Nt1310 Unit 3 Research Paper

Improved Essays
Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War). (State Dept.org) While this Protocol was a good step forward, it does not stop the use of chemical/biological weapons by state actors that are non-signatory (e.g. Iraq's use of nerve agents during the Iran-Iraq War in the 80's).

Lethal Dose (LD) and Lethal Dose 50 (LD 50 or LD-50, or LD/50) can be defined as the median amount of material
…show more content…
has a working, single approach to respond to and care for the public in the unlikely event of terrorist attacks, major disasters, and "other" emergencies. This Directive deals directly with utilizing a national approach to domestic incident management. The President directly established that the Secretary of Homeland Security be the chief Federal official regarding national incident management. Reading through PD-5, it is my opinion that the Directive focuses primarily on terrorist activities/attacks, however, this could easily apply to domestic nuclear incidents such as reactor meltdowns, Broken Arrows, lost weapons or all-out nuclear attacks on the

Related Documents

  • Improved Essays

    My first research experience started when I participated in bone scaffold designing project at the Cooper Union in Spring 2012, under the supervision of professor David Wootton at Cooper Union Department of Mechanical Engineering. The purpose of this study was to design and manufacture bone scaffold for orthopedic trauma, especially for segmented bone fracture. I worked with a senior mechanical engineering student who had been conducting the research as his senior capstone project. The first task was to test manufacturing efficiency of two different types of polycaprolactone (PCL) with different average molecular weight. I concluded that the low molecular weight PCL is more convenient for mold-casting fabrication, due to low viscosity, while the high molecular weight PCL has an advantage of being mechanically stronger than the brittle…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The design idea we had was modified several times. Initially the fingers that were constructed for the hand seemed to work and look fine in our Solidworks assembly. We did not want the fingers to be too large as the girl were were designing the hand for is only seven years old. However, after printing them, we quickly realized that they were far too small to be able to exert the force to grasp a water bottle. Furthermore, because they were so small, it was difficult for the 3D printer to print out the finger because the walls were so thin.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We want the neural network to predict the stock price at a future date using stock price, EMA, RSI and MACD data of today and the last few days. The neural network can be configured to have a specified number of hidden layers. In addition to hidden layers the neural network has an input layer and an output layer. In the input layer we give the input that is stock price, EMA, RSI and MACD data of today and the last few days. The hidden layer comes between the input layer and the output layer.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the paper, [1], the author introduced two kinds of topology attacks focus on the architecture of SDN and emphasized the weakness of the host tracking service and the link discovery service. And then, the paper provides the security extension, called Topoguard, for the Floodlight v0.9 controller. A. Two topology attacks The first attack as we mentioned, Host Location Hijacking Attack, is to send a fake request that the target host migrates to a new location trying to intercept packets and connections to the target host. This attack uses the weakness of the host tracking service that the controller simply follows the latest Packet-in message and does not check the identity of the request.…

    • 647 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 1312 Words
    • 6 Pages

    a.) Describe the establishments you visited (include location/ major intersection), the waiting-line model in use, and your overall experience. State the wait times for each line you were in. Store 1: I visited the nearest Costco store. The store is located at 71 Colossus Drive, Woodbridge, ON L4L 9J8, In the city of Vaughan.…

    • 1312 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 1 Study

    • 419 Words
    • 2 Pages

    1.2.1 Studying Server Consolidation Server consolidation is an approach to the capable usage of computer server sources in order to reduce the total number of servers or server location that an organization needs. The practice was developed in reply to the problem of “server sprawl,” a position in which several under-utilized servers take up more space and consume more sources than can be acceptable by their workload. SERVER PRODUCT ARCHITECTURE A few definitions provide a good starting point. Three terms are important to VMware: 1.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Cybersecurity is vital to improving the security and reliability of the Western Interconnection power grid. As one of the most complex and critical infrastructures, the importance of prioritizing the continued security of the power grid should be at the top of the list. There are many different options that can improve security levels of both a physical and logical nature, such as disk drive encryption, digital certificates, Transport Layer Security (TLS), and Virtual Private Networks. Recommendation: Implement Full Disk Encryption Full disk encryption is the ability to convert data into unreadable code that can only be deciphered by authorized people. The encryption can include almost everything on the system such as temporary files and swap files.…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    The general model introduced in Fig.4.10 is commonly used to design stable high-order modulators. If a chain of integrators is used to form the loop filter, two main modulators typologies exist [1, 5, 8]: a cascade of M delaying integrators is used to form the filter, where the feedback and the input signals are being fed to each integrator input with different weight factors a_i and b_i (Fig.4.11). The transfer function of the signal filter, L_0, is: while the feedback filter L_1 can be derived as: where a_i and b_i>0. The NTF results: Note that the NTF zeros must lie at 푧=1 (i.e. DC). The weight factors a_i can be used to introduce finite non-zero poles into the NTF and to determine the zeros of L_1 (z).…

    • 275 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This was a real threat to all people even civilians the thought of dying choking on yellow smoke and just struggling to breathe is a horrible way to go out for most people. The Geneva Protocol was a treaty to make war less terrifying because of this treaty all of the countries that had chemical weapons stocked up and ready for war they all had to be destroyed so there is no chemical weapons in all of the countries that signed this treaty but of course there are countries that didn’t sign for example the soviet union didn’t sign…

    • 1531 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Until the end of the Cold War, the environmental and public health costs of U.S. nuclear weapons generally received little consideration and finance. This was partly because they were lacking organized efforts proceeding to address all of the issues. But it was also because few government officials felt comfortable raising concerns about real and possible hazards posed by the manufacture and testing of nuclear arms at a time when those weapons were still…

    • 1103 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    The Geneva Protocol

    • 2274 Words
    • 10 Pages

    I. Introduction From World War I to shortly after World War II, the Western world created numerous significant treaties and agreements including the Treaty of Versailles, the Molotov-Ribbentrop Pact, and The Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other Gases, and of Bacteriological Methods of Warfare, otherwise known as the Geneva Protocol. However, the Geneva Protocol is one of the most comprehensive and arguably successful agreements to come from the time period despite being short in comparison to similar documents. The Geneva Protocol aimed to prohibit the use of “of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices [in warfare ... as well as] bacteriological…

    • 2274 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Review: My Experience Using Gionee M5 So Far The Gionee M5 sees gionee launch the marathon series of smart-phones in the lower mid range category. This sees improvement in the build quality, display quality/size and the camera department. I'll dive into these in detail as we go further.…

    • 966 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    My Plate Comparing my recorded diet to the My Plate recommended value I found some interesting facts. My grain intake was at 96.7%, my vegetable intake was at 29.2%, fruits was at 24%, dairy at 8.3%, protein foods at 149.4%, empty calories at 70.1%. Some of the numbers are alarming. I am fully aware of the fact that I do not consume enough vegetables, fruits and dairy.…

    • 837 Words
    • 4 Pages
    Improved Essays