1,509,455 research outputs found
Modelling ultraviolet threats
Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels
Securing library information system: Vulnerabilities and threats
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the
public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats
Looming Threats to Society Journals
Now is not the time for members of professional scientific societies to be complacent or unengaged. The American Chemical Society Publications Division, as well as other learned society publishers, such as the Royal Society of Chemistry, may be overly confident that the obvious high quality of their journals will ensure their position against commercial competitors.
In addition, when they resist open-access efforts, society publishers appear to be more aligned strategically with commercial publishers' short-term perspective than with the research community's need to easily access all relevant content over the long term.
Societies need to adhere closely to their members' needs, even if that means a break with their for-profit counterparts. University faculty and administrators need to engage with librarians to ensure that the best decisions are being made for the long term
Recommended from our members
Managing the threat of terrorism in British travel and leisure organizations
This paper examines the perceived threats from terrorism in six organizations in the travel and leisure sector in the UK. These organizations are particularly exposed to such extreme threats. This paper examines how managers in organizations deal with uncertainty where probabilities are impossible or difficult to define and examines how they face the challenge of interpreting and acting upon these interpretations. Theoretically the paper draws upon two lenses: organizational resilience and institutional perspectives. The former assumes managers can act autonomously to increase organizational resilience. The latter argues that systemic features of organization are more accurate explanations of why managers and organizations fail to spot threats and impending disasters. The data indicate that perceptions of uncertainty and threats from terrorism and theories of action differ in and between organizations depending upon factors such as the accuracy and completeness of information; previous experience of terrorist events and whether or not these threats were prioritized over other uncertainties. Three organizations in the aviation industry prioritize threats from terrorism, whilst three organizations in the leisure and travel sector do not. Managers in the aviation industry tend to take a proactive, organizational resilience stance towards uncertainty, whilst managers in the other organizations are more reactive, or take little action, with systemic features of organization taking precedence over decisions and actions
Russell Now Claims Death Threats Never Happened
Memo describing death threats made to union leaders and workers at a Russell Athletic factory in Honduras, and Russell’s refusal to recognize the threats. Discusses the implications of the threats for union activity and labor rights advocacy in the country
Testing Threats in Repeated Games
I introduce a solution concept for infinite-horizon games, called “Nash equilibrium with added tests”, in which players optimize with respect to relevant threats only after having tested them before. Both the optimal response and the tests are part of equilibrium behavior. The concept is applied to repeated 2×2 games and yields the following results: 1) Sustained cooperation in games such as the Prisoner’s Dilemma is preceded by a “build up” phase, whose comparative statics are characterized. 2) Sustainability of long-run cooperation by means of familiar selfenforcement conventions varies with the payoff structure. E.g., “constructive reciprocity” achieves cooperation with minimal buildup time in the Prisoner’s Dilemma, yet it is inconsistent with long-run cooperation in Chicken. 3) Nevertheless, a “folk theorem” holds for this class of games.Game Theory, Prisoner's Dilemma
- …
