Deep convection in the oceans, particularly at high latitudes, plays an important role in the climate systems of the world's oceans and atmosphere. This study was conducted to examine atmospheric forcing effects on deep convection in the Labrador Sea. The Naval Postgraduate School one dimensional ocean mixed layer model was applied to the Labrador Sea from February 12 to March 10, 1997. The model was initialized and forced with oceanographic and atmospheric data collected onboard the RN Knorr during the first field program of the Labrador Sea Deep Convection Experiment. An ocean mixed layer...
Deep convection in the oceans, particularly at high latitudes, plays an important role in the climate systems of the world's oceans and atmosphere. Th...
In December 1993, the Department of Defense issued directives that revised the military's exclusionary policy toward homosexuals. These directives marked the culmination of an intense period of public debate that placed little emphasis on the moral dimension of homosexuality. The objective of this book is to determine if personal religious beliefs of military members influence their responses to policies that they perceive to involve morality, specifically with regard to the 1993 proposal to integrate homosexuals into the military. The research approach involves two phases: a review of the...
In December 1993, the Department of Defense issued directives that revised the military's exclusionary policy toward homosexuals. These directives mar...
Potential adversaries throughout the world continue to acquire and develop sophisticated multi-layered, anti-access, area-denial (A2AD) systems. To maintain its maritime superiority, the United States must continue to innovate systems that are capable of operating in and defeating these A2AD environments. In particular, command of the undersea domain remains vital and will increasingly be critical in facing this future battle space. The challenges our nation faces, however, are not limited only to the technological capabilities of the warfighters, but also include a myriad of confounding...
Potential adversaries throughout the world continue to acquire and develop sophisticated multi-layered, anti-access, area-denial (A2AD) systems. To ma...
The relationship between U.S. and U.S.S.R. arms transfers to Third world nations and its effects on the maintenance of regime stability was examined. This book uses the focused comparison approach to examine three U.S. cases (Vietnam 1960-1975, the Philippines 1950-1989, and El Salvador 1960-1989) and three U.S.S.R. cases (Afghanistan 1950-1989, Vietnam 1976-1989, and Nicaragua 1979-1989). The U.S. and the Soviet cases were chosen due to the intuitive similarities found in the supplier nation's involvement with the recipient Third World nation. The trend in the amounts of arms transfers was...
The relationship between U.S. and U.S.S.R. arms transfers to Third world nations and its effects on the maintenance of regime stability was examined. ...
Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. They are frequently used to protect valuable files, systems, and internal users from external users while still providing services to outside hosts. Another aspect of reverse proxies is that they can be installed remotely by malicious actors onto compromised machines in order to service malicious content while masking where the content is truly hosted. Reverse proxies interact over the HyperText Transfer Protocol (HTTP), which is delivered via...
Reverse proxy servers are valuable assets to defend outside hosts from seeing the internal network structure upon which the reverse proxy is serving. ...
This book examines the lessons the U.S. Army drew from the war in Vietnam and how these lessons influence current Army attitudes toward peace operations. The book finds that the Army's failure in Vietnam contributes not only to the Army's aversion toward peace operations, but also to its reluctance to participate in any limited war. It posits that culture has explanatory power in describing the Army's attitudes and policies toward peace operations. This work examines the development of the lessons of Vietnam, especially the emergence of the "never-again" school by surveying the articles...
This book examines the lessons the U.S. Army drew from the war in Vietnam and how these lessons influence current Army attitudes toward peace operatio...
The A. Q. Khan nuclear supplier network constitutes the most severe loss of control over nuclear technology ever. For the first time in history all of the keys to a nuclear weapon-the supplier networks, the material, the enrichment technology, and the warhead designs-were outside of state oversight and control. This book demonstrates that Khan's nuclear enterprise evolved out of a portion of the Pakistani procurement network of the 1970s and 1980s. It presents new information on how the Pakistani state organized, managed, and oversaw its nuclear weapons laboratories. This book provides...
The A. Q. Khan nuclear supplier network constitutes the most severe loss of control over nuclear technology ever. For the first time in history all of...
This book estimates the cost of biofuel to meet the Department of the Navy's (DON) stated energy objectives, i.e., sailing the Great Green Fleet in 2016 and transitioning to 50 percent alternative fuel by 2020. The first estimate is for the additional cost to operate the Carrier Air Wing (CVW) component of the Great Green Fleet in 2016. A premium to the cost of JP-5 is estimated. A second estimate is made for a CVW operating a six-month deployment with 50 percent biofuel in 2020. A premium was estimated and a sensitivity analysis was conducted to project the required reduction in costs for...
This book estimates the cost of biofuel to meet the Department of the Navy's (DON) stated energy objectives, i.e., sailing the Great Green Fleet in 20...
Facial recognition technology adds a new dimension to government and police surveillance. If these organizations were to employ active surveillance using facial recognition technology, the implication could mean that people appearing in public places no longer have an expectation of privacy in anonymity. Real-time identification using facial recognition surveillance technology is not currently ready for successful employment by law enforcement or government agencies, but the speed with which the technology is being developed means that a constitutional challenge to this new technology will...
Facial recognition technology adds a new dimension to government and police surveillance. If these organizations were to employ active surveillance us...