Classification of Battlespace Detonations From Temporally Resolved Multi-Band Imagery and Mid-Infrared Spectra
The classification of battlespace detonations, specifically the determination of munitions type and size using temporal and spectral features, has been studied using near-infrared (NIR) and multi-color visible wavelength imagers. Key features from the time dependence of fireball size are identified for discriminating various types and sizes of detonation flashes. The five classes include three weights of trinitrotoluene (TNT) and two weights of an enhanced mixture, all of which are uncased and detonated with 10% C4. Using Fisher linear discriminant techniques, features are projected onto a line such that the projected points are maximally clustered for the different classes of detonations. Bayesian decision boundaries are then established on class-conditional probability densities. Feature saliency and stability are determined by selecting features that best discriminate while requiring low variations in class-conditional probability densities and high performance in independent testing.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Need for a Dedicated Space Vehicle for Defensive Counterspace Operations
This paper investigates the defensive counterspace function as defined in Air Force Doctrine Document 1 and considers whether an on-orbit capability is needed for its fulfillment. The discussion begins with the examination of threats to space systems, how they are likely to be attacked and the means with which to counter those attacks. The examination focuses on the space element and determines that a space-based defensive capability will be needed to protect orbital assets in the future. The defensive potential of ground-based systems and self-defending spacecraft are determined to be inadequate, leading to the conclusion that a dedicated, mission specific vehicle design is the best option for fulfilling the defensive counterspace function. Finally, preliminary considerations of vehicle design and mission capability indicate that the first iteration of this vehicle should be ground-stationed, reusable, and prepared to launch into earth orbit in time of heightened tensions or war to carry out the defensive counterspace mission.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Logging the JSF
Within the US Air Force, acquisition, operations, and logistics communities collectively face a perplexing question: What is the best way to plan the acquisition and life-cycle sustainment of a fighter aircraft fleet? To find the answer to this question the following thesis attempts to derive lessons learned from case study analysis to develop a new methodology for future use. Aircraft fleet size, in an acquisition program, is determined by assessing the capabilities necessary to meet current and future operational readiness demands. Aircraft sustainment, although equally important, is typically not considered during early procurement planning due to the difficulty in forecasting the sustainment infrastructure necessary to mitigate effects caused by aging and changing operational requirements. At best a nebulous endeavor, sustainment forecasting is affected by the myriad of dynamic organizational, technological, and budgetary influences caused by rigid DoD acquisition processes and inflexible Congressional appropriations cycles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Characterization of Functionally Graded Materials
The purpose of this study was to characterize the behavior of a functionally graded material through experimentation and analytical modeling. Functionally graded materials are a ceramic metal composite which transitions from metal on one face to ceramic on the opposite face. Creating reliable models required verifying the material properties. This was accomplished through the use of a static modulus of elasticity test as well as a dynamic ping test. The natural frequencies from the dynamic test were compared with finite element models to determine which material properties most accurately represented the functionally graded material. It was found that the material properties established experimentally by Hill and Lin produced the best models. A fracture surface was examined to determine the failure criteria for the prediction of failure in a cyclic loading scenario. It was determined that the material would fail in a brittle manner and the maximum principle stresses should be used to predict failure.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Protecting Commercial Space Systems
Key questions will address the impact on U.S. national security due to attacks on commercial space assets. What is the `real' impact of commercial space on the U.S. economy (not just spending)? How would loss of commercial space capabilities impact U.S. warfighting capability? What constitutes an attack on a commercial space system? How do we deter and detect an attack? How should the U.S. respond to such attacks, proportionally or massively? Finally, what policy and process changes are needed to protect our national security?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Integrating the B-2 Into Link 16 Operations
Network centric warfare is a key enabler to present day military operations. Link 16, a tactical data link, is one means that combat air forces utilize to leverage network centric warfare. In the past, the B-2 community relied on stove-piped communications systems, but now the B-2 is in the early stages of implementing a fully integrated Link 16 system. This paper will show that the current integration of Link 16 will enhance the B-2's overall mission effectiveness by decreasing aircrew workload, increasing situational awareness, and eliminating many opportunities for human error. However, the current Link 16 implementation also has several hurdles to overcome in order to be fully effective. These hurdles, which include implementing hardware and software improvements, maximizing training opportunities, and emphasizing a commitment to Link 16 use in combat operations, are also addressed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Determining the Surface-to-Air Missile Requirement for Western and Southern Part of the Turkish Air Defense System
An air defense system is vital for countries to protect their homelands. Today, air defense systems consist of integrated systems such as early warning radars, fighter aircraft, airborne early warning aircraft and surface-to-air (SAM) systems. The Turkish air defense system does not have long range SAM systems. Turkey plans to procure SAM systems to protect her borders. This research develops two location optimization models to optimally locate SAM sites to defend specified areas of the nation. One of the models finds the minimum number of SAM sites to cover the specified area; the other finds the maximum coverage for a given number of SAM sites. The model is formulated as an integer program, and the LINGO 10 software package is used to solve the model. Three candidate SAM systems are examined. All models use the maximum range of each SAM system. Solutions are presented for the decision makers to examine. Sensitivity analysis is used to explore how much the optimal solution(s) change given fluctuations in input values. The main objective of this research is to provide the Turkish Air Force coverage information regarding the three candidate SAM systems. This research also provides a model and an approach that can be used to examine other candidate systems. The results and models presented in this research should facilitate development of a more efficient and effective air defense system to support Turkey's homeland defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Sentinel Chameleon
Sentinel Chameleon: A Concept of Operations for Employment of Unmanned Aerial Systems for Persistent Information Operations in 2030 The year is 2031. Coalition Forces are conducting Foreign Internal Defense and stabilization operations at the request of a terrorist-plagued nation in North-East Africa. There have been credible threats of a Weapons of Mass Destruction (WMD) attack using conventional delivery methods; most likely in the form of a dirty bomb. There is no indication that the host country has an organic WMD capability. A Sentinel Chameleon (SENCHEON) constellation has been operating over a designated area for 37 hours where the coast and the borders of a neighboring country, known to deal in WMD materials, can be closely monitored. The Master Planning Tasking Command and Control Mission Lead (MPTC2ML) is a Marine Corps Joint Forces Commander established by Africa Command (AFRICOM) and has set up headquarters in the troubled country. The MPTC2 center is located in the Coalition Air Operations Center. The Combined Forces Maritime Component Commander (CFMCC), comprised of US Navy combatants from Commander FIFTH Fleet (C5F), has been conducting Maritime Interdiction Operations (MIO) from the straight of Babel Mandeb to the Northern Kenyan coast. Although piracy interdiction has been successful, the Navy's Visit Board Search and Seizure (VBSS) of suspect vessels has not yielded indications of Chemical Biological Radiological or Nuclear (CBRN) materials. The Combined Forces Land Component Commander (CFLCC) is providing support to boarder control authorities, but for the most part this responsibility has fallen to the host nation. WMD proliferation is growing and the threat to the FID operation is imminent. So, what kind of Unmanned Aerial System is SENCHEON? How is it different from any other? What can it do to help eliminate the threat?This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Power Microwaves
The conclusion of this study is that high power microwave technology is ready for the transition to active weapons in the U.S. military. It reviews various applications of high power microwave weapons in strategic and operational missions for the Air Force, considers the implications of the integration of microwave technology into operational weapons, and examines numerous constraints and challenges associated with the transition of new technologies and systems into the Air Force inventory. This study concludes that high power microwave weapons systems offer the prospect of significant offensive and defensive capabilities for all of the military services. The principal recommendations include the suggestion that the Department of Defense and the Air Force establish a High Power Microwave Systems Program Office for the purpose of developing these weapons and integrating them into the combatant commands. This systems program office should be a joint program office that involves the participa-tion of the Army, Navy, and Marine Corps as well as other agencies. Only then will the U.S. military be able to maximize the development of microwave applications, minimize costs, and facilitate the transition of this unique technology to the military services and other government agencies. Not only should defense contractors be encouraged to develop the technical capabilities that would permit them to participate in microwave weapons programs, but this study also concludes that all U.S. military systems should be hardened to protect them against the effects of microwaves.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Horizons
The one and only shot the US had against Osama bin Laden was all down to a new surveillance aircraft the CIA was still testing and evaluating at the time. Commanders decided putting the small unmanned drone, what was then called a UAV, through a little 'real world' experience might be interesting. The shot was not taken due to a mix of domestic political and diplomatic reasons. Indeed one problem was that the closest 'shooter' or USAF fighter would have had to violate allied airspace unannounced - a tough ask during an unstable nuclear stand-off between Pakistan and India.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Empowering First Responders
The terrorist attacks of September 11th, 2001, marked a watershed event for America. No longer can it be expected that the American military will fight our nations battles on foreign lands while America's populace is safe back in the homeland. Now, the new frontlines of this War on Terrorism are defined by where and when an attack happens; the new soldiers are America's first responders. Unfortunately, as 9-11 demonstrated, these new frontline warriors do not fully possess the tools, training, or most importantly, the interoperability that their military counterparts have perfected over the past several decades. Among these tools, communications capability represents the most important force multiplier on the battlefield. For the first responder, communications capability is absolutely essential. One emerging communications and data-sharing tool that can greatly empower first responders, and provide them with greater situational awareness and decision superiority, is Peer-to-Peer Technology (P2P). P2P technology allows two or more computers to establish direct contact without a central entity. Such technology provides a rapidly established, flexible, and dynamic architecture. Moreover, it provides a robust, reliable, and distributed information-sharing capability for homeland security applications. US Northern Command (USNORTHCOM) represents the Department of Defense's operational command for Homeland Security. One of its key missions is to provide military assistance to civil authorities, including consequence management operations during terrorist attacks.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Environmental Life Cycle Assessment of Coal-Biomass to Liquid Jet Fuel Compared to Petroleum-Derived JP-8 Jet Fuel
The United States (U.S.) imported 57 percent of the petroleum products that it consumed in 2008. The Department of Defense (DOD) and in particular, the United States Air Force (USAF), consumes a large amount of oil to support the mission of defending the U.S. According to the USAF energy policy, by 2016, the Air Force (AF) must be prepared to cost competitively acquire 50 percent of its domestic aviation fuel requirement via an alternative fuel blend in which the alternative component is derived from domestic sources produced in a manner that is "greener" than fuels produced from conventional petroleum. This study employed a life cycle assessment (LCA) tool known as Economic Input-Output Life Cycle Assessment (EIO-LCA) to compare the petroleum derived jet fuel of JP-8 to the alternative jet fuel of Coal-Biomass to Liquid (CBTL) to determine which was "greener" by determining the total global warming potential (GWP) over each jet fuels' entire life cycle. The CBTL jet fuel was determined to be "greener" for the environment with utilizing carbon capture and storage (CCS) via the Fischer Tropsch (FT) synthesis process when producing liquid jet fuel from coal and swithchgrass as the biomass.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Bioactive Glass Materials for Biological Applications
This book envelopes the complexities, challenges, and advancement in developing new class of bioactive materials for versatile applications. It outlines the materials involved, bioactivity against bioinert materials, phase change materials, biomolecular nature, synthetic biodegradable polymers, and bioactive glasses.
Coverage of Continuous Regions in Euclidean Space Using Homogeneous Resources With Application to the Allocation of Phased Array Radar Systems
Air surveillance of United States territory is an essential Department of Defense function. In the event of an incoming aerial attack on North America, the DoD, Department of Homeland Security, and Federal Aviation Administration surveillance capabilities are critical to discovering and tracking the threat so that it can be eliminated. Many of the currently used surveillance radar will reach the end of their design life within ten to twenty years. By replacing the current radar network with a single integrated network of Multifunction Phased Array Radar (MPAR) units, surveillance capabilities can be enhanced and life cycle cost can be reduced. The problem of determining the location of required MPAR units to provide sufficient air surveillance of a given area is a large problem that could require a prohibitively long time to solve. By representing the area of surveillance as a polygon and the MPAR units as guards with a defined circle of detection, this problem as well as similar surveillance or coverage problems can be expressed with easily adjustable parameters. The problem of covering the interior and exterior of a polygon region with a minimal number of guards with homogeneous capabilities is not well researched. There are no methods for determining the minimal number of guards required to cover the interior and exterior of a polygon at a desired coverage level less than 100 percent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Comparison Study of F-15C Fighter Squadron Ready Aircrew Program Flying Hour Scheduling vs. the RAND Corporation's Flying Hour Scheduling Linear Program
This research compares and contrasts the Flying Hour model created by the RAND corporation with the Ready Aircrew Program (RAP) model from Air Combat Command. The RAP model was designed to generate an annual flying hour program that specifies the minimum number of sorties required to stay tactically safe. The RAND model was designed to provide fighter pilots 13 sorties per month, a number determined from surveys of combat aviation leadership. The RAND model is built on the assumption that the fighter pilots would be immediately ready to deploy to a combat situation. In contrast, squadrons using the RAP model must take extra sorties and time to get fighter pilots ready for war. This research recommends an increase to AFI 1-2F-15V1 annual pilot requirements. This plus-up will increase average monthly sorties for combat mission ready API-1 pilots to the Air Force Safety Center recommended 11 flights per month at a flying hour cost of approximately $1.7 million per squadron.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Strikestar 2025
The United States military of the year 2025 will need to deal with a widevariety of threats in diverse parts of the world. It will be faced withbudgetary restraints that will dictate system trades favoring those militaryelements that offer utility over a wide spectrum of conflict and add to theability to project power over long distances. The United States military of the year 2025 will also exist in a social and political environment that willdictate the need to minimize United States personnel losses and enemy collateral damage.An opportunity exists to exploit planned advances in intelligence, surveillance, reconnaissance, and the development of unmanned aerial vehicles (UAV) to address future military needs. Through all-source, coordinated intelligence fusion, it will be possible to supply the war fighter with all-weather, day or night, near-perfect battlespace awareness. This information will be of precision targeting quality and takes advantage of multiple sources to create a multidimensional view of potential targets. Early in the twenty-first century, reconnaissance UAVs will mature to the extent that reliable, long-endurance, high-altitude flight will be routine, and multiple, secure command and control communications links to them will have been developed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Airborne Platforms for Emergency Communications and Reconnaissance in Domestic Disaster Response
Since the 19th century, aircraft have played a significant role in military operations worldwide. From the use of observation balloons in the American Civil War, to the introduction of jet-powered aircraft in World War II, to the advent of remotely piloted aircraft (RPA) like the Reaper and Global Hawk, the role of aircraft has been ever expanding as technology advances in our nation's Air Force. One of the initial roles of military of aircraft was to provide intelligence, surveillance and reconnaissance (ISR) to battlefield commanders. That role continues today in a variety of situations. One of those situations is disaster response in the continental United States. US Air Force aircraft and sensor technology can provide detailed imagery and video of affected areas to assist with relief efforts. These aircraft can also be used to assist in another critical area of disaster response: communications restoral. Multi-role aircraft, manned, unmanned, and remotely piloted can be used to provide this ISR capability and provide communications service to an area affected by a disaster. Responding to a US Northern Command requirement, this research paper will explore which types of airborne platforms, to include airships, tethered aerostats, traditional heavier than air remotely piloted platforms, and others, can provide emergency communications and wide area surveillance both prior to a disaster situation, and during the US Government's response operations. The US Government response to Hurricane Katrina will be used as a case study to determine exactly what communications and ISR capabilities will be required to support disaster response operations. Lessons learned from Hurricane Katrina will also be explored.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Talking Back
The information age is altering weapon system development and improvement. Information communications, storage, and computing technologies will revolutionize system development, operations, maintenance, and logistic processes. Based on the so-called laws of Gilder, Metcalfe and Moore and current DoD weapons trends the futures of these technologies provide opportunities to progress the paradigm of weapons development and improvement.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
An Analysis of the Air Force Basic Communications Officer Training Course
In 1998, the Aerospace Communications and Information Expertise (ACE) program was implemented to provide a common operational foundation for new Air Force Communications and Information officers. Training's crucial role in providing Air Force effectiveness and efficiency in the officer corps is demonstrated by the formal training courses new officers are required to attend for instruction in their jobs. The importance of training, and subsequent training evaluation, is evident for two significant reasons: the skills required by Air Force Communications and Information officers and the amount of investment in training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Enabling Battlespace Persistent Surveillance
In 2025, the military's need for persistent surveillance applications will extend beyond current airborne platforms such as Global Hawk and Predator. The future of 2025 contains potential enemies with a material and information focus capable of conducting regular and irregular warfare on foreign lands as well as the continental United States. The US military must invest their energy and money today into researching enabling technologies such as nanotechnology, wireless networks, and micro-electromechanical systems (MEMS) to develop persistent surveillance applications such as Smart Dust for the future.The enabling aspects of these technologies, based in academia or business today, form the basis for the disruptive combat applications in the next 20 years. Nanotechnology, while fantastic in some aspects, reduces today's technology to the molecular level contributing to increased performance for the future. Facilitating globalization, wireless networks link people, computers, and sensors beyond the borders of nations without the need for costly hardware-intensive infrastructure. Finally, MEMS sense a wide array of information with the processing and communication capabilities to act as independent or networked sensors. Fused together into a network of nanosized particles distributed over the battlefield capable of measuring, collecting, and sending information, Smart Dust will transform persistent surveillance for the warfighter.With technological, social, and ethical challenges preventing growth, the US military should lead research, development, and education on these enabling technologies to realize the full benefits of Smart Dust by 2025. Through policy decisions, the United States, as the world's superpower, must continue to lead the development of innovative technologies to preserve the balance of power for the future.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Retaining Army Engineer Officers
Policy and doctrine require the U.S. Army to provide certain capabilities during the conduct of stability operations. The Department of Defense now considers stability operations as critical to success as offensive and defensive operations. Operations that require technical engineer capabilities, specifically infrastructure reconstruction operations, require a portion of the engineer officer corps to possess a technical engineering education. Trends in officer accessions and retention indicate a shortfall in technical engineering education among the engineer officer corps, casting doubt in the ability of the Engineer Regiment to meet anticipated future requirements. Senior engineer leaders identified these conditions and initiated a campaign to increase technical competence within the regiment. This monograph contributes to this effort by identifying factors that affect the retention of engineer officers who possess engineering degrees. The results of a survey of engineer officers at Fort Leavenworth reveal these officers possess lower job satisfaction than officers who possess non-engineering degrees and officers across the Army. These officers are more likely to believe their experiences in the Army did not match their pre-commissioning expectations contributing to perceived "psychological contract violations." The monograph suggests leaders conduct a series of studies over time to assess the effects of initiatives to increase technical competence within the Engineer Regiment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space Based Satellite Tracking and Characterization Utilizing Non-Imaging Passive Sensors
A technique is developed to determine the orbit of a sunlight illuminated satellite passing through the field-of-view of a sensor platform in a Highly Elliptical Orbit (HEO) and Geosynchronous orbit (GEO). The technique develops two different methods of initial orbit determination. The first relies on the Gauss initial orbit determination method to develop an estimate of the state from angular data. The second method relies on positional data of the target relative to the Earth's background to determine an estimate of the state. These estimates are then refined in a non-linear least squares routine. This estimate of the state is then used to identify the target from the Air Force Space Command satellite catalog.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Assessing Capabilities of the High Energy Liquid Laser Area Defense System Through Combat Simulations
High Energy Laser (HEL) technology continues to improve and its place in the battlefield is ever evolving. By combining the high energy delivery of solid state laser technology with the efficient thermal management of liquid laser technology, HELLADS has two main advantages over any HEL predecessors. One, the configuration is small and light enough to be carried on more tactical aircraft such as fighters. Two, the thermal management greatly increases HEL fire power by increasing dwell time on target. To assess HELLADS operational capabilities the test community has been challenged with how to effectively examine the advantages and limitations through a cost effective manner. Modeling and simulation supports this assessment as it yields itself easily to relatively low cost and robust testing methodologies. The challenge comes with building credible models through validation and verification of test parameters and scenarios. An Air Force Standard Analysis Toolkit model, the Extended Air Defense Simulation Model (EADSIM), is used in this study to meet these challenges. This research effort focuses on the assessment of the HELLADS operational capabilities through EADSIM. Of particular interest is the investigation of the envisioned HELLADS operational envelope and the potential advantages it offers over other HEL systems. Scenarios are applied to represent the Homeland Defense arena in which HELLADS is proposed to operate. Specifically this study explores what factors impact HELLADS effectiveness and suitability in the Homeland Defense scenarios examined.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Integrating Unmanned Aerial Vehicles With Current Combat Search and Rescue Doctrine
The events of September 11, 2001 brought home to the United States (U.S.) the realities of the Post Cold War World. With the realization that our Republic's armed forces are fighting a new type of enemy came a demand that the United States military defeat this new threat using every tool in our arsenal.1 The use of United States Air Force Predator Unmanned Aerial Vehicles (UAVs) and externally carried Hellfire anti-armor missiles against selected Taliban and al Qaeda targets was the first modern-day UAVs to do so in combat.2 This use of UAVs in a direct combat role, as opposed to their traditional Reconnaissance, Surveillance and Target Acquisition (RSTA) role, led me to the idea of using UAVs for other non-traditional roles in combat. As an Army UH-60 Black Hawk helicopter pilot, Combat Search and Rescue (CSAR) is an integral part of our Army Aviation mission. This is also true among the other services' rotary-wing and fixed-wing communities. A common problem among all the services, particularly the Air Force, is the limited amount of resources and manpower that are devoted to the CSAR mission. Under the current force structure, exactly 105 HH-60G Pave Hawks in the Air Combat Command inventory are too few to perform the potential number of missions required to support current operations.3 The rescues of Lieutenant Colonel Iceal Hambleton in Vietnam and Captain Scott O'Grady in Bosnia illustrate the difficulty associated with CSAR operations on the modern battlefield.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Engendering Cyber-mindedness in the USAF Cyber Officer Corps
The mission of the United States Air Force is to fly, fight and win...in air, space and cyberspace. The Air Force is the first military service in the Department of Defense to include the cyberspace operating domain as part of its mission. The Air Force has undergone notable changes to incorporate this new domain of operations, to include establishing a cyberspace numbered air force and creating a cyberspace career field. The Air Force converted all of its Communications and Information Officers into Cyberspace Operations Officers in April 2010. The Air Force, however, has not completed an in-depth analysis of what skills the officers in this new career field will need in order to face future cyberspace challenges. This new career field is an amalgamation of officers with different educational backgrounds and operational experiences. The essence of any organization is the culture among its members. An accepted definition of organizational culture is a shared set of beliefs among members of a group that establishes acceptable behavior by individuals within the group. When the Air Force recognized cyberspace as an independent operating domain it became important for the service to foster a cyber-minded culture. This research offers a better understanding of and recommendations for shaping a cohesive, operationally-oriented, and mature cyber-minded culture, which the Air Force desires for its new operating domain. To accomplish this goal, this research explores three context-specific cultural variables with regard to their influence on certain career fields in the Air Force's operating domains. Those variables are advocacy and mentorship, education and formal training, and divergence of career paths. Each of the variables plays a role in fostering cohesion, operational orientation, and maturity of domain-minded cultures. A study of the air- and space-minded cultures, with a careful focus on their maturation from their birth and early growth stages to organizational miThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Warfare
As we approach the dawn of the 21st century, success of our national security strategy will depend greatly on our ability to combat the Information Warfare (IW) threat. Old paradigms regarding conventional warfare must change to incorporate this new form of warfare. Our nation's growing dependency on information and information-based technologies has made IW a legitimate weapon for potential adversaries. The "information" and its support infrastructures are becoming extremely vulnerable to hostile attacks. Adversarial forces can now wage information-based warfare from anywhere in the world, and literally remain anonymous. Thus, our ability to recognize and defend against this new form of warfare is paramount to the survival of our national security infrastructure.The thesis of this research project is predicated upon the following premises: First, the exploitation of "information" as a weapon is changing the nature of warfare. Second, although there is much debate about the reality of the IW threat, this paper postulates that adversarial IW tactics pose a legitimate threat to our national security infrastructure. Finally, the Department of Defense (DOD), the Joint Staff, and the Services must remain actively committed to combating the IW threat in the 21st century.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Simulation Based Methodology to Examine the B-1B's AN/ALQ-161 Maintenance Process
This thesis looks at the maintenance procedures associated with the defensive electronic counter measure (ECM) system on the B-1B, designated the AN/ALQ-161. Computer simulation of the current line-replaceable-unit (LRU) maintenance network for Ellsworth AFB and Dyess AFB is modeled. In addition, two hypothetical repair networks are proposed and analyzed. This research considers the applicability of this type of computer simulation, using ARENA software to study the AN/ALQ-161 repair system. The contribution of this research is a discrete simulation methodology specific to the AN/ALQ-161 LRU repair line. Two response variables of interest were addressed, work-in-process and machine utilization. A total of 20 different repair scenarios were analyzed for the three different LRU networks simulated. A best-case scenario is selected from each model and the results are compared to one another.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Deep Battle Exploitation in Rapid Decisive Operations
This research offers new doctrine guiding use of airborne forces. The primary method was synthesizing past and current airborne doctrine and practice with recent advances in technology and capabilities to come up with a fresh look at solving airborne problems. The traditional problems encountered by airborne forces are fratricide, assembly delays, aircraft vulnerability to AAA, SAMs, and enemy aircraft, resupply, and vulnerabilities after insertion. These include foot speed maneuver limits, little protection against heavy forces, and potential of being isolated. These problems can be overcome by following a new doctrine of Deep Battle Exploitation building on existing technology improvements like GPS, satellite communications, NVGs, improved intelligence, and data links such as Blue Force Tracker and Link 16. This doctrine integrates overarching Rapid Decisive Operations concepts applied at the operational level and is stated as using multiple (15+) simultaneous airborne force insertions forward of the main battle lines with no requirement of link up operations. These company to battalion size forces will operate like SOF, but focus overtly on JFC objectives in either a supporting or supported role. Implementing this doctrine requires no new aircraft or hardware, but needs significant changes in Army and Air Force doctrine and training in tactics, techniques, and proceduresthat can be done today! Key words: Rapid Decisive Operations (RDO), non-linear, simultaneous, non-contiguous, swarm, Strategic Brigade Airdrop (SBA), Airland Battle, Joint Targeting, airborne, airdrop, air assault, simultaneity and depth.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
In Vitro Toxicity of Aluminum Nanoparticles in Rat Alveolar Macrophages
Nanomaterials, which are by definition in the 1 - 100 nanometer range, have numerous possible benefits to society, but currently there is a lack of data that characterizes these materials effects on human health and environment. In general nanomaterials are of interest to the Air Force because of their applications in electronics, sensors, munitions and energetic/reactive systems. Nanoparticles such as aluminum have been considered for enhancing propulsion in solid rocket fuel. To date, only a few studies have looked at the toxicological effects of direct exposure to nanoparticles, none with aluminum. It is important to increase the understanding of the nanomaterial exposure health impact before these materials are throughout diverse levels of occupations or fully used in large capacities within industry and the military.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Shock Wave Dynamics of Novel Aluminized Detonations and Empirical Model for Temperature Evolution From Post-Detonation Combustion Fireballs
This research characterizes the blast wave and temperature evolution of an explosion fireball in order to improve the classification of aluminized conventional munitions based on a single explosive type such as RDX. A drag model fit to data shows initial shock velocities of 1.6-2.8 km/s and maximum fireball radii ranging from 4.3-5.8 m with most of the radii reached by 50 ms upon detonation. The Sedov-Taylor point blast model is fitted to data where a constant release (s=1) of energy upon detonation suggests shock energies of 0.5-8.9 MJ with blast dimensionalities indicative of the spherical geometry (n 3) observed in visible imagery. An inverse correlation exists between blast wave energy and overall aluminum content in the test articles. Using a radiative cooling term and a secondary combustion term, a physics-based empirical model is able to reduce 82 data points to five fit parameters to describe post-detonation combustion fireballs. The fit-derived heat of combustion has a 96% correlation with the calculated heat of combustion but has a slope of 0.49 suggesting that only half of the theoretical heat of combustion is realized. Initial temperature is not a good discriminator of detonation events but heat of combustion holds promise as a potential variable for event classification.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Development Test and Evaluation Under Acquisition Reform
Acquisition Reform changed government involvement in system acquisition with transition to best commercial practices. Shortened acquisition timelines, reduced budgets and increased contractor test responsibilities intensifed several issues. These issues are test planning and execution capabilities, joint contractor and government test efficiency, and both government and industry test experience levels. Today's DTE methods are insufficient to successfully overcome increased system complexity, decreased test budgets, and reduced manpower challenges of the future. To meet these challenges, this project presents six test recommendations which enhance DTE contributions to the acquisition process. The six recommendations are: 1. Develop a single commercial industry standard governing military aviation testing. 2. Emphasize greater simulation configuration control and technological simulation advances, with software test and avionics integration simulation the highest priorities. 3. Refine the Integrated Test Team Concept to combine contractor, development, and operational test requirements in addition to innovative test program teaming. 4. Streamline development and operational test data requirements and allow contractor and development test personnel to supplement operational test teams. 5. Automate test planning and execution functions to reduce manpower investments. 6. Modify the Federal Aviation Administration Designated Engineering Representative concept to increase contractor test autonomy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Civil Engineer Mobilization in a Joint Vision 2010 World
Rapid evolution in the international political, social, and military environment, coupled with budget pressures within the federal government, have created a fluid setting for the military services. As fundamental as aircraft to the Air Force's ability to protect U.S. interests at home and abroad are the support functions that provide deployed basing for aircraft and aircrew alike. What are the factors that influence the civil engineer's ability to launch, support and sustain deployed military operations within the context of this environment and the national military strategy established to meet these challenges? Do current civil engineer capabilities fulfill Joint Vision 2010 and Air Force "Global Engagement" strategies, now and in the future, for interaction in the New World order? What steps are Air Force civil engineers taking, or should they take, to improve their ability to support deployed military operations? This study concludes that Air Force civil engineering is substantially in step with the evolving character of the current strategies that enable the U.S. military to engage across the spectrum of new and anticipated future world environments.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Investigation of the Effects of Target Feature Variations on Ballistic Missile RCS
Uncertainties in certain features of target geometries result in a loss of confidence in the signature assessment of the target. Knowledge of the impact to a target's radarcross section (RCS) due to changes to specific target features can assist to identifywhether uncertainty in a certain target feature warrants a loss of confidence in the targetsignature. This study will allow a development of a general "rule-of-thumb" on how theradar signature of a target varies as a function of the target's specific target features. Thetargets of interest which this study is centered around are fictitious ballistic missiles.Four target features that were investigated: fin size, nosecone shape, effect of panelriveting along the sides of the missile and the effects of heat shielding on the nosecone.By varying each of the four target features into a missile configuration and comparing toanother configuration, a relationship between specific target features and its effect on theradar cross section of a ballistic missile can be obtained. Based on the range of possibleconfigurations that target's feature can take, it is possible to estimate a range of possiblevalues of the radar signature. This will enable the user of the signature data to have abetter understanding of the target being assessed and target characteristics when acomplete knowledge of target configuration is unavailable.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving F-15C Air Combat Training With Distributed Mission Training Advanced Simulation
Air Combat Command is investing in Distributed Mission Training (DMT) to provide realistic mission training to the Combat Air Forces (CAF) using advances in simulation technology. DMT will network advanced simulators (and some real-world systems) to provide combat aircrews with team training in a synthetic wartime environment. F-15C units will be first in the CAF to incorporate DMT; they are confronted with developing training programs utilizing this new tool without previous experience of how to exploit the benefits of simulation for air combat training. This paper seeks to assist syllabus developers by providing a summary of lessons learned from years of air combat simulation study, and applying those lessons to DMT. A comprehensive analysis of air combat simulation training studies provides insight on how to improve F-15C air combat training using DMT. Studies not only demonstrate simulators can provide effective training, but also identify unique benefits and limitations of simulator training, and offer several training program considerations to achieve the most effective results. DMT benefits not available in flight training include unique instruction options, the capability to repeatedly practice desired tasks or missions, and the opportunity to train in complex combat scenarios. Identified limitations include sources of negative training and the lack of physiological stresses or inputs that may be desired in training. For training programs, simulator studies suggest which tasks should be emphasized in DMT, how metrics can identify training needs, who is expected to gain the most benefit from DMT, and how to intermix DMT and flight scheduling to optimize training.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Robotics
New technology may be able to help answer the cries to reduce casualties resulting from friendly fire and collateral damage, as well as assist the military in performing urban operations. Unmanned vehicles, whether air, land or sea, are one means to get our airmen, soldiers, marines, and sailors out of harm's way and are most likely a key driver to an upcoming revolution in military affairs (RMA) for all services. The major objective of the paper is to bring attention to Tactical Mobile Robots (TMR) and hopefully encourage follow-on studies and to cultivate an enthusiasm to employ them correctly to help get our troops out of harms way and win battles. This study focuses primarily on the use of TMRs in the special operations environment. The paper discusses the current and immediate TMR capabilities; key logistics concerns regarding maintenance, supply, and transportation; and two possible scenarios, one in an unconstrained battlefield and the other in an urban environment. The data collected was primarily via conducting interviews and witnessing experiments and they highlight a few barriers, which must be addressed if unmanned platforms are to keep pace with congressional orders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Force Civil Engineer Mobilization in a Joint Vision 2010 World
Rapid evolution in the international political, social, and military environment, coupled with budget pressures within the federal government, have created a fluid setting for the military services. As fundamental as aircraft to the Air Force's ability to protect U.S. interests at home and abroad are the support functions that provide deployed basing for aircraft and aircrew alike. What are the factors that influence the civil engineer's ability to launch, support and sustain deployed military operations within the context of this environment and the national military strategy established to meet these challenges? Do current civil engineer capabilities fulfill Joint Vision 2010 and Air Force "Global Engagement" strategies, now and in the future, for interaction in the New World order? What steps are Air Force civil engineers taking, or should they take, to improve their ability to support deployed military operations? This study concludes that Air Force civil engineering is substantially in step with the evolving character of the current strategies that enable the U.S. military to engage across the spectrum of new and anticipated future world environments.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Counterair
This white paper examines the counterair mission in 2025--what it is, what the threats are, how we counter them. In the broadest sense, the counterair mission will not change in the next thirty years. The basic premise of air superiority--neutralizing or destroying an adversary's ability to control the skies--will remain intact. This paper examines the counterair mission by first performing an analysis of three different trajectories. The first is an evolutionary trajectory based on projections of current and programmed capability. The second and third trajectories represent extremes--"anything but" approaches for conducting the counterair mission. The second trajectory is "anything but" inhabited aircraft and the third is "anything but" aircraft at all--performing the counterair mission solely with surface and space-based systems. The results of this analysis will provide us with a basis of comparison for each. Common themes emerged from all three trajectories. The primary theme is a requirement for near-real-time collection, processing and distribution of information, or in some cases knowledge, to support the commander's assessment and reaction to a given situation. A comprehensive holographic display system is required to present the information to the commander.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling Urban Warfare
The United States military is performing operations in urban environments with increasing frequency. Current Department of Defense doctrine is poorly suited to train and equip today's warriors with the tools and experience necessary to fight and win in modern sprawling cities. In order to close the gap, the U.S. Joint Forces Command's Joint Experimentation Directorate led an effort to run a massively distributed simulation of a synthetic urban environment utilizing human-in-the-loop operators called URBAN RESOLVE. The synthetic environment simulated the city of Jakarta with over 1,000,000 buildings and structures and over 120,000 civilian entities. A Red force retreated into the city while a Blue force attempted to determine the enemy's Order of Battle. The exercise generated over 3.7 terabytes of data in seven distinct trials.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evaluating Management Strategies for Automated Test Systems/Equipment
The management of United States Air Force ATS/E presents a variety of issues that affect the long-term capability and mission readiness of weapon systems. Traditional procurement processes suggest that individual aircraft platform System Program Offices (SPOs) developed, improved and replaced ATE on an "as-required" basis. Increased obsolescence, however, and a concern for maintaining longer-term viability provided the necessary inertia for a movement towards the procurement and development of consolidated, common test equipment that would support multiple weapon systems. In 1998, the Air Force Chief of Staff directed HQ AFMC to establish a Common Support Equipment office to facilitate the combination of similar legacy ATE into common equipment. Today, some ATE continues to be managed by individual SPOs, while other ATE is primarily managed by the Automated Test Systems Division at Warner-Robins Air Logistics Center. This research examines the differences of these two approaches. Specifically, this research focuses on the management of two pieces of ATE for a mature aircraft system - the F-15.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Simulation of Autonomic Logistics System Sortie Generation
The current Air Force logistics operations system is reactive in nature, meaning that after the aircraft detects a part failure, the maintenance person must perform fault isolation procedures and then steps are taken to repair or replace the faulty item. This may or may not include ordering of a replacement item from base supply. The Autonomic Logistics System (ALS) concept changes this reactive process into a proactive one with the employment of technologies such as prognostics and distributed information network. This new approach to the logistics process shows the potential for cost savings, increased aircraft operational availability, and better system performance. The ALS basic function can be compared to the human body's nervous system. The body's nervous system performs activities automatically or without constant thought like respiration and blood circulation. This same concept can be applied to the Air Force logistics system. Certain logistics tasks can be handled automatically or autonomously. Ordering parts for a broken system, calling the right maintenance specialist to the right aircraft reporting a problem, notifying the maintenance control center that a certain aircraft has a malfunctioning system and will not be available for the next sortie, and other possible applications. Since the ALS can handle these routine tasks, the maintenance personnel are free to perform more important tasks such as maintaining and repairing the jets. This thesis explores the impact of this concept on the aircraft sortie generation process by building a discrete event simulation tool to allow the study of the baseline existing system and the ALS.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Next Generation Munitions Handler Prototype Acquisition Campaign
The Air Force will improve the quality of the aircraft munitions loading process by fielding a new generation of munition handling equipment that incorporates emerging telerobotics technology. An active program is underway to develop an Next Generation Munitions Handler (NGMH) Advanced Technology Demonstrator (ATD). This project uses air campaign planning principals to address the development of the technology roadmap and dual use business case study required to transition the ATD into a full-scale prototype. A discussion of the history and performance requirements for telerobotic munition handling is provided as a background for creation of an initial critical technologies list. The maturity level and validity of that list is investigated through an intelligence preparation operation that supports the election of nine specific technology targets. Courses of action to bring those technologies to commercial-off-the-shelf availability are explored. Scenarios for technology application in a range of alternative military and commercial applications lay the groundwork for development of a dual use business case. Civilian industry coalition partners were identified. Creation of a full scale NGMH prototype acquisition campaign is now possible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Audio Expert
This newly updated third edition of The Audio Expert offers a comprehensive reference book that covers all aspects of audio. The book includes both practical and theoretical explanations, using common sense plain-English explanations and mechanical analogies, with minimal math.
The Comanche Helicopter
On 23 February 2004, the Acting Secretary of the Army Les Aspin and the Chief of Staff of the Army General Peter Schoomaker, announced the cancellation of the Comanche program. In the minds of these two gentlemen, the evidence presented in a 2003 comprehensive review of aviation-a changing environment, an aging fleet, and budgetary concerns-demanded immediate and drastic action. This paper investigates those claims through the eyes of the Comanche program managers during the final seven years of the program. After numerous interviews, it is apparent that the claims made during the cancellation briefing do hold merit. However, they only portray a snapshot in time. To understand why the program suffered its eventual fate, one needs to consider the program in its entirety.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Lethality, Legality, and Reality
This study evaluates the potential for non-lethal weapons to become viable tools for the air support of ground forces in military conflicts. During the Cold War, the US Air Force developed conventional air-support aircraft and munitions to fight Soviet mechanized infantry and armor in the central plains of Europe. Since the end of the Cold War, the United States increasingly confronts adversaries in situations where it is not in the national interest to use destructive force. In response to this new security environment, the Department of Defense has established the Joint Non-Lethal Weapons Program and deployed a myriad of non-lethal devices to conflicts around the world. All non-lethal weapons in the US armed forces, however, are ground weapons and are severely limited in range. Aircraft could provide the perspective and added range joint force commanders desire; thus, this thesis explores the potential for aircraft to provide non-lethal force options. Many factors contribute to the viability and acceptance of non-lethal weapons for offensive air support. One is technology.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Assessing Capabilities of the High Energy Liquid Laser Area Defense System Through Combat Simulations
High Energy Laser (HEL) technology continues to improve and its place in the battlefield is ever evolving. By combining the high energy delivery of solid state laser technology with the efficient thermal management of liquid laser technology, HELLADS has two main advantages over any HEL predecessors. One, the configuration is small and light enough to be carried on more tactical aircraft such as fighters. Two, the thermal management greatly increases HEL fire power by increasing dwell time on target. To assess HELLADS operational capabilities the test community has been challenged with how to effectively examine the advantages and limitations through a cost effective manner. Modeling and simulation supports this assessment as it yields itself easily to relatively low cost and robust testing methodologies. The challenge comes with building credible models through validation and verification of test parameters and scenarios. An Air Force Standard Analysis Toolkit model, the Extended Air Defense Simulation Model (EADSIM), is used in this study to meet these challenges. This research effort focuses on the assessment of the HELLADS operational capabilities through EADSIM. Of particular interest is the investigation of the envisioned HELLADS operational envelope and the potential advantages it offers over other HEL systems. Scenarios are applied to represent the Homeland Defense arena in which HELLADS is proposed to operate. Specifically this study explores what factors impact HELLADS effectiveness and suitability in the Homeland Defense scenarios examined.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The All Seeing Eye
This research paper investigates the space environment in the 2030 timeframe with respect to the important space-based earth surveillance mission. It attempts to answer the question: "Can the U.S. field a persistent space-based surveillance capability in an operational domain that is increasingly challenged by adversary threats?" To answer this question, the paper looks at the nature of existing threats and the likely capability developments in the next 20 years. To counter the threats, the paper investigates a geosynchronous orbit based surveillance system. Such a system would be beyond the reach of current anti-satellite weapons. However, significant technical hurdles remain to make such a system a reality.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Sleep Deprivation and Its Effect on Combat Effectiveness
This paper examines the effects of sleep loss on the combat effectiveness of the US Army's leaders and soldiers. It begins with an examination of US and Soviet doctrine for conducting continuous operations. This section discusses the doctrinal methods and procedures that both major powers employ to maintain continuous pressure on their opponent. After laying the theoretical groundwork, it then examines the changes that have occurred in tactical force design since World War II to determine what has been done to enhance or degrade our ability to execute that doctrine. After this discussion on the mechanical aspect of combat, the paper discusses the effects of sleep loss on units and the individual soldier. It concludes that the US Army currently has no doctrine for the conduct of combat over an extended period of time. Adequate doctrine has been provided for the conduct of operations in periods of both limited and unlimited visibility, but the doctrine necessary to transition to continuous operations is not available. Furthermore, recent changes in the force structure of our combat units (primarily Armor and Mechanized Infantry) have significantly reduced the redundancy and robustness in those units that is necessary to conduct continuous operations. During continuous operations our units will be affected by loss of sleep. Sleep deprivation affects the cognitive skills of our leaders greater than the physical skills of our soldiers. To fight the continuous operations that will be forced upon us by our opponent, we must prepare ourselves to combat the effects of sleep loss first.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Night Vision Goggles
The Air National Guard Bureau Office of Airspace and Ranges (ANG/DOBA) has requested from Air Command and Staff College that training be developed to train Air National Guard air to ground Range Officers in night vision goggle use. This project fulfills that request. It is a computer based training product that was authored in Macromedia Authorware version 4.0 software. It is a fully interactive computer program that incorporates a wide range of graphics, video, sound, and animation to allow interactivity between the program interface and the learner. It was designed using sound instructional design principles and a complete task analysis, objective development, and instructional strategies were developed. Full sets of storyboards were developed using an original storyboard format and were created in Microsoft Access software. A custom installation program was also used, and the installation of the program, along with user hardware system requirements meets the Air National Guard Bureau request. The computer based training also has an evaluation instrument, and automatically writes user results to a tracking database. This fulfills the night vision goggle academic training certification process. Future applications of this product can be conversion to web based training, and the project includes a web based training prototype.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.