-
A Network Flow Approach to the Initial Skills Training Scheduling Problem
The United States Air Force commissions new officers as they complete their undergraduate degree or
-
How is MS-13 a Threat to US National Security?
Street gangs have been a regional problem in the United States for a long time, but today's gangs s
-
A Laboratory Study to Investigate Gaseous Emissions and Solids Decomposition During Composting of Municipal Solid Wastes
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Rich
-
United States Preparedness to Respond to a "Mumbai-Style" Attack Within the Homeland
"American homeland defenders are quick to criticize the Government of India's (GoI) counterterroris
-
The Diffusion of Military Technologies to Foreign Nations
The purpose of this paper is to recommend that the United States government maintain the defense te
-
A Method for FMS Countries to Maximize CLSSA Service Levels While Minimizing Costs Through Optimal Requisitioning Patterns
The Cooperative Logistics Supply Support Arrangement (CLSSA) is a program designed to provide follo
-
Modification of Position and Attitude Determination of a Test Article Through Photogrammetry to Account for Structural Deformation
The Arnold Engineering Development Center (AEDC) at Arnold AFB, TN currently has a computer program
-
From "Whack-a-Mole" to Three-dimensional Chess
Beyond their battlefield effects, improvised explosive devices (IEDs) are weapons of "strategic inf
-
A Systems Engineering Approach to Integrated Structural Health Monitoring for Aging Aircraft
The United States Air Force and many of its Coalition partners have extended the original service l
-
Direct Aeromedical Evacuation From USCENTCOM to the Continental United States
Landstuhl Regional Medical Center provides outstanding care to patients evacuated from Iraq and Afg
-
United States Preparedness to Respond to a "Mumbai-Style" Attack Within the Homeland
"American homeland defenders are quick to criticize the Government of India's (GoI) counterterroris
-
Spacecraft Proximity Operations Used to Estimate the Dynamical and Physical Properties of a Resident Space Object
When conducting a space proximity operation, developing high-fidelity estimates of the dynamical an
-
Decisionmaker's Guide to Recycling Plastics
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Rich
-
The Development of a Finite Element Program to Model High Cycle Fatigue in Isotropic Plates
As part of a joint AFRL-DAGSI turbine blade research effort, a computer program has been developed
-
The Utility of Using a Third Party in Military to Commercial Technology Transfer
In the wake of the defense drawdown and end of the Cold War, government laboratories are facing a c
-
Performance Evaluation of a Field Programmable Gate Array-based System for Detecting and Tracking Peer-to-peer Protocols on a Gigabit Ethernet Network
The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA.
-
School-Based Programs to Reduce Bullying and Victimization
The National Institute of Justice (NIJ) is the research, development and evaluationagency of the US
-
Decision Analysis With Value Focused Thinking as a Methodology to Select Buildings for Deconstruction
The purpose of this research was to examine the reuse and recycling of building materials on Wright
-
Performance Characterization of a Novel Plasma Thruster to Provide a Revolutionary Operationally Responsive Space Capability With Micro- and Nano-Satellites
Few options currently exist to provide propulsion for extremely small satellites due to design cons
-
Keys to Successful Implementation and Sustainment of Managed Maintenance for Healthcare Facilities
Health care providers are faced with two critical issues in today's evolving marketplace: lowering
-
The Use of Space-Based Assets to Reduce the Effects of Natural Disasters
Natural disasters kill one million people around the world each decade, and leave millions homeless
-
Linking ABM Competencies and AWACS Capabilities to Future Operations
The functions air battle managers (ABM) provide to tactical and operational warfighters through the
-
Interaction Between the Process Used to Introduce Change and the Personality of Organizational Members
Organizations introduce change to strengthen organizational performance and improve effectiveness.
-
Roadmap to Seclusion and Restraint Free Mental Health Services
Supports the training of direct-care staff in strategies for the prevention and elimination of secl
-
Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace
Since the last years of the 20th Century, threats in space and cyberspace have become prominent, to
-
Domestic Challenges to the Oath of Office
Noting that the military oath of office requires defense of the Constitution against enemies foreig
-
Impacts of F-22 and Joint Strike Fighter Exports to the Middle East
In recent decades, stealth technology has provided the US with an unprecedented advantage in milita
-
Routing UAVS to Co-Optimize Mission Effectiveness and Network Performance With Dynamic Programming
In support of the Air Force Research Laboratory's (AFRL) vision of the layered sensing operations c
-
Use of Critical Chain Scheduling to Increase Aircraft Availability
United States Air Force Special Operations Command (AFSOC) has a minimal number of aircraft at its
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
U.S. Policy Recommendation for Responding to Cyber Attacks Against the United States
U.S. Response Strategy for Cyber Attacks The United States has traditionally looked to its military
-
To Click or Not to Click
Today's Air Force networks are under frequent attack. One of the most pernicious threats is a sophi
-
Influencing the Behavior of General Chang Wanquan to Protect United States Space Assets
In January 2007, the Chinese successfully tested an anti-satellite (ASAT) missile that threatened U
-
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm With Application to the Detection of Distributed Computer Network Intrusions
Today's predominantly-employed signature-based intrusion detection systems are reactive in nature a
-
Comparison of Climatological Optical Turbulence Profiles to Standard, Statistical and Numerical Models Using Heleeos
Optical turbulence within earth's atmosphere plays a significant role in electromagnetic radiation
-
An Object-Oriented Approach to the Modeling and Visualization of Early-Stage Breast Cancer Tumors
Great strides have been made in controlling the progression of breast cancer, but medical professio
-
Engaging African Sub-Regional Organizations to Improve Continental Stability and Security
Abstract The United States has been engaged on the African continent for one reason or another for
-
Multiple Perspectives on Battered Mothers and Their Children Fleeing to the United States for Safety
In cases in which the left-behind fathers filed Hague Convention petitions to have their children r
-
Handbook for Developing Watershed Plans to Restore and Protect Our Waters
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Rich
-
Multiple Perspectives on Battered Mothers and Their Children Fleeing to the United States for Safety
In cases in which the left-behind fathers filed Hague Convention petitions to have their children r
-
How to Read the Human Head and Face
Explore the fascinating world of physiognomy with H. Ellis Foster's "How to Read the Human Head and
-
Report of the Kentucky Commissioners to the Late Peace Conference Held at Washington City, Made to the Legislature of Kentucky
This is a report by the Kentucky Commissioners to the Peace Conference held in Washington D.C. in F
-
Pilgrim Plymouth Guide to Objects of Special Historic Interest ... Together With a Brief Historical Outline of the Pilgrim Migration From the Inception of the Congregation at Scrooby, England, to the
"Pilgrim Plymouth Guide to Objects of Special Historic Interest" by William Franklin Atwood offers
-
A Systems Engineering Approach to the Design of a Spacecraft Dynamics and Control Testbed
A systems engineering team used an innovative process to develop a new frictionless air bearing sat
-
Time to Overhaul the United States Air Force's Air Command and Staff College
The Air Command and Staff College (ACSC) is the United States (US) Air Force's (AF) intermediate pr
-
Sensitivity Analysis of ALGAN/GAN High Electron Mobility Transistors to Process Variation
A sensitivity analysis of AlGaN/GaN HEMT performance on material and process variations was perform
-
Study of the Pursuit of the Turks Following Their Defeat at Gaza-Beersheba, to Include 15 November, 1917
This study covers the pursuit of the defeated Turks after the battle, and was it conducted in accor
-
Utilizing Near-Field Measurements to Characterize Far-Field Radar Signatures
The increased need for stealth aircraft requires an on-site Far-Field (FF) Radar Cross-Section (RCS