text
stringlengths
9
3.55k
source
stringlengths
31
280
All models of Gatling guns were declared obsolete by the U.S. Army in 1911, after 45 years of service.With "hot" handloads and a rifle capable of handling them, the .30-06 is capable of performance rivaling many magnum cartridges. However, when loaded more closely to the original government specs, .30-06 remains within the upper limit of felt recoil most shooters consider tolerable over multiple rounds, unlike the magnums, and is not unnecessarily destructive of meat on game such as deer. With appropriate loads, it is suitable for any small or large heavy game found in North America. The .30-06's power and versatility (combined with the availability of surplus firearms chambered for it and demand for commercial ammunition) have kept the round as one of the most popular for hunting in North America.
https://en.wikipedia.org/wiki/.30-06_Springfield
In military situations, a turkey shoot occurs when a group or team catch the enemy off-guard or outgunned to the point of the battle being extremely lopsided, as in the following famous examples: Battle of New Orleans – War of 1812 Battle of San Jacinto – Texas Revolution Charge of the Light Brigade – Crimean War Battle of the Crater – American Civil War Battle of the Philippine Sea – World War II Battle of Longewala – Indo-Pakistani War of 1971 Operation Mole Cricket 19 – 1982 Lebanon War Highway of Death – Gulf War Battle of Fallujah (2016) – Iraqi Civil War (2014–2017)
https://en.wikipedia.org/wiki/Turkey_shoot
In military slang, a spider hole is a type of camouflaged one-man foxhole, used for observation.
https://en.wikipedia.org/wiki/Spider_hole
In military strategy, a choke point (or chokepoint) is a geographical feature on land such as a valley, defile or bridge, or maritime passage through a critical waterway such as a strait, which an armed force is forced to pass through in order to reach its objective, sometimes on a substantially narrowed front and therefore greatly decreasing its combat effectiveness by making it harder to bring superior numbers to bear. A choke point can allow a numerically inferior defending force to use the terrain as a force multiplier to thwart or ambush a much larger opponent, as the attacker cannot advance any further without first securing passage through the choke point.
https://en.wikipedia.org/wiki/Choke_point
In military studies concerning the deployment of nuclear weapons, Swedish plans focused on bombs dropped by ground-attack aircraft. The Swedes planned to have a relatively small number of tactical nuclear weapons; the Saab 36 bomber was supposed to be able to carry an 800 kg free falling nuclear weapon, but development of the aircraft was cancelled in 1957. Thus, it was the Air Force's most modern fighter-bomber that was intended to carry nuclear weapons as well as other weaponry. Had the program followed its original schedule, the Saab A32 Lansen would have been the relevant platform.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
According to the revised schedule in which nuclear weapons would have appeared first in the 1970s, the AJ 37 Viggen would have also been relevant. The studies of nuclear payloads also briefly discussed the possibility of using land-based missiles with a range of about 100 km, as well as nuclear-armed torpedoes. The most likely configuration would have been Sjöormen-class submarine firing modified Torped 61 torpedoes.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
Little else is known about these alternative plans, since the Swedish program focused mainly on bombs dropped by aircraft. From 1957 to 1959, Saab developed Robot 330, a land attack missile with 500 km range, which was designed to carry nuclear warheads. The project was shut down due to excessive costs.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
Some other types of weapons outlined and developed during the 1950—60s were designed as carriers for nuclear weapons – among them, the Saab A36, a strategic bomber, Bandkanon 1, a 155 mm artillery piece, and Robot 08, an anti-ship missile. These claims have been circulating since the times when the defense studies were still classified. There were certainly first drafts concerning the physical shape of Swedish nuclear weapon when the Saab A36 was under development, but the project A36 was soon abandoned in favor of the Saab AJ 37 Viggen when the first detailed military (rather than merely physical or technical) studies were conducted in 1961–62.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
Thus, even if the A36 was not designed to be an integral part of the nuclear weapons program itself, it was constructed specifically as a nuclear weapons carrier. A36 pilots were to specialize in this task.As for Robot 08, the previously classified documents provide no support for the claim that something other than aerial bombs would have been prioritized. Nuclear-armed anti-ship missiles (as the RBS-15 is believed to have such a non-conventional option capability), as well as nuclear-armed torpedoes, would primarily have been targeted at naval transportation.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
However, the study of nuclear devices came to the conclusion that a bomb dropped in the home port would have the greatest impact. At sea, naval fleets would be dispersed to reduce casualties from nuclear attack. Statements about plans on nuclear ammunition for 155 mm Swedish artillery greater than 25 km range should be viewed with even greater skepticism.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
Since the US developed nuclear ammunition for its 155 mm artillery and the USSR developed ammunition for its 152 mm, certainly a Swedish device was technically possible. The only American type of device of this calibre that was actually completed, W48, had only a 72-ton yield even though it required as much plutonium as a significantly higher yielding device. Explosives with greater effect were primarily used in artillery with 203 mm and 280 mm barrels.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
These artillery projectiles used a different design principal, linear implosion instead of a traditional spherical implosion bomb. Such designs sacrificed efficiency and yield to reduce the payload's diameter. Since Sweden's plutonium supply was always a limiting factor in its nuclear program, and cost-effectiveness was a concern, it is unlikely that Sweden would have sacrificed multiple aerial bombs to build one battlefield device, especially when taking into account the reduced yield and additional development expenses.
https://en.wikipedia.org/wiki/Swedish_nuclear_weapons_program
In military tactics, a flanking maneuver is a movement of an armed force around an enemy force's side, or flank, to achieve an advantageous position over it. Flanking is useful because a force's fighting strength is typically concentrated in its front, therefore, to circumvent an opposing force's front and attack its flank is to concentrate one's own offense in the area where the enemy is least able to concentrate defense. Flanking can also occur at the operational and strategic levels of warfare.
https://en.wikipedia.org/wiki/Flanking_maneuver
In military tactics, a strongpoint is a key point in a defensive fighting position which anchors the overall defense line. This may include redoubts, bunkers, pillboxes, trenches or fortresses, alone or in combination; the primary requirement is that it should not be easily overrun or avoided. A blocking position in good defensive terrain commanding the lines of communication, such as high ground, is preferred. Examples from history include Thermopylae, where the ancient Greeks held back a much larger Persian army, and Monte Cassino, which anchored the Winter Line in Italy in World War II. == References ==
https://en.wikipedia.org/wiki/Strongpoint
In military tactics, close air support (CAS) is defined as aerial warfare actions—often air-to-ground actions such as strafes or airstrikes—by military aircraft against hostile targets in close proximity to friendly forces. A form of fire support, CAS requires detailed integration of each air mission with fire and movement of all forces involved. CAS may be conducted using aerial bombs, glide bombs, missiles, rockets, autocannons, machine guns, and even directed-energy weapons such as lasers.The requirement for detailed integration because of proximity, fires or movement is the determining factor. CAS may need to be conducted during shaping operations with special forces if the mission requires detailed integration with the fire and movement of those forces.
https://en.wikipedia.org/wiki/Ground_attack
A closely related subset of air interdiction, battlefield air interdiction, denotes interdiction against units with near-term effects on friendly units, but which does not require integration with friendly troop movements. CAS requires excellent coordination with ground forces, typically handled by specialists such as artillery observers, joint terminal attack controllers, and forward air controllers. World War I was the first conflict to make extensive use of CAS, albeit using relatively primitive methods in contrast to later warfare, though it was made evident that proper coordination between aerial and ground forces via radio made attacks more effective.
https://en.wikipedia.org/wiki/Ground_attack
Several conflicts during the interwar period—including the Polish–Soviet War, the Spanish Civil War, the Iraqi Revolt, and the Chaco War—made notable use of CAS. World War II marked the universal acceptance of the integration of air power into combined arms warfare, with all of the war's major combatants having developed effective air-ground coordination techniques by the conflict's end. New techniques, such as the use of forward air control to guide CAS aircraft and identifying invasion stripes, also emerged at this time, being heavily shaped by the Italian Campaign and the invasion of Normandy. CAS continued to advance during the conflicts of the Cold War, especially the Korean War and the Vietnam War; major milestones included the introduction of attack helicopters, gunships, and dedicated CAS attack jets.
https://en.wikipedia.org/wiki/Ground_attack
In military tactics, the kill zone, also known as killing zone, is an area entirely covered by direct and effective fire, an element of ambush within which an approaching enemy force is trapped and destroyed. The objective of the ambush force is to quickly kill or capture all enemy soldiers inside the kill zone. The trapped soldiers may respond by counterattacking. The term is used in the analogous non-lethal sense in paintball and airsoft tactics.
https://en.wikipedia.org/wiki/Kill_zone
In military telecommunications, electronic support (ES) or electronic support measures (ESM) gather intelligence through passive "listening" to electromagnetic radiations of military interest. They are an aspect of electronic warfare involving actions taken under direct control of an operational commander to detect, intercept, identify, locate, record, and/or analyze sources of radiated electromagnetic energy for the purposes of immediate threat recognition (such as warning that fire control radar has locked on a combat vehicle, ship, or aircraft) or longer-term operational planning. Thus, electronic support provides a source of information required for decisions involving electronic protection (EP), electronic attack (EA), avoidance, targeting, and other tactical employment of forces. Electronic support data can be used to produce signals intelligence (SIGINT), communications intelligence (COMINT) and electronics intelligence (ELINT).Electronic support measures can provide (1) initial detection or knowledge of foreign systems, (2) a library of technical and operational data on foreign systems, and (3) tactical combat information utilizing that library.
https://en.wikipedia.org/wiki/Electronic_Support_Measures
ESM collection platforms can remain electronically silent and detect and analyze RADAR transmissions beyond the RADAR detection range because of the greater power of the transmitted electromagnetic pulse with respect to a reflected echo of that pulse. United States airborne ESM receivers are designated in the AN/ALR series.Desirable characteristics for electromagnetic surveillance and collection equipment include (1) wide-spectrum or bandwidth capability because foreign frequencies are initially unknown, (2) wide dynamic range because the signal strength is initially unknown, (3) narrow bandpass to discriminate the signal of interest from other electromagnetic radiation on nearby frequencies, and (4) good angle-of arrival measurement for bearings to locate the transmitter. The frequency spectrum of interest ranges from 30 MHz to 50 GHz. Multiple receivers are typically required for surveillance of the entire spectrum, but tactical receivers may be functional within a specific signal strength threshold of a smaller frequency range.
https://en.wikipedia.org/wiki/Electronic_Support_Measures
In military terminology a landing zone (LZ) is an area where aircraft can land. In the United States military, a landing zone is the actual point where aircraft, especially helicopters, land (equivalent to the commonwealth landing point. )In commonwealth militaries, a landing zone is the cartographic (numeric) zone in which the landing is going to take place (e.g., a valley).
https://en.wikipedia.org/wiki/Landing_zones
The landing area is the area in which the landing is going to take place (e.g., the field where the aircraft are to land). The landing point is the actual point on which aircraft are going to land (e.g., a point of the field). Each aircraft has a different landing point.
https://en.wikipedia.org/wiki/Landing_zones
In military terminology, a black site is a location at which an unacknowledged black operation or black project is conducted. A 2021 Associated Press news story defined black sites as "clandestine jails where prisoners generally are not charged with a crime and have no legal recourse, with no bail or court order."
https://en.wikipedia.org/wiki/Black_site
In military terminology, a demolition belt is a selected land area sown with explosive charges, mines, and other available obstacles to deny use of the land to enemy operations, and as a protection to friendly troops.There are two types of demolition belt: A primary demolition belt is a continuous series of obstacles across the whole front, selected by the division or higher commander. The preparation of such a belt is normally a priority engineer task. A subsidiary demolition belt is a supplement to the primary belt to give depth in front or behind or to protect the flanks.
https://en.wikipedia.org/wiki/Demolition_belt
In military terminology, a missile is a guided airborne ranged weapon capable of self-propelled flight usually by a jet engine or rocket motor. Missiles are thus also called guided missiles or guided rockets (when a previously unguided rocket is made guided). Missiles have five system components: targeting, guidance system, flight system, engine, and warhead. Missiles come in types adapted for different purposes: surface-to-surface and air-to-surface missiles (ballistic, cruise, anti-ship, anti-submarine, anti-tank, etc.), surface-to-air missiles (and anti-ballistic), air-to-air missiles, and anti-satellite weapons.
https://en.wikipedia.org/wiki/Guided_missile
Airborne explosive devices without propulsion are referred to as shells if fired by an artillery piece and bombs if dropped by an aircraft. Unguided jet- or rocket-propelled weapons are usually described as rocket artillery. Historically, the word missile referred to any projectile that is thrown, shot or propelled towards a target; this usage is still recognized today.
https://en.wikipedia.org/wiki/Guided_missile
In military terminology, a rocket is a self-propelled, generally unguided, weapon-system powered by a rocket engine. Though used primarily as medium- and long-range artillery systems, historically rockets have also seen considerable use as air-to-surface weapons, some use as air-to-air weapons, and even (in a few cases) as surface-to-air devices. Examples of modern surface-to-surface rocket systems include the Soviet BM-27 Uragan and the American M270 Multiple Launch Rocket System. In military parlance, a rocket differs from a missile primarily by lacking an active guidance system; early missiles became known as "guided rockets" or "guided missiles". Some rockets were developed as unguided systems and later upgraded to guided versions, like the GMLRS, and these generally retain the term "rocket" instead of becoming "missiles". Rockets or missiles that travel underwater, like the VA-111 Shkval, are known as "torpedoes", whatever their propulsion system.
https://en.wikipedia.org/wiki/Unguided_rocket
In military terminology, a soft-skinned vehicle is any vehicle that is not armored, such as a truck, motorcycle, Jeep or car. The term soft-skinned vehicle may apply also to half-tracks and scouting vehicles having little or no armor. These can be used as general-purpose workhorses, like a 53-seater coach or pick-up, a military police vehicle, or a car used for undercover work on the home front. == References ==
https://en.wikipedia.org/wiki/Soft-skinned_vehicle
In military terminology, friendly fire or fratricide is an attack by belligerent or neutral forces on friendly troops while attempting to attack enemy/hostile targets. Examples include misidentifying the target as hostile, cross-fire while engaging an enemy, long range ranging errors or inaccuracy. Accidental fire not intended to attack enemy/hostile targets, and deliberate firing on one's own troops for disciplinary reasons, is not called friendly fire, and neither is unintentional harm to civilian or neutral targets, which is sometimes referred to as collateral damage. Training accidents and bloodless incidents also do not qualify as friendly fire in terms of casualty reporting.Use of the term "friendly" in a military context for allied personnel started during the First World War, often when shells fell short of the targeted enemy.
https://en.wikipedia.org/wiki/Friendly_fire
The term friendly fire was originally adopted by the United States military; S.L.A. Marshall used the term in Men Against Fire in 1947. Many North Atlantic Treaty Organization (NATO) militaries refer to these incidents as blue on blue, which derives from military exercises where NATO forces were identified by blue pennants and units representing Warsaw Pact forces by red pennants. In classical forms of warfare where hand-to-hand combat dominated, death from a "friendly" was rare, but in industrialized warfare, deaths from friendly fire are more common.Friendly fire should not be confused with fragging, which is the uncondoned intentional (or attempted) killing of servicemen by fellow personnel serving on the same side.
https://en.wikipedia.org/wiki/Friendly_fire
In military terminology, it is used for the stated ability of some military commanders, such as Field-Marshal Erwin Rommel, to describe "the instinctive and immediate response to battle situations", a quality needed to maintain, with great accuracy and attention to detail, an ever-changing operational and tactical situation by maintaining a mental map of the battlefield. The idiom is intended to evoke a military commander who is in such intimate communication with the battlefield that it is as though he has a fingertip on each critical point. In this sense the term is synonymous with the English expression of "keeping one's finger on the pulse", and was expressed in the 18th and 19th centuries as "having a feel for combat". The term is only figurative, and cannot in itself give a realistic picture of the ability being described.
https://en.wikipedia.org/wiki/Fingerspitzengefühl
It is cognitively related to personal possession of multiple intelligences, notably those pertinent to visual and spatial data processing. The term suggests that in addition to any discursive processing of information that the commander may be conducting (such as mentally considering a specific plan), the commander is automatically establishing cognitive relationships between disparate pieces of information as they arrive, and is able to immediately re-synthesise their mental model of the battlefield. Even though there is no physical connection between the commander and his troops, other than conduits for discursive information such as radio signals, it is as if the commander had their own sensitive presence in each spot.
https://en.wikipedia.org/wiki/Fingerspitzengefühl
One of the functions of a static map is to allow a traveler to decide upon a course of action suitable for getting from one point to another. In times of war, the terrain and the troops and weapons deployed upon it can be changed much more rapidly than cartographers can change their maps. A commander with Fingerspitzengefühl would hold such a map in their mind, and adjust it by incorporating any significant information that was received. Colonel Mehta Basti Ram was said to have Fingerspitzengefühl.
https://en.wikipedia.org/wiki/Fingerspitzengefühl
In military terminology, vulnerability is a subset of survivability, the others being susceptibility and recoverability. Vulnerability is defined in various ways depending on the nation and service arm concerned, but in general it refers to the near-instantaneous effects of a weapon attack. In aviation it is defined as the inability of an aircraft to withstand the damage caused by the man-made hostile environment. In some definitions, recoverability (damage control, firefighting, restoration of capability) is included in vulnerability. Some military services develop their own concept of vulnerability.
https://en.wikipedia.org/wiki/Window_of_vulnerability
In military thinking, John Robb applies the long tail to the developments in insurgency and terrorist movements, showing how technology and networking allows the long tail of disgruntled groups and criminals to take on the nation state and have a chance to win.
https://en.wikipedia.org/wiki/The_long_tail
In military uniforms, a shoulder belt is a wide belt worn usually over the shoulder and across the body. With nearly all line infantry, skirmishers, light infantry, grenadiers and guard regiments, two shoulder belts were worn - one carrying the cartridge box, and another for the bayonet, a sword ("sword belt" was also the term in this case), or other military equipment.A shoulder belt was worn in various configurations, depending on army and rank. For example, an officer may have only worn one shoulder belt as appropriate for only having a pistol. A light horseman may have also worn one shoulder belt, for their cartridge pouch.
https://en.wikipedia.org/wiki/Shoulder_belt_(military)
Initially shoulder belts had buckles. In the second half of the 18th century the British army replaced buckles with shoulder belt plates. The latter ones were solid metal plates fixed with two studs to one end of the belt and used a hook to pass through one of several holes by the other end.
https://en.wikipedia.org/wiki/Shoulder_belt_(military)
This arrangement allowed for quick readjustment and a more neat appearance. Officers used to wear fancy gold and silver plates with elaborate engravings. Soldiers wore brass plates, usually with numerical or other design indicative of their regiment.
https://en.wikipedia.org/wiki/Shoulder_belt_(military)
In military usage, a barrage is massed sustained artillery fire (shelling) aimed at a series of points along a line. In addition to attacking any enemy in the kill zone, a barrage intends to suppress enemy movements and deny access across that line of barrage. The impact points along the line may be 20–30 yards/meters apart, with the total line length of the barrage zone anything from a few hundred to several thousand yards/meters long. Barrages can consist of multiple such lines, usually about 100 yards/meters apart, with the barrage shifting from one line to the next over time, or several lines may be targeted simultaneously.
https://en.wikipedia.org/wiki/Artillery_barrage
A barrage may involve a few or many artillery batteries, or even (rarely) a single gun. Typically each gun in a barrage, using indirect fire, will fire continuously at a steady rate at its assigned point for an assigned time before moving onto the next target, following the barrage's detailed timetable. Barrages typically use high-explosive shells, but may also be shrapnel, smoke, illumination, poison gas (in World War I), or potentially other chemical agents.
https://en.wikipedia.org/wiki/Artillery_barrage
Barrages are in contrast with concentrated artillery fire, which has a single specific target such as a known enemy position or structure, and in contrast with direct fire which targets enemies within the direct line of sight of the gun. Barrages may be used defensively or offensively, and have a variety of patterns. Defensive ones are often static (such as a standing barrage) while offensive ones are moved in coordination with the advancing friendly troops (such as creeping, rolling, or block barrages).
https://en.wikipedia.org/wiki/Artillery_barrage
They may target along the front line, or further into enemy back area to isolate certain enemy positions (such as a box barrage). A series of different patterns may be employed as a battle develops, with each barrage lasting only a few minutes or many hours. Barrages are usually integral with larger operations of multiple military formations, from divisions to armies, requiring days to weeks of preparation and exact planning.
https://en.wikipedia.org/wiki/Artillery_barrage
The barrage was developed by the British Army in the Second Boer War. It came to prominence in World War I, notably its use by the British Expeditionary Force and particularly from late 1915 onwards when the British realized that the suppressive effects of artillery to provide covering fire were the key to breaking into defensive positions. By late 1916 the creeping barrage was the standard means of applying artillery fire to support an infantry attack, with the infantry following the advancing barrage as closely as possible.
https://en.wikipedia.org/wiki/Artillery_barrage
Its employment in this way recognised the importance of artillery fire in suppressing or neutralizing, rather than destroying, the enemy. It was found that a moving barrage immediately followed by the infantry assault could be far more effective than weeks of preliminary bombardment. Barrages remained in use in World War II and later, but only as one of a variety of artillery tactics made possible by improvements in predicted fire, target location and communications. The term barrage is widely, and technically incorrectly, used in the popular media for any artillery fire.
https://en.wikipedia.org/wiki/Artillery_barrage
In military usage, a region is shorthand for the name of a military formation larger than an Army Group and smaller than a Theater. The full name of the military formation is Army Region. The size of an Army Region can vary widely but is generally somewhere between about 1 million and 3 million soldiers. Two or more Army Regions could make up a Theater.
https://en.wikipedia.org/wiki/Region
An Army Region is typically commanded by a full General (US four stars), a Field Marshal or General of the Army (US five stars), or Generalissimo (Soviet Union); and in the US Armed Forces an Admiral (typically four stars) may also command a region. Due to the large size of this formation, its use is rarely employed. Some of the very few examples of an Army Region are each of the Eastern, Western, and southern (mostly in Italy) fronts in Europe during World War II. The military map unit symbol for this echelon of formation (see Military organization and APP-6A) is identified with six Xs.
https://en.wikipedia.org/wiki/Region
In military usage, fit to receive or fitting "for but not with" describes a weapon or system which is called for in a design but not installed or is only partially installed during construction, with the installation completed later as needed. This can be done to reduce the vessel's build cost by not purchasing the system at the time of construction, as a method of future-proofing a design, or for security purposes. The term is usually used in regard to ships but sometimes extends to military vehicles, aircraft and other hardware.Provision is made physically with power supply and data wiring to a hardpoint or through software for the installation of a weapon or system which is marked for purchase at a later date, with installation during the vehicle's modernisation or refit. Part of the justification for this design concept is the implicit assumption that in the event of the system being required (such as a war), there should be enough warning time to purchase the system, install it in the vehicle, and train operators in its use.Fitting for but not with can range anywhere between leaving sufficient space for any future upgrades, to installing a weapon system during construction but not purchasing ammunition until it is needed.
https://en.wikipedia.org/wiki/For_but_not_with
In military use, a petard mortar was a spigot mortar (a weapon that fires explosive projectiles, known as bombs, at low velocities, short ranges and parabolic ballistic trajectories) of a 230 mm (9.1 in) bore, known to its crews as the "flying dustbin" due to the characteristics of its projectile, an un-aerodynamic 20 kg (44 lb) charge that could be fired up to 100 m (110 yd). The weapon was carried by the Churchill AVRE tank and was sufficient to breach or demolish many bunkers and earthworks.In Maltese English, home-made fireworks—a popular and widespread albeit highly dangerous hobby in Malta—are called petards (the word in Maltese, murtal, is related to "mortar"). These petards are detonated by the dozen during feasts dedicated to local patron saints. Maltese petards are made by common people without formal education in chemistry, as an exercise in traditional handiwork.
https://en.wikipedia.org/wiki/Petard
In military use, the J75 was used on the Convair F-106 Delta Dart, Lockheed U-2, and Republic F-105 Thunderchief. It was also utilized in the prototype and experimental Avro Canada CF-105 Arrow, Lockheed A-12, Martin P6M SeaMaster, North American YF-107, and Vought XF8U-3 Crusader III. Before the arrival of the Pratt & Whitney JT3D turbofan engine, the JT4A was used to power certain Boeing 707 and Douglas DC-8 models, bringing improved field performance in the medium-range Boeing 707-220 and Douglas DC-8-20, and intercontinental range in the Boeing 707-320 and the Douglas DC-8-30. By late 1959, P&W had considered introducing a turbofan version of the J75, which was to have tentatively been named the TF75 or JT4D. Apparently, little interest was shown by the aircraft industry, so the variant was dropped.
https://en.wikipedia.org/wiki/Pratt_&_Whitney_J75/JT4
In milling the spindle is where a cutting tool is mounted. In some situations material must be cut from a direction where the feature can not be seen from the perspective of the spindle and requires special tooling to reach behind the visible material. The corners may be undercut to remove the radius that is usually left by the milling cutter this is commonly referred to as a relief.
https://en.wikipedia.org/wiki/Undercut_(manufacturing)
In million tonnes CO2e, China is the largest emitter with 12705; USA is second with 6001, India 3394, EU (which is 27 countries) 3383, Russia 2476, Japan 1166, Brazil 1057, Indonesia 1002, Iran 893, and Canada 736.
https://en.wikipedia.org/wiki/Top_contributors_to_climate_change
In millipedes, ozopores are repeated serially on body segments, and usually situated laterally. Exceptions are members of the order Glomerida, which have ozopores located dorsally. Some members of the order Julida have especially prominent ozadenes.
https://en.wikipedia.org/wiki/Ozopore
In mimesis (also called masquerade), the camouflaged object looks like something else which is of no special interest to the observer. Mimesis is common in prey animals, for example when a peppered moth caterpillar mimics a twig, or a grasshopper mimics a dry leaf. It is also found in nest structures; some eusocial wasps, such as Leipomeles dorsata, build a nest envelope in patterns that mimic the leaves surrounding the nest.Mimesis is also employed by some predators and parasites to lure their prey. For example, a flower mantis mimics a particular kind of flower, such as an orchid.
https://en.wikipedia.org/wiki/Silvering_(camouflage)
This tactic has occasionally been used in warfare, for example with heavily armed Q-ships disguised as merchant ships.The common cuckoo, a brood parasite, provides examples of mimesis both in the adult and in the egg. The female lays her eggs in nests of other, smaller species of bird, one per nest. The female mimics a sparrowhawk.
https://en.wikipedia.org/wiki/Silvering_(camouflage)
The resemblance is sufficient to make small birds take action to avoid the apparent predator. The female cuckoo then has time to lay her egg in their nest without being seen to do so. The cuckoo's egg itself mimics the eggs of the host species, reducing its chance of being rejected.
https://en.wikipedia.org/wiki/Silvering_(camouflage)
In mineral exploration, the most common drilling method is a rotary rig with fluid circulated down the drillpipe and back up between the drillpipe and the borehole wall. The fluid carries the cuttings to the surface, where the cuttings are removed, and the recycled fluid, known as mud, is returned to the hole. The first ice drilling project to try this approach was an American Geographical Society expedition to the Taku Glacier in 1950.
https://en.wikipedia.org/wiki/Ice_drilling
Fresh water, drawn from the glacier, was used as the drilling fluid, and three holes were drilled, to a maximum depth of 89 m. Cores were retrieved, but in poor condition. Seawater has also been tried as a drilling fluid. The first time a fluid other than water was used with a conventional rotary rig was in late 1958, at Little America V, where diesel fuel was used for the last few metres of a 254 m hole.
https://en.wikipedia.org/wiki/Ice_drilling
In mineral processing, such as metals ore (e.g. iron, tin, tungsten, tantalum etc.) and nonferrous metals ores (e.g. lead, zinc, gold, silver and industrial sand etc.), high frequency screens have a crucial role. After the ores get comminuted, high frequency screens are used as a classifier which selects materials size that is small enough to enter the next stage for recovery. For example, the closed grinding circuit (e.g. recirculating network with ball mill). Firstly, it screens out the coarse particles and recirculates them back to the grinding mill machine.
https://en.wikipedia.org/wiki/High_Frequency_Vibrating_Equipment
Secondly, the fine-grained material will be unloaded in a timely manner, avoiding over-crushing caused by re-grinding. The benefits of using high frequency screens in mineral processing can meet the requirement of fineness easily for recovery and is able to achieve a smaller size separation, reducing capacity needed for comminution stage and overall energy consumption. Hence, improving the grade of the final product and providing a better recovery and screening efficiency.
https://en.wikipedia.org/wiki/High_Frequency_Vibrating_Equipment
In mineralogy, a Miller index of 101 is a crystal face that crosses the horizontal axis (a) and 3D vertical axis (c) but does not cross the 2D vertical axis (b). In physics and chemistry, it is the atomic number of mendelevium, an actinide. In astronomy it is the Messier designation given to the Pinwheel Galaxy in Ursa Major.
https://en.wikipedia.org/wiki/101_(number)
In mineralogy, amorphous carbon is the name used for coal, carbide-derived carbon, and other impure forms of carbon that are neither graphite nor diamond. In a crystallographic sense, however, the materials are not truly amorphous but rather polycrystalline materials of graphite or diamond within an amorphous carbon matrix. Commercial carbon also usually contains significant quantities of other elements, which may also form crystalline impurities.
https://en.wikipedia.org/wiki/Amorphous_carbon
In mineralogy, an inclusion is any material that is trapped inside a mineral during its formation. In gemology, an inclusion is a characteristic enclosed within a gemstone, or reaching its surface from the interior.According to Hutton's law of inclusions, fragments included in a host rock are older than the host rock itself.
https://en.wikipedia.org/wiki/Inclusion_(mineral)
In mineralogy, crystal habit is the characteristic external shape of an individual crystal or aggregate of crystals. The habit of a crystal is dependent on its crystallographic form and growth conditions, which generally creates irregularities due to limited space in the crystallizing medium (commonly in rocks).
https://en.wikipedia.org/wiki/Mineral_habit
In mineralogy, epitaxy is the overgrowth of one mineral on another in an orderly way, such that certain crystal directions of the two minerals are aligned. This occurs when some planes in the lattices of the overgrowth and the substrate have similar spacings between atoms.If the crystals of both minerals are well formed so that the directions of the crystallographic axes are clear then the epitaxic relationship can be deduced just by a visual inspection.Sometimes many separate crystals form the overgrowth on a single substrate, and then if there is epitaxy all the overgrowth crystals will have a similar orientation. The reverse, however, is not necessarily true. If the overgrowth crystals have a similar orientation there is probably an epitaxic relationship, but it is not certain.Some authors consider that overgrowths of a second generation of the same mineral species should also be considered as epitaxy, and this is common terminology for semiconductor scientists who induce epitaxic growth of a film with a different doping level on a semiconductor substrate of the same material. For naturally produced minerals, however, the International Mineralogical Association (IMA) definition requires that the two minerals be of different species.Another man-made application of epitaxy is the making of artificial snow using silver iodide, which is possible because hexagonal silver iodide and ice have similar cell dimensions.
https://en.wikipedia.org/wiki/Epitaxial_growth
In mineralogy, silicate minerals are classified into seven major groups according to the structure of their silicate anion: Tectosilicates can only have additional cations if some of the silicon is replaced by an atom of lower valence such as aluminum. Al for Si substitution is common.
https://en.wikipedia.org/wiki/Silicate_minerals
In mineralogy, tenacity is a mineral's behavior when deformed or broken.
https://en.wikipedia.org/wiki/Tenacity_(mineralogy)
In minerals, phosphorus generally occurs as phosphate. Good sources of phosphorus includes baking powder, instant pudding, cottonseed meal, hemp seeds, fortified beverages, dried whey.
https://en.wikipedia.org/wiki/Water-electrolyte_imbalance
In mines which use rubber tired equipment for coarse ore removal, the ore (or "muck") is removed from the stope (referred to as "mucked out" or "bogged") using center articulated vehicles (referred to as boggers or LHD (Load, Haul, Dump machine)). These pieces of equipment may operate using diesel engines or electric motors, and resemble a low-profile front end loader. LHD operated through electricity utilize trailing cables which are flexible and can be extended or retracted on a reel.
https://en.wikipedia.org/wiki/Block_caving
The ore is then dumped into a truck to be hauled to the surface (in shallower mines). In deeper mines, the ore is dumped down an ore pass (a vertical or near vertical excavation) where it falls to a collection level. On the collection level, it may receive primary crushing via jaw or cone crusher, or via a rockbreaker.
https://en.wikipedia.org/wiki/Block_caving
The ore is then moved by conveyor belts, trucks or occasionally trains to the shaft to be hoisted to the surface in buckets or skips and emptied into bins beneath the surface headframe for transport to the mill. In some cases the underground primary crusher feeds an inclined conveyor belt which delivers ore via an incline shaft direct to the surface. The ore is fed down ore passes, with mining equipment accessing the ore body via a decline from surface.
https://en.wikipedia.org/wiki/Block_caving
In minimal models, the central charge of the Virasoro algebra takes values of the type c p , q = 1 − 6 ( p − q ) 2 p q . {\displaystyle c_{p,q}=1-6{(p-q)^{2} \over pq}\ .} where p , q {\displaystyle p,q} are coprime integers such that p , q ≥ 2 {\displaystyle p,q\geq 2} . Then the conformal dimensions of degenerate representations are h r , s = ( p r − q s ) 2 − ( p − q ) 2 4 p q , with r , s ∈ N ∗ , {\displaystyle h_{r,s}={\frac {(pr-qs)^{2}-(p-q)^{2}}{4pq}}\ ,\quad {\text{with}}\ r,s\in \mathbb {N} ^{*}\ ,} and they obey the identities h r , s = h q − r , p − s = h r + q , s + p .
https://en.wikipedia.org/wiki/Minimal_model_(physics)
{\displaystyle h_{r,s}=h_{q-r,p-s}=h_{r+q,s+p}\ .} The spectrums of minimal models are made of irreducible, degenerate lowest-weight representations of the Virasoro algebra, whose conformal dimensions are of the type h r , s {\displaystyle h_{r,s}} with 1 ≤ r ≤ q − 1 , 1 ≤ s ≤ p − 1 .
https://en.wikipedia.org/wiki/Minimal_model_(physics)
{\displaystyle 1\leq r\leq q-1\quad ,\quad 1\leq s\leq p-1\ .} Such a representation R r , s {\displaystyle {\mathcal {R}}_{r,s}} is a coset of a Verma module by its infinitely many nontrivial submodules. It is unitary if and only if | p − q | = 1 {\displaystyle |p-q|=1} .
https://en.wikipedia.org/wiki/Minimal_model_(physics)
At a given central charge, there are 1 2 ( p − 1 ) ( q − 1 ) {\displaystyle {\frac {1}{2}}(p-1)(q-1)} distinct representations of this type. The set of these representations, or of their conformal dimensions, is called the Kac table with parameters ( p , q ) {\displaystyle (p,q)} . The Kac table is usually drawn as a rectangle of size ( q − 1 ) × ( p − 1 ) {\displaystyle (q-1)\times (p-1)} , where each representation appears twice due to the relation R r , s = R q − r , p − s . {\displaystyle {\mathcal {R}}_{r,s}={\mathcal {R}}_{q-r,p-s}\ .}
https://en.wikipedia.org/wiki/Minimal_model_(physics)
In minimum deviation, the refracted ray in the prism is parallel to its base. In other words, the light ray is symmetrical about the axis of symmetry of the prism. Also, the angles of refractions are equal i.e. r1 = r2.
https://en.wikipedia.org/wiki/Minimum_deviation
And, the angle of incidence and angle of emergence equal each other (i = e). This is clearly visible in the graph below. The formula for minimum deviation can be derived by exploiting the geometry in the prism.
https://en.wikipedia.org/wiki/Minimum_deviation
In mining of gold from dilute sources, gold is selectively extracted by dissolution in aqueous solutions of cyanide, provided by dissolving sodium cyanide, potassium cyanide and/or calcium cyanide. The reaction for the dissolution of gold, the "Elsner Equation", is: 4 Au + 8 KCN + O2 + 2 H2O → 4 K + 4 KOHIn this process, oxygen is the oxidant.It can also be produced by reaction of gold(I) salts with excess potassium cyanide. AuCl + 2 KCN → K + KCl
https://en.wikipedia.org/wiki/Potassium_dicyanoaurate
In mining, a rib pillar separates one stope from the other and is aligned transverse of the stope, perpendicular to the strike. It is used in mines to increase the strata stability of the stope and support the raises, winzes or shaft of the mine. == References ==
https://en.wikipedia.org/wiki/Rib_pillar
In mining, high grading refers to mining out the portions of the orebody that has the highest grade of material to be mined. However, it may also refer to the concealment and theft of valuable gold or silver ore by miners for personal profit. Common in the United States in the late 19th century and early 20th century, high graders would usually conceal the highest grades of ore they encountered during their work day in a pocket or lunch pail, or within the body, and later attempt to fence it on the black market. As mining companies became more aware of the growing problem, they built changing stations where they forced the miners to shower after their shift in the mines, making it easier to foil attempts at theft.
https://en.wikipedia.org/wiki/Selective_logging
“HIGH GRADING AT TONOPAH.” The arrest of four men for high grading took place at Tonopah last Friday morning as the men were coming off shift at the McNamara mine. The men arrested are William Turner, vice president of the Tonopah miners' union; Tom Conifrey, Tom Cunningham and Patrick Flanigan. They were caught with the rich ore concealed upon their persons, and it is said that nearly a wagonload of ore was recovered from the residences of the high graders.
https://en.wikipedia.org/wiki/Selective_logging
These men have been suspected for a long time, and Friday morning the entire shift was held up and searched. All were lodged in the county jail, and two of them have since given bail. It is announced that they will be prosecuted to the full extent of the law.
https://en.wikipedia.org/wiki/Selective_logging
In mining, tailings or tails are the materials left over after the process of separating the valuable fraction from the uneconomic fraction (gangue) of an ore. Tailings are different from overburden, which is the waste rock or other material that overlies an ore or mineral body and is displaced during mining without being processed. The extraction of minerals from ore can be done two ways: placer mining, which uses water and gravity to concentrate the valuable minerals, or hard rock mining, which pulverizes the rock containing the ore and then relies on chemical reactions to concentrate the sought-after material. In the latter, the extraction of minerals from ore requires comminution, i.e., grinding the ore into fine particles to facilitate extraction of the target element(s).
https://en.wikipedia.org/wiki/Tailings
Because of this comminution, tailings consist of a slurry of fine particles, ranging from the size of a grain of sand to a few micrometres. Mine tailings are usually produced from the mill in slurry form, which is a mixture of fine mineral particles and water.Tailings can be dangerous sources of toxic chemicals such as heavy metals, sulfides and radioactive content. These chemicals are especially dangerous when stored in water in ponds behind tailings dams.
https://en.wikipedia.org/wiki/Tailings
These ponds are also vulnerable to major breaches or leaks from the dams, causing environmental disasters. Because of these and other environmental concerns such as groundwater leakage, toxic emissions and bird death, tailing piles and ponds are often under regulatory scrutiny.
https://en.wikipedia.org/wiki/Tailings
There are a wide range of methods for recovering economic value, containing or otherwise mitigating the impacts of tailings. However, internationally, these practices are poor, sometimes violating human rights. To mitigate risks of harm, the first UN-level standard for tailing management was established 2020.
https://en.wikipedia.org/wiki/Tailings
In mining, the face is the surface where the mining work is advancing. In surface mining it is commonly called pit face, in underground mining a common term is mine face. Accordingly, face equipment is the mining equipment used immediately at the mine face used for removal and near-face transportation of the material: cutting machines, loaders, etc. == References ==
https://en.wikipedia.org/wiki/Coal_face
In mining, valuation is the process of determining the value or worth of a mining property - i.e. as distinct from a listed mining corporate. Mining valuations are sometimes required for IPOs, fairness opinions, litigation, mergers and acquisitions, and shareholder-related matters. In valuing a mining project or mining property, fair market value is the standard of value to be used. In general, this result will be a function of the property's "reserve" - the estimated size and grade of the deposit in question - and the complexity and costs of extracting this.
https://en.wikipedia.org/wiki/Investment_analysis
"CIMVal" generally applied by the Toronto Stock Exchange, is widely recognised as a "standard" for the valuation of mining projects. (CIMVal: Canadian Institute of Mining, Metallurgy and Petroleum on Valuation of Mineral Properties ) The Australasian equivalent is VALMIN; the Southern African is SAMVAL. These standards stress the use of the cost approach, market approach, and the income approach, depending on the stage of development of the mining property or project.
https://en.wikipedia.org/wiki/Investment_analysis
See for further discussion and context. Analyzing listed mining corporates (and other resource companies) is also specialized, as the valuation requires a good understanding of the company's overall assets, its operational business model as well as key market drivers, and an understanding of that sector of the stock market. Re the latter, a distinction is usually made based on size and financial capabilities; see Mining § Corporate classifications.
https://en.wikipedia.org/wiki/Investment_analysis
The price of a "Junior" mining stock, typically having one asset, will at its early stages be linked to the result of its feasibility study; later, the price will be a function of that mine's viability and value, largely applying the above techniques. A "Major", on the other hand, has numerous properties, and the contents of any single deposit will impact stock value in a limited fashion; this due to diversification, access to funding, and, also, since the share price inheres goodwill. Typically, then, the exposure is more to the market value of each mineral in the portfolio, than to the individual properties.
https://en.wikipedia.org/wiki/Investment_analysis
In minor injuries with little bleeding, there may be abdominal pain, tenderness in the epigastrium and pain in the left flank. Often there is a sharp pain in the left shoulder, known as Kehr's sign. In larger injuries with more extensive bleeding, signs of hypovolemic shock are most prominent. This might include a rapid pulse, low blood pressure, rapid breathing, paleness, and anxiety.
https://en.wikipedia.org/wiki/Splenic_injury
In mirror electron microscopy, electrons are slowed in the retarding field of the condenser lens to the limit of the instrument and thus, only allowed to interact with the “near-surface” region of the sample. It is very complicated to understand the exact contrast variations come from, but the important things to point out here are that height variations at the surface of the region change the properties of the retarding field, therefore influencing the reflected (specular) beam. No LEED pattern is formed, because no scattering events have taken place, and therefore, reflected intensity is high.
https://en.wikipedia.org/wiki/Low-energy_electron_microscopy
In mirror writing a text is deliberately displayed as its mirror image, in order to be read through a mirror. For example, emergency vehicles such as ambulances or fire engines use mirror images in order to be read from a vehicle's rear-view mirror. Some movie theaters also use mirror writing in a Rear Window Captioning System used to assist individuals with hearing impairments in watching films.
https://en.wikipedia.org/wiki/Mirror_plane_of_symmetry
In missile guidance, line of sight (LOS) is the line directly between the launcher/tacker and the target, which must be in view. If the target is moving the missile is constantly manoeuvred to be on the line of sight as it changes, this results in the missile flying a curved path to the target (see command to line-of-sight).The same path is flown as in pursuit guidance but without the missile having a seeker. No ranger data is used in the control and no prediction of intercept location made.
https://en.wikipedia.org/wiki/Line_of_sight_(missile)
In mission-critical software systems, formal methods may be used to ensure the correct operation of a system. These formal methods can prove costly, however, representing as much as 80 percent of total software design cost.
https://en.wikipedia.org/wiki/Software_verification_and_validation
In missions from peacekeeping operations to major theater war, the E-8C can provide targeting data and intelligence for attack aviation, naval surface fire, field artillery and friendly maneuver forces. The information helps air and land commanders to control the battlespace.The E-8's ground-moving radar can tell approximate number of vehicles, location, speed, and direction of travel. It cannot identify exactly what type of vehicle a target is, tell what equipment it has, or discern whether it is friendly, hostile, or a bystander, so commanders often crosscheck the JSTARS data against other sources. In the Army, JSTARS data is analyzed in and disseminated from a Ground Station Module (GSM).
https://en.wikipedia.org/wiki/E-8_J-STARS
In mistrustful cryptography the participating parties do not trust each other. For example, Alice and Bob collaborate to perform some computation where both parties enter some private inputs. But Alice does not trust Bob and Bob does not trust Alice. Thus, a secure implementation of a cryptographic task requires that after completing the computation, Alice can be guaranteed that Bob has not cheated and Bob can be guaranteed that Alice has not cheated either.
https://en.wikipedia.org/wiki/Quantum_Cryptography
Examples of tasks in mistrustful cryptography are commitment schemes and secure computations, the latter including the further examples of coin flipping and oblivious transfer. Key distribution does not belong to the area of mistrustful cryptography. Mistrustful quantum cryptography studies the area of mistrustful cryptography using quantum systems.
https://en.wikipedia.org/wiki/Quantum_Cryptography
In contrast to quantum key distribution where unconditional security can be achieved based only on the laws of quantum physics, in the case of various tasks in mistrustful cryptography there are no-go theorems showing that it is impossible to achieve unconditionally secure protocols based only on the laws of quantum physics. However, some of these tasks can be implemented with unconditional security if the protocols not only exploit quantum mechanics but also special relativity. For example, unconditionally secure quantum bit commitment was shown impossible by Mayers and by Lo and Chau.
https://en.wikipedia.org/wiki/Quantum_Cryptography
Unconditionally secure ideal quantum coin flipping was shown impossible by Lo and Chau. Moreover, Lo showed that there cannot be unconditionally secure quantum protocols for one-out-of-two oblivious transfer and other secure two-party computations. However, unconditionally secure relativistic protocols for coin flipping and bit-commitment have been shown by Kent.
https://en.wikipedia.org/wiki/Quantum_Cryptography