Joint Direct Attack Munition (JDAM)

2013 ◽  
Author(s):  
Patrick Burke
Keyword(s):  
1985 ◽  
Vol 50 (4) ◽  
pp. 845-853 ◽  
Author(s):  
Miloslav Šorm ◽  
Miloslav Procházka ◽  
Jaroslav Kálal

The course of hydrolysis of an ester, 4-acetoxy-3-nitrobenzoic acid catalyzed with poly(1-methyl-3-allylimidazolium bromide) (IIa), poly[l-methyl-3-(2-propinyl)imidazolium chloride] (IIb) and poly[l-methyl-3-(2-methacryloyloxyethyl)imidazolium bromide] (IIc) in a 28.5% aqueous ethanol was investigated as a function of pH and compared with low-molecular weight models, viz., l-methyl-3-alkylimidazolium bromides (the alkyl group being methyl, propyl, and hexyl, resp). Polymers IIb, IIc possessed a higher activity at pH above 9, while the models were more active at a lower pH with a maximum at pH 7.67. The catalytic activity at the higher pH is attributed to an attack by the OH- group, while at the lower pH it is assigned to a direct attack of water on the substrate. The rate of hydrolysis of 4-acetoxy-3-nitrobenzoic acid is proportional to the catalyst concentration [IIc] and proceeds as a first-order reaction. The hydrolysis depends on the composition of the solvent and was highest at 28.5% (vol.) of ethanol in water. The hydrolysis of a neutral ester, 4-nitrophenyl acetate, was not accelerated by IIc.


1997 ◽  
Vol 34 (01) ◽  
pp. 192-207 ◽  
Author(s):  
Anyue Chen ◽  
Eric Renshaw

An M/M/1 queue is subject to mass exodus at rate β and mass immigration at rate when idle. A general resolvent approach is used to derive occupation probabilities and high-order moments. This powerful technique is not only considerably easier to apply than a standard direct attack on the forward p.g.f. equation, but it also implicitly yields necessary and sufficient conditions for recurrence, positive recurrence and transience.


1971 ◽  
Vol 24 (7) ◽  
pp. 1413 ◽  
Author(s):  
BE Boulton ◽  
BAW Coller

A procedure is described for monitoring the reactivity of a substrate towards bromine in aqueous bromide solutions, as a function of extent of reaction, by following the changes of electrode potential with time in the intervals between successive periods of electrolysis. ��� The title compounds show 1 : 1 stoicheiometry with substitution in the 4-position. The observed rate behaviour may be understood in terms of direct attack by molecular bromine on the neutral substrate molecules, rate coefficients for dilute aqueous solution at 25�C being: ����� k20(Br2+pyrazole) = 3.8x105 dm3 mol-1 s-1, kH/kD = 1.39;����� k20(Br2+1.methylpyrazole) = 8.0x105 dm3 mol-1 s-1;����� k20(Br2+3,5-dimethylpyrazole) = 1.4x109 dm3 mol-1 s-1, kH/kD = 1.08 Values of pKa(pyrazole-H+) = 2.58 and pKa(3,5-dimethylpyrazole-H+) = 4.11 were determined by potentiometric titration methods.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 1051
Author(s):  
Gera Jaideep ◽  
Bhanu Prakash Battula

Peer to Peer (P2P) network in the real world is a class of systems that are made up of thousands of nodes in distributed environments. The nodes are decentralized in nature. P2P networks are widely used for sharing resources and information with ease. Gnutella is one of the well known examples for such network. Since these networks spread across the globe with large scale deployment of nodes, adversaries use them as a vehicle to launch DDoS attacks. P2P networks are exploited to make attacks over hosts that provide critical services to large number of clients across the globe. As the attacker does not make a direct attack it is hard to detect such attacks and considered to be high risk threat to Internet based applications. Many techniques came into existence to defeat such attacks. Still, it is an open problem to be addressed as the flooding-based DDoS is difficult to handle as huge number of nodes are compromised to make attack and source address spoofing is employed. In this paper, we proposed a framework to identify and secure P2P communications from a DDoS attacks in distributed environment. Time-to-Live value and distance between source and victim are considered in the proposed framework. A special agent is used to handle information about nodes, their capacity, and bandwidth for efficient trace back. A Simulation study has been made using NS2 and the experimental results reveal the significance of the proposed framework in defending P2P network and target hosts from high risk DDoS attacks.  


Neurosurgery ◽  
1982 ◽  
Vol 10 (5) ◽  
pp. 600-603 ◽  
Author(s):  
R. Michael Scott ◽  
Hsiu-Chih Liu ◽  
Robert Yuan ◽  
Lester Adelman

Abstract The fatal rupture of a previously unruptured giant middle cerebral artery aneurysm occurred 13 days after an extracranial-intracranial bypass had been carried out, before definitive aneurysm surgery. Alterations in blood flow adjacent to the aneurysm after the bypass may have led to the fatal hemorrhage. After a preliminary extracranial-intracranial bypass procedure, there should be no undue delay in the direct attack on a giant aneurysm, regardless of its mode of presentation.


1977 ◽  
Vol 46 (1) ◽  
pp. 12-23 ◽  
Author(s):  
Edward I. Kandel ◽  
Vyacheslav V. Peresedov

✓ In carefully selected cases of arterial aneurysms and deep-seated arteriovenous malformations (AVM), when direct attack may be dangerous or impossible, the authors advocate stereotaxic clipping. A special device and technique for its application are described. The instrument is introduced through a trephine opening and clipping is monitored by angiography. Successful results have been obtained in 10 operations performed on eight patients, three of whom had arterial aneurysms (two internal carotid and one anterior cerebral-anterior communicating) and five with AVM's.


Author(s):  
Paulina Kewes

This chapter explores the seventeenth-century afterlife of the most daring political tract of the Elizabethan era, A Conference About the Next Succession to the Crowne of Ingland (1594/5) by the Jesuit Robert Persons. The chapter begins by explaining what is distinctive about A Conference, notably its direct attack on the hereditary principle and on the pre-eminence of the monarchy itself, and gives an overview of its transmission, reception, and appropriation. It goes on to trace the text’s signal and varied influence on Protestant writers from Henry Walker and Henry Parker during the Puritan Revolution and John Somers and Algernon Sidney during the Exclusion Crisis, to the defenders of the ‘Glorious’ Revolution. It thus invites a rethinking of the republican and Whig traditions in English political thought by revealing their dependence on the work of an Elizabethan Jesuit.


Sign in / Sign up

Export Citation Format

Share Document