631 research outputs found

    Unexploded Ordnance (UXO), Ordnance and Explosives (OE), or Chemical Agents (CA) Functional Sub-Activity (UOFSA) Information Business Strategy

    Get PDF
    Currently, the Explosive Ordnance Disposal (EOD) and unexploded ordnance (UXO) clean-up community are supported by three locally developed and maintained systems. The Unexploded Ordnance Site Management Model (UXOSMM) is being maintained by the Naval Explosive Ordnance Disposal Technology Division (EODTECHDIV). Ordnance Technical Management System (OTMS) is maintained by United States Army Engineer Division, Huntsville (USAEDH). In a functionally similar undertaking, landmine elimination in Host Nations is provided by the Humanitarian Demining Operations Geographic Information System (HDOGIS). HDOGIS is a Special Operations Command (SOCOM) automated tool currently used by host nation forces in Eritrea and Ethiopia. It was developed by the US SOCOM Central (US SOCCENT) to assist nations in eliminating landmines and mine fields. HDOGIS was designed to record, track and manage information associated with Humanitarian Demining Operations (HDO)–e.g., minefield and mine incident locations, personnel training, availability of resources to support demining operations, and plans for conducting operations. Spatial information–e.g., mine incident and/or minefield locations–are presented in a geographic view or map

    Inferring emotion without language: Comparing canines and prelinguistic infants

    Get PDF
    Research on canine emotions has to deal with challenges quite similar to psychological research on social and emotional development in human infants. In both cases, verbal reports are unattainable, and behavioral and physiological methods have to be adjusted to the specific population. I will argue that both regarding empirical approaches and conceptual work, advances in research on social-cognitive development in human infants can inform the study of canine emotions

    Empowered by Jesus: A Research Proposal for an Exploration of Jesus\u27 Empowerment Approach in John 21:1-25

    Get PDF

    Local law enforcement\u27s initial role in response to a radiological dispersion device attack

    Get PDF
    Today the potential exists for a terrorist organization to use a Radiological Dispersion Device or a dirty bomb within the United States. The results of such an attack could be catastrophic to the affected population. The response by law enforcement must be calculated and planned. To properly analyze the law enforcement\u27s role in a radioactive incident a qualitative approach was taken. A determination must be made prior to an attack to discern what kind of training will be necessary, what equipment will be required, and what response procedures need to be in place to ensure a safe and efficient response. Law enforcement must understand that the essential components of any radiation response protocol are to analyze the situation, secure the area, notify the required agencies and protect the general population. Training and equipment needs must be fulfilled. Law enforcement must always keep in mind a radiological attack is a crime, and proper police procedure must be established to ensure the security of the crime scene and preservation of evidence. Research shows that local law enforcement agencies must have a usable radiation response protocol which can be used in the event of a radiological release

    Usual Suspects Beware: Walk, Don\u27t Run Through Dangerous Neighborhoods

    Get PDF
    The Fourth Amendment to the United States Constitution is designed \u27to prevent arbitrary and oppressive interference by enforcement officials with the privacy and personal security of individuals. The Amendment is currently interpreted as consisting of two separate clauses, the first generally prohibiting unreasonable searches and seizures, and the second requiring the establishment of probable cause prior to the issuance of a warrant. Hence, only those government searches and seizures requiring a warrant necessitate the establishment of probable cause, and all other searches and seizures simply need to be reasonable

    Evidence for a dual-process account of over-imitation: Children imitate anti- and prosocial models equally, but prefer prosocial models once they become aware of multiple solutions to a task

    Get PDF
    Children imitate actions that are perceivably unnecessary to achieve the instrumental goal of an action sequence, a behavior termed over-imitation. It is debated whether this behavior is based on the motivation to follow behavioral norms and affiliate with the model or whether it can be interpreted in terms of a behavioral heuristic to copy observed intentional actions without questioning the purpose of each action step. To resolve this question, we tested whether preschool-aged children (N = 89) over-imitate a prosocial model, a helper in a prior third-party moral transgression, but refuse to over-imitate an antisocial model, the perpetrator of the moral transgression. After first observing an inefficient way to extract a reward from a puzzle box from either a perpetrator or a helper, children over-imitated the perpetrator to the same degree as they over-imitated the helper. In a second phase, children were then presented the efficient solution by the respective other model, i.e. the helper or the perpetrator. Over-imitation rates then dropped in both conditions, but remained significantly higher than in a baseline condition only when children had observed the prosocial model demonstrate the inefficient action sequence and the perpetrator performed the efficient solution. In contrast, over-imitation dropped to baseline level when the perpetrator had modelled the inefficient actions and the prosocial model subsequently showed children the efficient solution. In line with a dual-process account of over-imitation, results speak to a strong initial tendency to imitate perceivably irrelevant actions regardless of the model. Imitation behavior is then adjusted according to social motivations after deliberate consideration of different options to attain the goal

    BioModels Database: Next generation model repository

    Get PDF
    Public announce that the software system running BioModels Database ("http://www.ebi.ac.uk/biomodels/":http://www.ebi.ac.uk/biomodels/) will evolve from open source to a community developed project
    • …
    corecore