Home About us Contact | |||
Warfare
Kinds of Warfare Terms modified by Warfare Selected AbstractsBETWEEN WARRIORS AND CHAMPIONS: WARFARE AND SOCIAL CHANGE IN THE LATER PREHISTORY OF THE NORTH-WESTERN IBERIAN PENINSULA1OXFORD JOURNAL OF ARCHAEOLOGY, Issue 1 2009FRANCISCO JAVIER GONZÁLEZ GARCÍA Summary This article explores changes in the ,art of warfare' among societies in the north-western Iberian Peninsula in the Late Bronze and Iron Ages. These changes are interpreted as a manifestation of the transformation experienced by societies living in the region first from ,warrior societies' to ,societies with warriors' at the end of the Bronze Age and then back to ,warrior societies' in the Late Iron Age. Evidence of individual combat as a manifestation of ,societies with warriors' is analysed in the broader context of Indo-European and ethnographical examples. It reflects societies in which there were groups specialized in warfare and represents the establishment, in the region, of an Indo-European warrior ideology. [source] WARFARE IN THE EUROPEAN NEOLITHICACTA ARCHAEOLOGICA, Issue 2 2004Jonas Christensen First page of article [source] Illusions of Coherence: George F. Kennan, U.S. Strategy and Political Warfare in the Early Cold War, 1946,1950*DIPLOMATIC HISTORY, Issue 1 2009Scott Lucas First page of article [source] Cold War Scholars and Thinking about WarfareDIPLOMATIC HISTORY, Issue 3 2007David Mayers No abstract is available for this article. [source] The Reagan Administration, Economic Warfare, and Starting to Close Down the Cold War*DIPLOMATIC HISTORY, Issue 3 2005Alan P. Dobson First page of article [source] Form before Substance: Eisenhower's Commitment to Psychological Warfare and Negotiations with the EnemyDIPLOMATIC HISTORY, Issue 3 2000Kenneth A. Osgood [source] Enemy Lines: Warfare, Childhood, and Play in Batticaloa.ETHOS, Issue 1 2010Margaret Trawick. No abstract is available for this article. [source] The Battle of Chester and Warfare in Post-Roman BritainHISTORY, Issue 318 2010SEAN DAVIES Archaeological work at Heronbridge near Chester has recently uncovered the earliest identifiable site of a major British battlefield and investigated a related seventh-century fortification on the site. This article uses the new evidence to help interpret the battle of Chester's political background, the make-up of the forces on the day, their motivations, the equipment used and the course of the conflict, suggesting that the construction of the remarkable fortification was a key factor in the decision to engage in a battle that contravened the usual tactical principles of the age. The clash is set in the wider context of warfare in post-Roman Europe, providing insights into the development of both the Anglo-Saxon and British kingdoms that had emerged in the former imperial province of Britannia. [source] Study on battlespace ontology construction approachINTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, Issue 12 2005Jun-feng Song In Network Centric Warfare, the sensor network's capability is much stronger than ever; the force can get a mass of information about battlespace in real or near-real time. How to utilize the information about battlespace effectively and transform the information superiority into knowledge superiority is a key problem for NCW research. To solve this problem, first we need to establish a suitable knowledge infrastructure. In this article, battlespace ontology is considered as the knowledge infrastructure of NCW, and we propose a battlespace ontology construction approach based on OWL, which consists of two parts: formal ontology construction approach to construct subdomain ontologies of battlespace and formal ontology integration approach to integrate subdomain ontologies of battlespace. Then a concrete application of the approach to an air combat battlespace is given. © 2005 Wiley Periodicals, Inc. Int J Int Syst 20: 1219,1231, 2005. [source] Imperial Warfare in the Naked City,Sociality as Critical InfrastructureINTERNATIONAL POLITICAL SOCIOLOGY, Issue 3 2008Ronnie D. Lipschutz The Global War on Terror (GWOT), framed as conflict with groups and individuals determined to disrupt and destroy "critical infrastructures," is heavily dependent on technological and psychological discourses and practices to find terrorists and their plots., These methods seek to protect the material "backbone" of contemporary society and to detect those individuals whose capabilities might progress to action. Yet, the social nature of all action suggests that "critical infrastructure is people," and that surveillance cannot, by itself, determine who might act and who will not. The ultimate purpose and effect of the GWOT is better understood as involving the transformation of individual mentalities, so that "heretical" thoughts and practices become impossible. [source] "Post-Heroic Warfare" and Ghosts,The Social Control of Dead American Soldiers in Iraq,INTERNATIONAL POLITICAL SOCIOLOGY, Issue 2 2008Christophe Wasinski According to some researchers, the public acceptance of military intervention is conditional upon the minimization of military mortality. Once a threshold of military death is crossed, political leaders are obliged to limit their ambitions. This research proposes to consider the idea of threshold as mythical. Instead, it suggests focusing at the presence of the ghosts the dead American soldiers in the public sphere and the way they are "ventriloquated" in order to support or contest the intervention. [source] Understanding the Threat of Biological WeaponsINTERNATIONAL STUDIES REVIEW, Issue 1 2000Susan B. Martin Books reviewed: Lederberg, Joshua (ed.), Biological Weapons: Limiting the Threat Zilinskas, Raymond A. (ed.), Biological Warfare: Modern Offense and Defense [source] "Arapesh Warfare": Reo Fortune's Veiled Critique of Margaret Mead's Sex and TemperamentAMERICAN ANTHROPOLOGIST, Issue 3 2010Lise M. Dobrin ABSTRACT, In Sex and Temperament (1935), Margaret Mead depicted the Mountain Arapesh as a nurturing, peace-loving people. But Mead's second husband and fieldwork partner, Reo Fortune, disagreed with this in a 1939 article, "Arapesh Warfare," which presented evidence that before pacification Arapesh society countenanced warfare. Here we show that "Arapesh Warfare" also contains a submerged argument against Mead's personal integrity and ethnographic authority. Sex and Temperament had its own personal subtext, and Fortune responded to it by mobilizing rhetorical strategies drawn from an Arapesh framework of speaking. Our analysis provides insight into Fortune's position in an anthropological disagreement that has been seen primarily from Mead's perspective,when it has been seen at all. Fortune's peculiar approach also speaks to a limitation on reflexivity in anthropology: the illegitimacy of criticizing personal motives in cases of ethnographic dispute, although we know scholarly works are always suffused with their authors' personal histories and perspectives. [source] Poison Arrows: North American Indian Hunting and Warfare by David E. JonesAMERICAN ANTHROPOLOGIST, Issue 1 2008THOMAS S. ABLER No abstract is available for this article. [source] Knowledge Warfare in the 21ST Century: An Extension in PerformanceNAVAL ENGINEERS JOURNAL, Issue 2 2003Dr. Yvonne R. Masakowski ABSTRACT As we move into the 21st century, we are faced with a critical need to address the ways in which knowledge is generated and used to optimize system and human performance. Today, we are inundated with a plethora of information, emails, and ever-changing software. There is a dynamic relationship among humans, computers, expert systems and intelligent agent software that shapes the way we live, conduct business and participate in war. It is imperative that we master the critical components of knowledge management that will enhance their decision-making capacities and empower the warfighter. In the 21st century, knowledge management tools, intelligent agent architectures, robotics, and automated systems will facilitate expert performance necessary to fortify net-centric warfare. One of the principal metrics of performance will be our ability to reduce uncertainty and provide the most accurate information to the decision-maker at the right time. The importance of these goals becomes clear when considered within the context of images of the World Trade Center (WTC) crumbling to the ground. Now, we understand the cost of poor information in terms of life and freedom. This paper will provide an introduction to the importance of knowledge management and implications for future ship design. [source] The Paradox of Post-Heroic WarfareNEW PERSPECTIVES QUARTERLY, Issue 5 2000Article first published online: 28 JUN 200 No abstract is available for this article. [source] Human Rights Violations, Corruption, and the Policy of RepressionPOLICY STUDIES JOURNAL, Issue 1 2008Alok K. Bohara Quantitative cross-national research on human rights violations and repression has made considerable progress in identifying and eliminating economic and political factors that influence the use of torture and killing by governments. Warfare tends to increase violations, democracy,notably full democracy,and trade tends to inhibit violations. Where motives have been considered, this research has generally assumed a strategic motivation for government use of repression. Repression is employed to counter threats from the opposition as represented by the presence of warfare. Less attention has been given to the effect of implementation on levels of repression. Theory suggests that agents are likely to make a substantial independent contribution to the level of repression, if given the opportunity. In this article we develop this argument and present cross-country comparative evidence that suggests that agents' opportunities for hidden action measured by perceived levels of financial corruption substantially influences the incidence of torture in a political system, after controlling for the strategic motive of governments and the other factors found influential in earlier research. We show that the results are robust and not sensitive to alternative modeling, measurement, and research-design decisions. [source] Teaching & Learning Guide for: Can a Darwinian Be a Christian?RELIGION COMPASS (ELECTRONIC), Issue 3 2008Gregory W. Dawes Author's Introduction The article was provoked by recent discussion of the so-called ,conflict thesis': the idea that the Christian faith and the findings of modern science are necessarily at odds. This thesis is generally attributed to John William Draper (1811,1882) and Andrew Dickson White (1832,1918). Recent opposition to their work dates from a 1979 publication by James Moore. Moore argues that the warfare metaphor employed by Draper and White misrepresents the historical reality, by suggesting that the religion and science debates were clashes between distinct groups of people who were sharply polarized and violently antagonistic. Since then, similar criticisms have been made by historians, such as David Livingstone, Ronald Numbers, and David Lindberg. A key question here is: what does the conflict thesis entail? If it holds that Christian thinkers have invariably opposed scientific progress, while the defenders of science have been non-believers, it would be demonstrably false. But there exist more interesting forms of conflict thesis, which are philosophical rather than historical. These suggest that there is some tension between what Christians have traditionally believed and the findings of modern science, particularly Darwin's theory of evolution by natural selection. Even if the two are not, strictly speaking, incompatible, the truth of one may constitute evidence against the truth of the other. Darwin's theory also undercuts traditional arguments from design, and highlights the epistemological divide between religious and scientific conceptions of authority. Online Materials The following sites contain audio and video files, as well as text and images. 1. http://www.meta-library.net/history/intro-frame.html This is a useful overview of the historical debate by Ronald Numbers, with links to other sites. Most presenters follow Moore in opposing the conflict thesis, narrowly defined, but neglect the conflicts that my article highlights. 2. http://www.pbs.org/wgbh/nova/id/program.html Here one can view an excellent, 2-h PBS television documentary on the Dover, Pennsylvania trial in December 2005 regarding the teaching of ,intelligent design' (ID) in public schools. 3. http://www.butler.edu/clergyproject/rel_evol_sun.htm This is a letter signed by more than 11,000 clergy, arguing that there is no conflict between religion and science, and encouraging (among other things) the liturgical celebration of evolution by natural selection. 4. http://www.discovery.org/csc/ At the other end of the theological spectrum, this is the website of the Discovery Institute, devoted to opposing Darwinism and promoting ,intelligent design' (ID). Controversially, it presents ID as a scientific theory, rather than a religious doctrine. 5. http://www.asa3.org/ Somewhere between the Clergy Letter Project and the Discovery Institute lies the American Scientific Affiliation (ASA). The ASA ,does not take a position when there is honest disagreement between Christians', so it embraces a variety of perspectives. Sample Syllabus The following could form the basis for a graduate seminar on religion and science, focusing on the Darwinian controversies. One could, for instance, devote two classes to each of these topics. 1. The Draper-White Thesis I recommend reading extracts from the two writers thought to be responsible for the conflict thesis, to establish what each actually said. John William Draper, The History of the Conflict between Religion and Science, International Scientific Series 13 (London: Henry S. King & Co., 1875), chap. 8. Andrew Dickson White, A History of the Warfare of Science with Theology in Christendom (1896; New York, NY: Dover Publications, 1960), vol. 1, chap. 1. 2. Criticism of the Draper-White Thesis Either of the following readings from historians critical of Draper and White's work would be a useful starting point for discussion. James R. Moore, The Post-Darwinian Controversies: A Study of the Protestant Struggle to Come to Terms with Darwin in Great Britain and America, 1870,1900 (Cambridge: Cambridge University Press, 1979), chap. 1. David N. Livingstone, ,Re-placing Darwinism and Christianity', in David C. Lindberg and Ronald L. Numbers (eds.), When Science and Christianity Meet, pp. 183,202 (Chicago, IL: University of Chicago Press, 2003). 3. The Incompatibility Thesis Many authors attempt to show that Darwinism and Christianity and compatible. But it would be useful to examine Pope John Paul II's statement on this topic, along with some responses by biologists and philosophers. John Paul II, ,The Pope's Message on Evolution and Four Commentaries', The Quarterly Review of Biology, 72:4 (1997): 375,406. 4. The Evidential Thesis Students might enjoy reading and discussing the following article by a leading evolutionary biologist. George C. Williams, ,Mother Nature Is a Wicked Old Witch', in Matthew H. Nitecki and Doris V. Nitecki (eds.), Evolutionary Ethics, 217,31 (Albany, NY: State University of New York Press, 1993). 5. The Replacement Thesis This is an important but often neglected book. Students would benefit from reading at least the first chapter. Neal C. Gillespie, Charles Darwin and the Problem of Creation (Chicago, IL: University of Chicago Press, 1979), chap. 1. 6. The Faith and Reason Thesis The following article by a well-known historian and philosopher of science touches on some of the key issues. Ernan McMullin, ,Evolution and Special Creation', Zygon 28:3 (1993): 299,335. Focus Questions 1There exist many Christian thinkers who accept Darwin's theory of evolution by natural selection. Does that mean there is no conflict between Darwinism and Christianity? 2Taken at face value, Genesis 1,3 tells the story of the origins of the world and of human beings. What aspects of that story would you consider essential to the Christian faith? 3If we have an entirely natural explanation of the origins of complex living organisms, do we still have reasons to believe in a creator God? 4If God could have created complex living beings by a simple command, why would he choose a lengthy and wasteful process such as natural selection? 5Could a Christian regard the existence of God in the same way as a scientific hypothesis, that is to say, to be accepted only in so far as it is supported by the evidence? Seminar Activity I would suggest a debate, in which students sympathetic to the creationist position are asked to defend Darwin's theory, while students sympathetic to evolution are asked to argue against it. [source] Southeast Asian Slavery and Slave -Gathering Warfare as a Vector for Cultural Transmission: The Case of Burma and ThailandTHE HISTORIAN, Issue 3 2009Bryce Beemer First page of article [source] Crusader Warfare: Byzantium, Western Europe and the Struggle for the Holy Land 1050,1300 AD , By David NicolleTHE HISTORIAN, Issue 3 2009Joshua Birk No abstract is available for this article. [source] Workfare,Warfare: Neoliberalism, "Active" Welfare and the New American Way of WarANTIPODE, Issue 5 2009Julie MacLeavy Abstract:, In recent decades, welfare reform in the USA has increasingly been based on a political imperative to reduce the number of people on welfare. This has in large part taken place through the establishment of a "workfare" state, in which the receipt of state benefits requires a paid labor input. Designed to reduce expenditure on civil social services, welfare-to-work programs have been introduced. At the same time, the restructuring of US defense provision has seen the "military,industrial complex" emerge as a key beneficiary of state expenditure. Both of these trends can be characterized, this paper argues, as manifestations of neoliberal thinking,whether in the form of the "workfarism" that is undertaken to bolster the US economy, or the "defense transformation" that has been intended to enhance US war-making capacity. While these two aspects have been analyzed in detail independently, the aim of this paper is to probe the similarities, connections and overlaps between the workfare state and the recent American emphasis on high-technology warfare,the so-called "Revolution in Military Affairs",and "defense transformation". There are, the paper argues, strong homologies to be drawn between the restructuring of the American defense and welfare infrastructures. Furthermore there are also instances where warfare and welfare are being melded together into a hybrid form "workfare,warfare", in which military service is increasingly positioned as a means of gaining welfare and, conversely, traditionally military industries are becoming involved in the area of welfare provision. The result, it is argued, is an emergent form of workfare,warfare state in the USA. [source] On coordination and its significance to distributed and multi-agent systemsCONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 4 2006Sascha Ossowski Abstract Coordination is one of those words: it appears in most science and social fields, in politics, warfare, and it is even the subject of sports talks. While the usage of the word may convey different ideas to different people, the definition of coordination in all fields is quite similar,it relates to the control, planning, and execution of activities that are performed by distributed (perhaps independent) actors. Computer scientists involved in the field of distributed systems and agents focus on the distribution aspect of this concept. They see coordination as a separate field from all the others,a field that rather complements standard fields such as the ones mentioned above. This paper focuses on explaining the term coordination in relation to distributed and multi-agent systems. Several approaches to coordination are described and put in perspective. The paper finishes with a look at what we are calling emergent coordination and its potential for efficiently handling coordination in open environments. Copyright © 2005 John Wiley & Sons, Ltd. [source] Don't kill the messenger: writing history and warCRITICAL QUARTERLY, Issue 4 2005RICHARD TOBIAS This article explores the effort to invert Edmund Burke's Sublime and the Beautiful to talk about the Hell and the Ugly of warfare. Official histories fall into the 'rotted language' (Wallace Stevens) of ancient heroics. Since the actual experience of warfare is beyond language, irony - a dangerous and difficult force - is the recourse. Since no Thucydides can write our history of the thirty-one-year war between August of 1914 and August of 1945, a few participants have sufficient irony to find language to convey the actual horror of our inhumanity. The public, however, prefers to obliterate this message. [source] DISPLACING VIOLENCE: Making Pentecostal Memory in Postwar Sierra LeoneCULTURAL ANTHROPOLOGY, Issue 1 2007ROSALIND SHAW In this article, I seek to locate the anthropology of social recovery within the work of memory. Following a decade of violent armed conflict in Sierra Leone, displaced youth in a Pentecostal church write and perform plays that are silent on the subject of the war, but renarrate it in the idiom of spiritual warfare against a subterranean demonic realm known as the Underworld. Ideas of the Underworld are part of a local retooling of the Pentecostal deliverance ministry to address Sierra Leone's years of war. Through their struggle against the Underworld, these Pentecostal youth reimagine Sierra Leone's war, reshaping experiences of violence that have shaped them and thereby transforming demonic memory into Pentecostal memory. Just as their own physical displacement is not an entirely negative condition, their displacement of violent memory is enabling rather than repressive. By "forgetting" the war as a direct realist account and reworking it through the lens of the Underworld, they use war itself to re-member their lives. Although they do not lose their memories of terror and violence, they learn to transform these in ways that allow them to create a moral life course in which they are much more than weak dependents. [source] Israeli Kindergarten Teachers Cope With Terror and War: Two Implicit Models of ResilienceCURRICULUM INQUIRY, Issue 1 2007DAVID BRODY ABSTRACT The resilience of teachers in the face of terror was examined in a narrative study of two Israeli kindergarten teachers over the course of one school year. During this time, there occurred frequent terror attacks as well as the threat of impending war with Iraq and the concomitant threat of chemical warfare. Each teacher's unique pattern of coping based on her own personal theory of resilience was examined. One teacher actively processed with her students stressful news items that the children had encountered. This was based on her belief that children would become more resilient if they had experience dealing with stress in a mediated fashion. The second teacher chose to create what she perceived to be a comfort zone for her students by actively avoiding open discussion about stressful events. She chose to focus on enhancing self-esteem, self-efficacy, and optimism, which she believed would produce greater resilience in her students. In developing these personal resilience theories, both teachers were able to move out of a paralyzed position that is typical of crisis and the immediate posttraumatic period, and move into active coping, thereby incorporating their unique theories of resilience into their personal professional knowledge. These practices were examined in light of current resilience theory. [source] War, Livelihoods and Vulnerability in Sri LankaDEVELOPMENT AND CHANGE, Issue 2 2004Benedikt Korf As the number of de-stabilized regions of warfare or post-war conditions worldwide continues to grow, this article investigates how civilians survive in the context of a civil war. It analyses livelihood strategies of farmers in the war-torn areas of Sri Lanka, using an analytical framework based on a revised form of DFID's sustainable rural livelihoods approach, placing particular attention on the institutional reproduction of household capital assets in the war economy. The author delineates a three pillar model of household livelihood strategies focusing on how households (1) cope with the increased level of risk and uncertainty; (2) adjust their economic and social household assets for economic survival; and (3) use their social and political assets as livelihood strategies. Empirical evidence comes from four case study villages in the east of Sri Lanka. Although the four case studies were very close together geographically, their livelihood outcomes differed considerably depending on the very specific local political geography. The role of social and political assets is essential: while social assets (extended family networks) were important to absorb migrants, political assets (alliances with power holders) were instrumental in enabling individuals, households or economic actors to stabilize or even expand their livelihood options and opportunities. The author concludes that civilians in conflict situations are not all victims (some may also be culprits in the political economy of warfare), and that war can be both a threat and an opportunity, often at the same time. [source] Are non-poor households always less vulnerable?DISASTERS, Issue 3 2008The case of households exposed to protracted civil war in Southern Sudan Civil wars in Africa are now the leading contributory cause of vulnerability of rural communities. Understanding vulnerability during civil war is critical for humanitarian response and post-conflict rehabilitation planning. The lack of understanding of vulnerability has led existing studies to make sweeping generalizations, either by equating the dynamics of vulnerability during civil wars with vulnerability in other risk events, or by projecting people in the ,war zones' as unable to cope and subsequently becoming vulnerable. This paper is an attempt to gain a more nuanced understanding of the dynamics of vulnerability during protracted civil war. It shows that during civil war the non-poor are not necessarily less vulnerable than poor households. The idea that people caught up in civil war are all vulnerable is not supported by the findings of this paper. It shows that the ,standard' pattern of vulnerability to drought is similar to that during exogenous counter-insurgency warfare, while a different pattern of vulnerability to endogenous shocks is identified. [source] Biological warfare in the garden pond: tadpoles suppress the growth of mosquito larvaeECOLOGICAL ENTOMOLOGY, Issue 1 2003Allie Mokany Abstract. 1. Although tadpoles and mosquito larvae may compete for scarce resources in natural freshwater systems, the mechanisms involved in such competition remain largely unstudied. 2. Replicated artificial ponds were set up to examine the role of pathogenic interference (water-borne growth inhibitors) in two tadpole,mosquito systems from south-eastern Australia. One system comprised taxa that are commonly sympatric in freshwater ponds (tadpoles of Limnodynastes peronii and larvae of Culex quinquefasciatus) while the other comprised species that co-occur in brackish water ponds (tadpoles of Crinia signifera and larvae of Ochlerotatus australis). 3. Water that had previously contained tadpoles suppressed the rates of survival and pupation of mosquito larvae in both systems. Fungicide reduced or eliminated this effect, suggesting that the growth inhibitors may be fungal organisms (possibly the yeast Rhodotorula glutinis) from tadpole faeces. Fungicide also enhanced growth rates of tadpoles. 4. These results suggest that interference competition between tadpoles and mosquito larvae is mediated by other organisms in some ecological systems. [source] Taxation, warfare, and the early fourteenth century ,crisis' in the north: Cumberland lay subsidies, 1332,13481ECONOMIC HISTORY REVIEW, Issue 4 2005CHRIS BRIGGS Recent research into the impact of Anglo-Scottish conflict on northern England's economy has become increasingly sophisticated, using local estate accounts to enhance understanding of the role of war in the 'crisis' of the early fourteenth century. Yet taxation data also remains an important source on these issues, not least because of its wide geographical coverage. Using a rich series of lay subsidy documents for Cumberland, this article concludes that the direct impact of Scottish raids was only one of several determinants of economic fortunes. More significantly, reconstructing the process of taxation shows that non-violent resistance to state levies was as responsible as war damage for a decline in revenue from the county. [source] Targeting Chemical and Biological Warfare Agents at the Molecular LevelELECTROANALYSIS, Issue 14 2003Omowunmi Abstract After the September,11 tragedies of 2001, scientists and law-enforcement agencies have shown increasing concern that terrorist organizations and their "rogue" foreign government-backers may resort to the use of chemical and/or biological agents against U.S. military or civilian targets. In addition to the right mix of policies, including security measures, intelligence gathering and training for medical personnel on how to recognize symptoms of biochemical warfare agents, the major success in combating terrorism lies in how best to respond to an attack using reliable analytical sensors. The public and regulatory agencies expect sensing methodologies and devices for homeland security to be very reliable. Quality data can only be generated by using analytical sensors that are validated and proven to be under strict design criteria, development and manufacturing controls. Electrochemical devices are ideally suited for obtaining the desired analytical information in a faster, simpler, and cheaper manner compared to traditional (lab-based) assays and hence for meeting the requirements of decentralized biodefense applications. This articler presents a review of the major trends in monitoring technologies for chemical and biological warfare (CBW) agents. It focuses on research and development of sensors (particularly electrochemical ones), discusses how advances in molecular recognition might be used to design new multimission networked sensors (MULNETS) for homeland security. Decision flow-charts for choosing particular analytical techniques for CBW agents are presented. Finally, the paths to designing sensors to meet the needs of today's measurement criteria are analyzed. [source] |