarsening kinetics of the Cr2Nb precipitates present in the alloy. At all temperatures, the microstructure consists of a bimodal and sometimes trimodal distribution of strengthening Cr2Nb precipitates, depending on precipitation condition, i.e. from liquid or solid solution, and cooling rates. These precipitates remain in the same size range, i.e. large precipitates of approximately I pm, and small precipitates less dm 300 nm, and effectively pin the grain boundaries thus retaining a fine grain size of 2.7 micro-m after 100 h at 1323 K. (A relatively small number of Cr-rich and Nb-rich particles were also present.) This grain boundary pinning and sluggish coarsening of Cr2Nb particles explain the retention of good mechanical properties after prolonged holding at very high temperatures, e.g., 75% of the original hardness after aging for 100 h at 1273 K. Application of LSW-based coarsening models indicated that the coarsening kinetics of the large precipitates are most likely governed by grain boundary diffsion and, to a lesser extent, volume diffusion mechanisms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
How Lumber is Graded
"How Lumber is Graded," Volume 64, by Harold S. Betts, offers a detailed exploration of the processes and standards involved in evaluating lumber quality. Originally published in 1920, this book provides valuable insights into the historical practices of the timber industry and the criteria used to classify lumber for various applications. It is an essential resource for anyone interested in forestry, woodworking, construction, or the history of material sciences. This volume details the specific characteristics considered when grading lumber, offering both historical context and practical knowledge for professionals and enthusiasts alike.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Estimating the Effects of Radio Frequency Identification Tagging Technologies on the Army's War-Time Logistics Network
Some civilian business practices, such as radio frequency identification (RFID) tags, were used for the first time by the Army in a major conflict during Operation Iraqi Freedom (OIF). RFID tags were attached to every container and pallet in all sustainment shipments entering and exiting the area of operations (AOR). Although RFID tagging was somewhat successful during OIF, the logistics network still suffered significant problems, to include lack of asset visibility and ineffective theater distribution. Implementing business practices on the battlefield seems like an easy answer to these problems, but the implementation of RFID tags may or may not easily transition to a military of combat environment. The purpose of this research was to discover if the business practice of using RFID tags to track equipment and supplies could be effectively used in a war-time environment by the Army's logistics network.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Achieving Decision Making Superiority
The USAF is making a commitment to dominate the cyberspace domain in the same manner it dominates the air and space domains. This commitment comes during a time of accelerating growth in technology. If the current acceleration in technology continues, by the year 2025 defending U.S. cyberspace equity will require speed only available through automation of our cyber systems and decision making processes. To fly, fight and win in cyberspace the USAF should prepare for an OODA loop (observe, orient, decide, and act) measured in microseconds. Who will harness the capabilities of the cyber domain and integrate them with existing air and space capabilities? The infrastructure to protect our networks exists, but where is the cadre of cyber warriors (CW) to be educated? The accelerating pace of change in cyber technology brings new capabilities and increased availability for all players from nation states to small terrorist cells and criminals. This paper examines the need for the USAF to combine the specialized skills of CW with tactical genius and a warrior culture in a Cyber Weapons School (CWS).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Passive Geolocation of Low-Power Emitters in Urban Environments Using TDOA
Low-power devices such as key fobs, cell phones, and wireless routers are commonly used to control Improvised Explosive Devices (IEDs) and as communications nodes for command and control. Quickly locating the source of these signals is difficult, especially in an urban environment where buildings and towers can cause interference. This research presents a geolocation system that combines the attributes of several proven geolocation and error mitigation methods to locate an emitter of interest in an urban environment. The proposed geolocation system uses a Time Difference of Arrival (TDOA) technique to estimate the location of the emitter of interest. Using multiple sensors at known locations, TDOA estimates are obtained by cross-correlating the signal received at all the sensors. A Weighted Least Squares (WLS) solution is used to estimate the emitter's location.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Prepositioned Trailers for Aircraft Battle Damage Repair Support
Air superiority is essential in today's wartime environment. Aircraft that are damaged and not returned to combat can have a considerable impact on the quest for dominance in the air. To maintain operational effectiveness, an organization must have the capability to quickly repair damaged aircraft. The purpose of an Aircraft Battle Damage Repair (ABDR) program is to rapidly and effectively repair damaged aircraft to fly additional operational sorties and further contribute to wartime objectives. This capability must consist of providing the necessary tools and equipment for the rapid repair of aircraft. When an ABDR team deploys in support of an organization in a wartime environment, it is expected that the team will be fully functional, autonomous, and have on hand the resources necessary to complete all tasks. From a logistics standpoint, this is a feasible objective using different methods, with the present method used being prepositioning. During combat operations, Air Mobility Command (AMC) is heavily tasked with movement of personnel and equipment. The prepositioning of ABDR trailers could provide relief on AMC resources already strained to their limits. This research seeks to determine if the AF should continue to preposition ABDR trailers to augment strategic airlift during combat operations by determining the best course of action for providing ABDR trailers to ABDR teams during combat operations. This research will evaluate the effectiveness of both prepositioning and airlifting ABDR trailers.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
TM 5-698-2
The United States Army Publishing Directorate is the Army's leader in publishing and delivering informational products worldwide. Their main mission is to supply official authenticated information to enhance the readiness of the total force. Some product topics include: Army Regulations, Engineering Technical Manuals, Administrative Publications, Circulars and Pamphlets. This is one of their documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Guide to the Biosolids Risk Assessments for the EPA Part 503 Rule
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Oxidation Kinetics of Continuous Carbon Fibers in a Cracked Ceramic Matrix Composite
Experimental observations and results suggest two primary regimes as a function of temperature, i.e., diffusion and reaction controlled kinetics. Thermogravimetric analysis of carbon fiber in flowing oxygen gave an activation energy of 64.1 kJ/mol in the temperature range of 500 to 600 C and an apparent activation energy of 7.6 kJ/mol for temperatures from 600 to 1400 C. When C/SiC composite material was unstressed, matrix effects at temperatures from 900 to 1400 C protected the internal fibers. When under stress, self-protection was not observed. Increasing the stress from 10 to 25 ksi caused a 67 to 82 percent reduction in times to failure at temperatures from 750 to 1500 C. Based on experimental results, observation, and theory, a finite difference model was developed, which simulates the diffusion of oxygen into a matrix crack that is bridged by carbon fibers. The model allows the influence of important variables on oxidation kinetics to be studied systematically, i.e., temperature, reaction rate constant, diffusion coefficient, environment, and sample geometry.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Prediction of Long-Term Strength of Thermoplastic Composites Using Time-Temperature Superposition
Accelerated tests for composite failure were investigated. Constant ramp transverse strength tests on thermoplastic composite specimens were conducted at four temperatures from 300 F to 450 F and five duration times from 0.5 sec to 24 hrs. Up to 400 F, the time-temperature-superposition method produces a master curve allowing strength at longer times to be estimated from strength tests conducted over shorter times but at higher temperatures. The shift factors derived from compliance tests applied well to the strength data. To explain why strength behaved similar to compliance, a viscoelastic fracture model was investigated based on the hypothesis that the work of fracture for crack initiation at some critical flaw remains constant with time and temperature. The model, which used compliance as input, was found to fit the strength data only if the critical fracture energy was allowed to vary with stress rate. Fracture tests using double cantilever beam specimens were conducted from 300 F to 450 F over time scales similar to the strength study. The toughness data showed a significant change with loading rate, less variation with temperature, did not form a master curve, and could not be correlated with the fracture model. Since the fracture model did not fit the fracture data, an alternative explanation based on the dilatational strain energy density was proposed. However the usefulness of this model is severely limited because it relies on a critical parameter which varies with loading rate.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Airborne Directed Energy Weapon Applications for Special Operations Forces
The purpose of this research effort is to investigate and analyze high energy laser and high power microwave directed energy technologies that could enhance special operations forces (SOF) warfighting capabilities within the next 10-15 years. The primary objective of this paper is to present an assessment of the potential military utility of these technologies in support of SOF warfighting roles and missions. The intent of this paper is to offer a broad, strategic perspective on the ways in which directed energy technologies could transform the conduct of future special operations missions. Since the end of the Cold War, the Department of Defense (DOD) has embarked upon a number of efforts to reshape America's armed forces to meet a new set of security challenges. The process of re-tooling our armed forces has been an iterative one, and continues today under the banner of "defense transformation." This paper explores the concept of defense transformation, how directed energy technologies align with DOD transformation constructs, and how they might, or might not, support SOF transformation objectives and future warfighting requirements. To do this, operational measures of effectiveness (MOEs) are derived from various DOD, Air Force, and SOF transformation roadmaps, as well as Air Force and USSOCOM concepts of operation. Using these MOEs as a framework for analysis, this paper presents an assessment of the potential military utility and transformational value of directed energy technologies that could, one day, be developed into air-to-ground weapons for use by SOF strike platforms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.